Wipro
Job Description
The purpose of this role is to analyse, identify, rectify &recommend specific improvement measures that help in the securityposture of the organization by protecting the sensitive information
Do
- Ensuring customer centricity by providing aptcybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any securitybreaches
- Monitor for attacks, intrusions and unusual, unauthorized orillegal activity
- Performs moderately complex log reviews and forensic analysis toidentify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root causeanalysis of security incidents
- Handling incidents escalated by the L1 team in 24×7 rotationalshifts
- Use advanced analytics tools to determine emerging threatpatterns and vulnerabilities
- Completing all tactical security operations tasks associatedwith this engagement.
- Analyses all the attacks and come up with remedial attackanalysis
- Conduct detailed analysis of incidents and create reports anddashboards
Â
- Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issuesand provide future recommendations
- Maintain an information security risk register and assist withinternal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cybersecurity awareness training for colleagues
- Advice and guidance to employees on issues such as spam andunwanted or malicious emails
Â
Stakeholder Interaction
Â
Stakeholder Type | Stakeholder Identification | Purpose of Interaction |
Internal | Technical Lead/ Project Lead | Regular reporting & updates |
Security Intelligence (Practice) | Coordination for security reasons | |
External | Customer
 |
To coordinate for all security breaches & resolutions |
Display
Â
Lists the competencies required to perform this role effectively:
- Functional Competencies/ Skill
- Leveraging Technology – Knowledge of current and upcoming technology(automation, tools and systems) to build efficiencies and effectivenessin own function/ Client organization –Â Expert
- Process Excellence – Ability to follow the standards and norms toproduce consistent results, provide effective control and reduction ofrisk – Expert
- Functional/Technical – Knowledge of Network Security devices,firewalls, end points, SIEM, application security, IPS/IDS, VA / PTskills – Master
Â
Competency Levels | |
Foundation | Knowledgeable about the competency requirements. Demonstrates (inparts) frequently with minimal support and guidance. |
Competent | Consistently demonstrates the full range of the competencywithout guidance. Extends the competency to difficult and unknownsituations as well. |
Expert | Applies the competency in all situations and is serves as a guideto others as well. |
Master | Coaches others and builds organizational capability in thecompetency area. Serves as a key resource for that competency and isrecognized within the entire organization. |
- Behavioral Competencies
- Effective Communication
- Collaborative Working
- Execution Excellence
- Problem Solving & Analytical Skills
Â
Â
Deliver
Â
No. | Performance Parameter | Measure |
1. | Customer centricity | Â Timely security breach solutioning to end users,Internal stakeholders & external customers experience |
2. | Process Adherence | Adherence to SLA’s (90-95%), response time and resolutiontime TAT |
Â
To apply for this job please visit careers.wipro.com.