• Analyst I , IM Security Jobs in Cochin - 25174950

  • Xerox India Ltd

Job Description:

Xerox Corporation (NYSE XRX) is an $11 billion technology leader that innovates the way the world communicates, connects and works Our expertise is more important than ever as customers of all sizes look to improve productivity, maximize profitability and increase satisfaction We do this for small and mid-size businesses, large enterprises, governments, graphic communications providers, and for our partners who serve them We understand whats at the heart of work and all of the forms it can take We embrace the increasingly complex world of paper and digital Office and mobile Personal and social Every day across the globe in more than 160 countries our technology, software and people successfully navigate those intersections We automate, personalize, package, analyze and secure information to keep our customers moving at an accelerated pace

Learn more at wwwxeroxcom and explore our commitment to diversity and inclusion!

Roles and Responsibilities
Manage the logging and monitoring process for system level changes, ensure that original files are received and track responses to the original log files
Collect data from SAP platforms to perform review of FFID access Execute initial review of FFID access, distribute and track and follow ups required
Initiate escalation process for any file not received, track to closure
Monitor central mailbox for queries
Perform Scrub (Access Review) for User and Technical access review at the Application, Database, and OS level, for all US Xerox applications supported by the Access Control Clearinghouse
Prepare, maintain, provide input into test status reports as required
Support audit requests to provided data in support of process execution
Reviewing and monitoring of Security Standards such as SOX and PCI DSS 32
Review systems for adequate management controls, efficiency, and compliance with Policies, regulations, and accounting principles
Coordinated with various departments to create remediation plans for deficiencies found during audit
Prepare and publish IT audit results to senior management with evidence trackers
Risk identification, management and escalation as and when necessary

Qualifications

Candidate Education
Graduation in specialized field (Example Bachelor of Engineering etc) Computer Science, Information Systems, or related field

Professional Certifications
Preferred Technical certifications such as CISSP, SANS GSEC, CIPP, FBCP are desired

Candidate Background
Minimum Relevant experience in Information Technology
Minimum Experience or training in a risk management specialism desired
Minimum Understands and uses appropriate methods and tools and applications
Minimum Demonstrates analytical and systematic approach to problem solving
Minimum Contributes fully to the work of teams
Minimum Can plan, schedule and monitor own work
Minimum Is able to absorb and apply new technical information
Minimum Is able to work to required standards and to understand and use the appropriate methods, tools and applications
Minimum Show aptitude for learning about other areas of information technology and how they relate to risk management
Minimum Has a basic business knowledge and an understanding of current and emerging information and communications technologies and their level of maturity
Minimum Is able to obtain information from business people in face to face situations, and to analyze information on users occupational tasks obtained by a variety of formal and informal means
Minimum Can solve common problems in area of expertise, and knows how to get answers outside of that area
Minimum Is familiar with the principles and practices involved in development and maintenance and in service delivery
Minimum Has good technical understanding and the aptitude to remain up to date with IS security and developments
Minimum Possesses a general understanding of the business applications of IT
Minimum Is proficient in both written and oral communication
Minimum Demonstrates basic knowledge of information security principles
Minimum Has experience or training as an administrator of IT systems, databases, or processes

Additional Role Requirements
Information Security Domain
Basic understanding of at least 5 out of the following 10 security domains
Access Control Systems and Methodology
Telecommunications and Network Security
Business Continuity Planning and Disaster Recovery Planning
Security Management Practices
Security Architecture and Models
Law, Investigation, and Ethics
Application and Systems Development Security
Cryptography
Computer Operations Security
Physical Security
One or more of the following industry certifications desired CISSP, GSEC, CISA, GCIH, GCFA, GCFW, GCWN or other related certification
Disaster Recovery Domain
Basic understanding of at least 5 out of the following 10 Business Continuity domain areas
Project Initiation and Management
Risk Evaluation and Control
Business Impact Analysis
Developing Business Continuity Strategies
Emergency Response and Operations
Developing and Implementing Business Continuity Plans
Awareness and Training Programs
Exercising and Maintaining Business Continuity Plans
Public Relations and Crisis Coordination
Public Relations and Crisis Coordination
Coordinating with External Agencies
One of the following industry certifications desired ABCP, CFCP or other related certification

Xerox is an Equal Opportunity Employer and considers applicants for all positions without regard to race, color, creed, religion, ancestry, national origin, age, gender identity, sex, marital status, sexual orientation, physical or mental disability, use of a guide dog or service animal, military/veteran status, citizenship status, basis of genetic information, or any other group protected by law People with disabilities who need a reasonable accommodation to apply or compete for employment with Xerox may request such accommodation(s) by sending an e-mail to XeroxStaffingAdminCenterxeroxcom Be sure to include your name, the job you are interested in, and the accommodation you are seeking

Primary Location India-Kerala-Kochi

Travel No

Employee Status Regular

Profile Summary:

Employment Type : Full Time
Eligibility : Any Graduate
Industry : Consumer Durables/FMCG, Manufacturing/Industrial
Functional Area : IT Software : Software Products & Services
Role : System Security
Salary : As per Industry Standards
Deadline : 20th May 2020

Key Skills:

These are some of our most popular tutorials

People who search this job also searched for the following Keywords

Sourced**

Salary trends based on over 1 crore profiles

View Salaries

All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status