Job Description

A Bachelor’s or Higher Degree is the minimum entry required for the position

  • Skill Set : antivirus,anti-spyware and anti-phishing
  • Total Experience : 3.00 to 11.00 Years
  • No of Openings : 1
  • Job Post Date : 16/05/2022
  • Job Expiry Date : 31/05/2023
  • Domain : IT
  • Location : MUMBAI [India]
  • Job Reference No : 911282

Job Summary

[Monday 1:49 PM] Andavelli Padmavathy 1 Role : McAfee DLP Technical ConsultantExperience: 5 years Experience in handling of McAfee DLP (Endpoint, Network, Email, Proxy) solution.Application level:1) Experience in Setup, Installation, Configuration, Troubleshooting, Configuration and Fine tuning of Rules in McAfee Solutions for DLP (Endpoint, Network, Cloud, Mobile )2) Experience in Deployment and Operationalization of ePO, Server, Load Balancer (If required) for UAT, PR, DR Setup (or any other setup) required for the solution.3) Expertise in Configuration, Customisation and maintenance of Dashboards including Data4) Experience implementing security solutions, multi factor authentication, single sign on, identity management or related technologies.5) Expertise in Performance monitoring & tuning, data quality assurance, Health monitoring6) Knowledge of windows operating system, Microsoft IIS, Web TechnologiesDatabase level:7) Experience in Database technologies and suites of Oracle/ MSSQL etc.8) Building MSSQL queries for handling the ad hoc requirement of various Reports9) Experience in administration of entire solution including server and database.10) Experience in automation of data incidents from ePO.Security related:1) Knowledge of Perimeter security controls ¿ firewall, IDS/IPS, network access control and network segmentation, Router, switch and VLAN security; wireless security, Security concepts related to endpoint protection, DNS, routing, authentication, VPN, proxy services and DDOS mitigation technologies2) Expertise in designing & practicing robust security architecture.3) Knowledge of network security architecture definition and Understanding of security protocols, cryptography, authentication, authorisation and security Knowledge of current IT risks4) Experience in performing vulnerability testing, risk analysis and security assessments and closing the observations.5) Expertise in implementing security standards, Risk assessment procedures, policy formation, role based authorization methodologies, authentication technologies(integration with SIEM, DAM, PIMS and other security standards).

Recommend to Friend