Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information.
Responsibilities
- Ensuring customer centricity by providing appropriate cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitoring for attacks, intrusions and unusual, unauthorized or illegal activity
- Performing moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conducting security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24×7 rotational shifts
- Using advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks related to this engagement
- Analyzing all attacks and developing remedial attack analysis
- Conducting detailed analysis of incidents and creating reports and dashboards
- Stakeholder coordination & audit assistance
- Liaising with stakeholders on cyber security issues and providing future recommendations
- Maintaining an information security risk register and assisting with internal and external audits related to information security
- Assisting with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Providing advice and guidance to employees on issues such as spam and unwanted or malicious emails
Deliverables / Performance Parameters
Performance Parameter
1. Customer centricity: Timely security breach solutioning to end users, internal stakeholders & external customers experience.
2. Process Adherence: Adherence to SLA’s (90‑95%), response time and resolution time TAT.
Mandatory Skills
Cloud Security Posture Management.
#J-18808-Ljbffr”, “datePosted”: “2026-05-17”, “hiringOrganization”: { “@type”: “Organization”, “name”: “Wipro”, “sameAs”: “https://uk.whatjobs.com/pub_api__cpl__434436113__4861?utm_campaign=publisher&utm_medium=api&utm_source=4861&geoID=33” }, “jobLocation”: { “@type”: “Place”, “address”: { “@type”: “PostalAddress”, “addressLocality”: “London” } } }Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information.
Responsibilities
- Ensuring customer centricity by providing appropriate cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitoring for attacks, intrusions and unusual, unauthorized or illegal activity
- Performing moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conducting security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24×7 rotational shifts
- Using advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks related to this engagement
- Analyzing all attacks and developing remedial attack analysis
- Conducting detailed analysis of incidents and creating reports and dashboards
- Stakeholder coordination & audit assistance
- Liaising with stakeholders on cyber security issues and providing future recommendations
- Maintaining an information security risk register and assisting with internal and external audits related to information security
- Assisting with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Providing advice and guidance to employees on issues such as spam and unwanted or malicious emails
Deliverables / Performance Parameters
Performance Parameter
1. Customer centricity: Timely security breach solutioning to end users, internal stakeholders & external customers experience.
2. Process Adherence: Adherence to SLA’s (90‑95%), response time and resolution time TAT.
Mandatory Skills
Cloud Security Posture Management.
#J-18808-Ljbffr…
