Home
/
Data and Analytics
/
Cyber Security Architect
Cyber Security Architect-January 2024
Pune
Jan 19, 2025
ABOUT WIPRO
Wipro is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfoli
10,000+ employees
Consulting
VIEW COMPANY PROFILE >>
About Cyber Security Architect

  \n

  Role Purpose

  \n

  The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.

  \n

  Do

  \n

  Day to Day Operation Vectra

  \n\n\n Log in to console and address all critical alerts in the critical quadrants \n\n Depending on the severity, true positive, and number of alerts this can take a significant amount of time \n During this investigative process I reach out to the other teams that?re part of Chemours when required to find out details from Identity team or firewall team \n Close and notate false positive alerts \n\n Input daily numbers into Daily Secops report \n Health checks to ensure all sensors are up a functioning as designed \n

  \n I user the system health check screen for this \n\n Monitor the unsecured protocol dashboard to look and report on new host leverage insecure protocols \n Perform Threat hunting in recall \n\n Largely depend on the threat intel report Chemours provides internally \n\n\n\n

  \n \n Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge \n Identify security design gaps in existing and proposed architectures and recommend changes or enhancements \n Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations \n Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. \n Provide support during technical deployment, configuration, integration and administration of security technologies \n Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. \n Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized orillegal activity \n Provide solution of RFP?s received from clients and ensure overall design assurance \n \n Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives \n Analyze technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture \n \n \n\n Depending on the client?s need with particular standards andtechnology stacks create complete RFPs \n\n \n Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology \n Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions \n Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps \n \n\n Evaluate and recommend solutions to integrate with overall technology ecosystem \n Tracks industry and application trends and relates these to planning current and future IT needs \n\n

  \n \n \n \n

  \n

  \n

  Stakeholder Interaction

  \n

  \n \n \n \n \n

  Stakeholder Type

  \n \n \n

  Stakeholder Identification

  \n \n \n

  Purpose of Interaction

  \n \n \n \n \n

  Internal

  \n \n \n

  Program Manager/Director

  \n \n \n

  Regular reporting & updates

  \n \n \n \n \n

  Infrastructure (CRS team)

  \n \n \n

  For infrastructure support

  \n \n \n \n \n

  External

  \n \n \n

  Customer

  \n

  \n \n \n

  To coordinate for all security breaches & resolutions

  \n \n \n \n \n

  Display

  \n

  \n

  Lists the competencies required to perform this role effectively:

  \n\n Functional Competencies/ Skill \n\n Leveraging Technology - Knowledge of current and upcoming security technologies specially hands on in Vectra AI and understanding of compliance regulatory requirement like PCI DSS, HIPAA,etc.- Expert \n Systems Thinking ? Understanding of the Wipro system(interrelatedness, interdependencies and boundaries) and perform problemsolving in a complex environment - Expert \n Leveraging Technology ? In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect ?Master \n Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure,ToGAF or SABSA certification-Master \n\n\n

  \n

  \n \n \n \n \n

  Competency Levels

  \n \n \n \n \n

  Foundation

  \n \n \n

  Knowledgeable about the competency requirements. Demonstrates (inparts) frequently with minimal support and guidance.

  \n \n \n \n \n

  Competent

  \n \n \n

  Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well.

  \n \n \n \n \n

  Expert

  \n \n \n

  Applies the competency in all situations and is serves as a guide to others as well.

  \n \n \n \n \n

  Master

  \n \n \n

  Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization.

  \n \n \n \n \n

  \n\n Behavioral Competencies \n\n Effective Communication \n Managing Complexity \n Client centricity \n Technology Acumen \n Innovation \n Problem Solving approach \n Collaborative Working \n Execution Excellence \n\n\n

  \n

  \n

  \n

  \n

  \n

  Deliver

  \n

  \n \n \n \n \n

  No.

  \n \n \n

  Performance Parameter

  \n \n \n

  Measure

  \n \n \n \n \n

  1.

  \n \n \n

  Customer centricity

  \n \n \n

  Timely security breach solutioning to end users, Internalstakeholders & external customers experience, CSAT, educating andsuggesting right control to the customers.

  \n \n \n \n \n

  2.

  \n \n \n

  Support sales team to create wins

  \n \n \n

  % of proposals with Quality Index >7, timely support ofthe proposals, identifying opportunities/ leads to sell services within/outside account (lead generation), no. of proposals led

  \n \n \n \n \n

  \n

  \n

  Security Information Event Management

Comments
Welcome to zdrecruit comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
SIMILAR JOBS
Retail Stores Associate II
Become part of the Converse Team Converse is a place to explore potential, break barriers and push out the edges of what can be. The company looks for people who can grow, think, dream and create. It
Camera Software - Computational Photography/Machine Learning Research Engineer
Summary Posted: Nov 10, 2023 Weekly Hours: 40 Role Number:200519262 The Camera Algorithms team is looking for passionate, self-driven computer vision/computational photography research engineers who
Program Manager TS/SCI with CI Poly REQUIRED
Program Manager TS/SCI with CI Poly REQUIRED Position Description This is a tremendous opportunity to influence high-level decision makers in the government through a transformational advisory role.
Oracle Hyperion DRM Admin
Oracle Hyperion DRM Admin Position Description CGI is looking for an experienced Oracle Hyperion DRM Administrator responsible for configuration, migration, troubleshooting, testing, performance tuni
AIML - Sr Engineering Program Manager, ML Data & Infrastructure
Summary Posted: Nov 8, 2023 Weekly Hours: 40 Role Number:200519113 Imagine what you could do here. At Apple, new ideas have a way of becoming extraordinary products, services, and customer experience
CIP Hygiene Technician - Rexdale, ON
Background & Purpose of the Job Help us Bring Out the Best! Unilever is now recruiting for a CIP Technician at our Rexdale facility where we produce Hellmann's Mayonnaise. In this role you will w
Stage : Déploiement d'un nouvel outil de documentation des activités de validation de systèmes/équipements, Belgique - 2024
Site Name: Belgium-Wavre Posted Date: Nov 21 2023 Aidez-nous à devancer la maladie en participant à notre programme de stages Formation requise : Vous êtes étudiant(e) en Bachelier/Master en Administ
Associate Director - Digital Transformation
Site Name: Bengaluru Luxor North Tower Posted Date: Nov 29 2023Your role will bring technical expertise with project management acumen, ensuring seamless coordination and the successful implementatio
Clinical Technologist/Technologist Trainee- 2nd Shift | Medical Drug Monitoring LCMS Instrument/Data Analysis
MedTox Laboratories is a subsidiary of Laboratory Corporation of America (LabCorp). The integration of LabCorp and Covance in 2015 makes LabCorp the largest health care diagnostic company in the worl
Modelling/Forecasting Senior Specialist
Hours 40 Department Overview The Platform Delivery Team is responsible for coordinating and/or testing changes or enhancements to the components of the MLE Platform (Model Lifecycle Environment), a L
Copyright 2023-2025 - www.zdrecruit.com All Rights Reserved