Key Responsibilities and Attributes:
· Provide Technical Application Support for the Security Infrastructure and Applications.
· Production and UAT Environment Troubleshooting expertise.
· Capacity, performance and Stability reporting and Management.
· Maintenance of scripts and other tools for system monitoring and process automation.
· Provide Technical Mentoring.
· Lead Operations-related projects and Security assessment for the infrastructure associated with the applications in scope.
· Leadership Skills to Document and do knowledge transfer to other team members.
· Be responsible to assess the risk and associated impact of all operational issues and change events and react quickly to escalate to technology management in a timely manner when required.
· Work closely with the infrastructure team to ensure the operational requirements are met during application integrations.
· Continuously keep the Knowledge Share repository up to date.
· Strong interpersonal and communication skills.
· Strong analytical skills and attention to detail.
· Ability to work across all levels of the organization.
· Proven ability to work with demanding global partners within aggressive timelines; solid problem solving, analytical and technical abilities.
Qualifications :
Strong candidates will possess the following qualifications:
· Bachelor’s degree in information technology or any other equivalent
· Knowledge and 3-5 years of experience in Operations support or System Administration
· Knowledge and experience with the following Operating Systems is a must: Red Hat, Linux, Windows System, or other Unix-based Operating Systems
· Hands on experience with Unix scripting, SQL, or any other equivalent
· Knowledge of Security tools and hands-on experience with some of the following technologies is an added advantage:
o Multi-Factor Authentication and Authorization Technologies: Safeword Premier Access, Cisco ISE, CITI2EE End to End Encryption, Cloud IAM, SiteMinder
o Data Security Technologies: Cortosis, DTAAS, Ionic
o PKI Technology and Encryption Systems: Entrust, MS-PKI, Venafi Encryption Director, OCSP, Hashicorp
o Identity Management Technologies: SailPoint, Powerbroker
o Privileged Access and Vault Management Technologies: CyberArk, SCAPDAP, WAIS
o Monitoring or Automation Tools: Tivoli, Sensu, Autosys, ServiceNow
· Knowledge of the following components would be a good addition:
o Web Servers (Apache, IIS, Sun One Web servers)
o Application Servers (WebLogic, WebSphere)
o Databases (Oracle, SQL server, Sybase)
o Programming languages (Java, Perl, C/C++)
o Understanding of security, network architectures and protocols.
o Familiarity of Compliance and risk management frameworks and methodologies (ISO27002, SDLC)
o Certifications (CISSP, ITIL, CCNA/CCNP, CEH, RedHat, MCSE, Cloud)
Working knowledge in Key and certificate encryption, life cycle and end-to-end communication.