Wipro Technologies
Cryptography Engineer
Wipro Technologies, Trenton, New Jersey, United States,
Role PurposeThe purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information.DoEnsuring customer centricity by providing apt cybersecurity
Monitoring and safeguarding the log sources and security access.Planning for disaster recovery in the event of any security breaches.Monitor for attacks, intrusions and unusual, unauthorized or illegal activity.Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems.Conduct security assessments, risk analysis and root cause analysis of security incidents.Handling incidents escalated by the L1 team in 24x7 rotational shifts.Use advanced analytics tools to determine emerging threat patterns and vulnerabilities.Completing all tactical security operations tasks associated with this engagement.Analyses all the attacks and come up with remedial attack analysis.Conduct detailed analysis of incidents and create reports and dashboards.
Stakeholder coordination & audit assistance
Liaise with stakeholders in relation to cyber security issues and provide future recommendations.Maintain an information security risk register and assist with internal and external audits relating to information security.Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues.Advice and guidance to employees on issues such as spam and unwanted or malicious emails.
Stakeholder InteractionStakeholder Type
: InternalStakeholder Identification
: Technical Lead/ Project LeadPurpose of Interaction
: Regular reporting & updatesStakeholder Type
: InternalStakeholder Identification
: Security Intelligence (Practice)Purpose of Interaction
: Coordination for security reasonsStakeholder Type
: ExternalStakeholder Identification
: CustomerPurpose of Interaction
: To coordinate for all security breaches & resolutionsDisplayLists the competencies required to perform this role effectively:Functional Competencies/ Skill
Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization -
ExpertProcess Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk –
ExpertFunctional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills -
Master
Competency LevelsFoundation - Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance.Competent - Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well.Expert - Applies the competency in all situations and serves as a guide to others as well.Master - Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization.Behavioral Competencies
Effective CommunicationCollaborative WorkingExecution ExcellenceProblem Solving & Analytical Skills
DeliverNo.Performance ParameterMeasure1.Customer centricityTimely security breach solutioning to end users, Internal stakeholders & external customers experience.2.Process AdherenceAdherence to SLA’s (90-95%), response time and resolution time TAT.
#J-18808-Ljbffr
Monitoring and safeguarding the log sources and security access.Planning for disaster recovery in the event of any security breaches.Monitor for attacks, intrusions and unusual, unauthorized or illegal activity.Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems.Conduct security assessments, risk analysis and root cause analysis of security incidents.Handling incidents escalated by the L1 team in 24x7 rotational shifts.Use advanced analytics tools to determine emerging threat patterns and vulnerabilities.Completing all tactical security operations tasks associated with this engagement.Analyses all the attacks and come up with remedial attack analysis.Conduct detailed analysis of incidents and create reports and dashboards.
Stakeholder coordination & audit assistance
Liaise with stakeholders in relation to cyber security issues and provide future recommendations.Maintain an information security risk register and assist with internal and external audits relating to information security.Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues.Advice and guidance to employees on issues such as spam and unwanted or malicious emails.
Stakeholder InteractionStakeholder Type
: InternalStakeholder Identification
: Technical Lead/ Project LeadPurpose of Interaction
: Regular reporting & updatesStakeholder Type
: InternalStakeholder Identification
: Security Intelligence (Practice)Purpose of Interaction
: Coordination for security reasonsStakeholder Type
: ExternalStakeholder Identification
: CustomerPurpose of Interaction
: To coordinate for all security breaches & resolutionsDisplayLists the competencies required to perform this role effectively:Functional Competencies/ Skill
Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization -
ExpertProcess Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk –
ExpertFunctional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills -
Master
Competency LevelsFoundation - Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance.Competent - Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well.Expert - Applies the competency in all situations and serves as a guide to others as well.Master - Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization.Behavioral Competencies
Effective CommunicationCollaborative WorkingExecution ExcellenceProblem Solving & Analytical Skills
DeliverNo.Performance ParameterMeasure1.Customer centricityTimely security breach solutioning to end users, Internal stakeholders & external customers experience.2.Process AdherenceAdherence to SLA’s (90-95%), response time and resolution time TAT.
#J-18808-Ljbffr