IS Perimeter Defense Team Operations Lead (L 09) 66 views

Job Description:Role Summary/Purpose: Perimeter Defense Operations Lead will focus primarily on the Perimeter Defense team operational effectiveness and efficiency with the management of the process, procedures and service levels, risk management and

Job Description: Role Summary/Purpose: Perimeter Defense Operations Lead will focus primarily on the Perimeter Defense team operational effectiveness and efficiency with the management of the process, procedures and service levels, risk management and oversight of service delivery. Essential Responsibilities: Responsible for management/design/governance around the Firewall and Proxy technology under the custodianship of the Perimeter Defense Team including but not limited to: Cisco ASA Policy, VMware NSX DFW and ESG Policy, Akamai Web Application Firewall Policy, Amazon AWS Security Groups, Palo Alto Firewall Policy, BlueCoat Policy, zScalar Proxy. Continuous review and improving the operations of the Perimeter Defense team including: Strong, effective interactions with other teams Oversight of changes to ensure continued positive delivery Review service-levels are being met or exceeded and where it is not, review the process and make recommendations for new/revised processes Develop and improve the effectiveness and efficiency, design, and implementation of new processes Manage the team’s documentation and ensure all processes are documented to promote consistency across the team Conduct training of new team members to raise team proficiency Review team metrics and skillset to identify areas where single person dependencies or areas where proficiency need to be bolstered and assisting with the knowledge transfer to provide effective team resiliancy Analyze Firewall Rule and Web Proxy Policy configuration to ensure continued compliance and operational effectiveness and efficiency. Implement security compliance strategies including the routine review of security policy against best practices and company policy and if gaps are identified, design and implement to close the compliance gaps Demonstrable ability to lead a discussion with other IT personnel who as less network or security savvy in the development of a least-privilege security posture fitting the requirements of their application, identifying access that may be excessive or not compliant with existing Company Policies, Standards, best practices and guidance Monitor usage of the new and existing rules to identify need for additional rule adjustments and make recommendations, review impact and submit changes in support of the elimination of unused/stale rules Work with the Perimeter Defense Lead, the business, network and other IT teams that are proposing changes that impact Synchrony network security controls to ensure that the teams follow defined security standards. Support incoming security requests including: Gain knowledge of the security posture of the organization and be able to identify and escalate to management if incoming requests appear to be non-compliant with existing standards, guidelines and/or best practices. Develop and Implement solutions that conform to existing standards, guidelines and best practices. Identify and evaluate, if necessary, alternative solutions weighing the risks of the solutions and make recommendations to management Perform or oversee firewall rule and proxy policy periodic review activities ensuring appropriate owner’s evidenced approvals and perform remediation activities while ensuring no business impact Perform cybersecurity defense incident triage, to include determining scope, urgency, and potential impact identify the specific vulnerability and make recommendations that enable expeditious remediation Develop and utilize metrics to track the performance and efficiency of security operations requests processes, remediation efforts, and associated technologies Identify potential process improvement projects and serve as a change agent Ensure that expectations are met and ensure high customer satisfaction levels through established metrics against SLAs Design SIEM/Splunk queries to provide insight into operational effectiveness and help identify risks/threats. Support the design and implementation of procedures and controls necessary to ensure and protect the safety and security of all information systems assets, including prevention of intentional or inadvertent access, modification, disclosure, or destruction Collaborate with management in developing technical directions, setting objectives, and setting realistic and challenging goals Qualifications/Requirements: Bachelor’s degree in Computer Science/Information Technology or a related field Minimum 5+ years of experience in Information Technology, Information Security Operations, Information Assurance, IT Auditing, or a related field Experience with understanding, documenting, updating processes and process documentation. Identification improvement to these processes and manage the execution of these processes changes. Experience with evaluating team skillsets, gaps or single threaded skillsets and develop training program to raise skillsets of all team members. Highly analytical, detail-oriented, and strong problem solving with a common sense approach to resolving problems Expertise to clearly define complex issues, distilling the important facts and issues, despite incomplete or ambiguous information Excellent consulting skills and superior ability to develop and maintain effective client relationships Ability to work independently as well as part of a team Results driven, strategic, conceptual, and innovative thinker Must have strong verbal and written communication skills For Internal Applicants : Understand the criteria or mandatory skills required for the role, before applying. Inform your Manager or HRM before applying for any role on Workday. Ensure that your Professional Profile is updated (fields such as Education, Prior experience, Other skills) and it is mandatory to upload your updated resume (Word or PDF format) Must not be any corrective action plan (First Formal/Final Formal, PIP) Employees who have completed 18 months in the organization and 12 months in current role and level are only eligible. Last annual performance rating should at least be Strong Contributor/Critical Talent Level 9 Job – Level 8+ employees can apply Desired Characteristics: Minimum of 4 years’ experience working in a large, complex network environment. Required minimum of 4 year of working knowledge of Enterprise firewall access list management, Web Proxy technology, routers, switches, VPNs, routing, network address translation, PAC files and DNS, and CDNs Prior security operations experience and/or experience working with the following firewall/proxy technology: VMware NSX DFW and ESG Policy, Akamai WAF Policy, Amazon AWS Security Groups, PaloAlto Firewall Policy Experience working with SIEM tools such as Splunk and ability to develop your own Splunk query Proven ability to take on new challenges despite the lack of formal training and exceed expectations One or more relevant security certifications (CISSP, CCNA, CCNE, CISM, etc.) Experience working in a regulatory environment Proficient with scripting language such as Python or Powershell and leveraging Rest APIs to assist in the management or automation laborious/repetitive work Grade/Level: 09 Information Technology

More Information

Only candidates can apply for this job.
Share this job
Company Information
  • Total Jobs 15 Jobs
  • Location INDIA

Contact Us