Location: Abu Dhabi Diffrenz Business Solutions Pvt Ltd is a leading IT company specializing in Branding, Digital Marketing & ERP development. We are at the forefront of technology, delivering innovative solutions to our clients. Join our dynamic team and contribute to impactful projects that shape the future of IT. We are seeking for Information Security Engineer roles - Only need to focus on the NDR- Extrahop, MDM- Ivanti and Secure file transfer role- Seclore with 12 to 15 years of experience. Engineers with expertise in Data loss prevention, Data classification, email security and Network Detection and Response, Subject matter expert for the Network Access Control (NAC), Data Classification and Prevention, Data Rights Management, Data leakage prevention, Information rights management. Subject matter expert for Network Access Control (NAC), Privilege Access, Account Management (PAM), Email Security, Brand Protection, Breach Attack And Simulation, Network Detection And Response (NDR), Remote Browser Isolation, Cyber Deception, Multi-Factor Authentication, SOAR, Endpoint Detection And Response, Third-Party Risk Management, Network Configuration And Security Management, Browser Isolation, Sandboxing Vulnerability Assessment and Management, Data Classification and Prevention, Data Rights. Information Security responsibilities in Cyber Security Domain would include:
Review data loss prevention referrals involving email, web, chat, and other channels to ascertain policy violations.
Determine data classification of sensitive documents flagged by the Data Loss Prevention tools.
Build and maintain operating procedures for Data Loss Events
Work closely with business units to understand people, process, and technology to build effective DLP strategies.
Communicate, implement, enforce, and monitor security controls to protect the organization's data and technology assets from intentional or inadvertent modification, disclosure, or destruction.
Provide training, informational, and educational materials to impacted employees
Ensure that security plans, controls, processes, standards, policies, and procedures are aligned with overall information security standards
Identify security risks and exposures, determines the causes of standard security violations, and implement changes to halt future incidents and improve security.
Monitor and analyse system access logs to ensure ability to provide audit trails and incident investigation
Information Security Domain responsibilities would include:
Delivering Product Presentation, POC, and support in implementation.
Responsible for Schema Design and data protection policy
Responsible for data discovery of unstructured data and classification for on-prem and cloud repository
Handling of data protection suite from end to end (Post sales).
Handling of Data Classification Support Post implementation and troubleshooting
Assisting client to achieve the desired compliance pertaining to data classification and prevention ex - GDPR, HIPAA.
Confer with the client to identify document requirement
Knowledge of securing office 365
Conducted Level 1 & 2 troubleshooting for customer on requirement basis.
Experience in Information security and Administration, planning, designing, implementation with skills in Anti-virus, Anti-spam, DLP, Data classification, URL Filtering.
Hands on Products - AlgoSec, CrowdStrike EDR, Ivanti, Extra hop, MobileIron, Swivel MFA Solutions, SailPoint, Forcepoint, Fore scout etc
Documentation of various phases of project lifecycle which includes HLD, LLD, SOW, As Built and project signoff.
Hands on networking troubleshooting tools like Wireshark, etc
Conducted product training for strategic accounts post implementation.
Identification of critical security patches
Conducted workshops for customers prior to implementation for info gathering
Subject matter expert for Network Access Control (NAC), Privilege Access, Account Management (PAM), Email Security, Brand Protection, Breach Attack And Simulation, Network Detection And Response (NDR), Remote Browser Isolation, Cyber Deception, Multi-Factor Authentication, SOAR, Endpoint Detection And Response, Third-Party Risk Management, Network Configuration And Security Management, Browser Isolation, Sandboxing Vulnerability Assessment and Management, Data Classification and Prevention, Data Rights.
Strong Understanding of Radius, Encryption protocols, L2TP, IPSEC, FIREWALL, 802.1Q
Expertise in the implementation and scoping of PAM (Privileged Access Management), Breach Attack & Simulation, Remote Browser Isolation and Proxy Solution.
Experience presenting to the CIO, CISO, CSO, and CTO of large organizations
Assist with implementation of cyber security solutions, and work with the client to support implementation
Hands-on knowledge of Security related products, technologies, and sources such as IDS/IPS, SIEM/Log Management, Endpoint Security, Threat Detection, Incident Response, MSSP/MDR, Threat Feeds, CASB, Vulnerability assessment, and management.
SOC Operations - IT Process Automation / Orchestration
Deep expertise & Well versed with technologies around design, implementation, and operations of NAC(Network Access Control), SIEM, SOAR, Network Monitoring, Flow Management, Log Management, User Awareness System, Privilege Access Management, Multifactor, SSO, Identity & Access Management, Email Security And Authentication, Antivirus, Database Protect, Data Encryption, and Wiping, DATA Leakage Prevention, Web Security, Endpoint Security, Next-Generation Firewall, EDR, Vulnerability Management, Web Application Firewall, Wireless Security, Identity Governance, Remote Browser Isolation, DMARC, Sandboxing