Cyber Security Design Sr Specialist
Bengaluru, IN, 560066
We help the world run better
Our company culture is focused on helping our employees enable innovation by building breakthroughs together. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from. Apply now!
Job Title
Cyber Security Design Sr Specialist
Summary
Key responsibilities and tasks include:
- Analyzing and addressing vulnerabilities, misconfigurations, and flaws associated with organizational networks, systems, and applications (proactively/reactively)
- Manage vulnerability scanning results and analysis
- Identify and develop workflow automation to lower identification and response times
- Develop dashboards/reports with findings and remediation steps for different audiences/stakeholders
- Support emergency/incident-response activities, as needed
- Collaborate with cross functional stakeholders to facilitate information sharing, prioritize risks, and support remediation
- Ensure communication and escalation of high risk vulnerabilities to leadership and other stakeholders
- Network design evaluation
- Security analysis of Technical network architecture
- Internal/external response for Information security related topics
Role Requirements
- Knowledge and experience in Linux / Windows System administration and Virtualization (VMware / Xen)
- Knowledge and experience in Hyperscalers (Azure/GCP/AWS)
- Knowledge and experience in network administration of switches, routers and load balancers
- Knowledge and experience in information security technologies such as anti-virus, malware detection, firewalls, VPN, IDS, authentication and SIEM
- In depth understanding of security concepts, principles and practices related to server systems, OS, software applications, network, cloud and web servers
- Experience in EVM tools e.g. Qualys, Nessus, etc.
- Broad knowledge of technology attack vectors and exploits
- Strong excel/PowerBI skills with the ability to create data analysis reports/dashboards
- Bachelor’s degree in Science, Technology, Engineering, and Mathematics (STEM) disciplines
- 8+ years of experience with 3+ years in EVM Program
- Experience in information security certification and auditing is desired
- Knowledge in TTP methods and frameworks is desired
- Awareness in third party vulnerability management information sources (e.g. VirusTotal) (Desired)
- Eager to learn and explore new information security technologies
- Nice to have Security Certifications like CISSP, CISA, CISM, GCFA, GCIH, GCIA, GNFA, GREM, GCCC, or Security+
About the Team
Position is within HXM BISO Infrastructure security team of Human Experience Management (HXM) Practice within SAP & the team member gets opportunities for holistic professional & personal development. HXM helps SAP customers in their journey towards HR digital transformation leveraging SAP HXM solutions suite including SuccessFactors, HCM, Employee Experience, Innovation and Intelligent technologies.
#SecurityT3
We build breakthroughs together
SAP innovations help more than 400,000 customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with 200 million users and more than 100,000 employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, we build breakthroughs, together.
We win with inclusion
SAP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world.
SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com
For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training.
EOE AA M/F/Vet/Disability:
Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability.
Successful candidates might be required to undergo a background verification with an external vendor.
Requisition ID: 389642 | Work Area: Information Technology | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics Audits Automation AWS Azure CISA CISM CISSP Cloud ERP Exploits Firewalls GCFA GCIA GCIH GCP GNFA GREM IDS Linux Malware Mathematics Nessus Qualys SAP Security analysis SIEM STEM VirusTotal VMware VPN Vulnerabilities Vulnerability management Windows
Perks/benefits: Career development Flex hours Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open Forensics-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs