|Designation||Manager – Information Security Engineer|
|Year of Experience||10 +|
|Education Qualification||Post Graduate /MSC-Science/MCA prior experience of Information Security/ Cyber security certification in CEH/CLPTP/CISSP/CISM would be preferred|
|Package||At per Industry|
|Industry||Banking/Financial Service/NBFC/ Broking|
|Position Reports to|
Information Security Engineers help plan and carry out an organization’s information security strategy. They develop a set of security standards and best practices for the organization, and recommend security enhancements to management as needed & help to comply with Regulatory guidelines. They develop strategies to respond to and recover from a security breach. Information Security Engineers are also responsible for educating the workforce on information security through training and building awareness
Implement data classification at organization level to identify Private/ Public & Confidential Information. Information Security Engineers install and use software, such as firewalls and data encryption programs, to protect organizations’ sensitive information. They also assist computer users with installation or processing of new security products and procedures.
Drive and implement automation for controls to reduce all manual verification steps
An Information Security Engineer conducts periodic scans of networks to find any vulnerability. They also conduct penetration testing in software developments / Integrations, in which they
simulate an attack on the system to highlight or find any weaknesses that might be exploited by a malicious party.
Information Security Engineers must constantly monitor their organization’s networks and systems for security breaches or intrusions. They install software that helps to notify them of intrusions, and watch out for irregular system behaviour.
If a breach has occurred, the Information Security Engineer leads incident response activities to minimize the impact. Afterwards, they lead a technical and forensic investigation into how the breach happened and the extent of the damage. They prepare reports of their findings to be reported to management.