Associate Manager Information Security

Posted:
5/20/2024, 10:22:24 PM

Location(s):
Karnataka, India

Experience Level(s):
Mid Level ⋅ Senior

Field(s):
IT & Security

Job Description:

Responsibilities:

Firewall Management:

  • Implement, and manage Check Point firewall solutions to secure the organization's network infrastructure.
  • Configure and optimize firewall policies, rules, and access control lists (ACLs) based on security requirements and best practices.
  • Monitor and maintain firewall systems to ensure high availability and performance.

Site-to-Site VPN Configuration:

  • Design, configure, and manage Site-to-Site VPNs using Check Point technologies to ensure secure and reliable connectivity between different network sites.
  • Troubleshoot VPN connectivity issues, including encryption, authentication, and tunnel stability problems.
  • Collaborate with remote site administrators to implement and maintain VPN configurations.

Intrusion Prevention System (IPS):

  • Configure and manage Check Point IPS to detect and prevent network-based threats and vulnerabilities.
  • Monitor IPS alerts and logs to identify and respond to potential security incidents.
  • Tune IPS policies to minimize false positives and ensure accurate detection of malicious activities.

Security Monitoring and Incident Response:

  • Continuously monitor firewall and IPS logs for suspicious activities, intrusions, and security breaches.
  • Conduct security assessments and audits to identify vulnerabilities and implement appropriate countermeasures.
  • Respond to security incidents, perform root cause analysis, and implement corrective actions.

Collaboration and Documentation:

  • Work closely with network engineers, system administrators, and other IT teams to integrate firewall, VPN, and IPS solutions with the overall network infrastructure.
  • Document firewall configurations, VPN setups, IPS policies, procedures, and security incidents for compliance and audit purposes.
  • Provide training and support to IT staff and end-users regarding firewall and VPN security policies and best practices.

Continuous Improvement:

  • Stay up-to-date with the latest security threats, vulnerabilities, and industry trends.
  • Participate in continuous improvement initiatives to enhance the security posture of the organization.
  • Recommend and implement new security solutions and technologies as needed.

Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.