BE A NEXT-GEN CYBER SECURITY PROFESSIONAL @MPHASIS

 

Welcome to a world of customer-centric transformation where digital, cognitive, and intelligent technologies are always a few paces ahead. A leading applied technology services company, Mphasis has sprinted exciting laps of transformation to stand tall on the edge of NEXT and positive disruption.

With our agile business processes and innovations, we anticipate the future of applied technology to keep our clients at the summit of an ever-changing marketplace. Our future-proofed expertise brings faster, more innovative IT solutions to next-gen customers across countless industry segments and micro-verticals.

Information Security is one of the core competencies that enables Enterprise Cyber Defense programs. As an information security professional, you could play the vital role in delivering to these critical cyber security programs. With the use of cutting-edge threat-detection & defense technologies we at Mphasis leverage a comprehensive bouquet of platforms that power our critical cyber security services, such as end point threat detection, user behavior analytics, secured cloud & container services, secured coding & application development, governance policy risk & compliance.

Your colleagues are a talented bunch of peers - highly motivated and exciting to work with.

WHAT ARE WE LOOKING FOR ?

Identity & Access Management

  • Plan, Design, develop, implement and manage identity and access management solution

  • Provide expert advice in reengineering IDAM process to customers

  • Provide User Provisioning and Access Certifications implementation expertise

  • Fantastic Verbal and written communication

End-Point Security

  • Plan, Design, develop, implement and manage endpoint detection and response (EDR) solution

  • Collaborate with internal and external stakeholders to rollout, maintain compliance and mitigate end-point risks

  • Perform analysis, Triage and act on the incidents and alerts

  • Document, communicate, recommend and take appropriate action to resolve incidents

  • Excellent Verbal and written communication

Privilege Access Management

  • Plan, Design, develop, implement and manage PAM /PAS solution

  • Onboard applications, users, manage compliance and maintain password vault

  • Conduct periodic PAM audit and reconcile accounts

  • Fantastic Verbal and written communication

Vulnerability Management

  • Design and implement, onboard applications, Assets on to vulnerability management platform

  • Conduct periodic assessment and prioritize the remediation based on best practice

  • Co-ordinate and ensure remediation is complete as per SLA through rescan

  • Fantastic Verbal and written communication

FAQ's

 

What is Cyber Security?

Wikipedia definition - Computer security, cybersecurity or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. In other words, cyber security alludes to the faculty of technologies, processes, and practices designed and developed to protect all computing devices, programs, networks, and data from any sort of risk in terms of unauthorized access or follow on damage.

Cyber security certifications come in all forms and foci, mostly based on the wide variety of security related job roles – generic roles such as security analyst, network security administrator, system administrator (with security as a responsibility) and security engineer, information security specialist as well as expert roles like malware engineer, intrusion analyst and penetration tester.

Information security training/certification programs are often classified into three groups:

  • Entry-level certifications are meant to ingrain the fundamentals – foundation principles, latest and important tools and technologies, best practices etc.
  • Intermediate and expert-level certification programs are meant for folks who have extensive job experience mostly specific to industry and a comprehensive hold on the subject matter.


Irrespective of the subject or level:

  • Information Technology Security certifications can be used across jobs and organizations.
  • The credentialing method usually consists of formal training and a final certification exam.
  • Information security certifications, like other specialized IT related certifications, must be renewed periodically (every two-four years).
  • Along with the certification, basic ask from most employers is one must possess some kind of Bachelor's degree in Computer Science.


Source:CyberDegrees.org

Top five information security certification (based on the informal job board survey done by Business News Daily) are:


Certification

Simply Hired

Indeed

LinkedIn Jobs

TechCareers

Total

CEH (EC-Council)

2,172

2,991

5,093

1,422

11,678

CISA (ISACA)

4,582

7,130

11,455

4,130

27,297

CISM (ISACA)

3,087

4,592

7,897

350

15,926

CISSP [(ISC)2]

9,675

13,549

23,557

7,683

54,464

Security+ (CompTIA)

2,471

3,234

5,345

377

11,427

Here are some reports to give you an understanding of the scope of global cyber security market:

  • Cyber Risk Analytics reported about 8.4 billion records being exposed in their 2020 Q1 Data Breach report - a 273% increase compared to Q1 2019 and the most records exposed in any Q1 period since we 2005.
  • The Global Cyber Security market is expected to reach beyond $340 billion by 2026 growing at a CAGR of 12.3% during 2018 to 2026.
  • (ISC)2 Cybersecurity Workforce Study reveals that there are nearly 3 million people working in cybersecurity worldwide, and we need another 4 million people to fill current and future security jobs.


Hackers have shifted their attention to take advantage of pandemic crisis by the COVID-19, as unprecedented number of businesses are rushing to get their digital transformation on fast track while getting their employees around the world to switch to remote working. Scope for cyber security professionals is critical more than ever.