Post Job Free
Sign in

Technical Specialist

Company:
HCL Technologies Limited
Location:
Noida, Uttar Pradesh, India
Posted:
May 07, 2024
Apply

Description:

Posting).

Job Requirements -

Hands on experience on End-point Security portfolio, preferably TrendMicro Deep Security/Trend Micro OfficeScan/ApexOne (Reconciliation, Remediation, Configuration and Troubleshooting)

Hands on experience on EDR Solutions, preferably FireEye HX (Reconciliation, Remediation, Configuration and Troubleshooting)

Experienced on Data Loss Prevention Solutions, preferably Forcepoint DLP (Reconciliation, Remediation, Configuration and Troubleshooting)

Hands on Experience on Zscaler

Should have good knowledge of information security areas such as Vulnerability Management, Penetration Testing, Risk Management, Web Application Scanning, Policy Compliance

Experience in actual network Vulnerability Assessment (Eg Tenable Security Center Servers, Scanners and Agents/Qualys)

Experience in working with IDS/IPS, Splunk

Able to understand, design and develop threat mitigation strategy, prioritize identified threats, managing risks associated with threats.

Provide technical expertise in identifying modeling and reporting on emerging threats using different threat management tools like - ObserveIT

Knowledge of security policies and standards and such as PCI-DSS and ISO 17799, 27001

Good understanding of domains such as Network security, Firewall audits, VA/PT, Access Management etc. (1.) To clearly understand the client's cybersecurity environment and respective product. (2.) To monitor, configure, and troubleshoot cybersecurity issues and related monitoring tools (3.) To analyse and validate cybersecurity incidents in-detail and help the L3 team with RCAordata or logs collection (4.) To enable knowledge transferortrainings through creationor maintenance of configuration documents, test plans, operational manuals and provide operational training to L1 team. (5.) To analyse and fine-tune cybersecurity policies, participate in cybersecurity review calls pertaining to change requests and recommendations on cybersecurity policy changes. (6.) To implement changes, monitor security device performance and implements performance tuning when necessary. (7.) To prepare analyses and reports to highlight the project progressorchallenges and ensure quality and accuracy to the client

Qualification

B-Tech

Skill (Primary)

Information Security-Identity and Access Management-Web Access Management Implementation

Full time

Apply