Job Description
Role Holder’s Name :
Role Description: The role is based within the Cyber Security Identity Access Management (IAM) Controls Team. The IAM team are responsible for providing a best-in-class service to internal customers, cost effective operational delivery and the provisioning of an operational platform to support the Global Access Management strategy and future business growth.
IAM supports Global Technology teams in minimising losses to the Bank through inappropriate access to systems, ensuring that HSBC’s electronic based assets are monitored, managed, accessed, and protected effectively, so that only those people with a legitimate business need can access or modify them, when they need to do so. This is achieved through an IAM process framework and toolset and by measuring, monitoring, and reporting on both adherence to standards and quality of IT service performance.
Our IAM Vision is to ensure all individuals across HSBC have the access to the right resources at the right times for the right reasons, enabling quality outcomes whilst delivering the Bank’s regulatory requirements and managing risk.
The Candidate Will:
• Support the Business in ensuring IDAM control outcomes are met for IT Assets/Services
• Provide a streamlined experience for key stakeholders across 3LOD for the management, monitoring and reporting of control effectiveness for IT Assets/Services
• Provide Subject Matter Expertise on Group control operation and ensure residual risk is managed
• Understand and execute against the design and operation of the IDAM Control Exceptions (ICE) process and tooling.
• Monitoring and managing operating effectiveness and residual risk of IT Assets/Services
• Manage and implement enhancements to control process and tooling by working with key stakeholders to produce detailed functional and non-functional requirements.
• Support the business with the use of the control tools, including triage of queries, troubleshooting and training.
• Continuously and proactively seek to enhance, streamline, and automate processes where possible.
• Support communications to stakeholders throughout
Experience
The ideal candidate for this role will have the below experience:
• Cyber Security and IAM experience on controls including experience in supporting IAM change initiatives to deliver successful control outcomes.
• Technical and architectural skills are desirable.
• Demonstrated experience of making timely and rational decisions, based on relevant information.
• Role relevant qualifications, i.e., CISSP/CISM/CISA is desirable.
• Proven experience of working in an Identity and Access Management Controls function
• Experience of working with internal and external auditors and regulators
• Strong data analytical skills to review different application feeds
• Ability to analyse data and produce detailed management MI (management information)
• Strong process mapping skills
• Accountability for deliverables and proven track record of delivering on schedule
͏
Do
-
Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24x7 rotational shifts
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks associated with this engagement.
- Analyses all the attacks and come up with remedial attack analysis
- Conduct detailed analysis of incidents and create reports and dashboards
-
Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails
͏
Deliver
|
No. |
Performance Parameter |
Measure |
|
1. |
Customer centricity |
Timely security breach solutioning to end users, Internal stakeholders & external customers experience |
|
2. |
Process Adherence |
Adherence to SLAâÃÂÃÂs (90-95%), response time and resolution time TAT |
͏
͏
Experience: 5-8 Years .
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.