Sorry, this job is no longer available.(Loading More Opportunities)
Security Specialist - DLP & CASB
Location: Mumbai and Bangalore
Work with vendors to support the DLP technology (troubleshooting, upgrades, etc.)
Administration of the DLP tools which includes configuring policies and reporting
Monitor and respond to alerts generated from the DLP systems and other technologies
Understand and follow the incident response process through event escalations
Respond to escalations by the Incident Response Team
Follow processes to maintain the DLP system
Detecting potential data breach incidents in timely manner and prevent them by monitoring data
Monitoring of DLP alerts from Forcepoint and Zscaler DLP console globally
Processing of DLP incidents to ensure that no confidential data has been transferred out of LTI domain. To control the risk in transfer of data through emails.
Addressing suspicious alerts on timely basis.
Whitelisting legitimate email senders and recipients in DLP rules/policies to reduce false positive alerts and make monitoring more effective.
Trace and update the information of the employees leaving the organization, to specially monitor any confidential/sensitive information sent to their personal email ID(s).
Creation of management reports and dashboards
Suggest and implement enhancements to automate and simplify implementations
Well-versed in understanding the DLP policies.
Experience in implementation and management of IDAM solution
Extensive IDAM Architecture experience
Identity & Access Management Architect, strong in solution design and Active Directory
Experience of reviewing current end client setup and provide a solution
Consultancy experience of Vision and Strategy development for Identity & Access
Broad appreciation of technology encompassed within Identity & Access
Ability to work with Customer Business leaders and I.T. Architects to create and articulate a Vision for Identity & Access aligned with the Business goals of the organisation
Ability to work with Technical and Operations staff to define a strategy for delivering Identity & Access services
Comfortable with associated disciplines of Security Policy and Governance
Able to deliver a cohesive blueprint for delivery of Identity & Access Services to include technology options
Seamlessly integrate with in-house applications and implement controls to manage the onboarding, project/business movement and offboarding procedures
Analyse cloud user traffic identify anomalous activity and specify areas to strengthen protection of cloud data and applications
Implement technical measures or leverage existing technologies to prevent sensitive data from leaving the organization through email, network traffic, cloud storage/applications.
Works closely with and provides guidance/direction to the Managed Security Service and Security Operations Center.
Assist in the development / maintenance of CASB and Cloud Security Strategies Policies Standards and Procedures. This includes requirements/restrictions for Cloud application and storage use monitoring and where appropriate blocking of data leaving the
environment and the ongoing tracking/monitoring of cloud access activities within the enterprise environment.
Participates in security investigations and compliance reviews as assigned by management.
Assist in development and deployment of DLP and CASB awareness training and communication capabilities
Responsible for operating maintaining and supporting various security tools as assigned by management.
Collaborates with other security and infrastructure team members to identify and implement solutions.
Works with business partners in resolving security-related infrastructure outages.
Must possess expert troubleshooting skills.
· 2-6 years of experience in data leakage prevention technologies
· At least 3 years of experience in:
Information Security concepts related to Governance, Risk & Compliance
Implementation and Integration of various data security technologies
Experience in Cyber Security and/or Security Operations
Understanding of cybersecurity frameworks including but not limited to NIST, ISO 27001, CPM, etc.
Ability to work independently with or without direction and/or supervision.
Ability to prioritize and multitask. Flexibility and adaptability in work approach.
Very strong interpersonal, facilitation skills along with effective communication (both written and verbal) skills and the ability to present complex ideas in a clear, concise way; ability to influence and develop relationships with key partners, auditors & clients
Ability to think out of the box and effectively communicate with business leadership
Excellent communicator with strong client relationship focus with business sponsors, enterprise architects, and information security engineers to articulate business case and technology options and communicate enterprise messaging in simple and effective manner