drjobs Senior Domain Manager Information Security

Senior Domain Manager Information Security

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Pune - India

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Job Purpose
Information security team member (with skip level reporting to CISO) who is proficient in maintaining & managing Endpoint Security. Information Security tool management & governance. Understanding of regulatory requirements maintaining the tool compliance configuring the tool policy logs review & alert/incident handling. Driving information Security projects & Monitoring Key Risk Indicators (KRIs) for Information Security.Duties and Responsibilities
A-Minimum required Accountabilities for this role
We are looking for a skilled and dedicated Modern Device Management Specialist to join our IT this role you will be responsible for the management and security of all company-end devices using modern endpoint management solutions such as Microsoft Intune platforms. You will ensure that devices across various operating systems are securely configured maintained and updated in compliance with the organizations security standards.
Job Overview:
Mobile Device Management (MDM) system ensuring deployment and lifecycle management of mobile devices
Define and implement conditional access policies leveraging identity platforms (e.g. Azure AD Conditional Access).
Enforce security policies on devices ensuring compliance with internal and external regulations. Implement encryption remote wipe and other data protection techniques.
Mobile device management best practices and troubleshooting
Monitor and analyze device activity to detect and mitigate any security threats or policy violations
Configure monitor and troubleshoot mobile devices ensuring they are compliant with organizational security policies
Maintain up-to-date documentation of mobile device configurations security protocols and troubleshooting procedures
Provide reports on device compliance security incidents and other related metrics
Provide technical support for users with device-related issues and ensure minimal downtime.
Deploy and manage software applications patches and updates across all devices.
Develop implement and maintain policies and procedures for device management security and incident response
Regularly monitor devices for compliance and generate detailed reports on device health status and security.
Configure deploy and manage mobile devices laptops desktops and other endpoints using modern device management platforms (e.g. Microsoft Intune)
Configure policies based on risk levels device compliance location and application sensitivity.
Collaborate with the Security and Identity teams to fine-tune access control rules.
Monitor user and device access logs and respond to anomalies or policy violations
Configure policies based on user location device compliance risk level application sensitivity and user roles.
Test and tune policies to minimize friction while maintaining security posture.
Monitor and report on conditional access policy effectiveness troubleshooting access issues as needed.B-Additional Accountabilities pertaining to the role

Manage & maintain security tool policies like AV/EDR DLP Email security HDD encryption etc
Maintain compliance as per organization compliance policy
Highlight risk & mitigation plan
Work with Endpoint security team to investigate security alerts and improve detection rules.
Document security policies configurations and incident reports.
Risk analysis and mitigation
Interaction with OEM for Highly Critical technical support.
Responsible for Reports & Technical documentation.
Should be capable to guide the team/individual on requirement basis.
Communicate effectively with stakeholders & cross function teams
Responsible for MIS Reports/ Technical documents
Vendor Co-ordination
Excellent spoken and written English Communication.
Strong troubleshooting analytical and communication skills
Good attitude towards corporate environment.
Team player & Mentor to the team.
Energetic self-motivated and self-sufficient in accomplishing tasks.
Good analytical and problem solving skills.Key Decisions / Dimensions
Decide the appropriate configuration of end point security policy to be implemented in the current environment
Discuss observation response as applicable & improve security controls.
Decide if the policy and procedure documents need changes based on new regulations or audit outcomes.
Review the alert/incident and categorised True positive / False positive and take require steps.Major Challenges
Handling of fast changing environment with variety of MDM & Endpoint Security Domain
Handling of compliance expectations in stringent timelines
Handling multiple stakeholders at a time
Coordination with third party consultants who assist in auditing and compliance initiativesRequired Qualifications and Experience
a)Qualifications

Minimum 3 years of experience in Endpoint Security & MDM Conduction access policy MFA
Strong experience with MDM platforms (Microsoft Intune preferred).
Expertise in configuring Azure AD Conditional Access policies.
b)Work Experience
Knowledge & hands-on experience in information security tool compliance & incident management (Microsoft Purview Office 365 DLP Data classification AV/EDR.
Sound knowledge on IT infrastructure Information Security concept & tools ISMS & BCMS frameworks regulatory guidelines related to IT and cyber for NBFCs
Experience in Project management.
Positive attitude Hard Worker and team player
Excellent Communication and Leadership Skills
Certifications such as Microsoft Certified: Endpoint Administrator Azure Security Engineer (AZ-500) are a plus.

Required Experience:

Manager

Employment Type

Full-Time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.