Technical Specialist
HCLTech
Madurai, Tamil Nadu, India
Job description: Cloud Security Services 1. Responsible for Cloud Security Operations including IAM policies, encryption, Access Policies, KMS, Key Vault, RBAC. 2. Support and troubleshoot Cloud authentication and authorization services. 3. Troubleshooting issues with ADFS, Azure AD, Conditional Access, MFA, RBAC models and Access Policies. 4. Develop and manage scripts for Cloud operations. 5. Documentation and training for Cloud operations and procedures. 6. Ability to create documentation and diagrams to support design decisions. 7. Assist in mitigation of vulnerabilities. 8. Managing cryptography and encryption of data in the cloud. 9. Logging, monitoring, and responding to detected incidents in the cloud environment. 10. Responsible for the thorough documentations of implementations, via technical documentation and run-books. 11. Responsible for input and feedback on security architectures. 12. Support application team with Azure AD/AWS/GCP application registration. 13. Ensure proper delegation of permissions for all applications registered with Azure AD/AWS/GCP 14. Review all application registration and purge old or not used applications from Cloud console. 15. Monitor and support Web Application Proxy for ADFS. 16. Monitoring and resolving tickets related to Cloud systems (KMS, Key Vault, RBAC) ) 17. Ensure N/N-1 compliance for all servers and upgrades. To clearly understand the client's cybersecurity environment and respective product. To monitor, configure, and troubleshoot cybersecurity issues and related monitoring tools To analyse and validate cybersecurity incidents in-detail and help the L3 team with RCAordata or logs collection To enable knowledge transferortrainings through creationor maintenance of configuration documents, test plans, operational manuals and provide operational training to L1 team. To analyse and fine-tune cybersecurity policies, participate in cybersecurity review calls pertaining to change requests and recommendations on cybersecurity policy changes. To implement changes, monitor security device performance and implements performance tuning when necessary. To prepare analyses and reports to highlight the project progressorchallenges and ensure quality and accuracy to the client