中文 English

Applied Materials

ISAMS provides Identity, Security & Access Management services within the organization. The job role would involve managing and maintaining information protection services within the organization.

Key Responsibilities

·       Serve as an interface with multiple sub-groups within a business unit or functional area for the purpose of business technology alignment, solution discovery, solutions delivery, project portfolio management, and relationship management.

·       Architect and design complex business process/ application solutions to address cross functional needs and convert design to functional and technical specifications.

·       Identifies and recommend industry BKM’s for integrated solution design and standards.

·       Provides and/or oversees business application functional support services to meet customer performance, availability, service level agreements and customer satisfaction targets.

·       Oversees monitoring of specific IT systems or set of systems and tuning of such systems for availability and performance.

·       Drives team during outages and provide resolution of outages, completion of root cause analysis, coordinating with infrastructure and technical teams, service providers and vendors.

·       Drives implementation of corrective and preventative actions.  Evaluates/recommends/plans life cycle for patches, point releases, and major upgrades.

·       Delivers project and support services within area of responsibility within allocated budget.

·       Develops understanding cost model and cost drivers for service(s) and recommend service area budgets and cost optimization activities. May be responsible for timely renewal of maintenance and subscription contracts.

·       Ensures adherence to GIS project management, service management, change management, RCA and other relevant compliance, processes, standards, governance and controls.

·       May need to take part in the execution of sox controls & ISO audits and to support internal and external audits.

·       Plan and manage medium to large scale cross functional projects to ensure effective and efficient execution in line with guardrails of scope, timeline, budget and quality.

·       Oversees contingent workers performing operations/ project tasks/ assignments and ensure work product quality.

Requirements – Skills, Experience and Qualification

·       10 -14 years of work experience in IT Industry

·       5 – 8 years of experience in Information Protection/ Security, Data Security area

·       3 – 5 years of experience in Cloud Security Technologies

·       Familiar with information security industry standards, trends and emerging technologies

·       Design and implementation experience on Proxy, DLP, DRM, IRM solutions (Forcepoint/ Seclore/Zscaler/McAfee etc.)

·       Design and implementation experience on UEBA/SIEM & CASB solutions would be an added advantage

·       Experience in Threat hunting, IoCs, MITRE Framework etc.

·       Knowledge on Managed File Transfer / Secure File Transfer technologies would be added advantage

·       Knowledge on Cloud solutions – O365, Azure & AWS