IT Infrastructure - IT Security Lead

5 - 10 Years

What will I be doing at Ather?

• Develop Information Security Plans and Policies: Plan and carry out information security strategy. Develop a set of security standards and best practices for the organization and recommend security enhancements as needed. To develop strategies to respond to and recover from a security breach. Educating the workforce on information security through training and awareness programs.

• Implement Protections: Audit firewalls, encryption programs, data sharing methods, Mobile device management, Data Loss prevention, Antivirus, CASB, WAF, Cloud, Patching, Hardening standardization for all types of devices and equipment’s. Maintaining physical and logical security for data in rest, motion and processing.

• Test for Vulnerabilities: periodic scans of networks, websites, systems, endpoints, applications to find any vulnerability. To conduct vulnerability assessment, penetration testing and find any weaknesses that might be exploited by a malicious party or working with a third party for these to mitigate vulnerability to closure.

• Monitor for Security Breaches: Information Security Engineers must constantly monitor their organization’s networks and systems for security breaches or intrusions.

• Investigate Security Breaches: If a breach has occurred, the Information Security Engineer will lead the incident response activities to minimize the impact. To conduct a technical and forensic investigation into how the breach happened and the extent of the damage. Preparing reports of their findings to be reported to management.

What skills and experience do I require for this role?

• A strong multi-tasker with a keen eye for detail, can think one step ahead of criminals. Well organized and thrive in fast-paced, high-stress scenarios.
• AWS, GCP, security for cloud platforms.
• Direct experience with anti-virus software, intrusion detection, firewalls and content filtering, DLP, WAF, CASB, IRM.
• Knowledge of risk assessment tools, technologies and methods.
• Experience designing secure networks, systems and application architectures.
• Knowledge of disaster recovery, computer forensic tools, technologies and methods.
• Experience planning, researching and developing security policies, standards and procedures.
• Professional experience in a system administration role supporting multiple platforms and applications.
• Ability to communicate security issues to peers and management.
• Ability to read and use the results of mobile code, malicious code, and anti-virus software.
• Strong understanding of endpoint security solutions to include File Integrity Monitoring and Data Loss Prevention.
• Certified ethical Hacking / Certified Information Systems Security Professional Certification.
• Ability to obtain a Security Clearance.

What should I be graduated in?

B.E/B.Tech (Preferable to have Computer Science)

Enter Details