Wipro Technologies
Developer (Security Automation)
Wipro Technologies, Bellevue, Washington, us, 98009
Role PurposeThe purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information.DoEnsuring customer centricity by providing apt cybersecurity
Monitoring and safeguarding the log sources and security access.Planning for disaster recovery in the event of any security breaches.Monitor for attacks, intrusions and unusual, unauthorized or illegal activity.Perform moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems.Conduct security assessments, risk analysis and root cause analysis of security incidents.Handle incidents escalated by the L1 team in 24x7 rotational shifts.Use advanced analytics tools to determine emerging threat patterns and vulnerabilities.Complete all tactical security operations tasks associated with this engagement.Analyse all the attacks and come up with remedial attack analysis.Conduct detailed analysis of incidents and create reports and dashboards.
Stakeholder coordination & audit assistance
Liaise with stakeholders in relation to cyber security issues and provide future recommendations.Maintain an information security risk register and assist with internal and external audits relating to information security.Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues.Provide advice and guidance to employees on issues such as spam and unwanted or malicious emails.
Stakeholder InteractionStakeholder Type
-
Stakeholder Identification
-
Purpose of InteractionInternal - Technical Lead/ Project Lead - Regular reporting & updates.Internal - Security Intelligence (Practice) - Coordination for security reasons.External - Customer - To coordinate for all security breaches & resolutions.DisplayLists the competencies required to perform this role effectively:Functional Competencies/ Skill
Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization -
Expert
.Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk -
Expert
.Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills -
Master
.
Behavioral Competencies
Effective CommunicationCollaborative WorkingExecution ExcellenceProblem Solving & Analytical Skills
DeliverNo.
-
Performance Parameter
-
Measure1. - Customer centricity - Timely security breach solutioning to end users, Internal stakeholders & external customers experience.2. - Process Adherence - Adherence to SLA’s (90-95%), response time and resolution time TAT.
#J-18808-Ljbffr
Monitoring and safeguarding the log sources and security access.Planning for disaster recovery in the event of any security breaches.Monitor for attacks, intrusions and unusual, unauthorized or illegal activity.Perform moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems.Conduct security assessments, risk analysis and root cause analysis of security incidents.Handle incidents escalated by the L1 team in 24x7 rotational shifts.Use advanced analytics tools to determine emerging threat patterns and vulnerabilities.Complete all tactical security operations tasks associated with this engagement.Analyse all the attacks and come up with remedial attack analysis.Conduct detailed analysis of incidents and create reports and dashboards.
Stakeholder coordination & audit assistance
Liaise with stakeholders in relation to cyber security issues and provide future recommendations.Maintain an information security risk register and assist with internal and external audits relating to information security.Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues.Provide advice and guidance to employees on issues such as spam and unwanted or malicious emails.
Stakeholder InteractionStakeholder Type
-
Stakeholder Identification
-
Purpose of InteractionInternal - Technical Lead/ Project Lead - Regular reporting & updates.Internal - Security Intelligence (Practice) - Coordination for security reasons.External - Customer - To coordinate for all security breaches & resolutions.DisplayLists the competencies required to perform this role effectively:Functional Competencies/ Skill
Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization -
Expert
.Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk -
Expert
.Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills -
Master
.
Behavioral Competencies
Effective CommunicationCollaborative WorkingExecution ExcellenceProblem Solving & Analytical Skills
DeliverNo.
-
Performance Parameter
-
Measure1. - Customer centricity - Timely security breach solutioning to end users, Internal stakeholders & external customers experience.2. - Process Adherence - Adherence to SLA’s (90-95%), response time and resolution time TAT.
#J-18808-Ljbffr