The Job logo

What

Where

Cyber Security Architect

ApplyJoin for More Updates

You must Sign In before continuing to the company website to apply.

Smart SummaryPowered by Roshi
We are hiring a Cyber Security Architect at Wipro, located in Hyderabad, Telangana, India. This is a full-time opportunity and you will be responsible for designing the organization's computer and network security infrastructure. Your role will involve protecting systems and sensitive information from cyber threats. You'll need to evaluate security requirements, identify and mitigate risks, and develop security architecture. Additionally, you'll provide support during deployment, configuration, and administration of security technologies and assist with disaster recovery in case of security breaches. You must have relevant certifications, such as CISSP, Cloud Architect Certification, and expertise in security technologies. The job requires a bachelor's or master's degree and 3-7 years of experience.

Job description 

Role Purpose

The purpose of this role is to design the organisation’scomputer and network security infrastructure and protect its systems andsensitive information from cyber threats.

 

Do

 

  1. Design and develop enterprise cyber security strategyand architecture
    1. Understand security requirements by evaluating businessstrategies and conducting system security vulnerability and riskanalyses
    2. Identify risks associated with business processes, operations,

information security programs and technology projects

  1. Identify and communicate current and emerging security threatsand design security architecture elements to mitigate threats as theyemerge
  2. Identify security design gaps in existing and proposedarchitectures and recommend changes or enhancements
  3. Provide product best fit analysis to ensure end to end securitycovering different faucets of architecture e.g. Layered security,Zoning, Integration aspects, API, Endpoint security, Data security,Compliance and regulations
  4. Demonstrate experience in doing security assessment against NISTFrameworks, SANS, CIS, etc.
  5. Provide support during technical deployment, configuration,integration and administration of security technologies
  6. Demonstrate experience around ITIL or Key process-orienteddomains like incident management, configuration management, changemanagement, problem management etc.
  7. Provide assistance for disaster recovery in the event of anysecurity breaches, attacks, intrusions and unusual, unauthorized orillegal activity
  8. Provide solution of RFP’s received from clients and ensureoverall design assurance
    1. Develop a direction to manage the portfolio of to-be-solutionsincluding systems, shared infrastructure services, applications,hardware related to cyber risk security in order to better matchbusiness outcome objectives
    2. Analyse technology environment, enterprise specifics, clientrequirements to set a collaboration design framework/ architecture
  • Depending on the client’s need with particular standards andtechnology stacks create complete RFPs
  1. Provide technical leadership to the design, development andimplementation of custom solutions through thoughtful use of moderntechnology
  2. Define and understand current state solutions and identifyimprovements, options & tradeoffs to define target state solutions
  3. Clearly articulate and sell architectural targets, recommendationsand reusable patterns and accordingly propose investment roadmaps
  • Evaluate and recommend solutions to integrate with overalltechnology ecosystem
  • Tracks industry and application trends and relates these to planningcurrent and future IT needs

 

  1. Stakeholder coordination & audit assistance
    1. Liaise with stakeholders in relation to cyber security issuesand provide timely support and future recommendations
    2. Provide assistance in maintaining an information security riskregister and help with internal and external audits relating toinformation security
    3. Support audit of security best practices and implementation ofsecurity principles across the organization, to meet business goalsalong with customer and regulatory requirements
    4. Assist with the creation, maintenance and delivery of cybersecurity awareness training to team members and customers
    5. Provide training to employees on issues such as spam andunwanted or malicious emails

 

 

Stakeholder Interaction

 

Stakeholder TypeStakeholder IdentificationPurpose of Interaction
InternalProgram Manager/DirectorRegular reporting & updates
Infrastructure (CIS team)For infrastructure support
External

Customer

 

To coordinate for all security breaches & resolutions

 

Display

 

Lists the competencies required to perform this role effectively:

  • Functional Competencies/ Skill
    • Leveraging Technology - Knowledge of current and upcoming securitytechnologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) andunderstanding of compliance regulatory requirement like PCI DSS, HIPAA,etc.- Expert
    • Systems Thinking – Understanding of the Wipro system(interrelatedness, interdependencies and boundaries) and perform problemsolving in a complex environment - Expert
    • Leveraging Technology – In-depth knowledge of and mastery overecosystem technology that commands expert authority respect –Master
    • Technical Knowledge - Certified Information Systems SecurityProfessional (CISSP), Cloud Architect Certification from AWS and Azure,ToGAF or SABSA certification-Master

 

 

Competency Levels
FoundationKnowledgeable about the competency requirements. Demonstrates (inparts) frequently with minimal support and guidance.
CompetentConsistently demonstrates the full range of the competencywithout guidance. Extends the competency to difficult and unknownsituations as well.
ExpertApplies the competency in all situations and is serves as a guideto others as well.
MasterCoaches others and builds organizational capability in thecompetency area. Serves as a key resource for that competency and isrecognized within the entire organization.

 

  • Behavioral Competencies
    • Effective Communication
    • Managing Complexity
    • Client centricity
    • Technology Acumen
    • Innovation
    • Problem Solving approach
    • Collaborative Working
    • Execution Excellence

 

Deliver

 

No.Performance ParameterMeasure
1.Customer centricityTimely security breach solutioning to end users, Internalstakeholders & external customers experience, CSAT, educating andsuggesting right control to the customers.
2.Support sales team to create wins% of proposals with Quality Index  >7, timely support ofthe proposals, identifying opportunities/ leads to sell services within/outside account (lead generation), no. of proposals led

  

Security Architecting

Set alert for similar jobsCyber Security Architect role in Hyderabad, India
Wipro Logo

Company

Wipro

Job Posted

8 months ago

Job Type

Full-time

WorkMode

On-site

Experience Level

3-7 Years

Category

Software Engineering

Locations

Hyderabad, Telangana, India

Qualification

Bachelor or Master

Applicants

Be an early applicant

Related Jobs

Wipro Logo

Cyber Security Architect

Wipro

Bengaluru, Karnataka, India

Posted: a year ago

Job Description Position: SOC Lead (Security Operations Center Lead) Job Summary: The SOC Lead is a seasoned cybersecurity professional responsible for overseeing the daily operations of the Security Operations Center. This role involves managing a team of analysts, coordinating incident response efforts, ensuring the effectiveness of security tools and processes, and providing strategic guidance to enhance the organization's overall security posture. The SOC Lead collaborates with various stakeholders to develop and execute strategies that protect the organization's critical assets from cyber threats. Responsibilities: Lead and manage a team of SOC analysts, including hiring, training, performance evaluation, and career development. Oversee the day-to-day activities of the SOC, including incident monitoring, analysis, and response. Coordinate and drive incident response efforts for complex and high-impact security incidents. Develop and maintain SOC policies, procedures, and playbooks to ensure consistent and effective incident response. Must be able to manage the shifts/On-Call assignments for the management of the operations. Must be able to run and execute cyber Crisis simulation and table-top exercises for training of the team. Logically designing SOAR playbooks and helping the team manage the automation for Incident monitoring and response. Collaborate with IT, Legal, Compliance, and other departments to ensure alignment with security goals and regulatory requirements. Assess the effectiveness of security tools and technologies and recommend improvements or upgrades as needed. Provide strategic guidance and recommendations to senior management regarding security enhancements, threat landscape, and risk mitigation strategies. Stay up to date with emerging cybersecurity trends, threat intelligence, and best practices. Prepare and present regular reports on SOC activities, incident trends, and key performance indicators. Contribute to the development and maintenance of the organization's incident response and business continuity plans. Collaborate with internal teams and provide evidence for external/internal audits for risk governance and management. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience). Extensive experience working in a Security Operations Center environment, with progressively increasing responsibilities. Strong leadership and management skills, with a proven track record of leading and motivating teams. In-depth knowledge of cybersecurity technologies, tools, and best practices. Experience with incident response methodologies, crisis management, and handling high-stress situations. Excellent communication and interpersonal skills, with the ability to interact effectively with technical and non-technical stakeholders. Must have a hands-on experience of at least 4 years on EDR, NDR, SOAR, CSPM, CASB, IDS/IPS, and SIEM platforms. Relevant industry certifications such as SANS, CISSP, CISM, CISA, or equivalent are highly desirable. Ability to think strategically, analyze complex situations, and make informed decisions. Experience working with audit and regulatory compliance frameworks (e.g., GDPR, HIPAA, PCI DSS) is a plus. Demonstrated ability to drive process improvements and adapt to changing threat landscapes.