Join our team as an Associate WAF Engineer, where you will focus on developing and implementing security solutions. This is a full-time, on-site opportunity located in Pune, Maharashtra, India. As an Information Security Engineer II, your responsibilities include conducting network and software vulnerability assessments, evaluating system security configurations, and providing improvement recommendations. You will also assist in resolving malware and intrusion issues and stay updated on industry security updates and practices. Join us and be a part of enhancing our organization's IT security.
Job description
Information Security Engineer II
The Information Security Engineer's focus is to develop and implement security solutions, which also includes current evaluation as well as keeping track of observance of the needed security guidelines all over the company computing environment. This role may help conduct network and software vulnerability assessments and testing by utilizing reverse engineering techniques. This job learns how to test the current state of the information security architecture and provides improvement recommendations by gathering key insights found from testing and analyzing the current systems and networks. This job also assists with evaluating system security configurations and performing root cause analysis to determine how to provide optimal IT security for the organization.
Key Responsibilities and Duties
- Providing operations and engineering support for critical security systems and services including servers, endpoint security, computer forensics, vulnerability/penetration assessment/mitigation, and security event management.
- Assists with executing vulnerability analysis and exploitation of applications, operating systems and networks.
- Conducts cost/benefit evaluation of cloud solutions compared to virtual private networks, dedicated hosting, and in-house solutions.
- Assesses the technical feasibility of adopting external cloud based IT platform and infrastructure services within the organization.
- Identifies portions of the organization's IT platform/infrastructure with the highest potential return for cloud deployment.
- Helps implement the organization's global strategies and initiatives to enhance Information Technology plans, operations and procedures.
- Works to identify intrusion or incident path or method through testing and evaluation procedures.
- Helps design, develop and implement countermeasures, systems integration and tools specific to cyber and information operations.
- Learns how to resolve malware and intrusion issues within the system as they occur.
- Follows industry security updates, technologies and practices on a continual basis to improve overall security management.
- Helps serve as an internal information security consultant on the standards, complex issues and best practices for the organization.
- Contributes to the testing and analysis of complex software systems to determine both the functionality and intent of the systems.
- Assists with maintaining operational and configuration documentation and creates and maintains diagrams.
- Learns from and works with Cybersecurity Risk and Security Operation teams to enhance the overall security posture of the enterprise.
Educational Requirements
- University (Degree) Preferred
Work Experience
- 2+ Years Required; 3+ Years Preferred
Physical Requirements
- Physical Requirements: Sedentary Work
Career Level
6IC
Related Skills
Accountability, Adaptability, Business Continuity Planning, Cloud Computing Security, Collaboration, Communication, Compliance, Consultative Communication, Cybersecurity, Detail-Oriented, General Risk Management, Network Security, Prioritizes Effectively