Job Description
Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
Ensuring customer centricity by providing apt cybersecurityMonitoring and safeguarding the log sources and security access
Planning for disaster recovery in the event of any security breaches
Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
Conduct security assessments, risk analysis and root cause analysis of security incidents
Handling incidents escalated by the L1 team in 24×7 rotational shifts
Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
Completing all tactical security operations tasks associated with this engagement.
Analyses all the attacks and come up with remedial attack analysis
Conduct detailed analysis of incidents and create reports and dashboards
Stakeholder coordination & audit assistance
Liaise with stakeholders in relation to cyber security issues and provide future recommendations
Maintain an information security risk register and assist with internal and external audits relating to information security
Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
Advice and guidance to employees on issues such as spam and unwanted or malicious emails
Join Our Group To Get More Job Alerts -Click Here
Stakeholder Interaction
Stakeholder Type Stakeholder Identification Purpose of Interaction
Internal
Technical Lead/ Project Lead
Regular reporting & updates
Security Intelligence (Practice)
Coordination for security reasons
External
Customer
To coordinate for all security breaches & resolutions
Display
Lists the competencies required to perform this role effectively:
Functional Competencies/ SkillLeveraging Technology – Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization – Expert
Process Excellence – Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk – Expert
Functional/Technical – Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills – Master
Competency Levels
Foundation
Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance.
Competent
Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well.
Expert
Applies the competency in all situations and is serves as a guide to others as well.
Master
Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization.
Behavioral Competencies
Effective Communication
Collaborative Working
Execution Excellence
Problem Solving & Analytical Skills
Deliver
No. Performance Parameter Measure
1. Customer centricity
Timely security breach solutioning to end users, Internal stakeholders & external customers experience
2. Process Adherence
Adherence to SLA’s (90-95%), response time and resolution time TAT