Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Hyderabad |
Education | Not Mentioned |
Salary | Not Disclosed |
Industry | FMCG / F&B |
Functional Area | IT Operations / EDP / MIS |
EmploymentType | Full-time |
This role will work closely with the sector delivery leads, infrastructure engineers and SMEs, and IT engineers and architects. The recipient should demonstrate experience across key infrastructure domains including Network, Cloud, IT Service Management, Unified Communication, Collaboration and Security. Qualifications/ Requirements Functional Responsibilities: Ability to build and maintain constructive working relationships with a diverse community (in and outside of technology); ability to effectively communicate (both written and verbal) with and influence both technical and non- technical audiences. Providing architectural and technical guidance to support information system and infrastructure design, improvements, and planning. Assessing current and planned information systems, identifying security architecture issues, and designing solutions for gaps. Review, assess, and mitigate penetration tests and vulnerability assessments on information systems and infrastructure. Participating in infrastructure projects to develop, plan, and implement specifications for network and distributed system security technologies in support of key information systems. Preparing and presenting information on infrastructure plans, progress, and resolution of security gaps to leadership. Security policy development Participating in risk assessments and security audits to include assessment of vulnerabilities, threats, and likelihood. Key Competencies Required: Recognized as a subject matter expert within areas of expertise, and/ or is certified in one or more technology areas. Capable of diagnosing and evaluating complex issues. Work is performed with minimal direction and reviewed by senior management. Provides solutions to a diverse range of complex problems. Ensure the features, benefits, and architectural impact of technology are understood and valued Assist in developing the business cases for architectural solutions Position the appropriate IT services for customers to consider when deploying a technology solution Lead technical discussions, driving clarity of complex issues/ requirements to build robust solutions Develop advanced understanding of technological capabilities Effectively highlight IT technological advantages and disadvantages from the customer s perspective Identify technical win strategies from a business and technology perspective Key Qualifications/ Requirements: The ideal candidate should have 8- 10 years of experience with the following: Identity and Access Management (e.g., LDAP, Sun Access Manager, MS Active Directory, Sun Identity Manager, Tivoli Access Manager, and Unix Account Centralization tools such as Power Broker and other PAM- based tools) Remote Access Authorization and Authentication (RADIUS, SecurID, IPSEC and SSL VPN) Content security (Cisco/ Ironport ESA/ WSA/ Cloud/ OpenDNS/ Umbrella) security testing Excellent understanding of VPN (site- to- site, remote access client, IPSec, IKE, tunnel modes, SSL/ clientless/ AnyConnect, tunnels between firewalls, routers) Operating System Security Configurations (Windows, Unix (HPUX and AIX), and Linux) Operating System and Application Vulnerability and Patch Analsysis Vulnerability Scanning and Penetration Testing Tools (Tripwire, Foundstone, etc) Web Proxies and URL/ Content Filtering (e.g., products from WebWasher, and the ICAP protocols) Secure File Transfers (e.g., Sterling, Forum Systems, Ipswitch, sftp, ftps, https, and ftp with PGP) Wireless Security (e.g., 802.1x, Cisco and Aruba Wireless) Encryption and Key Management (whole disk, file- level, network, database, PGP, MS Certificate Services, and backup tapes) Incident Response and Forensic Analysis Support Application and Web Layer Security (e.g., Web 2.0, SOAP, SOA, Secure Messaging) Code Security Analysis (manual and leveraging automated scanning tools) Risk Assessments, methodologies, and compensating controls Endpoint Protection (e.g., Anti- Virus, Personal Firewall, and Application Executable Control from vendors such as Symantec and McAfee SSL Server Certificates (i.e., VeriSign) Firewalls, Routers, and Load- Balancers Data Loss Prevention (for databases/ storage, the network, and endpoints e.g. Symantec Vontu) Bachelors Degree required. Master s in Information Security (or related field) is a plus. Winning with Purpose reflects our ambition to win sustainably in the marketplace and embed purpose into all aspects of the business PepsiCo IT exists to shape, create and deliver technology capabilities to accelerate PepsiCo s growth. Our vision is to power PepsiCo with the best talent and technology in the world. To achieve this vision, our team spans a wide range of IT capabilities.,
Keyskills :
finance compliance customerrelations sunaccessmanager internetofthings datalossprevention dvis rep ting