DIGITAL SECURITY - Threat Protection - DEVSECOPS
Maharashtra, India
Zensar
Zensar is a global organization which conceptualizes, builds, and manages digital products through experience design, data engineering, and advanced analytics for over 200 leading companies. Our solutions leverage industry-leading platforms to...Key Responsibilities
- Identity and Access Management (IAM)
- Design, implement, and manage IAM frameworks, ensuring secure access control across on-premises and cloud environments.
- Administer user accounts, roles, and permissions following the principle of least privilege.
- Perform periodic access reviews and audits to ensure compliance with organizational policies.
- Manage single sign-on (SSO), multi-factor authentication (MFA), and identity federation solutions.
- Collaborate with application teams to implement secure authentication and authorization protocols.
- Vulnerability Management
- Conduct regular vulnerability scans across infrastructure, applications, and endpoints using tools such as Qualys, Nessus, or equivalent.
- Analyze vulnerability reports, prioritize risks, and coordinate remediation efforts with relevant teams.
- Maintain and improve patch management processes to address identified vulnerabilities.
- Monitor and track emerging threats, ensuring timely implementation of mitigation measures.
- Create and present vulnerability management dashboards and reports for stakeholders.
- Security Operations
- Monitor and respond to security incidents, ensuring quick containment and resolution.
- Configure and manage security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions.
- Conduct root cause analysis for incidents and implement preventive measures.
- Ensure compliance with security standards such as ISO 27001, NIST, or CIS benchmarks.
- Develop and update runbooks and incident response procedures.
- Collaboration and Governance
- Work closely with DevOps, infrastructure, and application teams to integrate security best practices.
- Participate in security assessments, audits, and risk analysis exercises.
- Support the development and enforcement of security policies and standards.
- Provide security awareness training to teams and stakeholders.
- Documentation and Reporting
- Maintain comprehensive documentation of IAM workflows, security processes, and vulnerability management activities.
- Provide periodic compliance and risk reports to management and relevant stakeholders.
Qualifications and Skills
- Proven experience in IAM, vulnerability management, and security operations.
- Strong knowledge of identity management tools and vulnerability scanning tools (e.g., Qualys).
- Proficiency in configuring and managing security tools such as firewalls, IDS/IPS, and endpoint security solutions.
- Familiarity with cloud security practices across platforms like AWS, Azure, or Google Cloud.
- Strong analytical and problem-solving skills with attention to detail.
- Relevant certifications such as CISSP, CISM, CompTIA Security+, or GIAC are highly desirable.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Audits AWS Azure CISM CISSP Cloud Compliance CompTIA DevOps DevSecOps Endpoint security Firewalls GCP GIAC Governance IAM IDS Incident response Intrusion detection IPS ISO 27001 Nessus NIST Qualys Risk analysis Security assessment SSO Vulnerabilities Vulnerability management Vulnerability scans
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.