RR Donnelley
RR Donnelley is a 145 year old, $11.5 billion Fortune 500 company,
and a global provider of integrated communications including premedia,
printing, logistics and business process outsourcing services. The
Global Outsourcing (GO) division is among the world"s leading
professional service providers of integrated onsite-offshore services in
finance, publishing, manufacturing, transportation, telecommunications,
healthcare, advertising, and investment banking to Fortune 500
companies and professional services firms in
the United States and Europe. Our operations are spread across India,
Philippines and Sri Lanka, with sales and delivery offices in the United States and United Kingdom.
RR Donnelley is committed to providing a meritocratic environment that values, recognizes and rewards our employees for their performance.
RR Donnelley is committed to providing a meritocratic environment that values, recognizes and rewards our employees for their performance.
Walk-in at RR Donnelley for IT - Information Security on 9th August 2014 - Saturday
Timing: 10.00 am to 1.00 pm
Position Description:
This position for a Security Analyst for the Project ITG-Offshore
which works as an extension to the Corporate IT Governance function
Essential Qualifications: E xperience in
security log analysis, incident response, hardening of windows, unix,
network devices besides applications like .NET, web-services etc.,
vulnerability assessment
Technical Qualifications:
Desirable [Associate of (ISC) /CISSP, Security +, CEH, CISA, CHFI,
LPT, ISO27001 (LA/implmenter) should have performed vulnerability
analysis hands on.
Work Schedule: Ability to work flexible schedule during day and where needed for incident response during non-business hours as well.
SIEM analytics -
o Evaluate the type and severity of security events by making use of packet analyses, and an in-depth understanding of exploits and vulnerabilities.
o Resolve issues by taking the appropriate corrective action, or following the appropriate escalation procedures.
o Follow through with designated stake owners for mitigation closures and risk reduction
Experience: 3 - 6 years
Work Schedule: Ability to work flexible schedule during day and where needed for incident response during non-business hours as well.
Description of Responsibility
SIEM analytics -
o Evaluate the type and severity of security events by making use of packet analyses, and an in-depth understanding of exploits and vulnerabilities.
o Resolve issues by taking the appropriate corrective action, or following the appropriate escalation procedures.
o Follow through with designated stake owners for mitigation closures and risk reduction
Incident response
o Detection, monitoring, analysis, resolution of security incidents; participate in providing containment recommendation. Support security incident response processes in the event of a security incident.
o Recognize successful intrusions and deviations through review and analysis of relevant event detail information & coordinate with concerned members to get it resolved.
o Recognizes attacks based on their signatures.
o Differentiates false positives from true intrusion attempts.
o Assist in breach investigations, facilitate compilation of objective evidences and communication to stake owners
o Detection, monitoring, analysis, resolution of security incidents; participate in providing containment recommendation. Support security incident response processes in the event of a security incident.
o Recognize successful intrusions and deviations through review and analysis of relevant event detail information & coordinate with concerned members to get it resolved.
o Recognizes attacks based on their signatures.
o Differentiates false positives from true intrusion attempts.
o Assist in breach investigations, facilitate compilation of objective evidences and communication to stake owners
Infosec upkeep
o Hardening (device configuration) review for network, OS, Database & voice infrastructure
o Security dashboard data feed compilation and communication
o Reconciling privileged access for critical IT infrastructure
o Vulnerability identification, recommendation for mitigation and tracking for closure
o Application security reviews as amicable.
o Hardening (device configuration) review for network, OS, Database & voice infrastructure
o Security dashboard data feed compilation and communication
o Reconciling privileged access for critical IT infrastructure
o Vulnerability identification, recommendation for mitigation and tracking for closure
o Application security reviews as amicable.
Vendor Governance
o Critical supplier inventory reconciliation
o Risk assessment questionnaire customization and coordination
o Developing risk score cards and continual compliance tracking.
o Critical supplier inventory reconciliation
o Risk assessment questionnaire customization and coordination
o Developing risk score cards and continual compliance tracking.
If the above JD suits your career aspirations, You can walk in directly on 9th August'14 - Saturday.
Contact Details
Recruiter Name: Sharon
Contact Company: RR Donnelley
Address: Floor 6, Prestige Polygon 471,
Anna Salai Teynampet
CHENNAI,Tamilnadu,India
Telephone: 044 30845098
No comments:
Post a Comment