Bangalore
7 days ago
Cyber Security--Developer III - Software Engineering

Role Proficiency:

Independently develops error free code with high quality validation of applications guides other developers and assists Lead 1 – Software Engineering

Outcomes:

     Understand and provide input to the application/feature/component designs; developing the same in accordance with user stories/requirements.      Code debug test document and communicate product/component/features at development stages.      Select appropriate technical options for development such as reusing improving or reconfiguration of existing components.      Optimise efficiency cost and quality by identifying opportunities for automation/process improvements and agile delivery models      Mentor Developer 1 – Software Engineering and Developer 2 – Software Engineering to effectively perform in their roles      Identify the problem patterns and improve the technical design of the application/system      Proactively identify issues/defects/flaws in module/requirement implementation       Assists Lead 1 – Software Engineering on Technical design. Review activities and begin demonstrating Lead 1 capabilities in making technical decisions

Measures of Outcomes:

     Adherence to engineering process and standards (coding standards)      Adherence to schedule / timelines      Adhere to SLAs where applicable      Number of defects post delivery      Number of non-compliance issues      Reduction of reoccurrence of known defects      Quick turnaround of production bugs      Meet the defined productivity standards for project      Number of reusable components created   Completion of applicable technical/domain certifications Completion of all mandatory training requirements

Outputs Expected:

Code:

Develop code independently for the above


Configure:

Implement and monitor configuration process


Test:

Create and review unit test cases
scenarios and execution


Domain relevance:

Develop features and components with good understanding of the business problem being addressed for the client


Manage Project:

Manage module level activities


Manage Defects:

Perform defect RCA and mitigation


Estimate:

Estimate time
effort
resource dependence for one's own work and others' work
including modules


Document:

Create documentation for own work as well as perform peer review of documentation of others' work


Manage knowledge:

Consume and contribute to project related documents
share point
libraries and client universities


Status Reporting:

Report status of tasks assigned Comply with project related reporting standards/process


Release:

Execute release process


Design:

LLD for multiple components


Mentoring:

Mentor juniors on the team Set FAST goals and provide feedback to FAST goals of mentees

Skill Examples:

Explain and communicate the design / development to the customer Perform and evaluate test results against product specifications Develop user interfaces business software components and embedded software components 5 Manage and guarantee high levels of cohesion and quality6 Use data models Estimate effort and resources required for developing / debugging features / components Perform and evaluate test in the customer or target environment Team Player Good written and verbal communication abilities Proactively ask for help and offer help

Knowledge Examples:

     Appropriate software programs / modules      Technical designing      Programming languages      DBMS      Operating Systems and software platforms      Integrated development environment (IDE)      Agile methods Knowledge of customer domain and sub domain where problem is solved

Additional Comments:

Detailed JD: Incident Response / CyberSecurity Engineer Investigates and analyzes all response activities related to cybersecurity incidents within an organization. Develops a procedural set of responses to cybersecurity incidents. Identifies security flaws and vulnerabilities. Responds to cybersecurity incidents, conducts threat analysis as directed and addresses detected incidents. Monitors systems and networks for intrusions. Conducts analysis to identify malicious activity on the network. Evaluates event flows to identify common risks and vulnerabilities to develop and implement solutions. Assists with security audits, risk analysis, network forensics and penetration testing. Provides assistance in monitoring the security of all designated networks and systems. Produces detailed incident reports and technical briefs for the security team. Oversees and assists with the prioritization of actions during a declared incident. The Incident Management Role will provide timely, accurate, consistent, and actionable information in a transparent manner to its stakeholders for any security incident that occurs within the Dell environments. The role will change based on the type of incident as well as the severity of the incident, ranging from simple communication to cross-team coordination to resolve the incident. Responsibilities Prioritizes own work and may have duties instructing, directing, assigning and overseeing work of more junior team members Manager usually provides the problem for this individual to develop appropriate solutions Understands and contributes to cybersecurity Incident Response strategy, policy, standards, and procedures Provides second and third-level support for cyber security Incident Response tasks and seeks help as needed Creates and delivers presentations to both technical and non-technical audiences on Incident Response topics SKILLS • Familiarity with cybersecurity Incident Response technologies and issues on multiple platforms • Advanced understanding of cybersecurity Incident Response key concepts, with deep expertise in at least one area • Collaborative work style • Excellent working knowledge of Microsoft Office Suite and ability to develop documentation or data analysis • Advanced written, spoken, and presentation skills. CERTIFICATIONS • Industry-standard cybersecurity certification from ISC(2), SANS, or similar entity. Education and Experience Typically requires 8+ years of related experience in a professional role with a Bachelor’s degree; or 6+ years with a Master’s degree; or 3+ years with a PhD; or equivalent experience

Confirm your E-mail: Send Email