Job Vacancy for Graduates at Verizon: Check More Details

Verizon is hiring an experienced Secur Cslt III-Sec Risk Mgt at their Hyderabad and Chennai locations

Graduates Vacancy at Verizon

SANDEEP KUMAR | Jul 25, 2024 |

Job Vacancy for Graduates at Verizon: Check More Details

Job Vacancy for Graduates at Verizon: Check More Details

Overview:

Verizon is hiring an experienced Secur Cslt III-Sec Risk Mgt at their Hyderabad and Chennai locations. This position falls under the Verizon Cyber Security (VCS) organization that supports Verizon’s Global Technology Services (GTS) Business Unit and the Verizon enterprise. The Information Risk Management (IRM) department fulfills our mission to safeguard and enable the business by improving the enterprise security risk posture through engagement in IT and business initiatives that impact company networks, information assets, and business operations.

The complete details of this job are as follows:

Roles and Responsibilities

  • Determining if security risk factors exist by engaging in business and IT initiatives to obtain and understand functional and technical requirements involving internal software development, use of third parties, new technologies or any use of information assets.
  • Evaluating new or modified end-to-end systems and evaluate inherent risk of human factors and associated process flow.
  • Assessing these risks against internal security standards and develop appropriate mitigation strategies to reduce potential loss to within acceptable limits.
  • Participating as a stakeholder representing Information Security in functional and technical requirements and design sessions via the agile and traditional software development methodologies.
  • Assigning a preliminary risk profile by identifying the information security risk factors based on data classification, design, and functional purpose and use.
  • Working with architecture teams to understand enterprise solutions and impacts on security controls.
  • Determining if other security or privacy risk factors exist due to the uniqueness of the initiative and evolving business ventures.
  • Performing detailed risk assessment and provide risk reduction recommendations and security requirements and guidance to IT and business teams supporting the initiatives.
  • Providing security requirements during planning sessions, functional and technical requirement sessions, user story creation and grooming, and technical design based on identified risks.
  • Determining if any compensating controls are necessary due to inability to comply with the primary control requirements.
  • Facilitating and help design compensating controls when needed.
  • Ensuring requirements and design include approved strategic security technologies.
  • Completing and present to Security management and business sponsors a risk assessment evaluation articulating risk and impact analysis when security controls cannot be met by an initiative to ensure transparency and appropriate level of acceptance.
  • Participating weekly meetings with management and security team peers to provide project updates and risk overviews.

What we’re looking for…

You’ll need to have:

  • Bachelor’s degree or four of more years of work experience.
  • Four or more years of relevant work experience.
  • Experience in an Information Security, Information Risk Management, Software Development/Technical Support related position.
  • Even better if you have one or more of the following:
  • One or more of the following professional certifications: Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), Certified in Risk and Information Systems Controls (CRISC), or Certified Cloud Security Professional (CCSP).
  • Knowledge of all stages of the SDLC process, from coding and code promotion through all levels of testing as well as management of multiple non-production environments.
  • Knowledge of server and desktop application and operating system security (Win10, Mac, Linux) particularly any knowledge about securing Google products such as Chrome, G Suite, and ChromeOS/Android.
  • Experience in Cloud security especially in AWS, Google Cloud Platform, or Azure.
  • Experience in Software-as-a-Service (SaaS) security and vendor security in general.
  • Experience in source code control systems (eg Git) and relevant security controls.
  • Experience in DevOps concepts and especially DevSecOps tools.
  • Experience in the security and governance of Big Data.
  • Knowledge of relational and non-relational databases and understanding of the Open Systems Interconnection model.
  • Knowledge of data security fundamentals and best practices with prior responsibilities of protecting information assets.
  • Ability to effectively communicate with Legal department attorneys and other supporting business groups such as Compliance and Finance.
  • Excellent written and verbal communication skills, documentation and organization skills.

To Apply For This Job, Visit Official Website

Disclaimer: The Recruitment Information provided above is for informational purposes only. The above Recruitment Information has been taken from the official site of the Organisation. We do not provide any Recruitment guarantee. Recruitment is to be done as per the official recruitment process of the company or organization posted the recruitment Vacancy. We don’t charge any fee for providing this Job Information. Neither the Author nor Studycafe and its Affiliates accepts any liabilities for any loss or damage of any kind arising out of any information in this article nor for any actions taken in reliance thereon.

StudyCafe Membership

Join StudyCafe Membership. For More details about Membership Click Join Membership Button
Join Membership

In case of any Doubt regarding Membership you can mail us at [email protected]

Join Studycafe's WhatsApp Group or Telegram Channel for Latest Updates on Government Job, Sarkari Naukri, Private Jobs, Income Tax, GST, Companies Act, Judgements and CA, CS, ICWA, and MUCH MORE!"