Mand skill: End point protection/Zscaler
1. Experience in platform security which include managing end point security creating and
managing anti-virus distribution points implementing & managing DLP email security etc.
2. Candidate will be handling all daily incidents problems service requests coming into the queue
of platform security team.
3. Hands on experience in VA/PT tools creating scan scripts running vulnerability assessment on
servers network devices and other IT infrastructure components to ensure that all the
vulnerabilities are being fixed and patches are up to date.
4. Act on the multiple security alerts and investigate those.
5. Knowledge of threat management techniques zero day vulnerabilities.
6. Understanding of information security best practices.
7. Launch and track security investigations to resolution. Recognize cyber-attacks based on their
signatures. Differentiate the false positives from true intrusion attempts and help remediate /
prevent.
8. Actively investigate the latest in security vulnerabilities advisories incidents and penetration
techniques.
9. Conduct periodic Vulnerability Assessment and Reporting.
Mand skill: End point protection/Zscaler 1. Experience in platform security which include managing end point security creating and managing anti-virus distribution points implementing & managing DLP email security etc. 2. Candidate will be handling all daily incidents problems service requests comin...
Mand skill: End point protection/Zscaler
1. Experience in platform security which include managing end point security creating and
managing anti-virus distribution points implementing & managing DLP email security etc.
2. Candidate will be handling all daily incidents problems service requests coming into the queue
of platform security team.
3. Hands on experience in VA/PT tools creating scan scripts running vulnerability assessment on
servers network devices and other IT infrastructure components to ensure that all the
vulnerabilities are being fixed and patches are up to date.
4. Act on the multiple security alerts and investigate those.
5. Knowledge of threat management techniques zero day vulnerabilities.
6. Understanding of information security best practices.
7. Launch and track security investigations to resolution. Recognize cyber-attacks based on their
signatures. Differentiate the false positives from true intrusion attempts and help remediate /
prevent.
8. Actively investigate the latest in security vulnerabilities advisories incidents and penetration
techniques.
9. Conduct periodic Vulnerability Assessment and Reporting.
View more
View less