Infosys is hiring for SOC/SIEM expert

A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment You will explore the alternatives to the recommended solutions based on research that includes literature surveys, information available in public domains, vendor evaluation information, etc. and build POCs You will create requirement specifications from the business needs, define the to-be-processes and detailed functional designs based on requirements. You will support configuring solution requirements on the products; understand if any issues, diagnose the root-cause of such issues, seek clarifications, and then identify and shortlist solution alternatives You will also contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Ability to work with clients to identify business challenges and contribute to client deliverables by refining, analyzing, and structuring relevant data Awareness of latest technologies and trends Logical thinking and problem solving skills along with an ability to collaborate Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Educational Requirements MCA,BSc,BCA,Bachelor of Engineering,Intergrated course BCA+MCA Service Line Cyber Security Location: Across Pan India.

Educational Requirements

MCA,BSc,BCA,Bachelor of Engineering,Intergrated course BCA+MCA

Service Line

Cyber Security

Preferred Skills:

Vulnerability Management

Application Security

Application Security->Wireshark

Application Security->Nessus

Application Security->Burpsuite

Application Security->Devsecops

Infrastructure Security->Email Security

GRC->Risk Assessment

Tools->Service Now->ServiceNow-Security

GRC

GRC->RSA Archer(e-GRC)

IDAM->Oracle Identity Manager(OIM)

IDAM->Oracle Access Manager(OAM)

IDAM->Okta

IDAM->Cyberark

IDAM->Sailpoint

IDAM->CA Siteminder(CA Identity Suite)

IDAM->Ping/Federate

IDAM->IBM Security Identity manager(ISIM)

Network Security

Network Security->Firewalls->Checkpoint

Network Security->Firewalls->Juniper-Firewalls

Network Security->Firewalls->Web Application Firewall(WAF)

Network Security->Firewalls->Palo Alto

Network Security->Load Balancer->F5

Network Security->Proxy->Blue Coat

Infrastructure Security->Antivirus

Infrastructure Security->Symantec Endpoint(SEP)

SOC->Security Operations Center(SOC/SIEM)

SOC

SOC->Security Monitoring

Infrastructure Security->Malware Analysis

SOC->Breach Response

Security Incident and Event Management(SIEM)->QRadar

Security Incident and Event Management(SIEM)->Arcsight

Tools->Splunk

Security Incident and Event Management(SIEM)->RSA Envision

Security Incident and Event Management(SIEM)->Logrythm

Data Security->Data Classification

Data Security->Data Encryption

Data Security->IBM Guardium

Data Security->Public Key Infrastructure(PKI)

Cloud Security

Cloud Security->AWS Security

Cloud Security->Azure Security

Security testing->Cloud Security

OT Security

OT Security->OT Security

AWS DevOps

Blockchain Security

Devops->Google Cloud Ptatform (GCP)

* Location of posting is subject to business requirements