Job Description Send me Jobs like this
Job Description Send me Jobs like this

Min 10-12 yrs of experience in the information Security platform
Expertise at correlating events detected by various security solutions deployed at a customer environment to determine if implies a potential security incident.
Perform research & log analysis on a wide range of security technologies including, but not limited to: SEIM, IDS/IPS, HIDS, Data Loss Prevention, Application Firewalls and Vulnerability Scanners
Build awareness/knowledge base on existing as well as upcoming IT security solutions from security vendors (including API based and Non-API based event logging devices)
Create Symantec engineering specifications for individual security products to correctly interpret security log entries to security events (Intrusion, Malware, scan, data leakage) to be gathered from these security products
Leverage automation studio to build translation logic for each unique log pattern for a security device to accurately and consistently interpret similar security events across security devices from different vendors.
Leverage automation studio to build specific connectors & translators per security device to be supported or automated log collection, translation and correlation
Exposure/understanding of the Cloud environments (AWS/Azure, etc.)
Guide and mentor junior team members
Responsible for leading team of junior members in delivery of log collection and translation support for newer versions of security devices and new security devices
Understand enterprise/customer security programs/architectures for IT infrastructure security
Research & understand trends in enterprise IT environments to identify evolving needs of customers to manage internal security incidents
Salary: Not Disclosed by Recruiter

Industry:IT-Software / Software Services

Functional Area:IT Software – Network Administration , Security

Role Category:Programming & Design

Role:Technical Architect

Employment Type: Permanent Job, Full Time

Keyskills
Information Security Consulting Vulnerability Assessment Cissp Data Loss Prevention Log Analysis IT Security Ethical Hacking Infrastructure Security Dlp IPS
Desired Candidate Profile
Qualification:

12-14 years relevant experience.
BCA/ MCA/Engineering Degree
Experience in analyzing, researching Windows / Unix Security Logs as well as logs form IDS/IPS, HIDS DLP, Next Generation Firewalls, Anti-Virus/Malware, Vulnerability Assessment solutions
Experience in threat/incident detection through accurate interpretation of the event logs
Ability to adapt to changing priorities, meet deadlines and work well under pressure
Security Certifications like Ethical Hacking, GSEC, SSCP, CISSP etc.

Qualification BE/BTECH/ MCA/MSC/ MBA IT

Education-

UG: BCA – Computers, B.Tech/B.E. – Any Specialization

PG:MCA – Computers, MBA/PGDM – Information Technology, MS/M.Sc(Science) – Any Specialization

Doctorate:Doctorate Not Required

Company Profile:
Harel Consulting

Client of Harel Consulting

LEAVE A REPLY

Please enter your comment!
Please enter your name here