Sunteți pe pagina 1din 3

Shantanu Pathak Dr. A. P. J.

Abdul Kalam Technical University


Assistant Registrar Uttar Pradesh, Lucknow
Nodal Officer-Training & Placement Sector-11, Jankipuram Extension, Lucknow
E-mail: arsp@aktu.ac.in

Ref: AKTU/UIIC/2019/058 11th Nov’ 2019

To
Directors/Principals
Colleges affiliated/associated to Dr. APJ Abdul Kalam Technical University
Lucknow, Uttar Pradesh

Subject: Regarding Company Ameriprise Financial Campus Hiring Opportunity for B.Tech, M.Tech & MCA
Students of 2020 passing out batch

Dear Sir/Ma’am
Please to inform you that as part of Campus Hiring process for B.Tech, M.Tech & MCA Students of 2020
passing out batch, Company Ameriprise Financial wish to invite all AMCAT assessed students of AKTU
affiliated colleges for this drive.
Please find invitation and link for the participation of students as per the details attached herewith
(Annexure 1). You are requested to kindly go through and encourage the students for registration latest by
12-Dec-2019

Registration Link:https://www.myamcat.com/jobs/description/graduate-intern-job-for-fresher-in-
ameriprise-financial-in-gurgaon/65316

If you have any concern, please feel free to write at tnp.aktu@aktu.ac.in

With warm regards

(Shantanu Pathak)

Nodal Officer- Training & Placement

Copy to:
1. Registrar, AKTU Lucknow
2. Finance Officer, AKTU Lucknow
3. Controller of Examination, AKTU Lucknow
4. Dean Student Welfare, AKTU Lucknow
5. Media Prabhari, AKTU Lucknow
6. Technical Officer, AKTU Lucknow
7. Pro VC, AKTU, Lucknow
8. Staff Officer, Hon’ble Vice Chancellor for kind information

(Shantanu Pathak)
(Annexure 1)
Profile Name: 1. Graduate Intern SOC
2. Graduate Intern Active Directory Cyber Ark
Salary: Stipend of Rs. 25000 per month will be paid along with both sides free cabs and subsidized
meals (This role is an internship of 6 months, post 6 months internship will be converted to full time
employment on the basis of performance with increase in pay scale)

Profile 1: Graduate Intern SOC

Job Responsibilities:
• Monitor and analyze security events that occur on the network or endpoint.
• Review and analyze correlated events, scheduled reports and trends on a periodic basis.
• Identify and filter out false positives.
• Carry out first level incident investigations and support the Investigations teams during escalated
incidents by following defined processes and procedures.
• Actively investigate the latest in security vulnerabilities, advisories, incidents, and attack
techniques, collate threat information from external/internal sources and report relevant
information to the next level analyst.
• Operate the SIEM tool, fine tune and develop new content including dashboards, reports, trends,
views based on the intelligence gathered.
• Perform the activities identified in the daily check list, document the findings and participate in the
shift handover calls.
• Tool aided case management and reporting.
• Perform health checks of security tools, devices and event feeds.
• Publish daily, weekly and monthly reports to applicable teams.
• Detect security policy violations and issue advisories to the violators.
Required Qualifications:
• B.Tech/M.Tech/MCA (0-1 Yrs of experience)
• Solid and demonstrable comprehension of Information Security concepts including malware,
emerging threats, attacks, and vulnerability management
• Experience in reviewing raw log files and ability to review and analyze network captures
• Experience in analyzing IDS, Firewall, Access control, Endpoint security and application events.
• Good understanding of TCP/IP and networking concepts.

Profile 2: Graduate Intern Active Directory CyberArk

Job Description
The IAM Engineer is responsible for effectively planning, designing, implementing and monitoring
security technologies and projects that support the firms' underlying security policies and
procedures. The position will utilize highly technical skills to ensure that security policies, standards
and best practices are followed throughout the technology organization-including where vendors
are utilized to provide services.
Responsibilities
Risk/Vulnerability Assessment
• Design, oversee and/or perform comprehensive risk/vulnerability systems assessments to identify
vulnerabilities, including providing reporting on assessment results as well as risk mitigation and
remediation recommendations and plans.
• Keep current with emerging security trends, issues and alerts.
• Communicate known security risks and solutions to mitigate risks to business and technology
partners as needed.
• Manage audits of vendor security processes, procedures and compliance controls.
Testing Strategy & Execution
• Serve as a security expert on application development, database design, network and/or platform
(operating system) projects, helping project teams comply with enterprise and Technology security
policies, industry regulations and best practices.
• Through a deep understanding of the business requirements, identify the appropriate security
requirements for each project.
• Design, develop and lead the testing approach and execution plan to ensure that new and existing
solutions meet security requirements.
Design
• Analyze application security needs based on the sensitivity or proprietary nature of the data and
work with the appropriate teams to develop and execute new or existing security technologies or
processes to support the business strategy.
• Participate in network architecture reviews and develop detailed security engineering design and
deployment plans.
• Design, test, implement, maintain and support current and future information security
technologies, processes and procedures.
Security Controls
• Responsible for the configuration of security controls to ensure the safety of information systems
assets and to protect from unauthorized access or intentional destruction.
• Develop, implement, maintain and oversee the enforcement of all technology information security
policies, procedures and associated plans based on industry standards, best practices and legal
compliance requirements.
• Implement changes to existing security policies and control standards to stay current with the
threat landscape.
Configuration
• Assist and/or lead projects related to information security regulatory compliance and the
implementation and maintenance of all information security programs, processes and technologies.
• Assess and document the need for all security configurations or re-configurations and work with
appropriate teams to execute them as required.
• Research, design and advocate new security technologies, architectures and security products that
will support the security requirements of the firm.
Event Management
• Assume the subject matter expert (SME) role in the management, investigation and response to
suspected and actual information security breaches or system failures.
• Using data collected from a variety of tools, provide forensic analysis of security events.
• Analyze security incidents to determine root cause and identify process or system changes to
prevent reoccurrence.
• Recommend and schedule fixes, security patches, disaster recovery procedures and other required
measures in the event of a security breach.

Tentative Date of Joining: December End 2019


Job Location: Gurgaon

S-ar putea să vă placă și