Newsletter Subject

UJJIVAN - Upload Your Curriculum Vitae (CV)

From

rockpath.info

Email Address

vishal@rockpath.info

Sent On

Wed, Jul 22, 2020 11:25 AM

Email Preheader Text

Job Summary: Manage operations and projects related overall IT Security portfolio. IT Security portf

Job Summary: Manage operations and projects related overall IT Security portfolio. IT Security portfolio includes evaluation of solution, Negotiation, Implementation and manage the operations. End to end SOC management along with various security components like firewall, IPS, IDS, DLP WAF, IDAM, Endpoint security etc. Primary Responsibilities: Business: Accomplish organization goals by accepting ownership for accomplishing new and different requests; exploring opportunities to add value to job accomplishments Provide solutions to business within the defined IT Security process and policies. Customer: Understanding internal and external customer requirements. Providing optimum solution based on requirements Coordinating with vendors for service commissioning, management and continuous improvement. Maintaining uptime of security systems to provide continuous services to external and internal customers. Defining, reviewing Vendor SLA and ensuring the SLA are met through strong management & monitoring process. Internal process: End to end experience of information security requirements and management in banking. Manage Banks Incident Response Team, involved in monitoring, tracking & closures of Security Incidents Hands-on experience to explore & deploy latest security products like firewall, IPS, IDS,SIEM DDOS Protection, APT WAF, Endpoint Security software and appliances etc. Assisting in the banks cyber security initiatives, ensuring projects , assessments, testing Pertaining to it. Implementing appropriate and cost effective IT solutions to minimize the risks of cyber attacks. Conduct regular meetings & follow-ups with infrastructure teams like OS ,DB & Application to ensure timely closure of Audit & VA-Appsec points Experience in developing security policies, procedures and guidelines Analyse and work with IT manger to determine the safest and most efficient means for establishing and implementing these policies Create, verify & ensure proper implementation of policies & Signatures for Proxies, IPS, firewalls & WAF etc. Ensure compliance and Audit remediation of all security tool ,solutions and process maintained and followed by the bank Advice and implement systems aimed toward preventing malware infections of company computer hardware. This can include installation, upgrading, and improvement of malware detection and prevention software across the entire company, as well as implementing policies for firewalls and site-blocking Provide leadership, direction and guidance in assessing and evaluating information security risks and monitor compliance with security standards and appropriate policies. Person should be Point of Contact for Security Operation Centre and working with partner to upgrading the capability as per the latest Cyber SOC guideline from RBI. Work with various technology partners to design and deploy information/cyber security solutions to protect bank’s presence in cyber space Secure Configuration review of devices, servers and applications & Change Management and ensure information security across all stages of application. Ensuring audit Log settings and maintenance monitoring, and analysis of Audit Logs Security Incident Response & Management and forensic analysis. Knowledge on network routing, MPLS, WAN encryption etc. Provide technical leadership and ensure appropriate planning for the deployment of applications and troubleshooting. Manage and develop the SOC Incident Response & Threat Intelligence team to ensure the most effective tools, processes are leveraged to protect client from cyber attacks Providing timely guidance, conducting weekly review meeting, imparting training Learning & Performance Prepare users by conducting training; providing information; resolving problems. Ensure goal-setting, midyear -review and annual appraisal process happens within specified timelines for self and team Challenge others to develop as leaders while serving as a role model and mentor Motivate team to work together in the most efficient manner. Keep track of lessons learned and shares those lessons with team members Functional Knowledge And Skills Security:Firewalls, IPS/IDS, Loadbalancers, sslvpn, WAF, PKI, Proxies, ipsec, SFTP, DLP Network: LAN, WAN, VLAN, SFTP, TCP/IP, WLAN, Leasedline, MPLS, Routers, Switches, EIGRP , BGP Mailing: SPF, DKIM, DMARC, MX, Antispam, Domains, DNS Endpoint: VDI, ATP, IRM, DLP, Antivirus [APPLY NOW]( --

Marketing emails from rockpath.info

View More
Sent On

01/12/2023

Sent On

01/12/2023

Sent On

01/12/2023

Sent On

01/12/2023

Sent On

01/12/2023

Sent On

01/12/2023

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2024 SimilarMail.