Cybersecurity Engineer Mumbai

Abbott·
India - Mumbai
3w ago
Full-time

Description

<p style="text-align:inherit">&nbsp; &nbsp; &nbsp;</p><h2><b>JOB DESCRIPTION:</b></h2><div><p><b><u><span>MAIN PURPOSE OF ROLE</span></u><span> </span></b></p></div><div><p><span> </span></p></div><ul><li><p><span><span>Individual</span><span><span> </span></span><span>contributor</span><span><span> </span></span><span>with</span><span><span> </span></span><span>comprehensive</span><span><span> </span></span><span>knowledge</span><span><span> </span></span><span>in</span><span><span> </span></span><span>the</span><span><span> </span></span><span>specific</span><span><span> </span></span><span>area</span><span>.</span></span><span> </span></p></li><li><p><span><span>Ability</span><span><span> </span></span><span>to</span><span><span> </span></span><span>execute</span><span><span> </span></span><span>highly</span><span><span> </span></span><span>complex</span><span><span> </span></span><span>or</span><span><span> </span></span><span>specialized</span><span><span> </span></span><span>projects</span><span>.</span></span><span> </span></p></li><li><p><span><span>Adapts</span><span><span> </span></span><span>precedent</span><span><span> </span></span><span>and</span><span><span> </span></span><span>may</span><span><span> </span></span><span>make</span><span><span> </span></span><span>significant</span><span><span> </span></span><span>departures</span><span><span> </span></span><span>from</span><span><span> </span></span><span>traditional</span><span><span> </span></span><span>approaches</span><span><span> </span></span><span>to</span><span><span> </span></span><span>develop</span><span><span> </span></span><span>solutions</span><span>.</span></span><span> </span></p></li><li><p><span><span>Responsible</span><span><span> </span></span><span>for</span><span><span> </span></span><span>developing</span><span>,<span> </span></span><span>communicating</span><span>,<span> </span></span><span>implementing</span><span>,<span> </span></span><span>enforcing</span><span><span> </span></span><span>and</span><span><span> </span></span><span>monitoring</span><span><span> </span></span><span>security</span><span><span> </span></span><span>controls</span><span><span> </span></span><span>to</span><span><span> </span></span><span>protect</span><span><span> </span></span><span>the</span><span><span> </span></span><span>organisation&#39;s</span><span><span> </span></span><span>technology</span><span><span> </span></span><span>assets</span><span><span> </span></span><span>from</span><span><span> </span></span><span>intentional</span><span><span> </span></span><span>or</span><span><span> </span></span><span>inadvertent</span><span><span> </span></span><span>modification</span><span>,<span> </span></span><span>disclosure</span><span><span> </span></span><span>or</span><span><span> </span></span><span>destruction</span><span>.</span></span><span> </span></p></li></ul><div><p><span> </span></p></div><div><p><b><u><span>MAIN RESPONSIBILITIES</span></u><span> </span></b></p></div><div><p><span> </span></p></div><ul><li><p><span><span>Performs</span><span><span> </span></span><span>all</span><span><span> </span></span><span>procedures</span><span><span> </span></span><span>necessary</span><span><span> </span></span><span>to</span><span><span> </span></span><span>ensure</span><span><span> </span></span><span>the</span><span><span> </span></span><span>safety</span><span><span> </span></span><span>of</span><span><span> </span></span><span>information</span><span><span> </span></span><span>systems</span><span><span> </span></span><span>assets</span><span><span> </span></span><span>and</span><span><span> </span></span><span>to</span><span><span> </span></span><span>protect</span><span><span> </span></span><span>systems</span><span><span> </span></span><span>from</span><span><span> </span></span><span>intentional</span><span><span> </span></span><span>or</span><span><span> </span></span><span>inadvertent</span><span><span> </span></span><span>access</span><span><span> </span></span><span>or</span><span><span> </span></span><span>destruction</span><span>.</span></span><span> </span></p></li><li><p><span><span>Ensures</span><span><span> </span></span><span>that</span><span><span> </span></span><span>user</span><span><span> </span></span><span>community</span><span><span> </span></span><span>understands</span><span><span> </span></span><span>and</span><span><span> </span></span><span>adheres</span><span><span> </span></span><span>to</span><span><span> </span></span><span>necessary</span><span><span> </span></span><span>procedures</span><span><span> </span></span><span>to</span><span><span> </span></span><span>maintain</span><span><span> </span></span><span>security</span><span>.</span></span><span> </span></p></li><li><p><span><span>May</span><span><span> </span></span><span>require</span><span><span> </span></span><span>familiarity</span><span><span> </span></span><span>with</span><span><span> </span></span><span>domain</span><span><span> </span></span><span>structures</span><span>,<span> </span></span><span>user</span><span><span> </span></span><span>authentication</span><span>,<span> </span></span><span>and</span><span><span> </span></span><span>digital</span><span><span> </span></span><span>signatures</span><span>.</span></span><span> </span></p></li><li><p><span><span>Conducts</span><span><span> </span></span><span>accurate</span><span><span> </span></span><span>evaluation</span><span><span> </span></span><span>of</span><span><span> </span></span><span>the</span><span><span> </span></span><span>level</span><span><span> </span></span><span>of</span><span><span> </span></span><span>security</span><span><span> </span></span><span>required</span><span>.</span></span><span> </span></p></li><li><p><span><span>Requires</span><span><span> </span>an<span> </span></span><span>understanding</span><span><span> </span></span><span>of</span><span><span> </span></span><span>firewall</span><span><span> </span></span><span>theory</span><span><span> </span></span><span>and</span><span><span> </span></span><span>configuration</span><span>.</span></span><span> </span></p></li><li><p><span><span>Has</span><span><span> </span></span><span>in-depth</span><span><span> </span></span><span>knowledge</span><span><span> </span></span><span>of</span><span><span> </span></span><span>intrusion</span><span><span> </span></span><span>detection</span><span><span> </span></span><span>and</span><span><span> </span>Internet<span> </span></span><span>architecture</span><span>.</span></span><span> </span></p></li><li><p><span><span>Must</span><span><span> </span></span><span>be</span><span><span> </span></span><span>able</span><span><span> </span></span><span>to</span><span><span> </span></span><span>weigh</span><span><span> </span></span><span>business</span><span><span> </span></span><span>needs</span><span><span> </span></span><span>against</span><span><span> </span></span><span>security</span><span><span> </span></span><span>concerns</span><span><span> </span></span><span>and</span><span><span> </span></span><span>articulate</span><span><span> </span></span><span>issues</span><span><span> </span></span><span>to</span><span><span> </span></span><span>management</span><span>.</span></span><span> </span></p></li><li><p><span><span>May</span><span><span> </span></span><span>coach</span><span><span> </span></span><span>or</span><span><span> </span></span><span>provide</span><span><span> </span></span><span>guidance</span><span><span> </span></span><span>to</span><span><span> </span></span><span>lower-level</span><span><span> </span></span><span>security</span><span><span> </span></span><span>professionals</span><span>.</span></span><span> </span></p></li></ul><div><p><span> </span></p></div><div><p><b><u><span>QUALIFICATIONS</span></u><span> </span></b></p></div><div><p><b><span>Education</span></b><span> </span></p></div><ul><li><p><span><span>Associates Degree (± 13 years)</span></span><span> </span></p></li></ul><div><p><span> </span></p></div><div><p><b><span>Experience/Background</span></b><span> </span></p></div><ul><li><p><span><span>Minimum</span><span> 4 </span><span>years</span></span><span> </span></p></li></ul><p style="text-align:inherit">&nbsp; &nbsp; &nbsp;</p><p><b>The base pay for this position is </b></p>N/A<p style="text-align:left"><span>In specific locations, the pay range may vary from the range posted.</span></p><p style="text-align:inherit">     </p><h2><b>JOB FAMILY:</b></h2>Information Risk &amp; Quality Assurance<p style="text-align:inherit">&nbsp; &nbsp; &nbsp;</p><h2><b>DIVISION:</b></h2>CRM Cardiac Rhythm Management<p style="text-align:inherit">&nbsp; &nbsp; &nbsp; &nbsp;&nbsp;</p><h2><b>LOCATION:</b></h2>India &gt; Mumbai : BKC Building<p style="text-align:inherit">&nbsp; &nbsp; &nbsp;</p><h2><b>ADDITIONAL LOCATIONS:</b></h2><p style="text-align:inherit">&nbsp; &nbsp; &nbsp;</p><h2><b>WORK SHIFT:</b></h2>Standard<p style="text-align:inherit">&nbsp; &nbsp; &nbsp;</p><h2><b>TRAVEL:</b></h2>Not specified<p style="text-align:inherit">&nbsp; &nbsp; &nbsp;</p><h2><b>MEDICAL SURVEILLANCE:</b></h2>Not Applicable<p style="text-align:inherit">&nbsp; &nbsp; &nbsp;</p><h2><b>SIGNIFICANT WORK ACTIVITIES:</b></h2>Continuous sitting for prolonged periods (more than 2 consecutive hours in an 8 hour day)<p style="text-align:inherit">&nbsp; &nbsp; &nbsp;</p><p style="text-align:inherit">     </p><p style="text-align:inherit">     </p>
Abbott

Abbott

BIOTECHNOLOGY

Device Manufacturing

LocationABBOTT PARK, IL
Open Jobs2000
CardiovascularImmunologyNeurologyMetabolic DiseasesOncology
View Company Profile

Pipeline

Home-based Exercise Rehabilitation.N/A
Alinity m HR HPVN/A
Effectiveness and Tolerability of Tarka® in the Treatment of Hypertensive Patients With High Risk ofN/A
CRT with MultiPoint PacingN/A
Aveir VR Leadless Pacemaker SystemN/A