Xerox Analyst II, IM Security (Security Analyst, Endpoint Protection) - - 22772 in GURGAON, India
Analyst II, IM Security (Security Analyst, Endpoint Protection) at created 28-Jul-2020"/>
Skip to content
Xerox at https://xerox.avature.net/en_US/careers
Analyst II, IM Security (Security Analyst, Endpoint Protection)
City: Bangalore, Cochin, Gurugram
State/Province: Haryana, Karnataka, Kerala
Department: IM Security
Date: Tuesday, July 28, 2020
Working time: Full-time
Job Level: Individual Contributor
Job Type: Experienced
Job Field: IM Security
Description & Requirements
Xerox (NYSE: XRX) makes every day work better. We are a workplace technology company, building and integrating software and hardware for enterprises large and small. As customers seek to manage information across digital and physical platforms, Xerox delivers a seamless, secure and sustainable experience. Whether inventing the copier, the ethernet, the laser printer or more, Xerox has long defined the modern work experience. Learn more at www.xerox.com at http://www.xerox.com/ and explore our commitment to diversity and inclusion. at https://www.xerox.com/en-us/jobs/diversity
This role will specialize on email/endpoint security, leveraging technology, technique, and method as they pertain to the disciplines of information security, privacy, disaster recovery, and regulatory compliance.
The development of and execution of information risk controls and management strategies to maintain the confidentiality, integrity, availability, accountability and relevant compliance of information systems.
The resolution of incidents and problems throughout the information system lifecycle, including classification, prioritization and initiation of action, documentation of root causes and implementation of remedies.
Manage day-to-day email/endpoint detection & response system operation within the enterprise, with a keen eye toward endpoint security for on premise, cloud datacenters as well client endpoints.
Monitor and act upon alerts driven from email security and endpoint detection & response platforms.
Manage/Develop processes and procedures for effective orchestration of incident response, remediation, and recovery from endpoint and/or email security events, adhering to the NIST incident response framework and principles.
Collaborate with community of risk analysts, as warranted.
Interact with members of enterprise architecture and/or IT solution delivery staff in articulating business requirements balanced with cyber security requirements and enforcement for security IT processing.
Analyzes incidents and problems to show trends and potential problem areas, so that actions can be taken to minimize the occurrence of incidents and to improve the process of problem reporting, analysis and clearance. Assesses and reports the probable causes of incidents and consequences of existing problems and known defects.
Provides advice, both reactively and pro-actively, to those engaged in activities where the technical specialism is applicable, including those in areas such as budgetary and financial planning, litigation, legislation, and health and safety.
Qualifications & Education Requirements:
Bachelor’s Degree in Computer Science, Information Systems, or related field.
Strong understanding of network security principles and enterprise deployment methodologies Uses discretion to identify & resolve complex problems with minimal supervision as well as in collaborative team environments Strong analytical skills with an emphasis on fact-based reporting/summaries
Excellent written and verbal communication & presentation skills with diverse communities (technical and non-technical)
IT and/or Security Certification Preferred, CISSP, SANS, GSEC, etc.
Ability to work in a fast- paced environment and adapt to rapidly changing business requirements.
Good time management and attention to detail
Applies standard procedures to enhance security or resilience to system interruptions. Can take immediate action in an incident to limit business impact and escalates event to higher authority.
Applies and maintains specific risk management controls as required by organizational policy and local risk assessments to maintain confidentiality, integrity and availability of business information systems. Determines when issues should be escalated to a higher level. Demonstrates effective communication of risk management issues to business managers and others.
Maintains knowledge of specific technical specialisms, provides detailed advice regarding their application, executes specialized tasks. Implements and administers risk management technologies and process controls in a given specialism and conducts compliance tracking. The specialism can be any area of information or communication technology, technique, method, product or application area.
Carries out specific assignments related to the technical specialism, either alone or as part of a team.
Maintains knowledge of the technical specialism at a detailed level and is responsible for own personal growth and technical proficiency. Xerox is an Equal Opportunity Employer and considers applicants for all positions without regard to race, color, creed, religion, ancestry, national origin, age, gender identity, sex, marital status, sexual orientation, physical or mental disability, use of a guide dog or service animal, military/veteran status, citizenship status, basis of genetic information, or any other group protected by law. Learn more at www.xerox.com at https://www.xerox.com/ and explore our commitment to diversity and inclusion! at https://www.xerox.com/en-us/jobs/diversity People with disabilities who need a reasonable accommodation to apply or compete for employment with Xerox may request such accommodation(s) by sending an e-mail to XeroxStaffingAdminCenter@xerox.com. Be sure to include your name, the job you are interested in, and the accommodation you are seeking. © 2020 Xerox Corporation. All rights reserved. Xerox® and Xerox and Design® are trademarks of Xerox Corporation in the United States and/or other countries.
Share this job:
Share Analyst II, IM Security (Security Analyst, Endpoint Protection) with Facebook
Share Analyst II, IM Security (Security Analyst, Endpoint Protection) with LinkedIn
Share Analyst II, IM Security (Security Analyst, Endpoint Protection) with Twitter
Share Analyst II, IM Security (Security Analyst, Endpoint Protection) with a friend via e-mail