C&s-sme - Bengaluru, India - Rapid Global Business Solutions
Description
[Job Title]
***Compliance and Security (C&S) Subject Matter Expert
[Job Overview]
***
[Technology and Sub-technology]
***- Threat and Vulnerability Management
- Data Leak Protection (DLP)
- Privilege Access Management
- Identify and Access Management
[Base Location]
***Bangalore
[Type]
***Hybrid - WFH/In-office (visiting office as per company guidelines is mandatory)
[Qualifications]
***- Education: Bachelor's degree in Information Systems, Information Technology (IT), Computer Science, Engineering, related programs, or equivalent experience.
- Proficiency in implementing and managing Vormetric encryption solutions or similar encryption technologies.
- Extensive knowledge of system hardening principles, secure configuration standards (e.g., CIS benchmarks), and vulnerability assessment tools (e.g., Kenna, Qualys).
- Strong analytical and problemsolving skills with the ability to assess complex security issues and provide effective solutions.
- Excellent communication and interpersonal skills, with the ability to effectively convey complex technical concepts to both technical and nontechnical audiences.
- Proven experience working as a Subject Matter Expert (SME) or Consultant in Privileged Access Management (PAM), RSA, Vormetric, ProofPoint, and system hardening (details below).
- IT Infrastructure experience is essential
- Privileged Access Management (PAM):
- Expertise in implementing and managing PAM solutions, such as CyberArk, Thycotic, or BeyondTrust.
- Knowledge of privileged account lifecycle management, including provisioning, deprovisioning, and access review processes.
- Familiarity with privileged session monitoring and recording.
- Understanding of privileged access policies, standards, and best practices.
- Proficiency in evaluating and mitigating risks associated with privileged accounts.
- Ability to design and implement privileged access controls and workflows.
- Experience in integrating PAM solutions with other security technologies and identity sources.
- Knowledge of compliance frameworks (e.g., PCI DSS, HIPAA) and their requirements related to PAM.
- Data Loss Prevention (DLP):
- Strong understanding of data classification and data handling requirements.
- Knowledge of DLP technologies and tools like Symantec DLP, McAfee DLP, or Forcepoint DLP.
- Ability to assess and classify sensitive data across various platforms and data repositories.
- Experience in designing and implementing DLP policies and rules.
- Proficiency in configuring and managing DLP agents, sensors, and monitoring consoles.
- Familiarity with incident response and investigation procedures related to DLP incidents.
- Understanding of regulatory compliance standards (e.g., GDPR, CCPA) and their impact on DLP implementations.
- Knowledge of encryption and data protection techniques.
- Identity and Access Management (IAM):
- Proficiency in IAM concepts, principles, and frameworks.
- Experience with IAM solutions like Okta, Azure Active Directory, or SailPoint.
- Knowledge of user lifecycle management, including user provisioning, deprovisioning, and access recertification processes.
- Understanding of identity governance and administration (IGA) processes and controls.
- Ability to design and implement IAM roles, entitlements, and access policies.
- Familiarity with single signon (SSO) and multifactor authentication (MFA) technologies.
- Knowledge of directory services (e.g., LDAP, Active Directory) and their integration with IAM solutions.
- Understanding of federation protocols and standards (e.g., SAML, OAuth, OpenID Connect).
- Threat and Vulnerability Management (TVM):
- Expertise in vulnerability assessment tools like Nessus, Qualys, or Rapid
- Proficiency in conducting vulnerability scans and managing vulnerability data.
- Knowledge of common vulnerabilities and exposures (CVE) databases and vulnerability intelligence sources.
- Understanding of vulnerability management processes, including prioritization, remediation, and reporting.
- Experience in designing and implementing a vulnerability management program.
- Familiarity with penetration testing methodologies and tools.
- Ability to analyze and interpret vulnerability scan results and provide actionable recommendations.
[Job Details]
***- Design and implement comprehensive Privileged Access Management (PAM) solutions to safeguard privileged accounts, enforce access controls, and monitor privileged activities.
- Provide guidance and best practices for the implementation and configuration of RSA solutions, including RSA SecurID, RSA Archer, and RSA NetWitness.
- Implement and maintain Vormetric encryption solutions to protect sensitive data at rest and in transit.
- Collaborate with infrastructure and operations teams to develop and implement system hardening guidelines, baselines, and secure configuration standards.
- Conduct security assessments, vulnerability scans, and penetration tests to identify and remedi
More jobs from Rapid Global Business Solutions
-
Mechanical Drafting
Bengaluru, India - 3 weeks ago
-
ERP Admin
Bengaluru, India - 2 days ago
-
PCB Layout Designer
Bengaluru, India - 2 weeks ago
-
pmo
Bengaluru, India - 3 days ago
-
Ced digitization
Bengaluru, India - 2 weeks ago
-
Ta & HRbp
Bengaluru, India - 2 weeks ago