Role Purpose
The purpose of this role is to analyse, identify, rectify &recommend specific improvement measures that help in the securityposture of the organization by protecting the sensitive information
Do
Want more jobs like this?
Get Computer and IT jobs in Cochin, India delivered to your inbox every week.
Stakeholder Interaction
Stakeholder Type
Stakeholder Identification
Purpose of Interaction
Internal
Technical Lead/ Project Lead
Regular reporting & updates
Security Intelligence (Practice)
Coordination for security reasons
External
Customer
To coordinate for all security breaches & resolutions
Display
Lists the competencies required to perform this role effectively:
- Functional Competencies/ Skill
- Leveraging Technology - Knowledge of current and upcoming technology(automation, tools and systems) to build efficiencies and effectivenessin own function/ Client organization - Expert
- Process Excellence - Ability to follow the standards and norms toproduce consistent results, provide effective control and reduction ofrisk - Expert
- Functional/Technical - Knowledge of Network Security devices,firewalls, end points, SIEM, application security, IPS/IDS, VA / PTskills - Master
Competency Levels
Foundation
Knowledgeable about the competency requirements. Demonstrates (inparts) frequently with minimal support and guidance.
Competent
Consistently demonstrates the full range of the competencywithout guidance. Extends the competency to difficult and unknownsituations as well.
Expert
Applies the competency in all situations and is serves as a guideto others as well.
Master
Coaches others and builds organizational capability in thecompetency area. Serves as a key resource for that competency and isrecognized within the entire organization.
- Behavioral Competencies
- Effective Communication
- Collaborative Working
- Execution Excellence
- Problem Solving & Analytical Skills
Deliver
No.
Performance Parameter
Measure
1.
Customer centricity
Timely security breach solutioning to end users,Internal stakeholders & external customers experience
2.
Process Adherence
Adherence to SLA's (90-95%), response time and resolutiontime TAT
Vulnerability Assessment Penetrationtest