Back to Results

IT Architect - Mumbai

Quick Facts
Company Name:Thermon
Location:Mumbai
Employment Type:Full Time
Take Action

Description

Overview

We are currently looking for an IT Architect!

The IT Architect is responsible for designing, creating, and maintaining Technology and Cyber solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. This role involves evaluating the security of the organization's systems for vulnerabilities and developing security requirements based on risk assessments, threat modeling, and analysis of existing systems.

Responsibilities:

  • Develop and implement a robust architectural framework for Microsoft 365 migration
  • Work closely with stakeholders to understand diverse organizational needs and align Microsoft 365 architecture accordingly.
  • Identify opportunities for optimization and customization within Microsoft 365 to enhance user experience.
  • Plan and design security solutions that align with the organization's needs and risk profile.
  • Conduct risk assessments to identify potential vulnerabilities and threats.
  • Analyze existing systems to understand potential attack vectors and design appropriate security measures.
  • Develop integration plans to protect existing infrastructure and incorporate future solutions.
  • Design action plans for policy creation, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats.
  • Leverage security information and event management (SIEM), data loss prevention (DLP), intrusion prevention systems (IPS), and other tools in designs.
  • Partner with stakeholders to encourage the adoption of security-compatible software designs and best practices.
  • Keep abreast of the latest intelligence from law enforcement and other cyber threat information sources.
  • Monitors SIEM, trouble tickets / email notifications and in-person escalations, logs from infrastructure components, applications or network devices such as firewalls, IDS/IPS.
  • Examine the escalated tickets to determine if they are true positive or false positives.
  • Performs malware analysis, threat hunting and threat modeling activities.
  • Assist forensic investigation by providing reports and other information.
  • Work with data loss prevention controls including classification and remediation.
  • Monitor systems for data movement on endpoints
  • Research and analyze data movement and exfiltration through email, web traffic, database usage, endpoint, vendor connections, SaaS applications, cloud storage solutions, and others
  • Partner with teammates and other security teams to research, assess, and recommend improvements of control environments
  • Analyze system events for diagnosis, trending, and measuring of system health, capacity, configuration efficiency and metric and analytic development
  • Participate in incident response teams to help in analyzing, containing, and coordinating elements of security incidents
  • Carry out assessments and penetration testing.
  • Manage audit/intrusion and security technology systems.
  • Architect and engineer/develop trusted systems into secure systems.
  • Maintain data center components (UPS etc.).
  • Troubleshoot security and network problems.
  • Respond to all system and/or network security breaches promptly.
  • Analyze and identify security vulnerabilities.
  • Develop and implement security policies.
  • Monitor network activity.
  • Respond to security incidents.
  • Conduct security assessments to identify vulnerabilities.
  • Prioritize findings for remediation.
  • Perform risk assessments to evaluate potential security weaknesses.
  • Design and maintain security controls for applications and infrastructure.
  • Respond to security incidents promptly.
  • Investigate security breaches and abnormal behavior.
  • Foster a security-first culture within the organization.

Requirements:

  • Bachelor's degree in computer science, engineering, or equivalent.
  • Relevant security certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM).
  • 5+ years of experience in IT Security/support
  • Proficiency in Microsoft Office 365, Azure, and other cloud technologies.
  • Detailed knowledge of Microsoft 365 Security, Defender for cloud apps or other CASB solutions.
  • Proficiency in programming languages such as Python, C++, Java, Ruby, Node, Go, and/or PowerShell.
  • Ability to work under pressure in a fast-paced environment.
  • Strong attention to detail with an analytical mind and outstanding problem-solving skills.
  • Awareness of cybersecurity trends and hacking techniques.
  • Bachelor's degree in computer science or related field
  • Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Other relevant certifications have added value.
  • Experience with Microsoft 365 Security.
  • Hands on experience in end user services applications including application security, End Point security, Data Security, SOX Audit, Risk Management, Exception Management, etc
  • Strong in MDR, EDR, SIEM, SOAR, etc
  • In dept architectural knowledge to design security systems and reduce exposure for cyber.
  • Familiarity with network security, encryption, and authentication protocols.
  • Understanding of cloud security (Azure, etc.).
  • Knowledge of threat intelligence and security frameworks.
  • Understanding of ITIL process, such as Incidents, Change & Problem management.
  • Experience in working in a global, process-driven organization.
  • Experience working with a geographically split organization and working in a multi-cultural environment.


Automation Alley Logo