Company Description
MicroStrategy transforms organizations into intelligent enterprises through data-driven innovation. We match smart people to dynamic projects and technologies that truly challenge their talents. Curious and creative in outlook, our success is built on the talent and energy of smart and driven people. MicroStrategy is a worldwide leader in enterprise analytics and mobility software. A pioneer in the BI and analytics space, MicroStrategy delivers innovative software that empowers people to make better decisions and transform the way they do business. We provide our enterprise customers with world-class software and expert services so they can deploy unique intelligence applications.
Ideal candidates will be located in Pune or within commutable distance and willing to work 9am – 6pm ET (US Hours).
Job Description
Support the detection, monitoring and tracking of security vulnerabilities at the application, database, server, workstation and OS levels
Tune-in and configure SIEM performance and events data quality to maximize log correlation efficiency
Work closely with the network team to implement and maintain network access control technologies
Configure Security Orchestration, Automation, and Response (SOAR) tools, scripts, events, and playbooks
Expertise in shell scripting and other programming languages, such as Python and/or Power Shell
Proficiency in understanding and using regular expressions (regex)
Solid understanding of REST/SOAP/WSDL/XML (Web Services), HTTP Request Methods.
Work closely with the compliance team to identify, document and implement various security controls related to NIST, FedRAMP, HiTRUST, and ISO 27001
Guide the network and operations teams in implementing security best practices
Work with network, and systems engineering teams to promote automation, automated monitoring and administration functionality
Implement, and support security solutions including but not limited to Intrusion Detection, Log Management, Data Loss Prevention, Vulnerability Management, Web Content Filtering, and Configuration Management
Support the efforts to develop operational best practice procedural documentation for operations staff
Assist in the development and documentation of various systems, policies, procedures, and customer deliverables
Research new products and make appropriate recommendations
Develop and design project plans, tasks and timelines and then provide verbal and written status reports as directed
Conduct on-going security assessments, document and track findings and remediation activities
Provide on-call support as needed
Qualifications
BS in Computer Science, Engineering or related field desired
Minimum 3 years of experience supporting enterprise level environment
Must have a good understanding of the following: Log correlation, SIEM technologies (AlertLogic, ArcSight, Q1 Radar, Log Rhythm, Splunk, etc.), IDS/IPS technologies, Vulnerability Scanners (Nessus, Qualys, etc.) and other related technologies
Understanding of common web application vulnerabilities and familiarity with using web application scanning tools such as Burp Suite, ZAP Proxy, Acunetix, etc.
Understanding of cloud solutions and cloud security best practices in environments such as AWS, Azure and Google Cloud
Solid understanding of compliance requirements and standards such as PCI-DSS, HIPAA, HiTRUST, ISO 27001, SOX. etc.
Demonstrated knowledge of one or more of the following systems: Linux, Windows, or Mac OS
Working knowledge of firewall and web filtering technologies
Experiences practicing ITIL framework-based processes such as Change, Problem, and Incident management in an enterprise environment
Excellent verbal and written communication, presentation, and interpersonal skills
Able to define, document and support systems, policies, and procedures
Excellent analytic, problem solving and troubleshooting skills
Good knowledge and experience designing network, system and application security architectures
Ability to efficiently handle multiple projects with shifting priorities
Able to anticipate and mitigate risks as well as define architectural solutions
The recruitment process includes online assessments as a first step (English, logic, design) - we send them via e-mail, please check also your SPAM folder