Bangalore, KA, India
4 days ago
Cyber Security Engineer

What success looks like in this role:

Serves as the regional point of contact for security escalations/requests and escalates requests to Security architecture as needed. Responsible for the identification, and assessment of enterprise risks. Identifies, evaluates, and tests appropriate security products, tools, and systems to ensure alignment with the CushWake global security posture Articulates security policies, guidelines, and standards to customers and developers. Able to apply theories, concepts, principles, and methodologies to difficult but conventional assignments. Assignments are given in terms of objectives to be met. Works independently within an established framework. Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware, and software for possible impact on system security, and the investigation and resolution of security incidents. Implements IS and cyber security policies and takes measures against intrusion, frauds, attacks, or leaks. Continues to build knowledge of the organization, processes, and customers. Performs a range of mainly straightforward assignments. Uses prescribed guidelines or policies to analyze and resolve problems. Receives a moderate level of guidance and direction Partners with Security Architecture on critical scope delivery Reviews security INC(s) to ensure proper processes have been follow and to identify additional IoA(s)/IoC(s). Serves as the security stakeholder for IR/MIM activities until Security Architecture and/or senior leadership can engage.

You will be successful in this role if you have:

Qualifications and Experience:

Minimum 7 years of experience in security domain with exposure to Security Products & operating as the administrator across security platforms and executing changes per the security Architecture groups design.Excellent verbal and written communication skills.Willingness to learn new technology platforms.Deep understanding of Cybersecurity concept, principals, and best practices.Familiar with SDLC & Agile frameworks.Should have good knowledge on Cloud technology (Azure, AWS)Knowledge of Windows and MAC operating Systems and their security features.Understanding compliance requirements.Experience with administrating or architecting solutions in:ZscalerCrowdStrikeMimecastWizMicrosoftEmphasis on Identity Setting up and analyzing Conditional Access PoliciesPrivilege Identity ManagementPalo AltoService Now

Additional Qualifications:

Exposure to Vulnerability Management & Recognized network and security certifications, Security+, CEH, CYSA+, CISSP, etc.Knowledge of Network Operations & Network Mapping.Knowledge of Patch management.#LI-SK2

Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law.

This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at GlobalRecruiting@unisys.com or alternatively Toll Free: 888-560-1782 (Prompt 4).  US job seekers can find more information about Unisys’  EEO commitment here.

Confirm your E-mail: Send Email