Responsible for Security solution development, competitive costing, commercial proposition integration and business case alignment of Enterprise Security Services solutions supporting client business, applications and/or information technology environments. Have experience to influence client evaluation criteria and decision making.
Solution scope includes ongoing delivery of services, Security and compliance requirements, services startup and transition, initial people, technology and process transformation as well as ongoing refresh, meeting client's specifications, strategic direction, technology context, and business needs. Confidently articulates all aspects of solution and convincingly communicates value to the stakeholders & client. Works individually, in teams or as leader, to determine customer requirements in complex and often ambiguous outsourced environments. Interacts effectively with team, pursuit leaders, internal governance and business leadership to advance sales efforts.
Responsibilities:
Opportunity Analysis:
+ Understands which security offerings best address customer needs and business requirements
+ Ongoing qualification of solution merits. Solution Design and Development:
+ Provides security solutions to meet client requirements and is able to adapt to new requirements.
+ Address Security and Compliance requirement.
+ Identifies and evaluates value- add alternatives, solutions to those alternatives.
+ Optimizes security solutions plus broader customer IT strategy.
+ Takes end to end view of solution, ensuring elements within their responsibility deliver against the defined business outcomes, using standard components.
+ Works with financial analysts to validate results versus applicable criteria.
+ Captures and highlights Risks and any associated costs.
+ Models multiple offerings/components of security domains.
+ Understands interaction of deal variables (compliance, volumes, services, service level agreements, locations, and more) between tower components.
+ Delivers and owns, accurate financial models that are logically structured and reflect the technical solution. Solution Leadership:
+ Experience in Directing solution activities, decisions.
+ Ability to lead service element integration within tower, tower sub-component volume tradeoffs.
+ Provides security solutions to meet client needs inclusive of Regulatory and Compliance requirement and is able to adapt to new requirements. Solution-Pursuit Integration
+ Anticipates, communicates and solutions to optimize inter-tower dependencies, overlaps, staff sharing, and more.
+ Effectively integrates client tools, process adoption and delivery startup/transition need.
+ Clearly defines all risks through governance process and works to mitigate. Client/Customer/Account Relationship
+ Understands and addresses CISO / CxO issues.
+ Applies consultative selling techniques to advance opportunities.
+ Participates in/supports negotiation of technical contract elements.
+ Provides solution advice, drives proposals, presentations, and other customer communications during pursuit.
+ Input to security offering teams to bring in changes to offerings as per latest security trends and compliance needs.
Education and Experience Required:
Total experience of 12+ years in IT Security, mainly on security pre-sales, solution selling
Technical university or Bachelor preferred
Good exposure to Pre-Sales role involved in Cyber Security Solutioning and understands the Security Market
Involvement in architecting and proposing the cyber security solutions to customer, experience in Managed Security Services market
Knowledge and Skills:
Demonstrates a broad knowledge of outsourcing services and solutions, with expertise in area of specialization.
Preferably having any one of Security certifications like - CISSP, CCSP, CISA AND Security Product certifications. ITIL and PMP certifications are good to have.
List of security domains on which solutioning exposure is required. Should be master in few (atleast in one) of the security domains backed up hand-on experience in both delivery and pre-sales.
+ SIEM - MS Sentinel / SUMO / Splunk / QRadar
+ IDM - Sailpoint / Forgerock / CyberArk / Microsoft / Broadcom / Okta
+ APT Solution - Micorsoft / FireEye / PaloAlto / Checkpoint
+ MDR / EDR Solution - Crowdstrike / Carbon black / Microsoft
+ Endpoint Security - Symantec / McAfee / Trend Micro / Microsoft
+ Network Security - PaloAlto / Checkpoint / Fortinet / Cisco
+ GRC tools
+ Cloud Security Good understanding of Security Risk & Compliance domain, Regulatory and Compliance requirements
Awareness of Security Alliance partner offerings and directions, current industry news.
Demonstrates thought leadership in Security domain.
Demonstrates ability to work as the lead for components of large complex projects.
Has in-depth understanding of the product and services portfolio roadmaps of multiple business units.
Experience to handle POCs
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.
Beware of fraud agents! do not pay money to get a job
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.
Job Detail
Job Id
JD3680072
Industry
Not mentioned
Total Positions
1
Job Type:
Contract
Salary:
Not mentioned
Employment Status
Permanent
Job Location
KA, IN, India
Education
Not mentioned
Experience
Year
Apply For This Job
Beware of fraud agents! do not pay money to get a job
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.