Peoplefy

Cyber Data Protection Engineer

Job Location

pune, India

Job Description

Shift timings: 5:00 PM to 2:30 AM Work: Hybrid model Location: Pune Years of exp: 6 years Job Summary : In addition to the responsibilities listed below, this position is responsible for leading the design, build, testing, and implementation of data protection security technologies, including infrastructure and supporting applications related to data protection. This includes managing complex IS projects through both pre-production and implementation phases by collaborating with internal technology risk teams, infrastructure management, and external business groups to understand requirements and design and implement solutions accordingly; testing and validating upgrades, enhancements, or new technologies prior to production implementation; consulting on incident support efforts to help resolve and remediate application production issues; and leading the implementation of new security controls as appropriate to resolve incidences and mitigate threat risks. It requires understanding of Cyber and IT regulatory requirements. This position is also responsible for maintaining a comprehensive understanding of infrastructure security operations, partnering with the Architecture & Strategy teams to help develop and validate the long-term direction for security technologies, and providing technical subject matter expertise to support the ongoing assessment and mitigation of information security risks. In addition to the responsibilities listed below, this position is responsible for leading the design, build, testing, and implementation of data protection security technologies, including infrastructure and supporting applications related to data protection. This includes managing complex IS and Cyber Security projects through both pre-production and implementation phases by collaborating with internal technology risk teams, infrastructure management, and external business groups to understand requirements and design and implement solutions accordingly; testing and validating upgrades, enhancements, or new technologies prior to production implementation; consulting on incident support efforts to help resolve and remediate application production issues; and leading the implementation of new security controls as appropriate to resolve incidences and mitigate threat risks. It requires understanding of Cyber and IT regulatory requirements. This position is also responsible for maintaining a comprehensive understanding of infrastructure security operations, partnering with the Architecture & Strategy teams to help develop and validate the long-term direction for security technologies, and providing technical subject matter expertise to support the ongoing assessment and mitigation of information security risks. Essential Responsibilities: Conducts or oversees business-specific projects by applying deep expertise in subject area; promoting adherence to all procedures and policies; developing work plans to meet business priorities and deadlines; determining and carrying out processes and methodologies; coordinating and delegating resources to accomplish organizational goals; partnering internally and externally to make effective business decisions; solving complex problems; escalating issues or risks, as appropriate; monitoring progress and results; recognizing and capitalizing on improvement opportunities; evaluating recommendations made; and influencing the completion of project tasks by others. Practices self-leadership and promotes learning in others by building relationships with cross-functional stakeholders; communicating information and providing advice to drive projects forward; influencing team members within assigned unit; listening and responding to, seeking, and addressing performance feedback; adapting to competing demands and new responsibilities; providing feedback to others, including upward feedback to leadership and mentoring junior team members; creating and executing plans to capitalize on strengths and improve opportunity areas; and adapting to and learning from change, difficulties, and feedback. Leads the designing and building of cybersecurity control systems by executing the design, development and implementation of complex countermeasures, systems integration, and tools specific to cybersecurity. Leads the analysis efforts in evaluating existing systems and analyzing attack surface (e.g., gap, control weakness, threat, and efficacy) of information systems in a large enterprise (e.g., applications, operating systems and networks); Provides subject-matter-expert level technical recommendations for control design while considering control gaps, risks, system weaknesses, threats, vulnerabilities, and control effectiveness. Provides some recommendations and input on options, risks, costs, and benefits for systems designs. Leverages partnerships with IT teams, Cyber Teams and key business partners to troubleshoot complex systems. Translates business requirements, and functional and non-functional requirements, into technical specifications that support integrated and sustainable designs for complex or high impact infrastructure systems by partnering with Business Analysts to understand business needs and functional specifications. Ensures system designs adhere to company architecture standards. Builds partnerships with counterparts in various IT Teams (e.g., database, operations, technical support) throughout system development and implementation. Serves as a technical expert for project teams throughout the implementation and maintenance of assigned enterprise infrastructure systems by defining and overseeing the documentation of detailed standards (e.g., guidelines, processes, procedures) for the introduction and maintenance of services. Mentors other technical resources throughout infrastructure systems development. Reviews and validates technical specifications and documentation for complex or multi-dimensional solutions. Leads the development and modification of solutions by identifying technical solutions to business problems. Collaborates with business leaders, Solutions, and lead enterprise architects to review business drivers, and establish a foundation for enterprise systems planning. Reviews benchmarking results and provides information to support current and future infrastructure needs and projects to IT leadership. Provides preliminary conclusions. Benchmarks and evaluates IT trends and technologies to identify opportunities and considerations that impact ROI. Makes recommendations on resources required to maintain service levels and meet new demands. Guides and drives physical architecture design for new initiatives. Provides subject-matter-expert level engineering oversight during security incidents response and investigations as required and leading the development of policies for future proofing when appropriate. Contributes expertise to the development and discussion of recommendations with leaders to collect input on options, risks, costs, and benefits for cybersecurity designs. Provides subject-matter-expert level engineering insight and mentoring others to develop cybersecurity system design prototypes/solutions. Job Qualifications Bachelor's degree in Cybersecurity, Computer Science, Information Technology, Software Engineering, or a directly related field AND minimum eight (5) years of experience in information technology (IT), software engineering, cybersecurity, or a directly related field Additional equivalent work experience of (3) additional years (11 total) may be substituted for a degree requirement with experience in cybersecurity, computer science, information technology, software engineering, or a directly related field. Four (4) years experience in the planning, design, and implementation of Data Protection solutions. Four (4) years experience in the configuration, implementation, troubleshooting, and operation of Data Protection technologies. In depth, Information/Cyber Security experience in one or more of the following areas: email security (Proofpoint), data loss prevention (Netscope or similar), web application firewall, cryptography. Must have skills: Hands on experience in experience in the planning, design, and implementation of Data Protection solutions Strong expertise in the configuration, implementation, troubleshooting, and operation of Data Protection technologies Hands on experience in Information/Cyber Security experience in one or more of the following areas: email security (Proofpoint), data loss prevention (Netscope or similar), web application firewall, cryptography Data loss Prevention (DLP)

Location: pune, IN

Posted Date: 6/16/2025
View More Peoplefy Jobs

Contact Information

Contact Human Resources
Peoplefy

Posted

June 16, 2025
UID: 5235657522

AboutJobs.com does not guarantee the validity or accuracy of the job information posted in this database. It is the job seeker's responsibility to independently review all posting companies, contracts and job offers.