Device Management Engineer/Information Security Engineer
Location :BangaloreTotal Experience:
2 years
Job Skills:
- Hands-on experience with implementation of DLP technology across a large enterprise must hands-on experience having worked on Forcepoint DLP (For Endpoints) Administration of the DLP tools to include configuration of policies, upgrading, patching etc.
- Monitor and respond to alerts generated from the DLP systems and other technologies.
- Understand and follow the incident response process through event escalations.
- Collaborate with business groups to help them identify, classify, and secure high value data. Sound knowledge of DLP versions, patches and other initiatives for system updating/up gradation.
- Implementation of proactive measures to enhance accuracy and effectiveness of DLP too.
Responsibilities:
- Should act as front level defensive agent in monitoring the various infrastructure devices.
- Should assist L2 in generating the tickets to the customer, if any suspicious activity observed.
- Provide support in the malicious activities detections with various SIEM supporting tools.
- Must have hands-on experience with any SIEM such as Log Rhythm, Arc sight, Splunk and
others. - Must have knowledge on packet analysis, various Cyber security attack patterns.
- Assist with applications/tools including but not limited to SIEM, IPS, Net flow, e-mail gateway protection, and DLP tools.
- Must know the best practices for Cyber-attack Mitigations.
- Review and update SOC Management Reports for policies, procedures, standards and
guidelines. - Research and evaluate applications and services for use by the institution.
- Provide a matrix when possible, detailing features within each different application or service.
- Assistance with the deployment and upkeep of the cyber security department’s website content.
- Provide first level compliance monitoring and investigations.
- Assist with forensics analysis and fact gathering.
- Assist with vulnerability assessments and penetration testing for specific applications, services, networks and servers as required.
- Perform compliance audits against institutionally accepted security controls.
- Record and track IT security incidents, including but not limited to copyright violations,
compromised accounts, e-mail threats, and abuse reports.