Compliance And Security (c&s) Subject Matter Expert

Year    Bengaluru, Karnataka, India

Job Description


We are looking for an experienced Compliance and Security Senior Technical Specialist who will support a major region for the security related topics under C&S scope covering PAM, RSA, Vormetric, Proof point, Hardening. He / she would oversee these security platforms / tools and objectives in line with the global directives to keep the company safe. As an SME, you will be responsible for providing expert guidance, recommendations, and hands-on support in these areas to ensure the security and integrity of our organization\'s IT infrastructure. Skill / Qualifications

  • Bachelor\xe2\x80\x99s degree in Information Systems, Information Technology (IT), Computer Science, Engineering, related programs, or equivalent experience.
  • Proficiency in implementing and managing Vormetric encryption solutions or similar encryption technologies.
  • Experience in designing and configuring Proofpoint email security solutions or equivalent email security platforms.
  • Extensive knowledge of system hardening principles, secure configuration standards (e.g., CIS benchmarks), and vulnerability assessment tools (e.g., Kenna, Qualys).
  • Strong analytical and problem-solving skills with the ability to assess complex security issues and provide effective solutions.
  • Excellent communication and interpersonal skills, with the ability to effectively convey complex technical concepts to both technical and non-technical audiences.
  • Proven experience working as a Subject Matter Expert (SME) or Consultant in Privileged Access Management (PAM), RSA, Vormetric, ProofPoint, and system hardening (details below).
  • Experience with IT Infrastructure essential.
  • Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or vendor-specific certifications in PAM, RSA
  • Familiarity with industry regulations and frameworks related to privileged access management and security hardening (e.g., NIST, PCI-DSS, ISO 27001).
  • Tools & Technology
  • Privileged Access Management (PAM):
  • Expertise in implementing and managing PAM solutions, such as CyberArk, Thycotic, or BeyondTrust.
  • Knowledge of privileged account lifecycle management, including provisioning, deprovisioning, and access review processes.
  • Familiarity with privileged session monitoring and recording.
  • Understanding of privileged access policies, standards, and best practices.
  • Proficiency in evaluating and mitigating risks associated with privileged accounts.
  • Ability to design and implement privileged access controls and workflows.
  • Experience in integrating PAM solutions with other security technologies and identity sources.
  • Knowledge of compliance frameworks (e.g., PCI DSS, HIPAA) and their requirements related to PAM.
  • Data Loss Prevention (DLP):
  • Strong understanding of data classification and data handling requirements.
  • Knowledge of DLP technologies and tools like Symantec DLP, McAfee DLP, or Forcepoint DLP.
  • Ability to assess and classify sensitive data across various platforms and data repositories.
  • Experience in designing and implementing DLP policies and rules.
  • Proficiency in configuring and managing DLP agents, sensors, and monitoring consoles.
  • Familiarity with incident response and investigation procedures related to DLP incidents.
  • Understanding of regulatory compliance standards (e.g., GDPR, CCPA) and their impact on DLP implementations.
  • Knowledge of encryption and data protection techniques.
  • Identity and Access Management (IAM):Proficiency in IAM concepts, principles, and frameworks.
Experience with IAM solutions like Okta, Azure Active Directory, or SailPoint.Knowledge of user lifecycle management, including user provisioning, deprovisioning, and access recertification processes.Understanding of identity governance and administration (IGA) processes and controls.Ability to design and implement IAM roles, entitlements, and access policies.Familiarity with single sign-on (SSO) and multi-factor authentication (MFA) technologies.Knowledge of directory services (e.g., LDAP, Active Directory) and their integration with IAM solutions.Understanding of federation protocols and standards (e.g., SAML, OAuth, OpenID Connect).
  • Threat and Vulnerability Management (TVM):Expertise in vulnerability assessment tools like Nessus, Qualys, or Rapid7.
Proficiency in conducting vulnerability scans and managing vulnerability dataKnowledge of common vulnerabilities and exposures (CVE) databases and vulnerability intelligence sources.Understanding of vulnerability management processes, including prioritization, remediation, and reporting.Experience in designing and implementing a vulnerability management programFamiliarity with penetration testing methodologies and toolsKnowledge of security assessment frameworks (e.g., OWASP, NIST SP 800-53) and their application to vulnerability management. o Ability to analyze and interpret vulnerability scan results and provide actionable recommendations.
Certification Required
  • Certified Information Systems Security Professional (CISSP)
  • Certified Ethical Hacker (CEH)
  • PAM
  • RSA
Job Responsibilities
  • Interface with engineering management and leadership to drive secure initiatives, planning, and resolve issues and conflicts early and within development lifecycle
  • Facilitate secure engagement activities including security requirements, threat modeling, vulnerability analysis, and risk assessment
  • Coordinate security incident and response activities, performing analysis, collaboration with engineering, and drive resolution of incidents
  • Identify and drive process efficiency and optimization within the team, allocation of resources, ensuring milestones and targets are achieved
  • Monitor and manage product risks, ensure key stakeholders are informed, plan and communicate intended outcomes
  • Coordinate and collaborate with internal and external stakeholders including engineering, quality assurance, security architecture, governance, and certification entities to achieve department goals, risk reduction, and milestones
  • Ensure security requirements are understood and applied in accordance with
  • Security policies, applicable country laws, and regulations
  • Promote and apply Zero Trust architecture and principles throughout service offerings
  • Serve as a subject matter expert and trusted advisor on Privileged Access Management (PAM), RSA, Vormetric, ProofPoint, and system hardening.
  • Design and implement comprehensive Privileged Access Management (PAM) solutions to safeguard privileged accounts, enforce access controls, and monitor privileged activities.
  • Provide guidance and best practices for the implementation and configuration of RSA solutions
  • Implement and maintain Vormetric encryption solutions to protect sensitive data at rest and in transit.
  • Collaborate with infrastructure and operations teams to develop and implement system hardening guidelines, baselines, and secure configuration standards.
  • Conduct security assessments, vulnerability scans, and penetration tests to identify and remediate security vulnerabilities.
  • Collaborate with cross-functional teams to develop and enforce security policies, procedures, and standards.
  • Stay abreast of emerging threats, vulnerabilities, and industry best practices related to Privileged Access Management, RSA, Vormetric, ProofPoint, and system hardening.
  • Provide training and knowledge sharing sessions to technical teams and stakeholders on security technologies and best practices.
  • Collaborate with incident response teams to investigate and remediate security incidents related to PAM, RSA, Vormetric, ProofPoint, and system hardening.
Benefits Competitive Hourly Rate (Depending on Experience) Job Type: Full-time Schedule:
  • Day shift
Education:
  • Bachelor\'s (Preferred)
Experience:
  • Privileged Access Management: 5 years (Preferred)
  • Data Loss Prevention: 5 years (Preferred)
  • Identity and Access Management: 5 years (Preferred)
Work Location: In person

Beware of fraud agents! do not pay money to get a job

MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Job Detail

  • Job Id
    JD3207380
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Permanent
  • Job Location
    Bengaluru, Karnataka, India
  • Education
    Not mentioned
  • Experience
    Year