Browse
Employers / Recruiters

Compliance and Security (C&S) Subject Matter Expert

Negotiable
Full-time
Continue
By pressing the button above, you agree to our Terms and Privacy Policy, and agree to receive email job alerts. You can unsubscribe anytime.
[Job Title]
Compliance and Security (C&S) – Subject Matter Expert
[Job Overview]

Compliance and Security Senior Technical Specialist part of the India Infrastructure Services team who will support a major region for the security related topics under C&S scope covering PAM, RSA, Vormetric, Proof point, Hardening. He / she would oversee these security platforms / tools and objectives in line with the global directives to keep the company safe. As an SME, you will be responsible for providing expert guidance, recommendations, and hands-on support in these areas to ensure the security and integrity of our organization's IT infrastructure. Your primary focus will be on designing, implementing, and maintaining robust security controls, policies, and technologies related to privileged access management, RSA solutions, Vormetric encryption, ProofPoint email security, and system hardening. You will collaborate with cross-functional teams and stakeholders to enhance the overall security posture of our organization.

[Technology and Sub-technology]
  • Threat and Vulnerability Management
  • Data Leak Protection (DLP)
  • Privilege Access Management
  • Identify and Access Management

[Base Location]

Bangalore
[Type]

Hybrid - WFH/In-office (visiting office as per company guidelines is mandatory)
[Qualifications]
  • Education: Bachelor's degree in Information Systems, Information Technology (IT), Computer Science, Engineering, related programs, or equivalent experience.
  • Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience).
  • Proficiency in implementing and managing Vormetric encryption solutions or similar encryption technologies.
  • Experience in designing and configuring Proofpoint email security solutions or equivalent email security platforms.
  • Extensive knowledge of system hardening principles, secure configuration standards (e.g., CIS benchmarks), and vulnerability assessment tools (e.g., Kenna, Qualys).
  • Strong analytical and problem-solving skills with the ability to assess complex security issues and provide effective solutions.
  • Excellent communication and interpersonal skills, with the ability to effectively convey complex technical concepts to both technical and non-technical audiences.
  • Proven experience working as a Subject Matter Expert (SME) or Consultant in Privileged Access Management (PAM), RSA, Vormetric, ProofPoint, and system hardening (details below).
  • IT Infrastructure experience is essential
  • Privileged Access Management (PAM):
  • Expertise in implementing and managing PAM solutions, such as CyberArk, Thycotic, or BeyondTrust.
  • Knowledge of privileged account lifecycle management, including provisioning, deprovisioning, and access review processes.
  • Familiarity with privileged session monitoring and recording.
  • Understanding of privileged access policies, standards, and best practices.
  • Proficiency in evaluating and mitigating risks associated with privileged accounts.
  • Ability to design and implement privileged access controls and workflows.
  • Experience in integrating PAM solutions with other security technologies and identity sources.
  • Knowledge of compliance frameworks (e.g., PCI DSS, HIPAA) and their requirements related to PAM.
  • Data Loss Prevention (DLP):
  • Strong understanding of data classification and data handling requirements.
  • Knowledge of DLP technologies and tools like Symantec DLP, McAfee DLP, or Forcepoint DLP.
  • Ability to assess and classify sensitive data across various platforms and data repositories.
  • Experience in designing and implementing DLP policies and rules.
  • Proficiency in configuring and managing DLP agents, sensors, and monitoring consoles.
  • Familiarity with incident response and investigation procedures related to DLP incidents.
  • Understanding of regulatory compliance standards (e.g., GDPR, CCPA) and their impact on DLP implementations.
  • Knowledge of encryption and data protection techniques.
  • Identity and Access Management (IAM):
  • Proficiency in IAM concepts, principles, and frameworks.
  • Experience with IAM solutions like Okta, Azure Active Directory, or SailPoint.
  • Knowledge of user lifecycle management, including user provisioning, deprovisioning, and access recertification processes.
  • Understanding of identity governance and administration (IGA) processes and controls.
  • Ability to design and implement IAM roles, entitlements, and access policies.
  • Familiarity with single sign-on (SSO) and multi-factor authentication (MFA) technologies.
  • Knowledge of directory services (e.g., LDAP, Active Directory) and their integration with IAM solutions.
  • Understanding of federation protocols and standards (e.g., SAML, OAuth, OpenID Connect).
  • Threat and Vulnerability Management (TVM):
  • Expertise in vulnerability assessment tools like Nessus, Qualys, or Rapid7.
  • Proficiency in conducting vulnerability scans and managing vulnerability data.
  • Knowledge of common vulnerabilities and exposures (CVE) databases and vulnerability intelligence sources.
  • Understanding of vulnerability management processes, including prioritization, remediation, and reporting.
  • Experience in designing and implementing a vulnerability management program.
  • Familiarity with penetration testing methodologies and tools.
  • Knowledge of security assessment frameworks (e.g., OWASP, NIST SP 800-53) and their application to vulnerability management.
  • Ability to analyze and interpret vulnerability scan results and provide actionable recommendations.


[Job Details]
  • Serve as a subject matter expert and trusted advisor on Privileged Access Management (PAM), RSA, Vormetric, ProofPoint, and system hardening.
  • Design and implement comprehensive Privileged Access Management (PAM) solutions to safeguard privileged accounts, enforce access controls, and monitor privileged activities.
  • Provide guidance and best practices for the implementation and configuration of RSA solutions, including RSA SecurID, RSA Archer, and RSA NetWitness.
  • Implement and maintain Vormetric encryption solutions to protect sensitive data at rest and in transit.
  • Design and configure ProofPoint email security solutions to mitigate email-based threats, such as phishing, malware, and data leakage.
  • Collaborate with infrastructure and operations teams to develop and implement system hardening guidelines, baselines, and secure configuration standards.
  • Conduct security assessments, vulnerability scans, and penetration tests to identify and remediate security vulnerabilities.
  • Collaborate with cross-functional teams to develop and enforce security policies, procedures, and standards.
  • Stay abreast of emerging threats, vulnerabilities, and industry best practices related to Privileged Access Management, RSA, Vormetric, ProofPoint, and system hardening.
  • Provide training and knowledge sharing sessions to technical teams and stakeholders on security technologies and best practices.
  • Collaborate with incident response teams to investigate and remediate security incidents related to PAM, RSA, Vormetric, ProofPoint, and system hardening.

[Good to have Skills]
  • Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or vendor-specific certifications in PAM, RSA
  • Familiarity with industry regulations and frameworks related to privileged access management and security hardening (e.g., NIST, PCI-DSS, ISO 27001).


[Responsibilities and Duties]
  • Interface with engineering management and leadership to drive secure initiatives, planning, and resolve issues and conflicts early and within development lifecycle
  • Facilitate secure engagement activities including security requirements, threat modeling, vulnerability analysis, and risk assessment
  • Coordinate security incident and response activities, performing analysis, collaboration with engineering, and drive resolution of incidents
  • Identify and drive process efficiency and optimization within the team, allocation of resources, ensuring milestones and targets are achieved
  • Monitor and manage product risks, ensure key stakeholders are informed, plan and communicate intended outcomes
  • Coordinate and collaborate with internal and external stakeholders including engineering, quality assurance, security architecture, governance, and certification entities to achieve department goals, risk reduction, and milestones
  • Ensure security requirements are understood and applied in accordance with
  • Security policies, applicable country laws, and regulations
  • Promote and apply Zero Trust architecture and principles throughout service offerings
  • Serve as a subject matter expert and trusted advisor on Privileged Access Management (PAM), RSA, Vormetric, ProofPoint, and system hardening.
  • Design and implement comprehensive Privileged Access Management (PAM) solutions to safeguard privileged accounts, enforce access controls, and monitor privileged activities.
  • Provide guidance and best practices for the implementation and configuration of RSA solutions
  • Implement and maintain Vormetric encryption solutions to protect sensitive data at rest and in transit.
  • Collaborate with infrastructure and operations teams to develop and implement system hardening guidelines, baselines, and secure configuration standards.
  • Conduct security assessments, vulnerability scans, and penetration tests to identify and remediate security vulnerabilities.
  • Collaborate with cross-functional teams to develop and enforce security policies, procedures, and standards.
  • Stay abreast of emerging threats, vulnerabilities, and industry best practices related to Privileged Access Management, RSA, Vormetric, ProofPoint, and system hardening.
  • Provide training and knowledge sharing sessions to technical teams and stakeholders on security technologies and best practices.
  • Collaborate with incident response teams to investigate and remediate security incidents related to PAM, RSA, Vormetric, ProofPoint, and system hardening.
  • Any other duties as assigned


[Keywords]
  • Compliance & Security
  • Security Tools – Beyond Trust, Delinea, McAfee
  • Security Governance
  • Security Operations
  • DLP
  • Kenna, Qualys
  • Antivirus
  • IT Infrastructure


Last updated on Aug 21, 2023

See more

More jobs at g6jdnw8nip4bx2tar9us2dx9tkot2005d9fqb82t4c87ph7vimwf7411au20toln

Analyzing

 · 

30+ days ago

 · 

30+ days ago

 · 

30+ days ago

 · 

30+ days ago

More jobs like this

Analyzing

Chennai, Tamil Nadu

 · 

30+ days ago

Compliance and Security (C&S) Subject Matter Expert
G
g6jdnw8nip4bx2tar9us2dx9tkot2005d9fqb82t4c87ph7vimwf7411au20toln

Bengaluru, Karnataka

 · 

30+ days ago

Certification Coordinator
D
dzjdnw32if8xtggkzt37s86ysogr2d0914ssefeipzumjenq39ptu7lmw6v63fwm

Bengaluru, Karnataka

 · 

30+ days ago

DEx Auditor AI&A
E
e5jdnwg7ia5nmpidkgm0x86zidegds023flk1ol79g88672m82f3rk6vbddcyss8

Chennai, Tamil Nadu

 · 

30+ days ago

Package Specialist SAP HANA Master Data Governance
T
tjjdnw3gpkwlpmq7qttmi8vox1rmzd09da8sjkc0z5wc5kgw7eewbu75l4yg3o0d

Bengaluru, Karnataka

 · 

30+ days ago

Ops- Regulatory Operations - Derivative Regulatory Reporting- Analyst
rbjdnweld32246lzg3taqwi54kvozt05179osu5qfv6m4t6jrkzmy95rqih6j9f1

Bengaluru, Karnataka

 · 

30+ days ago

Healthcare Complioance Analyst
X
x9jdnwa2m46pqq87teoiinh9tz9enk06899tm9zblpa5heuh32d0t5ue19lg2qdg

Vadodara, Gujarat

 · 

30+ days ago

Gurugram, Haryana

 · 

30+ days ago

Gurugram, Haryana

 · 

30+ days ago

Compliance Officer
C
careers-at-sleek

Remote

 · 

30+ days ago

Developed by Blake and Linh in the US and Vietnam.
We're interested in hearing what you like and don't like! Live chat with our founder or join our Discord
Changelog
🚀 LaunchpadNov 27
Create a site and sell services based on your resume.
🔥 Job search dashboardNov 13
Revamped job search UI with a sortable grid, live filtering, bookmarks, and application tracking.
🫡 Cover letter instructionsSep 27
New Studio settings give you control over AI output.
✨ Cover Letter StudioAug 9
Automatically generate cover letters for any job.
🎯 Suggested filtersAug 6
Copilot suggests additional filters above the results.
⚡️ Quick applicationsAug 2
Apply to jobs using info from your resume. Initial coverage of ~200k jobs in Spain, Germany, Austria, Switzerland, France, and the Netherlands.
🧠 Job AnalysisJul 12
Have Copilot read job descriptions and extract out key info you want to know. Click "Analyze All" to try it out. Click on the Copilot's gear icon to customize the prompt.
© 2024 RemoteAmbitionAffiliate · Privacy · Terms · Sitemap · Status