Cyber Security Specialist
Cyber Security Specialist32
Applications
32
Applications
About the Job
Skills
Greetings from Netsach - A Cyber Security Company.
We have an immediate job opening for Cybersecurity Specialist with 8-10 years of experience, with 3-5 years in Cybersecurity roles.
Job Title: CyberSecurity Specialist
Exp: 8-10yrs
Location: Chennai Onsite
Job Type: Full-time
Interested candidates please share your relevant profiles at emily@netsach.co.in
1. Job Description:
- 8-10 years of experience, with 3-5 years in Cybersecurity roles.
- Familiarity with security tools and technologies, including PAM, PIM, DLP, and Zero Trust frameworks.
- Experience with Active Directory, Office 365, Azure, and Oracle Cloud Infrastructure (OCI).
- Familiarity with cloud security assessment, application security, and network infrastructure VA and PT.
Professional Certifications:
- Minimum: CISM, CISA
- Recommended: CISSP, CCSP, CRISC, Microsoft 365 Certified: Security Administrator Associate, Microsoft Certified: Azure Security Engineer Associate
2. QUALIFICATIONS:
- Minimum: Bachelor’s degree in computer science, Information Systems, or a related field.
3. POSITION REǪUIREMENTS - SKILLS & COMPETENCIES:
- Strong understanding of cybersecurity principles, especially in cloud, AD, O365, and application security.
- Ability to guide and mentor IT teams on security best practices without direct involvement in management or implementation.
- Proficiency in recommending and enforcing security tools, configurations, and practices related to VA/PT.
- Strong collaboration skills to work with IT teams and leadership to enhance cybersecurity measures.
- Knowledge of security standards (e.g., NIST, OWASP) and experience in guiding teams to comply with these frameworks.
- Excellent communication and leadership skills to influence and guide cybersecurity practices across the organization.
4. PERFORMANCE MEASURES
- Compliance Adherence: Maintain regulatory and policy compliance across IT environments.
- Risk Mitigation: Effectively address identified risks and vulnerabilities.
- Incident Response: Timely and efficient guidance during security incidents.
- Security Assessments: Conduct thorough assessments and implement recommended improvements.
- Stakeholder Feedback: Positive feedback on guidance and support from stakeholders.
- Audit Resolution: Address audit findings promptly and enhance governance.
- Best Practices Implementation: High adoption rate of cybersecurity best practices.
- Training Contribution: Active involvement in cybersecurity training and awareness.
- Innovation: Introduce effective strategies or tools to improve security posture.
- Collaboration: Strong communication and collaboration with cross-functional teams.
5. PRIMARY JOB PURPOSE
- Oversee and guide the implementation of cybersecurity best practices across the organization’s IT environments, including Active Directory, Office 365, Azure, and Oracle Cloud Infrastructure.
- Advise IT teams on security frameworks, ensuring alignment with industry standards and organizational policies.
- Conduct security assessments to identify vulnerabilities and recommend mitigation strategies to strengthen the security posture.
- Provide strategic guidance on cloud security, application security, and network vulnerability management.
- Ensure compliance with regulatory requirements and security standards across all IT environments.
- Offer expert insights and recommendations to support IT teams in implementing effective security controls.
- Enhance the organization’s overall cybersecurity posture by fostering a secure and
compliant IT landscape.
- Collaborate with cross-functional teams to integrate cybersecurity practices into IT processes and initiatives.
6. KEY ACCOUNTABILITIES/ RESPONSIBILITIES
Cybersecurity Oversight and Guidance:
- Oversee and guide the implementation of cloud security policies and procedures.
- Provide best practices for securing cloud-based systems and services.
- Recommend hardening guidelines for IT systems and infrastructure.
- Advise on O365 security measures and configurations.
- Develop and provide centralized security frameworks and architectural guidance.
- Recommend security-related tools and platforms, including PAM, PIM, DLP, Access controls, and Zero Trust framework.
- Provide guidance on the enforcement of WAF tools, OWASP standards, vulnerability management, VAPT, and cloud security practices.
- Collaborate with IT teams to ensure cybersecurity best practices are integrated into Active Directory, Office 365, and cloud environments.
Office 365 Security Oversight:
- Oversee the security posture of Office 365 applications and services.
- Provide guidance on administering user accounts, licenses, permissions, and ensuring secure configurations of email, SharePoint, OneDrive, Teams, and other O365 components.
- Ensure security and compliance within Office 365 environments by advising on necessary cybersecurity measures.
- Support IT teams in maintaining a secure and compliant O365 environment.
Active Directory Security Guidance:
- Provide oversight and guidance on the design and maintenance of Active Directory (AD) infrastructure, including domain controllers, group policies, and organizational units.
- Offer best practices for monitoring AD performance, replication, security, and troubleshooting.
- Advise on managing user account lifecycle, permissions, and ensuring compliance with security standards.
- Guide IT teams on securing AD environments and managing access controls.
Cloud Security Advisory (Azure and OCI):
- Guide the IT team on the security aspects of deploying, configuring, and maintaining Azure and Oracle Cloud resources and services.
- Provide best practices for implementing secure Azure solutions, including Virtual Machines, App Services, and Networking.
- Advise on optimizing cloud environments for performance, cost, and scalability with a focus on security.
- Ensure cloud security and compliance with organizational policies and industry standards, offering guidance on best practices.
Cloud Security Assessment:
- Conduct security assessments for cloud environments, including Azure and OCI, to identify vulnerabilities and recommend mitigation strategies.
- Guide IT teams on securing cloud configurations, monitoring cloud security postures, and addressing compliance gaps.
- Provide best practices for maintaining secure cloud deployments, ensuring alignment with organizational policies and industry standards.
Application Security:
- Guide IT teams in implementing application security best practices, including secure coding, regular code reviews, and application vulnerability scanning.
- Oversee the security assessment of applications, ensuring that they are free from critical vulnerabilities and comply with security standards.
- Advise on the integration of security into the software development lifecycle (SDLC).
Network Infrastructure Vulnerability Assessment and Penetration Testing (VA/PT):
- Provide oversight on conducting VA and PT of network infrastructure to identify security weaknesses.
- Guide the IT team on implementing corrective actions based on VA/PT findings.
- Recommend best practices for securing network architecture and enhancing defensive measures.
- Ensure that security assessments are regularly conducted and that identified vulnerabilities are addressed promptly.
- practices across the organization.
- Collaboration: Strong communication and collaboration with cross-functional teams.
Thank You
Emily Jha
Netsach - A Cyber Security Company
www.netsach.co.in
About the company
Company Size
11-50 Employees
Headquarter
India
Other open jobs from NETSACH GLOBAL