Responsibilities
A day in the life of an Infoscion
• As part of the Infosys consulting team, your primary role would be to get to the heart of customer issues, diagnose problem areas, design innovative solutions and facilitate deployment resulting in client delight.
• You will develop a proposal by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise.
• You will plan the activities of configuration, configure the product as per the design, conduct conference room pilots and will assist in resolving any queries related to requirements and solution design
• You will conduct solution/product demonstrations, POC/Proof of Technology workshops and prepare effort estimates which suit the customer budgetary requirements and are in line with organization’s financial guidelines
• Actively lead small projects and contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers.
Responsibilities:-
Design, implement, and manage the Data Loss Prevention program across the organization.-
Develop policies, procedures, and guidelines for data protection and ensure their effective implementation.-
Monitor and analyze data flows to identify potential risks or breaches.-
Collaborate with IT teams to configure and maintain DLP tools and technologies.-
Conduct regular audits to assess compliance with data protection policies.-
Investigate incidents of data loss or leakage, perform root cause analysis, and recommend corrective actions.-
Stay up-to-date with industry trends and best practices in DLP to continuously improve the program.
Key Skills: DLP, PKI, Tripwire, FIM
Educational Requirements
Master of Science (Technology),Bachelor of Engineering,BCA,Bachelor Of Computer Science,MCA,Master of Computer Science
Service Line
Cyber Security
Preferred Skills:
Data Privacy
Data Security->Cloud Access Security Broker(CASB)
Data Security->Data Tokenization
Data Security->Data Masking
Data Security->Data Rights Management(DRM)
Data Security->Data Encryption
Data Security->Database Activity Monitoring(DAM)
Data Security->IBM Guardium
Data Security->Vormetric
Data Security->Public Key Infrastructure(PKI)
Data Security
Data Security->Information Security Management(IRM)
Data Security->Data Leak Prevention(DLP)
Data Security->Data Classification