Technology Analyst - Information Security

Chennai

Bounteous

We co‑innovate with the world’s most ambitious brands to create transformative digital experiences. Learn more about our work and our unique co-innovation model.

View all jobs at Bounteous

Bounteous x Accolite makes the future faster for the world's most ambitious brands. Our services span Strategy, Analytics, Digital Engineering, Cloud, Data & AI, Experience Design, and Marketing. We are guided by Co-Innovation, our proven methodology of collaborative partnership.  
Bounteous x Accolite brings together 5000+ employees spanning North America, APAC, and EMEA, and partnerships with leading technology providers. Through advanced digital engineering, technology solutions, and data-driven digital experiences, we create exceptional and efficient business impact and help our clients win. 
About Bounteous ( https://www.bounteous.com/ )Founded in 2003 in Chicago, Bounteous is a leading digital experience consultancy that co-innovates with the world's most ambitious brands to create transformative digital experiences. With services in Strategy, Experience Design, Technology, Analytics and Insight, and Marketing, Bounteous elevates brand experiences through technology partnerships and drives superior client outcomes. For more information, please visit www.bounteous.com
We are looking to hire a new Information Security Engineer who will work directly with our Bounteous team members, lines of business and clients to help protect the data, products and infrastructure against security threats by designing and implementing security systems. The role will be working with the IT and Risk teams to meet security and compliance needs, including but not limited to: vulnerability management, security updates and upgrades, responding to intrusions, reviewing devices for strong security postures, and staying current with the latest Information Security trends and news. 

Information Security Responsibilities

  • Awareness on information security measures such as acceptable use of information assets, malware protection, password security
  • Understand and report security risks and how they impact the confidentiality, integrity, and availability of information assets
  • Understand how data is stored, processed, or transmitted from a Data privacy and protection standpoint

Role and Responsibilities

  • Partner with leads and architects to create security solutions for proof of concepts, new integrations, and other technical service offerings. 
  • Exercise due care in increasing your knowledge of the security field, threat landscape, and security intelligence, moving proactively toward the prevention and detection of threats 
  • ·       Continuously monitor the client organization's networks and systems for potential threats and vulnerabilities. Analyze and assess the severity of security incidents.
  • ·       Conduct regular vulnerability assessments and penetration testing to identify weaknesses and recommend remediation measures. Run daily, weekly, and monthly scans to assess systems risks and issues.
  • ·       Assist with incident response efforts, including containment, analysis, recovery, and post-incident reporting. Ensure compliance with incident response procedures.
  • ·       Ensure compliance with industry standards and regulations. Keep updated with evolving compliance requirements and maintain the organization's security posture.
  • ·       Contribute to developing, implementing, and enforcing security policies, standards, and procedures.
  • ·       Manage and maintain security tools and technologies, such as SIEM systems, IDS/IPS, and endpoint security.
  • ·       Stay current with the latest cyber threats and vulnerabilities. Leverage threat intelligence to enhance security.
  • ·       Prepare detailed reports on security incidents, vulnerabilities, and risk assessments. Maintain accurate documentation for security policies and procedures.

Preferred Qualifications

  • CISM or CISSP or CISA certification (Mandatory) Please do not apply if you do not posses the certification
  •  Bachelor's degree in Computer Science or a related technical field, or equivalent practical experience 
  • ·       6+ years of relevant industry experience in security 
  • ·       2+ years of Cloudflare administration and configuration for enterprise clients 
  • ·       Experience in handling attack mitigation and thorough knowledge of various attacks (L3/4 and L7) 
  • ·       Comfortable and good experience working with Modern internet protocols like UDP, TCP, etc. 
  • ·       Advanced understanding of iptables 
  • ·       Experience in Analysing of traffic for attack anomaly detection and creation of mitigation rules 
  • ·       Considerable Experience with Cloudflare Security Products & Features (Cloudflare ACE Certification preferred) 
  • ·       Experience in implementing security-related policies and procedures to support organizational scaling and growth projections 
  • ·       Provide Technical Support and independently engage with the clients on the security incidents. 
  • ·       Expertise in Computer Networking fundamentals and in Command line / Bash shell 
  • ·       Sysadmin skills (Linux/Mac/Windows) & Programming skills (Python, Ruby, PHP, C, C#, Java, Perl, Git, etc.) 
  • ·       Security skills and certifications preferred: CISSP, GCIA GCIH, GCFA, GCFE, etc. 
  • ·       Efficient time management skills along with the ability to deliver results in the face of uncertainty. 
  • Good communication skills and ability to remain calm and work under pressure. 
We invite you to stay connected with us by subscribing to our monthly job openings alert here.
Research shows that women and other underrepresented groups apply only if they meet 100% of the criteria of a job posting. If you have passion and intelligence, and possess a technical knack (even if you’re missing some of the above), we encourage you to apply.
Bounteous x Accolite is focused on promoting an inclusive environment and is proud to be an equal opportunity employer. We celebrate the different viewpoints and experiences our diverse group of team members bring to Bounteous x Accolite. Bounteous x Accolite does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, physical or mental disability, national origin, veteran status, or any other status protected under federal, state, or local law.
In addition, you have the opportunity to participate in several Team Member Networks, sometimes referred to as employee resource groups (ERGs), that host space with individuals with shared identities, interests, and passions. Our Team Member Networks celebrate communities of color, life as a working parent or caregiver, the 2SLGBTQIA+ community, wellbeing, and more. Regardless of your respective identity, there are various avenues we involve team members in the Bounteous x Accolite community.
Bounteous x Accolite is willing to sponsor eligible candidates for employment visas.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  7  1  0
Category: Analyst Jobs

Tags: Analytics Bash C CISA CISM CISSP Cloud Cloudflare Compliance Computer Science Endpoint security GCFA GCFE GCIA GCIH IDS Incident response IPS IPtables Java Linux Malware Pentesting Perl PHP Privacy Python Risk assessment Ruby SIEM Strategy Threat intelligence Vulnerabilities Vulnerability management Windows

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.