Chat

iimjobs

jobseeker Logo
Now Apply on the Go!
Download iimjobs Jobseeker App and get a seamless experience for your job-hunting
12/12 Rajdeep Singh
HR at Jubilant HR Consultants

Views:7205 Applications:35 Rec. Actions:Recruiter Actions:11

Assistant Manager - Network Security Analyst - Fund Management Firm (5-8 yrs)

Mumbai Job Code: 774920

Assistant Manager - Network Security Analyst 


Our Client has an of rich experience in fund management expertise by consistently delivering value to its investors. They have a strong and proud lineage that traces back to a large Indian Bank along with a Joint Venture with one of the world's leading fund management companies.

Job Location - Mumbai

Job Position- Assistant Manager - IT Security

Report to - Chief Manager - Information Security Officer

Role and Responsibilities

The Network Security Analyst would be part of the Team entrusted to drive the overall agenda of the Network Security of the Company in accordance with the established policies and procedures & program through various initiatives by working closely with various stakeholder including external entities such as vendors / third parties and provide periodic updates to the Information Security officer and Information Security Committee / senior management.

Work closely with IT and other functional teams to:

- Lead the design, review, and implementation of security initiatives.

- Identify significant actual and potential cyber security problems, trends, and weaknesses and recommends specific modifications and solutions to reduce information systems security risks.

- Provide architectural design and coordinate the implementation of security solutions to integrate into existing network environment.

- Establish requirements and make recommendations on the appropriate infrastructure protection tools, methods, and technologies.

- Develop strategies for responding to future security challenges. Demonstrate effectiveness of the program for implementation on an organization-wide basis.

- Review, create and update security policies, procedures and standards, and present them to management for endorsement.

- Establish technical or procedural enforcements for pertinent policies within the organization.

- Facilitate organizational-wide communications and institute measures to ensure information security awareness and compliance.

- Review new and existing systems, networks, and software designs for potential security risks, and resolve integration security issues across disciplines.

- Define the scope and level of detail for applicable security plans and policies.

- Implement and interpret the requirements of ISO 27001, 27002, COBIT 5 policies, mandates and standards.

- Develop the project plan for the implementation, identify major milestones and activities, and coordinate development and implementation.

- Develop plan and methodology for testing and measuring IT compliancy.

- Act as a key member of the Incident Response Team, who may be called upon to represent in the investigation of serious cyber security violations that potentially impact the integrity of infrastructure.

- Recommend action for containment and remediation based on findings, and following up to ensure the implementation of corrective actions.

- Proactively monitor security infrastructure and tools to ensure reliability and integrity of systems and applications.

- Develop and implement operational response procedures to maximize visibility, maintain stability and prioritize criticality of identified issues.

- Investigate and respond rapidly to identify security incidents.

- Acquire, analyze, and interpret forensic images, packet captures and logs to accomplish rapid and accurate incident response.

- Recommend and implement tools, standards and procedures to facilitate future investigations.

- Educate IT team members in security best practices.

- Collaborate with IT Teams to incorporate security best practices into daily workflow and procedures.

- Assist with development and implementation of Security Awareness Training for entire organization.

- Management Dashboard on a periodic basis for Cyber Security Events

- Recommend secure practices for Cloud Environment

Skills & Competencies

- Strong knowledge of the requirement of Computer Applications and Network security technologies and principles

- Firewall rule base management tools

- Log analysis software

- Internet proxy servers

- Various operating systems (e.g. Windows and Linux)

- Network security (Firewalls, proxies, DNS, IPS, switching/routing, encryption, etc.

- Excellent oral and written communication skills and interpersonal skills.

- Self-starter, go-getter with ample resourcefulness to get things done

- Demonstrated ability to perform under tight timelines

- Strong communication Skills and ability to mentor

- Demonstrated skill in developing policies and procedures

Qualification & Experience

- Bachelor's in Computer Science BE or BCA.

- Five (5) + years' experience in firewalls, routers, proxies, load balancers, and WAF.

- Excellent oral and written communication skills and interpersonal skills.

- Proficient in network protocols such as TCP/IP, HTTP/HTTPS, SSH, SSL, BGP, DNS, SNMP, and VRRP.

- Proficient in firewalls, routers, proxies, load balancers, WAF, IPS and Windows-based systems.

- Proficient at securing systems (e.g. common operating systems, network equipment).

- Proficient in security concepts such as identity management, least privilege, defence in depth and separation of duties

- Proficient in security technologies such as IPS, VPNs, D/DoS and vulnerability management. Working knowledge of common web architectures and related security risks.

- Working knowledge of large-scale networks including architecture and security risks. Working knowledge of linux based operating systems.

- Working knowledge of scripting languages (Python or Perl preferred). Familiarity with incident response and forensic investigation.

- Experience writing technical specifications and operational documentation

This job opening was posted long time back. It may not be active. Nor was it removed by the recruiter. Please use your discretion.

Women-friendly workplace:

Maternity and Paternity Benefits

Add a note
Something suspicious? Report this job posting.