Job Description
Job Description:
- Design, deploy, and manage Zscaler ZIA & ZPA solutions to provide secure internet access for the organization.
- Collaborate with network and security teams to integrate Zscaler ZIA into the existing network infrastructure.
- Configure and maintain policies to enforce web filtering, data loss prevention, and threat prevention measures.
- Monitor and analyze network traffic to identify potential threats and security risks.
- Provide recommendations and implement improvements to enhance the security posture of Zscaler ZIA & ZPA.
- Stay up to date with emerging security threats, industry best practices, and Zscaler product updates
- Assist with incident response activities, including investigating and mitigating security incidents.
- Collaborate with vendors and support teams for issue resolution and troubleshooting.
- Deploy and manage Zscaler Private Access solutions to provide secure access to applications hosted in public or private clouds.
- Work closely with application owners and IT teams to onboard applications onto the Zscaler ZPA platform.
- Stay knowledgeable about Zscaler ZPA capabilities and provide recommendations for continuous improvement.
- Assist in the design and implementation of secure remote access solutions using Zscaler ZPA.
- Conduct regular audits and assessments to ensure compliance with security standards and policies.
- Provide guidance and training to end-users on Zscaler ZPA usage and best practices.
- Keep up to date with Zscaler ZPA product updates, industry trends, and emerging technologies.
͏
Do
-
Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24x7 rotational shifts
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks associated with this engagement.
- Analyses all the attacks and come up with remedial attack analysis
- Conduct detailed analysis of incidents and create reports and dashboards
-
Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails
͏
Deliver
No. |
Performance Parameter |
Measure |
1. |
Customer centricity |
Timely security breach solutioning to end users, Internal stakeholders & external customers experience |
2. |
Process Adherence |
Adherence to SLAâs (90-95%), response time and resolution time TAT |