Cyber Security Analyst
KeySkills
-
Security Monitoring,
Incident Response,
Threat Intelligence,
Vulnerability Assessment,
Forensic Analysis,
Risk Assessment,
Disaster Recovery Planning,
Security Auditing,
Log Analysis,
SIEM Tools,
EDR Tools,
Network Security,
Access Management,
Security Awareness Training,
Reporting & Documentation,
Stakeholder Coordination,
Root Cause Analysis,
Malware & Attack Analysis,
Compliance & Standards (ISO 27001,
SOC2,
etc.),
Job Description
- Job DescriptionThe purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive informationDo
- Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24x7 rotational shifts
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks associated with this engagement.
- Analyses all the attacks and come up with remedial attack analysis
- Conduct detailed analysis of incidents and create reports and dashboards
- Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails
Job Details
Experience :
5 To 8
Number Of
Vacancies :
10
Job Type :
Permanent
Industry Type : IT/Software
Salary
:
8 Lac - 12 Lac++
P.A
Education Summary
UG :
Any UG Degree
PG :
Any PG Degree
Contact Details
Contact
Person :
NA
Contact
Number :
4439523952
e-mailId :
helpdesk.recruitment@wipro.com
Address :
Wipro LimitedTP -3, Central Avenue,Mahindra World City,SEZ, Chengalpet.
Office Location
Central Jakarta No 1234, Jakarta, IndonesiaAssistant Manger
Experience -
3 to 7
Key Skills -
aml transaction monitoring,
risk based transaction monitoring,
suspicious activity analysis,
money laundering detection,
terrorist financing detection,
tax evasion analysis,
correspondent banking monitoring,
payment service provider psp monitoring,
alert investigation,
case investigation,
complex tm investigations,
financial crime typologies,
structuring,
layering,
mule activity detection,
fec behavior analysis,
high risk merchant monitoring,
customer behavior analysis,
transaction pattern analysis,
ultimate beneficial owner analysis,
originator and beneficiary analysis,
geographic risk assessment,
sanctions and aml compliance,
regulatory compliance,
bank aml policies,
first line of defense,
escalation management,
suspicious activity escalation,
audit ready documentation,
investigation narratives,
evidence collection,
quality assurance reviews,
quality control qc,
subject matter expert sme support,
case management tools,
aml systems,
workflow tools,
osint research,
open source intelligence,
adverse media screening,
regulatory reporting support,
sla management,
productivity and quality metrics,
continuous improvement,
stakeholder collaboration,
peer mentoring,
risk assessment judgment,
independent decision making,
regulatory adaptability,
change management,
banking regulations,
regulation e,
regulation z,
cfpb guidelines,
facta compliance,
fcra compliance.,
Netskope Deployment Specialist SWG
Experience -
5 to 15
Key Skills -
netskope swg,
secure web gateway,
swg deployment,
inline proxy mode,
ipsec tunnels,
gre tunnels,
traffic steering,
remote user security,
office network security,
web filtering,
url filtering,
threat protection,
tls inspection,
data loss prevention,
dlp policy enforcement,
cloud application access,
casb,
instance awareness,
adaptive access,
policy design,
policy optimization,
security testing,
malware simulation,
threat emulation,
dlp scenarios,
network segmentation,
micro segmentation,
access control lists,
acl,
zero trust,
sase,
incident response,
data exfiltration prevention,
regulatory compliance,
pci dss,
gdpr,
hipaa,
api integration,
security tool integration,
siem,
edr,
soar,
firewall integration,
sandboxing,
documentation,
sop creation,
runbooks,
playbooks,
knowledge transfer,
automation,
terraform,
ansible,
python,
cloud security,
network security,
itil,
major incident management,
communication skills,
stakeholder collaboration.,
Software Engineer
Experience -
3 to 5
Key Skills -
Continuous Integration (CI),
Continuous Deployment (CD),
DevOps Pipeline Management,
Application Lifecycle Management,
Infrastructure Management,
DevOps Tool Configuration,
User Access Management,
Workflow Creation,
DevOps Tool Engineering,
Automation (Testing & Deployment),
Scripting & Coding Collaboration,
Customer Support,
Multi-platform Support,
Ticket Resolution,
SLA/TAT Management,
Escalation Handling,
Troubleshooting,
Root Cause Analysis.,
Project Management Analyst
Experience -
1 to 4