Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
- Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24x7 rotational shifts
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks associated with this engagement.
- Analyses all the attacks and come up with remedial attack analysis
- Conduct detailed analysis of incidents and create reports and dashboards
- Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails
Stakeholder Interaction
Stakeholder Type | Stakeholder Identification | Purpose of Interaction |
Internal | Technical Lead/ Project Lead | Regular reporting & updates |
Security Intelligence (Practice) | Coordination for security reasons |
External | Customer | To coordinate for all security breaches & resolutions |
Display
Lists the competencies required to perform this role effectively:
- Functional Competencies/ Skill
- Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization - Expert
- Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk - Expert
- Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills - Master
Competency Levels |
Foundation | Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. |
Competent | Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. |
Expert | Applies the competency in all situations and is serves as a guide to others as well. |
Master | Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. |
- Behavioral Competencies
- Effective Communication
- Collaborative Working
- Execution Excellence
- Problem Solving & Analytical Skills
Deliver
No. | Performance Parameter | Measure |
1. | Customer centricity | Timely security breach solutioning to end users, Internal stakeholders & external customers experience |
2. | Process Adherence | Adherence to SLA’s (90-95%), response time and resolution time TAT |
SailPoint Identity Mgmt and Governance