Expires soon Oracle

Information Security Engineer 3-IT

  • Bengaluru (Bangalore Urban)
  • IT development

Job description

Define, design, and implement network communications and solutions within a fast-paced, leading edge database/applications company.

Perform performance trend analysis and manage the server/network capacity. Propose client configuration and implement technical solutions to enhance and/or troubleshoot the system. Work with others to define, coordinate vendor purchase needs. Responsible for support documentation as well.

Job duties are varied and complex utilizing independent judgment. May have project lead role. 5 years of related experience in a medium to large network distributed and computing environment. BS in Computer Science or related field.

Desired profile

Qualifications :

What You Will Do

• Play a key role in security technology selection, deployment;

• Research, design, and advocate new technologies, architectures, and security products that will support security requirements for the cloud and cloud-enabled products

• Play a key role in projects through design, pilot and deployment for new security solutions across a large-scale production cloud environment;

• Act as a last level of escalation for the operation teams and engage vendors where necessary;

• Collaborate with other teams as required;

• Document, communicate, conform and improve processes related to security;

• Provide mentorship in your technical domain, including presenting on topics related to information security

• Communicate, lead, and influence colleagues in information security best practices;

• Contribute to greater IT security roadmap

• Keep up to date with existing security threats and evolve network security posture accordingly

Basic qualifications

• BS in Computer Science, Engineering

• 3+ years of experience with networking, infrastructure, or systems administration in at least one of the following areas: Linux, UNIX, Windows, TCP/IP networking, security fundamentals.

• 3+ years of experience with network layers 2-7, network services, and/or systems management including virtualization and cloud technologies with a focus on security, high availability, encryption, automation using Python and other scripting languages

• 3+ years of experience in one or more of the following:

ü State and configuration automation tools like Puppet, Chef, Ansible

ü Knowledge of building and deploying with Container tools: Docker Container Management and Registries, Kubernetes management

ü Continuous integration orchestrators like Jenkins, Octopus Deploy

• Solid understanding of network services, vulnerabilities, and attacks;

• Knowledge of SIEM tools / Log Analysis;

• Ability to work independently and pro-actively contribute in a global team environment;

• Excellent interpersonal, organizational, documentation, and communication skills; able to concisely communicate security risks to both technical and business audiences;

Preferred Skills

• 3+ years of experience with supporting at least one of the following technologies: Cisco switches / routers, Cisco IDS/IPS, FireEye, IBM QRadar, network visibility solutions

• 3+ years of experience in 2 or more of the following Security Operations Center technologies/applications:

ü Vulnerability Assessment

ü Configuration Compliance Scanning

ü Intrusion Prevention Solutions

ü SNORT

ü Firewall policy management

ü Secure database applications

ü SIEM/Log Analytics

ü Oracle databases

ü Big data

• Database knowledge

• Knowledge of Network Intrusion Detection Systems and exploits / vulnerabilities;

• Strong grasp of information security fundamentals including secure communications, encryption, and networking and security compensating controls;

• Able to demonstrate significant depth of understanding in one or more security fields;

• Excellent interpersonal, organizational, documentation, and communication skills; able to concisely communicate security risks to both technical and business audiences;

• Demonstrate ability to methodically locate assets with limited information by leveraging core enterprise resources (including ARP tables, MAC addresses, DNS, etc.);

• CISSP and/or Certifications networking or information security

Make every future a success.
  • Job directory
  • Business directory