Posted:1 month ago|
Platform:
Work from Office
Full Time
Assist in designing, deploying, and maintaining server, network, and cloud-based systems. Troubleshoot hardware, software, and network issues, escalating complex problems as needed. Collaborate with cross-functional teams to ensure system reliability and performance. Document system configurations, processes, and procedures. Monitor system health and implement proactive maintenance. Support security compliance and vulnerability management initiatives. Continuously monitor security events and incidents using different SIEM tools to identify potential threats, anomalies and vulnerabilities. Monitor multiple security technologies, such as Proxy, Firewalls, VPN traffic, and other security threat data sources; Document all security alerts and incidents with detailed analysis and remediation recommendations; Knowledge and understanding of Proxy services and protocols; Ensure network systems' performance and security on a daily basis. Monitoring and safeguarding the log sources and security access Monitor for attacks,intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation,maintenance and delivery of cyber security awareness training for colleagues Manage and improve the operations of existing security tools, including Vulnerability Management,Threat Intelligence, end Endpoint Detection and Response Running a vulnerability management process using common technologies like Nessus. Understanding of Infrastructure as a Service (IaaS) cloud platforms, such as IAM, compute (EC2), networking (VPC, Load Balancers) and serverless (Lamda)in order to identify and prioritize potential security challenges Conduct regular security assessments and vulnerability scans to identify and mitigate risks. Participate in security audits and assessments to ensure compliance with regulatory requirements. Installation & Configure the Wazuh Cluster. Handson in Anchore, Spot Bug tools. Handson in Wireshark tool.
Tata Elxsi
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
My Connections Tata Elxsi
8.0 - 12.0 Lacs P.A.
Hyderabad, Pune, Bengaluru
12.0 - 22.0 Lacs P.A.
Hyderabad
18.0 - 30.0 Lacs P.A.
16.0 - 18.0 Lacs P.A.
Bengaluru
12.0 - 22.0 Lacs P.A.
Noida, Goregaon, Bengaluru
17.0 - 32.0 Lacs P.A.
3.25 - 8.25 Lacs P.A.
4.75 - 9.75 Lacs P.A.
15.0 - 25.0 Lacs P.A.
Noida, Hyderabad, Pune
50.0 - 60.0 Lacs P.A.