Posted On 27 January
Responsibilities
A day in the life of an InfoscionAs part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deploymentYou will explore the alternatives to the recommended solutions based on research that includes literature surveys, information available in public domains, vendor evaluation information, etc. and build POCsYou will create requirement specifications from the business needs, define the to-be-processes and detailed functional designs based on requirements.You will support configuring solution requirements on the products; understand if any issues, diagnose the root-cause of such issues, seek clarifications, and then identify and shortlist solution alternativesYou will also contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you!Ability to work with clients to identify business challenges and contribute to client deliverables by refining, analyzing, and structuring relevant dataAwareness of latest technologies and trendsLogical thinking and problem solving skills along with an ability to collaborateAbility to assess the current processes, identify improvement areas and suggest the technology solutionsOne or two industry domain knowledgeEducational RequirementsMCA,BSc,BCA,Bachelor of Engineering,Intergrated course BCA+MCA Service LineCyber Security Location: Across Pan India.
Preferred Skills:
Devops->Google Cloud Ptatform (GCP)
Blockchain Security
AWS DevOps
OT Security->OT Security
OT Security
Security testing->Cloud Security
Cloud Security->Azure Security
Cloud Security->AWS Security
Cloud Security
Data Security->Public Key Infrastructure(PKI)
Data Security->IBM Guardium
Data Security->Data Encryption
Data Security->Data Classification
Security Incident and Event Management(SIEM)->Logrythm
Security Incident and Event Management(SIEM)->RSA Envision
Tools->Splunk
Security Incident and Event Management(SIEM)->Arcsight
Security Incident and Event Management(SIEM)->QRadar
SOC->Breach Response
Infrastructure Security->Malware Analysis
SOC->Security Monitoring
SOC
SOC->Security Operations Center(SOC/SIEM)
Infrastructure Security->Symantec Endpoint(SEP)
Infrastructure Security->Antivirus
Network Security->Proxy->Blue Coat
Network Security->Load Balancer->F5
Network Security->Firewalls->Palo Alto
Network Security->Firewalls->Web Application Firewall(WAF)
Network Security->Firewalls->Juniper-Firewalls
Network Security->Firewalls->Checkpoint
Network Security
IDAM->IBM Security Identity manager(ISIM)
IDAM->Ping/Federate
IDAM->CA Siteminder(CA Identity Suite)
IDAM->Sailpoint
IDAM->Cyberark
IDAM->Okta
IDAM->Oracle Access Manager(OAM)
IDAM->Oracle Identity Manager(OIM)
GRC->RSA Archer(e-GRC)
GRC
Tools->Service Now->ServiceNow-Security
GRC->Risk Assessment
Educational Requirements -
Intergrated course BCA+MCA, Bachelor of Engineering, BCA, BSc, MCA
Education-
UG: BCA in Any Specialization,B.Tech/B.E. in Any Specialization,B.Sc in Any Specialization
PG: MCA in Any Specialization