Penetration Tester(Contract) Wipro Limited

  • company name Wipro Limited
  • working location Office Location
  • job type Full Time

Experience: 3 - 3 years required

Pay:

Salary Information not included

Type: Full Time

Location: Maharashtra

Skills: Disaster Recovery, Log analysis, Risk analysis, incident handling, Security operations, Vulnerability Assessment, Information security, Cybersecurity, Security assessments, Analytics Tools, Stakeholder Coordination, Audit Assistance, security awareness training

About Wipro Limited

Job Description

The main objective of this role is to analyze, identify, rectify & recommend specific improvement measures to enhance the security posture of the organization and safeguard sensitive information. The responsibilities include ensuring customer-centric cybersecurity, monitoring and safeguarding log sources and security access, planning for disaster recovery in case of security breaches, monitoring for attacks and intrusions, conducting log reviews, forensic analysis, and security assessments. The role also involves handling security incidents escalated by the L1 team in 24x7 rotational shifts, utilizing advanced analytics tools to identify emerging threat patterns and vulnerabilities, completing tactical security operations tasks, analyzing attacks for remedial action, creating incident reports and dashboards, coordinating with stakeholders on cyber security issues, maintaining an information security risk register, assisting with internal and external audits, and providing cyber security awareness training to colleagues. Additionally, providing advice and guidance to employees on issues such as spam and malicious emails is part of the role. Performance parameters for this role include customer centricity, measured by the timely resolution of security breaches for end users and stakeholders, and process adherence, measured by adherence to SLAs, response time, and resolution time TAT. Overall, the role requires a proactive approach to enhancing cybersecurity measures, effective communication with stakeholders, and meticulous attention to detail in analyzing and addressing security incidents to ensure the organization's security posture is robust and resilient.,