Peer to Peer Jobs | Peer to Peer Hiring - ReferXtra

Job Details

IT Security Engineer , Project Implementation (Level 2)

Mendarla
Permanent
10 days ago
₹4612.5

SOLAR INDUSTRIES

Accountancy Software

2018-02-08 18:43:22

₹300000

4-6 Yrs

Mendarla

Job Description

Name of Position  : IT Security Engineer , Project Implementation (Level 2)
Experience		: 04 -06 Years
Qualification		: Degree or Diploma in Computers
Offered CTC		: Upto 06 Lakhs 
Roles & Responsibility:

Architects , designs , implements , maintain and operate information system security controls and countermeasures.
Analyzes and recommends security controls and procedures in acquisition , development , and change management lifecycle of information systems , and monitors for compliance.
Analyzes and recommends security controls and procedures in business processes related to use of information systems and assets , and monitors for compliance.
Monitors information systems for security incidents and vulnerabilities;
 develops monitoring and visibility capabilities;
 reports on incidents , vulnerabilities , and trends.
Responds to information system security incidents , including investigation of , countermeasures to , and recovery from computer-based attacks , unauthorized access , and policy breaches;
 interacts and coordinates with third-party incident responders , including law enforcement.
Administers authentication and access controls , including provisioning , changes , and deprovisioning of user and system accounts , security/access roles , and access permissions to information assets.
Analyzes trends , news and changes in threat and compliance environment with respect to organizational risk;
 advises organization management and develops and executes plans for compliance and mitigation of risk;
 performs risk and compliance self-assessments , and engages and coordinates third-party risk and compliance assessments.
Analyzes and develops information security governance , including organizational policies , procedures , standards , baselines and guidelines with respect to information security and use and operation of information systems.
Develops and administers , or provides advice , evaluation , and oversight for , information security training and awareness programs.
 University degree or college diploma required , preferably in the field of computer science or other related academic fields
3 to 6  years of experience managing and configuring enterprise security solutions

Preferred Skills

  • Project Implementation,Information System Security Controls,Countermeasures,Security Controls,Acquisition,Change Management,Information Systems,Monitors,Business Processes,Monitors Information Systems,Information System,Law Enforcement,Provisioning,Organizational,Organization Management,Risk&Compliance,Information Security Governance,Baselines,Information Security,Evaluation,Awareness Programs,Project Implementation,Information System Security Controls,Countermeasures,Security Controls,Acquisition,Change Management,Information Systems,Monitors,Business Processes,Monitors Information Systems,Information System,Law Enforcement,Provisioning,Organizational,Organization Management,Risk&Compliance,Information Security Governance,Baselines,Information Security,Evaluation,Awareness Programs,Project Implementation,Information System Security Controls,Countermeasures,Security Controls,Acquisition,Change Management,Information Systems,Monitors,Business Processes,Monitors Information Systems,Information S

Required Skills

  • Enterprise Security Solutions,Enterprise Security Solutions,Enterprise Security Solutions,Enterprise Security Solutions

Refer Your Friend

HIreXtra then contact your Friend / colleague/Co Worker

If your Friend Got job Offer

After 90 Days of his Stay, We process your reference reward

HireXtra will contact your Friend

Your Refer Details

First Name is required.

Last Name is required.

Mobile Number is required.

Mobile Number is not valid.

Email is required.

This is not a valid email.

Present Company Name is required.

Year is required.

Month is required.