C&s-sme - Bengaluru, India - Rapid Global Business Solutions

Deepika Kaur

Posted by:

Deepika Kaur

beBee Recuiter


Description

[Job Title]
***Compliance and Security (C&S) Subject Matter Expert


[Job Overview]
***
[Technology and Sub-technology]
***- Threat and Vulnerability Management

  • Data Leak Protection (DLP)
  • Privilege Access Management
  • Identify and Access Management

[Base Location]
***Bangalore


[Type]
***Hybrid - WFH/In-office (visiting office as per company guidelines is mandatory)


[Qualifications]
***- Education: Bachelor's degree in Information Systems, Information Technology (IT), Computer Science, Engineering, related programs, or equivalent experience.

  • Proficiency in implementing and managing Vormetric encryption solutions or similar encryption technologies.
  • Extensive knowledge of system hardening principles, secure configuration standards (e.g., CIS benchmarks), and vulnerability assessment tools (e.g., Kenna, Qualys).
  • Strong analytical and problemsolving skills with the ability to assess complex security issues and provide effective solutions.
  • Excellent communication and interpersonal skills, with the ability to effectively convey complex technical concepts to both technical and nontechnical audiences.
  • Proven experience working as a Subject Matter Expert (SME) or Consultant in Privileged Access Management (PAM), RSA, Vormetric, ProofPoint, and system hardening (details below).
  • IT Infrastructure experience is essential
  • Privileged Access Management (PAM):
  • Expertise in implementing and managing PAM solutions, such as CyberArk, Thycotic, or BeyondTrust.
  • Knowledge of privileged account lifecycle management, including provisioning, deprovisioning, and access review processes.
  • Familiarity with privileged session monitoring and recording.
  • Understanding of privileged access policies, standards, and best practices.
  • Proficiency in evaluating and mitigating risks associated with privileged accounts.
  • Ability to design and implement privileged access controls and workflows.
  • Experience in integrating PAM solutions with other security technologies and identity sources.
  • Knowledge of compliance frameworks (e.g., PCI DSS, HIPAA) and their requirements related to PAM.
  • Data Loss Prevention (DLP):
  • Strong understanding of data classification and data handling requirements.
  • Knowledge of DLP technologies and tools like Symantec DLP, McAfee DLP, or Forcepoint DLP.
  • Ability to assess and classify sensitive data across various platforms and data repositories.
  • Experience in designing and implementing DLP policies and rules.
  • Proficiency in configuring and managing DLP agents, sensors, and monitoring consoles.
  • Familiarity with incident response and investigation procedures related to DLP incidents.
  • Understanding of regulatory compliance standards (e.g., GDPR, CCPA) and their impact on DLP implementations.
  • Knowledge of encryption and data protection techniques.
  • Identity and Access Management (IAM):
  • Proficiency in IAM concepts, principles, and frameworks.
  • Experience with IAM solutions like Okta, Azure Active Directory, or SailPoint.
  • Knowledge of user lifecycle management, including user provisioning, deprovisioning, and access recertification processes.
  • Understanding of identity governance and administration (IGA) processes and controls.
  • Ability to design and implement IAM roles, entitlements, and access policies.
  • Familiarity with single signon (SSO) and multifactor authentication (MFA) technologies.
  • Knowledge of directory services (e.g., LDAP, Active Directory) and their integration with IAM solutions.
  • Understanding of federation protocols and standards (e.g., SAML, OAuth, OpenID Connect).
  • Threat and Vulnerability Management (TVM):
  • Expertise in vulnerability assessment tools like Nessus, Qualys, or Rapid
  • Proficiency in conducting vulnerability scans and managing vulnerability data.
  • Knowledge of common vulnerabilities and exposures (CVE) databases and vulnerability intelligence sources.
  • Understanding of vulnerability management processes, including prioritization, remediation, and reporting.
  • Experience in designing and implementing a vulnerability management program.
  • Familiarity with penetration testing methodologies and tools.
  • Ability to analyze and interpret vulnerability scan results and provide actionable recommendations.

[Job Details]
***- Design and implement comprehensive Privileged Access Management (PAM) solutions to safeguard privileged accounts, enforce access controls, and monitor privileged activities.

  • Provide guidance and best practices for the implementation and configuration of RSA solutions, including RSA SecurID, RSA Archer, and RSA NetWitness.
  • Implement and maintain Vormetric encryption solutions to protect sensitive data at rest and in transit.
  • Collaborate with infrastructure and operations teams to develop and implement system hardening guidelines, baselines, and secure configuration standards.
  • Conduct security assessments, vulnerability scans, and penetration tests to identify and remedi

More jobs from Rapid Global Business Solutions