Life @ Essen Vision

We believe in the idea of ‘Work is play, play is work’. This is the sentiment that runs throughout in the DNA of Essenites. The idea is, not to be serious, but sincere in what we do. We treat every issue on its merit, and then find smarter ways to resolve it faster. As a result, work always feels like play. This approach has helped us build a team of great people that has delivered some inventive solutions to our clients over so many years.
Things like training programs, festive celebrations, parties, music, competitions, fun games constantly up the game for our people. So be it our Essen Alumni meet, Panchamda night with karaoke or an electrifying dance number, the spirit of every Essen is upbeat.

If you would like yourself to be a part of this smart fun loving team, do drop us a line at jobs@essenvision.com.

To View More Job Opportunities

TECHNICAL LEAD / CONSULTANT - DATA PRIVACY

Desired Candidate Profile:

Forcepoint DLP Administration
Secure Microsoft 365 Hybrid Environment
Secure Identities
Implement Authentication Methods
Implement Conditional Access
Implement Azure AD Privileged Identity Management (PIM)
Implement  and Manage 365 Security with Azure Sentinel
Manage Data Loss Prevention (DLP)
Manage Microsoft Cloud App Security
Manage and Monitor Security and Dashboards using Microsoft Security Center
Find and Recover deleted office 365 Data
Plan for Regulatory compliance
Review and Interpret GDPR dashboards and reports

Experience: 5 to 10 yrs Into Project Delivery, Project and People Management,  Team leading, Implementation to Consulting

Educational Qualification: Any Graduate/Post Graduate

Relevant Certifications/Training will be an added advantage.

SECURITY CONSULTANT - DLP

  • Role: Security Consultant – DLP
    (McAfee/ Forcepoint/Boldon James/Klassify/ Symantec- DLP)
  • Role Description: The DLP Security Consultant will be responsible for information 
    dissemination on Information Security policy, Procedures, Best practices etc. 
    within the specific clients / lines of businesses.
  • Must Have Skills: Strong Communication Skills, Presentation Skills and Interpersonal Skills.
  • Good To Have Skills: Key individual contributor role with accountability for performing systems and network information analysis of data loss prevention incidents to the network infrastructure, data center servers, workstations, and more in a fast-paced, highly technical environment.
  • Key Responsibilities: 
  • Assist in the hands-on implementation of multiple DLP solutions.
  • Provide DLP subject matter expertise and thought leadership as an extended member of a customer team.
  • Provide guidance, recommendations, best practices, etc. for DLP operations.
  • Stabilize and optimize DLP system performance, including rules and reports.
  • Assist with DLP component upgrades, installs, testing and configuration.
  • Liaise with Symantec Support, Engineering, Product Management, and others within Symantec on behalf of the customer.
  • Provide single point of contact and hands-on escalation and remediation for critical issues.
  • Ability to interact with senior stakeholders as well as other functions across a global 
    organization.
  • Respond rapidly to unplanned events, including after hours for Severity 1 issues.
  • Proactively communicate relevant technical information and alerts on known issues, hot fixes, new releases, etc.
  • Provide regular status reports for critical incidents, projects and proactive services.
  • Communicate professionally and effectively at all organizational levels.
  • Keep the Account Team informed of major issues or new opportunities.
  • Travel may be required to remote sites on an as-needed basis.

Professional Attributes: 

  • Working knowledge of common attacks and vulnerabilities.
  • Strong understanding of common categories and characteristics of malware.

Educational Qualification: B.E./ B.Tech (Computers), B.Sc CS/IT, BCA, M.Sc. CS/ IT, M.E./ M.Tech (Computers).

Additional Information: Should be willing to travel domestic & International location, must have a valid passport.

 

 

 

SUBJECT MATTER EXPERT - DATA PRIVACY

  • How we’ll help you grow:

    • You’ll have access to all the technical and management training courses to grow your expertise.
    • You’ll learn directly from experts in the field; our team leads love to mentor.
    • You have the opportunity to work in many different areas to determine what really excites you.
  • Role and Responsibilities
    • Conducting POCs for Data loss Prevention , Data Classification , CASB , DAM , PIM / PAM , Rights Management solution
    • Conducting Meetings with Client for Pre-engagement assessment with Customer to implement DLP as per Standard best practices
    • Suggest Server count and Size them as per license count and Client Environment
    • Design High level, Low level designs for different solutions as per the customer architecture.
    • Perform Implementation of different technologies as per Industry Best Practices
    • Conduct Architecture Assessment for various Customer’s existing Architecture and prepare assessment report and consult for amending changes as per industry Best practices
    • Conduct Data Flow Analysis/ Classification workshops with Business.
    • Prepare Data Classification Sheets and guide Consultants and Analyst in Policy Creation, Incident Analysis and Fine Tuning
    • Co-Ordinate with DLP Consultants and Analysts for Project Updates
    • Update Practice Heads and Customers on a timely basis regarding activities performed and highlight dependencies, if any
    • Stay up-to-date on product feature enhancements as per new releases of the product
    • Integrate Security solutions with existing infrastructure – AD, SIEM, SMTP
    • Configure customized notifications and alerts
    • Configure solution backups and monitor them periodically.
    • Suggest use cases on the basis of industry best practices for the client
    • Conduct troubleshooting in case issues are being faced in the deployed existing architecture
    • Configure different policies on solutions as per Customer’s needs.
    • Review and fine tune the policy to generate the incidents in their truest form
    • Conduct process consulting in client’s environment to define different set of processes to ensure Data Protection is met.

Qualifications and Education Requirements

  • Undergraduate / master’s degree or equivalent experience
  • Minimum 3 yrs. of total experience with the DLP Solutions (Forcepoint, Symantec/Broadcom, McAfee), Data Classification tool, CASB Tool, DAM or Rights Management solution.
  • Minimum 1 Year of experience with Conducting Data Flow Analysis Workshops.
  • Minimum 1 Year of experience with Conducting Data Classification Workshops.
  • Hands on with any of the Data Classification Tool
  • Proven expertise of Security Operations in Professional Security Services domains.
  • Ability to resolve issues pertaining to security solutions implemented at client locations.

PREFERRED SKILLS :

  • Knowledge of Networking Fundamental Concepts – CCNA / CCNP Preferred
  • Knowledge of Data Loss Prevention as a subject
  • Hands on with any one of DLP Technologies (Forcepoint, McAfee, Symantec/Broadcom)
  • Hands on with any of the Data Classification Tools.
  • Knowledge of Detection techniques, Policy creation, Incident analysis and Reports generation
  • Ability to identify false positives and carry out fine tuning to reduce them gradually
  • Ability to successfully identify challenge areas suspected to cause data leaks and address them before hand
  • Demonstrate critical thinking and problem-solving skills
  • Excellent communication skills, both written and verbal
  • Ability to work and influence successfully within a matrix driven environment and build effective business partnerships with all levels of team members
    CYBER ARK CONSULTANT

    • How we’ll help you grow:

      • You’ll have access to all the technical and management training courses to grow your expertise.
      • You’ll learn directly from experts in the field; our team leads love to mentor.
      • You have the opportunity to work in many different areas to determine what really excites you.
    • Role and Responsibilities
      • Define and Deploy a technical Solution for the Implementation and operations of IAM solution.
      • To streamline Management of ALL Privilege account across the organization on Multiple devices.
      • The solution is focused on the delivery of various Phases of Cyber-Ark Implementation:
      • Primary Responsibilities include deploying, supporting, maintaining, troubleshooting and monitoring the Production environments which are clustered Cyber-Ark Security Solution and maintaining the Compliance Level.
      • Technical Requirement Gathering
      • Installation and Configuration of Cyber –Ark Vault and Vault Client
      • Installation and Configuration of Cold and active Central Password Manager
      • Installation and Configuration of Network load balanced Cyber Ark Password Vault web access.
      • Installation and configuration of Clustered Cyber Ark Privilege session manager
      • Configuration and Multiple Privilege accounts across the organization
      • Configuration and Administration of Cyber Ark
      • Integration of Window accounts, Unix accounts
      • Integration of Database, Network and security device.
      • Create Password policies
      • Implementation of web policies, password policies
      • Password Management of Privilege accounts
      • Reconciliation, Password Synchronization, service definition for Target System, Workflows
      • Integration of Various target System privilege account Integration
      • Installation of DR sites
    • Qualifications and Education Requirements

      Any Graduate/Post Graduate with IT /EXTC /Computer Science Background

      Relevant Cyber Ark Certifications/ Trainings /Experience

    SECURITY CONSULTANT - SOC/SIEM

    • How we’ll help you grow:

      • You’ll have access to all the technical and management training courses to grow your expertise.
      • You’ll learn directly from experts in the field; our team leads love to mentor.
      • You have the opportunity to work in many different areas to determine what really excites you.
    • Role and Responsibilities
      • Create, modify and tune the SIEM rules to adjust the specifications of alerts and incidents.
      • Work with the customer designated personnel to provide continual correlation rule tuning, incident classification and prioritization recommendations.
      • Report query adjustments, and various other SIEM configuration activities.
      • Assist customers to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources.
      • Work closely with the assigned Managed Services SIEM resources to ensure client’s customized solution is functioning optimally and continuously tuned to the client’s needs.
      • Collaborate with a variety of customers in a polite, positive and professional manner.
      • Resolve problems related to Network, Device, Policy, connectivity issues etc.
      • Monitoring and processing various sources to produce actionable intelligence for multiple consumers
      • Identify new opportunities/threats in the network to improve the security of the network
      • Continuously evaluating existing sources for value and supporting decision-making related to the future use of those sources
      • Mentoring and developing less experienced team members
      • Supporting the creation and implementation of new processes as appropriate
      • Staying current on cyber security best practices, news, issues, vulnerabilities and threats (specifically as they apply to the financial industries)
      • Supporting relationships with partner teams
      • Fulfilling routine and ad-hoc reporting requests
      • Monitoring project delivery success metric and work with teams to take corrective actions
      • Team adherence to Key Performance (KPIs) Indicators
      • Act as a subject matter expert and liaison to business, to introduce, implement and ensure client and business objectives are continually met
      • Monitor and administer enterprise log correlation (SIEM)
      • Select, design, implement and manage security measures to reduce the risk of loss
      • Evaluate and develop approach to solutions
      • Perform analysis of suspicious URLs, emails, network anomalies, and binaries
      • Identify current attacks using internal tools or task intelligence sources to provide in-depth analysis of any current or prior attacker activity to support groups
      • Analyzes and investigates
      • Provides explanations and interpretations within area of expertise
    •  Qualifications and Education Requirements
      • Undergraduate degree or equivalent experience
      • Minimum 5 Yrs. of total experience with 3+ years of relevant experience in any product in SIEM (Arcsight, Qradar, LogRhythm, Splunk ES, McAfee, SolarWinds, DNIF, etc.)
      • Proven expertise of Security Operations (L1/ L2/ L3) in Infrastructure Security Services domains.
      • Ability to resolve issues pertaining to security solutions implemented at client locations.
    • Preferred Skills
      • Basic knowledge about Risk, Incident and Change Management.
      • Basic knowledge and understanding about OWASP Top Ten
      • Experience with SIEM tools and technologies, such as ArcSight, LogRhythm, Mcafee ESM, IBM Qradar and/or similar tools
      • Experience using intelligence analysis tools
      • Knowledge of data correlation techniques
      • Knowledge of processes, procedures, and methods to research, analyze, and disseminate open source intelligence information
      • Demonstrated critical thinking and problem solving skills
      • Proven communication skills, both written and verbal, to both business and technology audiences
      • Ability to work and influence successfully within a matrix driven environment and build effective business partnerships with all levels of team members
      SUBJECT MATTER EXPERT - PERIMETER SECURITY & THREAT DEFENSE

      • How we’ll help you grow:

        • You’ll have access to all the technical and management training courses to grow your expertise.
        • You’ll learn directly from experts in the field; our team leads love to mentor.
        • You have the opportunity to work in many different areas to determine what really excites you.
      • Role and Responsibilities

        To perform as a point of escalation and drive various implementation and operations projects assisting on-ground team with the following solutions: Firewall, Web Gateway, Cloud Security, WAF, NIPS etc.

        • Assist in Presales workshops with clients.
        • Conduct POCs of various Perimeter Defense Solutions for clients as part of Presales.
        • Work with clients and stakeholders to conduct information gathering workshops.
        • Design the Perimeter Defense solution as per best practices for client.
        • Document architecture considerations, prerequisites and implementation approach.
        • Install the Perimeter Defense Solutions in the environment as per agreed architecture.
        • Deploy Baseline configurations and Policies best suited to the environment.
        • Perform Security Baseline Configurations on the solution.
        • Review implementations or deployment as per best practices.
        • Assist in Fine-tuning of Security Policies.
        • Assist in building a general best practice SOP and As-built for the implementation.
        • Assist team in consulting best practice process around the solution.
        • Conduct Knowledge Transfer Workshops with all stakeholders.
        • Conduct trainings for team members.
      • Qualifications and Education Requirements
        • .BE EXTC, BE CMPN, BSc. IT.
        • (Mandatory) Any Networking Certification Course: CCNA R&S, CCNP R&S, CompTia Network+
        • (Optional) Any Security Certification Course: CEH, CCNA Security, CompTia Security+
        • (Mandatory) Any Vendor Based Certification Courses.

        Preferred Skills

        • 2 to 3 years’ hands-on experience on either of the Perimeter Defense Solutions: Firewall, Proxy, WAF, Load Balancer.
        • Good analytical skills.
        • Good and clear communication.
        • Familiar with Office Tools.
        • Proper documentation skills.