Job description
Handling Security solution consulting and Presales for Security business
development. Acquire professional services business and work with the sales
team to meet the Clients Security requirements and expectations. The key role
would be to engage with clients and foster the relationship to improve the
security penetration through trusted consulting
Demand generation
Conduct executive/solution workshops
Handle technical and business impacting aspects of all security-related technology in our
product portfolio from firewalls, VPNs, Intrusion Management Framework, SOC,
Gateways, Managed Services, standalone services etc.
Foster existing clients with the trusted advisory roles and improve the security
and other solution penetration
Whilst this resource should provide a presales support capability, he is actively
responsible for customer demand creation and being able to bring that back
into DD to create a sales pipeline.
Should evaluate new and emerging solutions with the global community for
inclusion in the portfolio of NTTs products and services.
Work towards introducing emerging technology and solution offerings, developed
in NTT methodologies
Should support in educating and strengthening the sales and other functions with
relevant education to promote security practice within the organization
Exposure in the areas of end point, network security, security operations etc.
Experience working with sales folks in helping them achieve quota as well working
with multiple OEMs like Cisco/Checkpoint etc
Hands-on experience configuring security devices is not mandatory but preferred
Should also have security product hands-on experience
Dear Subramani Bakthavatchalam,
Job Description
Role Senior Program Architect – Info Security
Job Purpose The role holder would be responsible for leading the initiatives and projects on the IT Info security
verticals for Core IT & organisation level (includes solutions & architecting , Risk assessment )
Principal Accountabilities As a member of the IT organisation at TAFE, the role holder would be responsible for
the following:
Responsible for Operational level & Governance level
• Management of Perimeter level security controls like UTM , WAF , DMZ related activities
• In-depth knowledge of architecture, engineering, and operations of Enterprise SIEM platform
• Data Protection - DLP , IRM , Data Classification implementation experience
• End Point - AV , Malware protections , XDR /MDR
• VA /PT exposure using tools
• ISMS Practices , ISO related controls & IT governance
Cyber Security ( including Cloud security)
• Assessment of Security risk & mitigation plans (derricking) for Cloud adoptions
• Cloud Security tools Implementation
• To develop Cyber security defence framework towards focusing on emerging security Threats
• Identity access Management (IAM) Implementation experience
• Zero trust architecture focus
Audit , Incident Management & Policy Management
• Oversight, planning and execution of any required vulnerability audits, penetration tests or forensic IT audits or
related investigations.
You will need to ensure that any findings are fed into projects improving organisations overall IT Security
• To develop IT security policies that can be deployed and are periodically revised and to sustain overall
effectiveness Educating and training employees on security safe guards.
• Develop policies around security incidents, investigate, resolve and mitigate for future whenever security
breaches happens.
Risk & Governance
• Business recovery plan and Business continuity post Cyber-attack.
• Engages and coordinates risk profiling, investigation and resolution
• Support, review enterprise IT & Cyber risks, assess capabilities, prioritize security and risk strategies and
communicate risk intelligence for business decision making
Tools & Techniques , Certification
• Tools signatures (e.g. YARA, Snort, Suricata, HIPS)
• Understanding of mobile technology and OS (i.e. Android, iOS, Windows), VMware technology, and Unix
/WinOS
• Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system
administration, OSI model, defense-in-depth and common security elements.
• Hands-on experience analysing high volumes of logs, network data –Netflow/FPC and other attack artefacts in
support of incident investigations
• Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics,
Network Forensics, and CSAB Security,SOC 2 audit ,ISO 27001 , ISO 31000 , Ethical Hacking
Certifications ,GDPR
Engages and coordinates risk profiling, investigation and resolution.
• Support, review enterprise IT & Cyber risks, assess capabilities, prioritize security and risk strategies and
communicate risk intelligence for business decision making
Reporting Relationships
Candidate Specifications
The expectations from the candidate would be as follows:
• 12 – 15 years of experience in working on IT Infrastructure, Data Centre Management & Application
Administration
• Cyber security frame works ,Cloud Security
• Experience with comprehensive experience in Risk management , Data Prtection program , disaster recovery
architecture and operations (ISO 27001 standard /ISO 31000/BCP ) , GDPR
• Knowledge on Information Security related certification would be an added advantage
• Excellent communication/ inter personal skills
Qualification BE/ B Tech/ MCA/ Msc. Computer Science
Experience 12– 15 years of experience in working on IT – Info Security Management & Operation
Location Chennai
Anurag Bhardwaj
6280825503 whatsaap
DATA SECURITY MANAGER – PUNE, HYDERABAD, MUMBAI
Data Security/Data Protection Consultant is an IT professional with expertise on data
security and data protection laws. The person should be familiar with the business and
day to day operations performed while supporting customer's IT systems with an
emphasis on data processing activities. The person should be involved in evaluating
customer risk, examining customer contracts or terms of service, helping different teams
around TIBCO PSG to understand data security risk and data privacy issues, and help
drive its mitigation.
Roles and Responsibilities:
Inform and advise the team how to be GDPR compliant and how to comply
with other data protection laws as required by the customers while supporting
their IT systems.
Define and manage internal policies related to Data Security and Data
Protection and make sure those are being followed.
Raise awareness and provide staff training for any employees involved
with processing activities.
Provide advice regarding the data protection impact assessment and
monitor its performance.
Give advice and recommendations about the interpretation or application
of the data protection rules.
Handle complaints or requests by the customers, the data controller, data
subjects.
Regularly auditing the policies and controls that are put into place.
Report any failure to comply with the GDPR or applicable data protection
rules.
Monitor compliance with GDPR or other data protection law.
Identify and evaluate the data processing activities.
Cooperate with the supervisory authority.
Maintain the records of data processing operations.
Detail out the security incident response plan.
Qualifications:
8-112 years experience in managing data security/data protection policies
for an organization
Background and expertise in legal, data compliance, audit or IT security
Knowledge of data protection legislation, particularly GDPR and alike
national laws
Relevant work experience of monitoring compliance with regulatory
requirements and engaging with regulatory bodies
Experienced in the operational application of privacy law
Familiarity with computer security systems
Experience in managing data breaches
Experience in cooperation with supervisory authorities of any kind
Understanding the environment in which IT support team operates and
associated data protection risks
Experience in conducting data protection impact assessments
Understanding GDPR requirements