The purpose of this role is to analyse, identify, rectify &recommend specific improvement measures that help in the securityposture of the organization by protecting the sensitive information
Ensuring customer centricity by providing aptcybersecurity
- Monitoring and safeguarding the log sources and security access
Planning for disaster recovery in the event of any securitybreaches
Monitor for attacks, intrusions and unusual, unauthorized orillegal activity
Performs moderately complex log reviews and forensic analysis toidentify unauthorized or unacceptable access to data or systems
Conduct security assessments, risk analysis and root causeanalysis of security incidents
Handling incidents escalated by the L1 team in 24x7 rotationalshifts
Use advanced analytics tools to determine emerging threatpatterns and vulnerabilities
Completing all tactical security operations tasks associatedwith this engagement.
Analyses all the attacks and come up with remedial attackanalysis
Conduct detailed analysis of incidents and create reports anddashboards
Stakeholder coordination & audit assistance
Liaise with stakeholders in relation to cyber security issuesand provide future recommendations
Maintain an information security risk register and assist withinternal and external audits relating to information security
Assist with the creation, maintenance and delivery of cybersecurity awareness training for colleagues
Advice and guidance to employees on issues such as spam andunwanted or malicious emails
Purpose of Interaction
Technical Lead/ Project Lead
Regular reporting & updates
Security Intelligence (Practice)
Coordination for security reasons
To coordinate for all security breaches & resolutions
Lists the competencies required to perform this role effectively:
Functional Competencies/ Skill
Leveraging Technology - Knowledge of current and upcoming technology(automation, tools and systems) to build efficiencies and effectivenessin own function/ Client organization - Expert
Process Excellence - Ability to follow the standards and norms toproduce consistent results, provide effective control and reduction ofrisk – Expert
Functional/Technical - Knowledge of Network Security devices,firewalls, end points, SIEM, application security, IPS/IDS, VA / PTskills - Master
Knowledgeable about the competency requirements. Demonstrates (inparts) frequently with minimal support and guidance.
Consistently demonstrates the full range of the competencywithout guidance. Extends the competency to difficult and unknownsituations as well.
Applies the competency in all situations and is serves as a guideto others as well.
Coaches others and builds organizational capability in thecompetency area. Serves as a key resource for that competency and isrecognized within the entire organization.
Problem Solving & Analytical Skills
Timely security breach solutioning to end users,Internal stakeholders & external customers experience
Adherence to SLA’s (90-95%), response time and resolutiontime TAT