The main job responsibilities of the incumbent is to secure enterprise information by determining security requirements, planning, implementing, and testing security systems, preparing security standards, policies, and procedures and mentoring team members.
The ability to be the enterprise security subject matter expert who can explain technical topics to those without a technical background.
Direct, hands-on experience or strong working knowledge of managing security infrastructure e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology
Verifiable experience reviewing application code for security vulnerabilities
Direct, hands-on experience or a strong working knowledge of vulnerability management tools
Documented experience and a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services.
Full-stack knowledge of IT infrastructure : Applications, Databases, Operating systems Windows, Unix and Linux, Hypervisors, IP networks WAN and LAN, Storage networks Fibre Channel, iSCSI and NAS, Backup networks and media
Direct experience designing IAM technologies and services : Active Director, Lightweight Directory Access Protocol (LDAP), Amazon Web Service (AWS) IAM
Experience designing the deployment of applications and infrastructure into public cloud services.
Security architecture, demonstrating solutions delivery, principles and emerging technologies Designing and implementing security solutions.
Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements.
Security considerations of cloud computing during and after migration.
Education & Certifications
Roles & Responsibilities
Deliver profitable, Secure and efficient Cyber Security solutions to meet business objectives and solves clients problems.
Capturing and translating well-defined customer security requirements into high-level solution / component designs.
Translating high-level solution and component designs into low-level designs and implementable configurations.
Review existing architecture, identify design gaps, and recommend security enhancements.
Collaborate closely with project management team to ensure that overall client’s Information Security governance strategy requirements met in client’s Group IT Infrastructure.
Review and assess the documents (Technical proposal, HLD, LLD) of new and upgrade projects to ensure the necessary security controls are taken into consideration within the design stages of the projects.
Lead security efforts assisting with the integration and initial implementation of solutions.
Build internal, external and third party supplier relationships to ensure full commitment and support.
Support the comprehension of client’s existing security solutions.
Research and Provide subject matter expertise on security solution that would augment the controls and improve user experience across the organization and its clients.
Understand current and emerging security threats and design security architecture to mitigate threats where possible.
Lead and execute preparation of RFI, RFP, MSRFP, bidder response evaluations and vendor engagements.
Develop and review information security policy, procedure and standard.
Lead, access and recommend the security control requirement for cloud migration.
Contributes in preparing budgets for the solutions and provide inputs for the yearly organization budgets business plan.