Product Development Manager - Managed Security Services
-
Demonstrated capabilities on conducting security risk assessment.
-
Deep understanding of security processes and capability to align them with different security standards.
-
Hands-on capabilities around industry leading GRC tools like Archer, etc.
-
Profound understanding of SOC (security Operations Center) processes and setup.
-
Strong experience of working in conceptualizing, developing or leading large part of Security Operations Centre, backed up by references
-
Strong experience and knowledge of Managed Security Services business and deep understanding of Telco Operations.
-
Experience in designing security solutions and architecture along with very good knowledge and understanding of security products and technologies at different layers like network, infrastructure, application, data, identity & access, processes, etc.
-
Strong pre-sales experience/capabilities in security
-
Expert understanding of various security monitoring tools and security operations center
-
Good understanding evolution of telecom technologies and architecture
-
Able to work at strategic and operations levels and to move between these levels with ease.
-
Excellent written, verbal and presentation communication skills, should be able to articulate the value of product offering
-
Able to effectively influence cross functional teams without formal authority
-
Very strong understanding of security standards like ISO/IEC 27001:2013, ISO 22301, ISO27011, PCI DSS, 3GPP, NIST, COBIT 5, etc.
-
Hands-on experience in security operations, including some of the following:
-
Security incident monitoring, analysis and remediation (SIEM functionality)
-
Log correlation and management
-
Security testing, audits and compliance
-
Identity & Access Management
-
Management of Security infrastructure such as firewall, IDS/IPS, VPNs, AV, Content filters etc
-
Application and infrastructure security assessments
-
Analysis of event and systems logs
-
Deep understanding of incident response best practices and processes
-
Forensic analysis
-
Intrusion detection systems
-