Search by job, company or skills

Y

Consultant - Cyber Security Job

new job description bg glownew job description bg glownew job description bg svg
  • Posted 4 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Job Description :

Skills & Experience

At least 5 -8 years of experience in Cyber Security Projects covering Cyber Security Consulting, Cyber Threat , Cyber Forensic Management.
Knowledge of SIEM, Cloud Access Security Broker, Data Leakage Prevention, Web Application Firewall, Multi Factor Authentication, Data Rights Management, Identity Access/Privileged Access Management.
Ability to gather business requirements select, test, and implement tools and applications.
Responsive, problem-solving orientation and ability to build strong relationships with all levels of stakeholders.
Administrative, presentation skills and the ability to manage multiple task.
Coordinate with counterparts to develop, implement, maintain, monitor and support company-wide best practices of all corporate infrastructure IT security including areas of networks, applications, and endpoints devices.
Install security measures and operate software to protect systems and information infrastructure, including assisting firewalls security rules and data security implementation.
Review and work with internal teams to remediate security concerns in cloud environments
Implement security measures and tune existing tools to further enforce zero trust monitoring for MDR model Delivery
Design and implement innovative approaches to endpoint protection, malware detection & mitigation, and auditing.
Provide data and root cause analysis of security incidents with corrective actions for improvement.
Work with the internal security team and analyze false positives and false negatives.
Monitor computer networks for security issues and investigate security breaches and other cyber incidents
Closely working with compliance and internal audit departments to ensure IT controls are in place, enforced, maintained and provide evidence samples according to the requirement.
Configure, maintain, and support internal uses of Security solution in trial and production implementation, post deployment of solution with required use case controls (self-study), provide required documentation and onboard Operations team with required trainings.
Work closely with internal various customer counterparts to onboard all required assets (CEF, Smart connecters, Data Connectors, develop lighthouse) to maintain corporate instances to ensure update to date security parameters, implementations, and best practices.
Create security metrics, reports, and dashboards
Stay up-to-date on information technology trends and security standards

Responsibilities

Mentor, and provide guidance to the SOC team, including security analysts, incident responders, and other personnel.
Incident Detection and Response:
Oversee the identification, analysis, and response to security incidents, ensuring adherence to established incident handling procedures and response SLAs.
Conduct post-incident analysis and provide recommendations for process improvements and mitigation strategies.
Threat Monitoring and Intelligence:
Develop and maintain a comprehensive understanding of the threat landscape, including emerging threats, vulnerabilities, and attack techniques.
Monitor threat intelligence sources, conduct threat hunting activities, and stay up-to-date with the latest security trends to proactively identify potential threats and vulnerabilities.
Security Tools and Technologies:
Manage and oversee the implementation, configuration, and maintenance of security tools and technologies used in the SOC, such as SIEM (Security Information and Event Management) systems, intrusion detection/prevention systems, and threat intelligence platforms.
Evaluate and recommend new tools and technologies to enhance the capabilities of the SOC and improve incident detection and response efficiency

Deep understanding of cloud architecture and cloud security challenges and solutions, as well as operating systems (Windows/MacOS/Linux), networking, authentication, and programming and scripting languages.

Professional Attributes

1. Strong analytical skills with a structured problem-solving approach
2. Effective communicator with great interpersonal skills and the ability to be credible with clients
3. Demonstrated creativity in complex problem solving and ability to work under pressure

Educational Qualification

  • Bachelors or above degree in a related field or equivalent full-time course.

Technical Certifications

  • AZ 500, AZ 900, CISSP, CEH, CSSP

More Info

Job Type:
Employment Type:

About Company

YASH Technologies is a customer-centric transformational global IT solutions and services partner. We have a proven track record in delivering battle-tested consulting, technology, and outsourcing services to address our clients&#8217&#x3B; evolving digital transformation challenges. We harness business-centric, innovative frameworks and solutions to help clients achieve unprecedented performance levels and revenue growth at optimized costs. Recognized as one of the fastest-growing IT services firms globally, YASH has complemented its robust organic growth with strategic &#8216&#x3B;tuck-in&#8217&#x3B; acquisitions. When it comes to our vision, mission and values, YASH is focused on building long-term relationships and working with clients as an extended team. Our customer-centricity and value system has helped us gain the trust of our clients globally.

Job ID: 144637197

Similar Jobs