Job Description
<strong><em>Role Purpose<br><br></em></strong><em>The purpose of this role is to analyse, identify, rectify &recommend specific improvement measures that help in the securityposture of the organization by protecting the sensitive information<br><br></em><strong> <br><br></strong><strong><em>Do</em></strong><ul><li><strong>Ensuring customer centricity by providing aptcybersecurity </strong></li><ul><li>Monitoring and safeguarding the log sources and security access</li><li>Planning for disaster recovery in the event of any securitybreaches</li><li>Monitor for attacks, intrusions and unusual, unauthorized orillegal activity</li><li>Performs moderately complex log reviews and forensic analysis toidentify unauthorized or unacceptable access to data or systems</li><li>Conduct security assessments, risk analysis and root causeanalysis of security incidents</li><li>Handling incidents escalated by the L1 team in 24×7 rotationalshifts</li><li>Use advanced analytics tools to determine emerging threatpatterns and vulnerabilities</li><li>Completing all tactical security operations tasks associatedwith this engagement.</li><li>Analyses all the attacks and come up with remedial attackanalysis</li><li>Conduct detailed analysis of incidents and create reports anddashboards</li></ul></ul><ul><li><strong>Stakeholder coordination & audit assistance</strong></li><ul><li>Liaise with stakeholders in relation to cyber security issuesand provide future recommendations</li><li>Maintain an information security risk register and assist withinternal and external audits relating to information security</li><li>Assist with the creation, maintenance and delivery of cybersecurity awareness training for colleagues</li><li>Advice and guidance to employees on issues such as spam andunwanted or malicious emails<br><br></li></ul></ul><strong><em>Stakeholder Interaction<br><br></em></strong><strong><em>Stakeholder Type<br><br></em></strong><strong><em>Stakeholder Identification<br><br></em></strong><strong><em>Purpose of Interaction<br><br></em></strong><strong><em>Internal<br><br></em></strong><em>Technical Lead/ Project Lead<br><br></em><em>Regular reporting & updates<br><br></em><em>Security Intelligence (Practice)<br><br></em><em>Coordination for security reasons<br><br></em><strong><em>External<br><br></em></strong><em>Customer<br><br></em><em>To coordinate for all security breaches & resolutions<br><br></em><strong><em>Display<br><br></em></strong><em>Lists the competencies required to perform this role effectively:</em><ul><li><strong>Functional Competencies/ Skill</strong></li><ul><li>Leveraging Technology – Knowledge of current and upcoming technology(automation, tools and systems) to build efficiencies and effectivenessin own function/ Client organization – Expert</li><li>Process Excellence – Ability to follow the standards and norms toproduce consistent results, provide effective control and reduction ofrisk β Expert</li><li>Functional/Technical – Knowledge of Network Security devices,firewalls, end points, SIEM, application security, IPS/IDS, VA / PTskills – Master<br><br></li></ul></ul><em>Competency Levels<br><br></em><em>Foundation<br><br></em><em>Knowledgeable about the competency requirements. Demonstrates (inparts) frequently with minimal support and guidance.<br><br></em><em>Competent<br><br></em><em>Consistently demonstrates the full range of the competencywithout guidance. Extends the competency to difficult and unknownsituations as well.<br><br></em><em>Expert<br><br></em><em>Applies the competency in all situations and is serves as a guideto others as well.<br><br></em><em>Master<br><br></em><em>Coaches others and builds organizational capability in thecompetency area. Serves as a key resource for that competency and isrecognized within the entire organization.</em><ul><li><strong>Behavioral Competencies</strong></li><ul><li>Effective Communication</li><li>Collaborative Working</li><li>Execution Excellence</li><li>Problem Solving & Analytical Skills<br><br></li></ul></ul><strong> <br><br></strong><strong><em>Deliver<br><br></em></strong><strong><em>No.<br><br></em></strong><strong><em>Performance Parameter<br><br></em></strong><strong><em>Measure<br><br></em></strong><li><br><br></li><em>Customer centricity <br><br></em><em>Timely security breach solutioning to end users,Internal stakeholders & external customers experience<br><br></em><li><br><br></li><em>Process Adherence <br><br></em><em>Adherence to SLAβs (90-95%), response time and resolutiontime TAT<br><br></em>Penetration Testing – PT