loader

Device Management Engineer/Information Security Engineer

Location :Bangalore

Total Experience:

2 years

Job Skills:

  • Hands-on experience with implementation of DLP technology across a large enterprise must hands-on experience having worked on Forcepoint DLP (For Endpoints) Administration of the DLP tools to include configuration of policies, upgrading, patching etc.
  • Monitor and respond to alerts generated from the DLP systems and other technologies.
  • Understand and follow the incident response process through event escalations.
  • Collaborate with business groups to help them identify, classify, and secure high value data. Sound knowledge of DLP versions, patches and other initiatives for system updating/up gradation.
  • Implementation of proactive measures to enhance accuracy and effectiveness of DLP too.

Responsibilities:

  • Should act as front level defensive agent in monitoring the various infrastructure devices.
  • Should assist L2 in generating the tickets to the customer, if any suspicious activity observed.
  • Provide support in the malicious activities detections with various SIEM supporting tools.
  • Must have hands-on experience with any SIEM such as Log Rhythm, Arc sight, Splunk and
    others.
  • Must have knowledge on packet analysis, various Cyber security attack patterns.
  • Assist with applications/tools including but not limited to SIEM, IPS, Net flow, e-mail gateway protection, and DLP tools.
  • Must know the best practices for Cyber-attack Mitigations.
  • Review and update SOC Management Reports for policies, procedures, standards and
    guidelines.
  • Research and evaluate applications and services for use by the institution.
  • Provide a matrix when possible, detailing features within each different application or service.
  • Assistance with the deployment and upkeep of the cyber security department’s website content.
  • Provide first level compliance monitoring and investigations.
  • Assist with forensics analysis and fact gathering.
  • Assist with vulnerability assessments and penetration testing for specific applications, services, networks and servers as required.
  • Perform compliance audits against institutionally accepted security controls.
  • Record and track IT security incidents, including but not limited to copyright violations,
    compromised accounts, e-mail threats, and abuse reports.

Our 15 years of achievements includes:

  • 10M+

    lines of codes

  • 2400+

    projects completed

  • 900+

    satisfied clients

  • 16+

    counties served

Consult with us Now