Responsibilities
A day in the life of an Infoscion.
As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment.
You will explore the alternatives to the recommended solutions based on research that includes literature surveys, information available in public domains, vendor evaluation information, etc. and build POCs.
You will create requirement specifications from the business needs, define the to-be-processes and detailed functional designs based on requirements.
You will support configuring solution requirements on the products; understand if any issues, diagnose the root-cause of such issues, seek clarifications, and then identify and shortlist solution alternatives.
You will also contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you!
Ability to work with clients to identify business challenges and contribute to client deliverables by refining, analyzing, and structuring relevant data.
Awareness of latest technologies and trends.
Logical thinking and problem-solving skills along with an ability to collaborate.
Ability to assess the current processes, identify improvement areas and suggest the technology solutions.
One or two industry domain knowledge.
Educational Requirements: MCA, BSc, BCA, Bachelor of Engineering, Intergrated course BCA+MCA
Service Line: Cyber Security
Location: Across Pan India.
Educational Requirements
MCA,BSc,BCA,Bachelor of Engineering,Intergrated course BCA+MCA
Service Line
Cyber Security
Preferred Skills:
Vulnerability Management
Application Security
Application Security->Wireshark
Application Security->Nessus
Application Security->Burpsuite
Application Security->Devsecops
Infrastructure Security->Email Security
GRC->Risk Assessment
Tools->Service Now->ServiceNow-Security
GRC
GRC->RSA Archer(e-GRC)
IDAM->Oracle Identity Manager(OIM)
IDAM->Oracle Access Manager(OAM)
IDAM->Okta
IDAM->Cyberark
IDAM->Sailpoint
IDAM->CA Siteminder(CA Identity Suite)
IDAM->Ping/Federate
IDAM->IBM Security Identity manager(ISIM)
Network Security
Network Security->Firewalls->Checkpoint
Network Security->Firewalls->Juniper-Firewalls
Network Security->Firewalls->Web Application Firewall(WAF)
Network Security->Firewalls->Palo Alto
Network Security->Load Balancer->F5
Network Security->Proxy->Blue Coat
Infrastructure Security->Antivirus
Infrastructure Security->Symantec Endpoint(SEP)
SOC->Security Operations Center(SOC/SIEM)
SOC
SOC->Security Monitoring
Infrastructure Security->Malware Analysis
SOC->Breach Response
Security Incident and Event Management(SIEM)->QRadar
Security Incident and Event Management(SIEM)->Arcsight
Tools->Splunk
Security Incident and Event Management(SIEM)->RSA Envision
Security Incident and Event Management(SIEM)->Logrythm
Data Security->Data Classification
Data Security->Data Encryption
Data Security->IBM Guardium
Data Security->Public Key Infrastructure(PKI)
Cloud Security
Cloud Security->AWS Security
Cloud Security->Azure Security
Security testing->Cloud Security
OT Security
OT Security->OT Security
AWS DevOps
Blockchain Security
Devops->Google Cloud Ptatform (GCP)