Cyber security analyst iiPosted: Feb. 2, 2022, 5 a.m. - Full Time - Bangalore
The Cyber Security and Data Protection resource deals with advanced, complex, and ever changing threats which could affect the Syniverse brand and/or business operations. Demonstrates a strong self-managed individual delivering against enterprise level cyber security programs. Drive delivery for the implementation, monitoring, and continuous improvement of Security Operations Centers SOCs and Cyber Fusion Center, Vulnerability Management, Incident Handling & Response and Data Protection practices
Contributes to the development and organization of Cyber Security and Data Protection program management, threat intelligence, defense monitoring and vulnerability management. Ability to establish metrics and reporting for both technical and non-technical stakeholders. Operates one or more Cyber functions including leveraging a follow the sun model supporting established SOCs and Cyber Fusion Center, Vulnerability Management, Incident Handling & Response and Data Protection practices
Reviews and evaluates Cyber Security and Data Protection process for the department or organization, provides technical and policy enforcement for Cyber Security and Data Protection operation, makes recommendations on security approaches, maintains knowledge of the latest technologies in information security, develops and maintains Cyber Security and Data Protection procedures and policies for team, evaluates and audits Cyber Security and Data Protection processes and recommends process improvements.
Principal Duties and Responsibilities:
25 Percent Enforces Cyber Security and Data Protection Efforts Operate Individual and or cross-functional team activities, providing leadership, guidance and consultation to the team, as needed to address issues. • Executes project plan(s) and resource requirements • Supports and enforces a team model to ensure the Syniverse brand and/or business operations. • Operates a follow the sun model for SOCs. • Provides recommendations to reduce the threat landscape by improving the vulnerability management program. • Provides recommendations to continuously enhance Incident Response capabilities
25 percent Identify Needs, Develop, and Maintain Critical Security information • Enhance threat intelligence leveraging technology and information available from both internal and external sources. • Cultivate team knowledge and skill sets to develop and respond to cyber threats • Monitors and safeguards data in real time • Ensure and maintain good relationships exist within Syniverse
20 percent Resolve Security Issues • SOCs are capable of receiving events from monitored systems and routing to dedicated personnel for review. • Contribute to the success of forensics capabilities. • Extend proactive monitoring of enterprise network and systems. • Address identified and confirmed security events in a timely manner. • Work with other groups to ensure continuity and coverage of the enterprise
30 percent Delivery • Operationalizes core Cyber Security and Data Protection functions • Establish and manage responsible program measurement • Analyzes and assesses vulnerabilities in the infrastructure software, hardware, networks • Investigates available tools and countermeasures to remedy the detected vulnerabilities, and recommends solutions and best practices • Analyzes and assesses damage to the data/infrastructure as a result of security incidents, examines available recovery tools and processes • Tests for compliance with security policies and procedures • May assist in the creation, implementation, and/or management of security solutions.
Job Requirements: Knowledge Requirements • Moderate to Advanced understanding of Cyber Security and Data Protection • Moderate to Advanced telecommunications and wireless industry knowledge • Moderate to Advanced written and oral communication skills • Moderate to Advanced analytical skills • Working knowledge of Project Management discipline and process • Certification as a CISSP, CISA and/or CFE, or GIAC certification • Organization, leadership and facilitation skills • Moderate to Advanced influence skills • Moderate to Advanced -level troubleshooting skills • Moderate to Advanced Knowledge of Security Policies/Practices • Limited to Moderate Security Application knowledge • Moderate to Advanced industry knowledge • Moderate to Advanced knowledge in SOC operations, Vulnerability Management, Incident Handling & Response and Data Protection practices • Moderate to Advanced level of awareness of current attack vectors
Experience Requirements • BS in Computer Science, Information Systems, related field or equivalent work experience • 3 to 5 years experience as a security practitioner preferred • Technology experience with the following o Vulnerability management tools, SIEM, advanced cyber security tools, Firewall and router configuration, switches, secure network architecture, VPNs, PKI, Portals, Cisco, network monitoring technologies, Solaris, AIX , HP-UX, Red Hat Linux, Checkpoint, IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Radius, F5, Nessus, security tools and facilities
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. It is not designed to be utilized as a comprehensive list of all duties, responsibilities, and qualifications required of employees assigned to this job.