Professional 1 Information Security (51005726)
DXC Technology
IND - KA - BANGALORE
2d ago

Job Description

  • Individuals at this job are responsible for monitoring and analyzing organizations traffic and logs for threats; notifying potential threats found;
  • responding to alarms raised; following-up for ticket closure with the client and any enhancements to existing cyber security measures.

    The job also involves identifying potential threats and performing enhancements to existing cyber security measures as per specifications or policy guidelines.

    When a security incident is declared they execute incident response process and document the same.

    What does a day in the life of this role look like?

  • This role is about monitoring organizations traffic and logs for threats in application consoles and raising incidents based on the 1st level analysis and following up to ensure response within agreed timelines.
  • Individuals at this job are responsible for monitoring and analyzing organizations traffic and logs for threats. Notifying potential threats found.
  • responding to alarms raised.
  • following-up for ticket closure with the client and any enhancements to existing cyber security measures.
  • The job also involves identifying potential threats and performing enhancements to existing cyber security measures as per specifications or policy guidelines.
  • When a security incident is declared they execute incident response process and document the same.
  • Operate the console of security information and event management tools (SIEM)
  • read coded scripts and modify and debug programs
  • develop custom parsers to parse logs from different sources including firewalls, operating systems, applications, etc.
  • work on various operating systems and plat
  • work with word processors, spreadsheets and presentations
  • Who are the key clients and what are the projects associated with the role?

    Name of the client

    What are the major goals aligned to the role?

    Team Working

    Main Skills / Profile : Ask the HM to define the essential skills, specific requirements and personal characteristics required for the role

    What are the top four skills / competencies required to be successful in the role?

  • Basic cyber security concepts
  • Relevant networking concepts, devices and terminology
  • cyber security incident detection, prevention, management & response activities
  • event and Log analysis and packet analysis
  • Operational processes such as report generation, verification, data analysis and correlation, etc.
  • What is the preferred background of the candidate and why?

    Diploma in Engineering or any graduate course

    Certification in Information systems or related fields, Basic soft skills training, ethical hacking or pertaining to ISO27001

    What are the personality traits of a successful candidate for this role?

    This job may require the individual to work in a team / shifts. The individual should be result oriented and have a high attention for detail.

    The individual should also be able to demonstrate good communication skills and logical thinking with willingness to work in shifts.

    Selling Points : Work with the HM to define the key selling points of the role to assist with candidate attraction

    Why would someone want this role? What is the value add proposition?

    Word Searches : Agree with the HM relevant technologies, qualifications or companies that can be used to assist in the search stream e.

    g. Excel, Oracle, PeopleSoft, Capital Markets

    Report this job
    checkmark

    Thank you for reporting this job!

    Your feedback will help us improve the quality of our services.

    Apply
    My Email
    By clicking on "Continue", I give neuvoo consent to process my data and to send me email alerts, as detailed in neuvoo's Privacy Policy . I may withdraw my consent or unsubscribe at any time.
    Continue
    Application form