Safeguards information system assets by identifying and solving potential and actual security problems.
Protects systems by defining access privileges, control structures, and resources.
Recognizes problems by identifying abnormalities; reporting violations.
Implements security improvements by assessing current situation; evaluating trends; anticipating requirements.
Determines security violations and inefficiencies by conducting periodic audits.
Upgrades the system by implementing and maintaining security controls.
Keeps users informed by preparing performance reports; communicating system status.
Maintains quality service by following organization standards.
Maintains technical knowledge by attending educational workshops; reviewing publications.
Contributes to team effort by accomplishing related results as needed.
Partnering with application developers on secure software development for on-premises and cloud native applications
Implementing application security solutions that leverage AWS services and other third-party services
Advising and implementing on-premises and AWS cloud security best practices
Serving internal clients on security challenges/solutions
Implementing, testing, and maintaining security technologies across the stack (e.g., network, application, data)
Planning, engineering, and monitoring the security arrangements for the protection of the network systems.
Identifying, monitoring, and defining the requirements of the overall security of the system.
Creating different ways to solve the existing threats and security issues.
Configuring and implementing intrusion detection systems and firewalls.
Testing and checking the system for weaknesses in software and hardware.
Maintaining firewalls, virtual private networks, web protocols, and email security.
Creating virus and threat detection systems.
Configuring and installing security infrastructure devices.
Investigating intrusion and hacking incidents, collecting incident responses, and carrying out forensic investigations.
Determining the latest technologies and processes that improve the overall security of the system.
Using industry-standard analysis criteria to test the security level of the firm.
Developing tracking documents to note system vulnerabilities.
Reporting the security analysis and monitoring findings.
Supervising the configuration and installation of new software and hardware.
Implementing regulatory systems in accordance with IT security.
Informing the company about the security incidents as soon as possible.
Modifying the technical, legal, and regulatory aspects of the system security.
Defining and maintaining security policies.
Occasionally replacing the security system protocol and architecture.
Maintaining switches and servers.
Skills & Experience:
Computer Science/Software Engineering (or related) degree
Experience with Windows and Unix/Linux security, Firewalls, Network Protocols, Networking Standards, Data analysis capabilities
Implementation experience of Identity and Access Control Management.
Implementation experience Security Information and Event Management
Extensive experience designing and implementing enterprise level and complex solutions for distributed systems
Experience with AWS and have implemented best practices
Experience with SSO, MFA setup
Recruiting For : Jewel Pro Tech Private Limited
Contact Email : info@jewelprotech.com
Please do not pay any money to anyone who promises to offer you a guaranteed job.This could be in the form of a registration fee or document processing fee or any other pretext.
The money could be asked upfront or it could be asked after trust has been built or after some correspondence has been exchanged.
If you get a job offer or a letter of intent without having been through an interview process it is probably a scam and you should contact @ support@beatsjobs.com.
Beats Jobs does not promise a job or an interview in exchange for money. We value your trust and are committed to making your job search a safe and fraud free experience on beatsjobs.com