Network Intelligence Pvt. Ltd.
Network Intelligence is one of the fastest growing cybersecurity firms with operations in India, Dubai, Singapore and Australia. What started off as a one-man show in 2001 is now a company of 300+ professionals working from 7 worldwide offices. We believe strongly in a culture of excellence, mentoring, and constant learning. Our consultants are appreciated as experts in their areas and have delivered consistently across challenging projects for clients all across the globe. With us you will find an environment that promotes your individual growth and rewards merit! Led by a team of hands-on practitioners we are working on exciting projects in the areas of cloud computing, IoT, Blockchain, NIST Cybersecurity Framework, and Big Data.
    We are looking for resource who has technical hands on firewall ( next generation ) , application firewall, VA tools and bypass switch .They will administer security systems in our Data center. He will work as operation security administration. The resource should have skills on using Trip wire as well. Below are more details-
    • Have capability to install, configure, design administer and operate security solutions such as , Next generation Firewalls, IPS, VPN, IDS, Vulnerability assessment tool , WAF ,  Bypass switch technologies
    • This SOW does contain any on-call support work.

    • Qualification : Bachelor in Computer Science or related certification, CCIE/CCSE Security, CISSP,CNNA Security

    • Monitor users, applications, networks, systems, access to security systems assets (includes intrusion prevention/detection, email/spam filtering, web filtering)
    • Scan for, analyze, and disposition vulnerabilities
    • Detect, analyze, and eliminate viruses and malicious code
    • Accept, triage, assign, and disposition all reported suspicious events and security incidents
    • Detect, triage, analyze, respond to, and recover from suspicious events and security incidents
    • Coordinate in-depth investigations of security incidents that are related to operation security with internal security authorities.

    • Respond to security incidents and security concerns on 24/7 basis.
    • Develop / review all corporate security policies and procedures to ensure compliance with CUSTOMER information security guidelines 
    • Identify deficiencies to Management while developing recommendations for appropriate corrective action that are related to operation security.
    • Liaison with all Customer & CUSTOMER IT staff with outside entities to ensure smooth security operations and to ensure compliance with CUSTOMER information security regulations.
    • Assist in the planning, coordination and conducting of security vulnerabilities scans.
    • Monitor exercises; prepare reports and debriefings identifying deficiencies, training needs and recommendations that related to security incidents matters.
    • Perform audit logging (includes review and retention) of users, applications, networks, systems, access to physical assets

    • Responsible for network security systems ensuring that best practices are followed in accordance with security standards and ISO 27001, ADSIC , NESA.
    • Responsible for consultancy and reporting in ICT security related subject.
    • Provide technical lead for Security products to network engineers.
    • In-depth knowledge of all networking technologies and stronger knowledge on troubleshooting issues for security devices such as WAF, Firewall , IPS , IDS, bypass switch etc..
    • Design and have capability to install, configure , administer and operate security solutions such as , Firewalls, IPS, VPN, IDS, Vulnerability assessment , WAF ,  Bypass switch technologies.
    • Serve as project lead and technical security assurance for ICT  security related projects.
    • Prepare detailed security reports for upper management for network behavior changes and trend analysis.
    • Prepare and  write ICT security policies , procedures, baselines  and maintain detailed and comprehensive documentation for all aspects of the security

    • While the resource will follow Customer working schedule, it may be determined some work is best done outside of those hours based on impact to the business.
    • Security Assessment & Audit
    • Interface with internal stakeholders such as information security and other authorities
    • Interface with CUSTOMER ICT & KEPCO & vendors

  • Recruiter Name:Ms. Surbhi
    Company:Network Intelligence Pvt Ltd

Post a Comment