cyber security delivery lead in bengaluru / bangalore

randstad india
position type
apply now

bengaluru / bangalore
Information Technology
position type
reference number
randstad india

job description

cyber security delivery lead in bengaluru / bangalore

Technical Skills:

§Requires overall understanding of Security services related processes and technologies:

§Experience and good understanding of Security Testing of application and Audit principles and associated compensating controls

§Experience and good understanding of:Vulnerability Assessment of network and host-based security platforms

§Audit principles and associated compensating controls

§Experience on Security tools

§Integration of testing mechanisms with industry best practices such as OWASP & NIST.

§Improving and maintaining secure development standards.

§Providing standard gap analysis services to internal business and technology partners.

§Good Understanding of IT security policy, procedure, design, and implementation.

§Basic Knowledge on security models such as ITIL, ISO27002, PCI DSS and Cobit 5

oData Security

oThreat Intelligence & Forensics

oIntrusion system

oAnti-virus and anti-spyware console

oAudit principles and associated compensating controls

oCloud Security

oIdentity & Access Management

§In depth knowledge of Security Architecture design and implementation

§Assist the development of security tool requirements, trials, and evaluations, as well as security operations procedures and processes.

§Plans security systems by evaluating network and security technologies

§Prepares system security reports by collecting, analyzing, and summarizing data and trends

§Knowledge of PCI, ISO 27002 and o security standards and framework

§Designs security models, reviews and approves security configuration and installation of Security devices

•Intermediate experience on VM ,IAM, MFA, PIM/PAM

•Thorough Understanding of Microsoft Solutions Like, MS Bit locker, MS Defender ATP

•Intermediate experience in defining Security Zones in Azure environment, Create Firewall Rules for DMZ, Knowledge on Infrastructure Management, Application and Data Domains.

•Intermediate experience in Backup and Data loss strategy, creating and automating an incident response plan, monitoring for security events, and static code analysis, SAST & DAST.

•High level knowledge in IDS/IPS, SIEM and SOAR.

•Ability to creates, Contributes, and Implements to best practices of Security.

•Detailed expertise in common infra. Activities (i.e. Patch Mgt., Migrations, Upgrades, Assessments etc.)

•Governance, Framework and Standard Exposure

Process Skills:

§Analyze, troubleshoot, and investigate security-related, information systems’ anomalies based on security platform reporting, network traffic, log files, host-based and automated security s

§Ensure and enforce security controls in the area of Networks and Applications to drive policy compliance and risk mitigation

§Controlling and managing access rights to the information system and assets that manage these information repositories

§Security-related Incident handling and registration

§Assist the development of security tool requirements, trials, and evaluations, as well as security operations procedures and processes

§Improving and maintaining secure development standard

§Providing standard gap analysis services to internal business and technology partners.       

§Ability to seek out vulnerabilities in IT infrastructures

§Protects system by defining access privileges, control structures, and resources

§Recognizes problems by identifying abnormalities; reporting violations

§Implements security improvements by assessing current situation; evaluating trends; anticipating requirements

§Determines security violations and inefficiencies by conducting periodic audits

§Knowledge and understanding of global security policies.

§Cyber Security Maturity Assessment

§Cyber Security gap analysis

§Comprehensive reporting on existing security state & desired security state

§Presenting to customers findings of the security gap analysis and proposed solution

§Proposing a comprehensive Cyber Security Road map to address the security gaps identified over

§Statement of Work for Cyber Security Solutions

§Conducting Proof-of-Concept (POC) for proposed security solutions

§Costings for security solutions

§Coordinating/Liaising with vendors and distributors

§Designing a High-Level Solution and documentation

§Detailed Level Solution design and documentation

§Assisting with solution deployments

§As-built documentations

§Operational Manual

§Technical lead on RFQs/RFIs/RFP

Behavioral Skills:

·Effective interpersonal, team building and communication skills

·Ability to collaborate; be able to communicate clearly and concisely both to laypeople and peers, be able to follow instructions, make a team stronger for your presence and not weaker.

·Ability to see the bigger picture and differing perspectives; to compromise, to balance competing priorities, and to prioritise the user.

·Desire for continuous improvement, of the worthy sort; always be learning and seeking improvement, avoid change aversion and excessive conservatism, equally avoid harmful perfectionism, 'not-invented-here' syndrome and damaging pursuit of the bleeding edge for its own sake.

·Learn things quickly, while working outside the area of expertise.

·Analyze a problem and realize exactly what all will be affected by even the smallest of change you make in your design

· Ability to communicate complex technology to no tech audience in simple and precise manner.

· Ownership skills.


·Bachelor’s degree preferably in Computer Science or Information Systems and /or equivalent formal training or work experience.


·- Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP).


PRIMARY COMPETENCY : Information Security PRIMARY SKILL : Infrastructure Vulnerability Management & Remediation PRIMARY SKILL PERCENTAGE : 60 SECONDARY COMPETENCY : Information Security SECONDARY SKILL : Governance Risk & Compliance SECONDARY SKILL PERCENTAGE : 20 TERTIARY COMPETENCY : Leadership TERTIARY SKILL : Client Management TERTIARY SKILL PERCENTAGE : 10


Cyber Security Delivery Lead