Applied Materials
ISAMS provides Identity, Security & Access Management services within the organization. The job role would involve managing and maintaining information protection services within the organization.
Key Responsibilities
· Serve as an interface with multiple sub-groups within a business unit or functional area for the purpose of business technology alignment, solution discovery, solutions delivery, project portfolio management, and relationship management.
· Architect and design complex business process/ application solutions to address cross functional needs and convert design to functional and technical specifications.
· Identifies and recommend industry BKM’s for integrated solution design and standards.
· Provides and/or oversees business application functional support services to meet customer performance, availability, service level agreements and customer satisfaction targets.
· Oversees monitoring of specific IT systems or set of systems and tuning of such systems for availability and performance.
· Drives team during outages and provide resolution of outages, completion of root cause analysis, coordinating with infrastructure and technical teams, service providers and vendors.
· Drives implementation of corrective and preventative actions. Evaluates/recommends/plans life cycle for patches, point releases, and major upgrades.
· Delivers project and support services within area of responsibility within allocated budget.
· Develops understanding cost model and cost drivers for service(s) and recommend service area budgets and cost optimization activities. May be responsible for timely renewal of maintenance and subscription contracts.
· Ensures adherence to GIS project management, service management, change management, RCA and other relevant compliance, processes, standards, governance and controls.
· May need to take part in the execution of sox controls & ISO audits and to support internal and external audits.
· Plan and manage medium to large scale cross functional projects to ensure effective and efficient execution in line with guardrails of scope, timeline, budget and quality.
· Oversees contingent workers performing operations/ project tasks/ assignments and ensure work product quality.
Requirements – Skills, Experience and Qualification
· 10 -14 years of work experience in IT Industry
· 5 – 8 years of experience in Information Protection/ Security, Data Security area
· 3 – 5 years of experience in Cloud Security Technologies
· Familiar with information security industry standards, trends and emerging technologies
· Design and implementation experience on Proxy, DLP, DRM, IRM solutions (Forcepoint/ Seclore/Zscaler/McAfee etc.)
· Design and implementation experience on UEBA/SIEM & CASB solutions would be an added advantage
· Experience in Threat hunting, IoCs, MITRE Framework etc.
· Knowledge on Managed File Transfer / Secure File Transfer technologies would be added advantage
· Knowledge on Cloud solutions – O365, Azure & AWS