Job Description
Cyber Security
Requirements
- Qualifications: BE / M.Tech / MSc (IT, Mathematics) / MCA
- Key Responsibilities:
- Develop and implement cybersecurity policies, frameworks, and security best practices.
- Monitor, analyze, and mitigate security threats to ensure a secure IT infrastructure.
- Conduct risk assessments, vulnerability scanning, and penetration testing.
- Ensure compliance with regulatory and industry security standards (ISO 27001, NIST, GDPR, etc.).
- Provide incident response and forensic analysis in the event of security breaches.
- Develop security awareness programs and training sessions for internal teams.
- Collaborate with stakeholders and IT teams to integrate security strategies into business operations.
- Stay updated on emerging cybersecurity technologies and innovations to enhance security resilience.
- Experience & skills:
- Minimum 4 years of experience as a technical consultant in cybersecurity.
- Successfully delivered at least three cybersecurity projects.
- Extensive experience in hardware and software security solutions, network security, and IT infrastructure protection.
- Strong knowledge of security frameworks, compliance standards, and threat intelligence.
- Proven expertise in data protection, software encryption, and cybersecurity risk assessment.
- Ability to develop and maintain internal security logs and provide incident response support.
- Proficiency in providing web-portal security support and troubleshooting.
- Expertise in monitoring security performance metrics and ensuring system integrity.
- Strong understanding of emerging cybersecurity threats, vulnerabilities, and mitigation strategies.
- Exceptional interpersonal and communication skills with the ability to conduct in-house training to enhance cybersecurity awareness.
- Experience with SIEM tools, IDS/IPS, firewalls, and endpoint security solutions.
- Strong understanding of cloud security, encryption protocols, and access management.
- Ability to work in fast-paced and high-security environments.
- Strong problem-solving and analytical skills to address complex security challenges.
- Preferred Certifications:
- Candidates with the following certifications will be given preference:
Certified Ethical Hacker (CEH)
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
CompTIA Security+ or CompTIA Advanced Security Practitioner (CASP)
GIAC Security Certifications (GSEC, GCIH, GPEN, etc.)
EC-Council Certified Security Analyst (ECSA)
Certified Cloud Security Professional (CCSP), ?ISO 27001 Lead Auditor / Implementer
Qualification
Master's Degree
Key skill Required
- Cyber Security
- Cybersecurity
- Access Management
- Analysis
- Awareness
- Awareness Programs
- Business Operations
- Cloud Security
- Communication
- Compliance
- Data Protection
- Forensic
- Forensic Analysis
- Incident Response
- Information Security
- Infrastructure
- Intelligence
- Management
- Mathematics
- Network Security
- Penetration Testing
- Scanning
- Security
- Security Solutions
- Software Security
- Threat intelligence
- Training
- Training Sessions
- Troubleshooting