Wipro Technologies
DevOps Engineer
Wipro Technologies, Bellevue, Washington, us, 98009
Role PurposeThe purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive informationDoEnsuring customer centricity by providing apt cybersecurity
Monitoring and safeguarding the log sources and security accessPlanning for disaster recovery in the event of any security breachesMonitor for attacks, intrusions and unusual, unauthorized or illegal activityPerforms moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systemsConduct security assessments, risk analysis and root cause analysis of security incidentsHandling incidents escalated by the L1 team in 24x7 rotational shiftsUse advanced analytics tools to determine emerging threat patterns and vulnerabilitiesCompleting all tactical security operations tasks associated with this engagement.Analyses all the attacks and come up with remedial attack analysisConduct detailed analysis of incidents and create reports and dashboards
Stakeholder coordination & audit assistance
Liaise with stakeholders in relation to cyber security issues and provide future recommendationsMaintain an information security risk register and assist with internal and external audits relating to information securityAssist with the creation, maintenance and delivery of cyber security awareness training for colleaguesAdvice and guidance to employees on issues such as spam and unwanted or malicious emails
Stakeholder InteractionStakeholder TypeStakeholder IdentificationPurpose of InteractionInternalTechnical Lead/ Project LeadRegular reporting & updatesSecurity Intelligence (Practice)Coordination for security reasonsExternalCustomerTo coordinate for all security breaches & resolutionsDisplayLists the competencies required to perform this role effectively:Functional Competencies/ Skill
Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization -
ExpertProcess Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk -
ExpertFunctional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills
-
Master
Competency LevelsFoundationKnowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance.CompetentConsistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well.ExpertApplies the competency in all situations and is serves as a guide to others as well.MasterCoaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization.Behavioral Competencies
Effective CommunicationCollaborative WorkingExecution ExcellenceProblem Solving & Analytical Skills
DeliverNo.Performance ParameterMeasure1.Customer centricityTimely security breach solutioning to end users, Internal stakeholders & external customers experience2.Process AdherenceAdherence to SLA’s (90-95%), response time and resolution time TATSOAR Tools#J-18808-Ljbffr
Monitoring and safeguarding the log sources and security accessPlanning for disaster recovery in the event of any security breachesMonitor for attacks, intrusions and unusual, unauthorized or illegal activityPerforms moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systemsConduct security assessments, risk analysis and root cause analysis of security incidentsHandling incidents escalated by the L1 team in 24x7 rotational shiftsUse advanced analytics tools to determine emerging threat patterns and vulnerabilitiesCompleting all tactical security operations tasks associated with this engagement.Analyses all the attacks and come up with remedial attack analysisConduct detailed analysis of incidents and create reports and dashboards
Stakeholder coordination & audit assistance
Liaise with stakeholders in relation to cyber security issues and provide future recommendationsMaintain an information security risk register and assist with internal and external audits relating to information securityAssist with the creation, maintenance and delivery of cyber security awareness training for colleaguesAdvice and guidance to employees on issues such as spam and unwanted or malicious emails
Stakeholder InteractionStakeholder TypeStakeholder IdentificationPurpose of InteractionInternalTechnical Lead/ Project LeadRegular reporting & updatesSecurity Intelligence (Practice)Coordination for security reasonsExternalCustomerTo coordinate for all security breaches & resolutionsDisplayLists the competencies required to perform this role effectively:Functional Competencies/ Skill
Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization -
ExpertProcess Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk -
ExpertFunctional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills
-
Master
Competency LevelsFoundationKnowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance.CompetentConsistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well.ExpertApplies the competency in all situations and is serves as a guide to others as well.MasterCoaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization.Behavioral Competencies
Effective CommunicationCollaborative WorkingExecution ExcellenceProblem Solving & Analytical Skills
DeliverNo.Performance ParameterMeasure1.Customer centricityTimely security breach solutioning to end users, Internal stakeholders & external customers experience2.Process AdherenceAdherence to SLA’s (90-95%), response time and resolution time TATSOAR Tools#J-18808-Ljbffr