IT Security Manager

13 Minutes ago • 11 Years +
Cyber Security

Job Description

Wolters Kluwer Global Business Services (GBS) is seeking an IT Security Manager (Incident Management) to lead the monitoring and response to emerging security incidents. This role is crucial for protecting the confidentiality, integrity, and availability of Wolters Kluwer assets. The manager will conduct thorough investigations, ensure effective containment and remediation, and interface with internal business units and stakeholders. Proficiency in incident analysis, data gathering, and information synthesis is essential for this position, which focuses on driving robust cyber defense and response strategies.
Good To Have:
  • Basic programming and scripting knowledge.
  • Prior 24x7x365 operations environment experience.
  • Security assessments of external providers.
  • Experience with GDPR compliance.
  • Knowledge of ISO 27001, NIST 800-53, NIST CSF, PCI DSS.
  • Preferred certifications: CISSP, ITIL, GCIH, CERT/CC CSIH, GCTI, GCFR, GCFA, GIME, GCFE.
  • Multiple language capability.
Must Have:
  • Lead security incident response and recovery.
  • Perform cybersecurity incident triage.
  • Conduct OSINT investigations.
  • Participate in red team/blue team exercises.
  • Perform forensically sound ESI collections.
  • Analyze systems, logs, and malware data.
  • Drive mature cyber defense and response.
  • Investigate security breaches; develop procedures.
  • Document all incident response activities.
  • Ensure compliance with WK enterprise policies.
  • Bachelor's in Computer Science/MIS or equivalent.
  • 11+ years IT experience.
  • 7+ years information security experience.
  • 3+ years incident handling experience.
  • Strong network protocols and security technologies understanding.
  • Experience with OSINT tools and techniques.
  • Experience with cloud and physical forensics.
  • Knowledge of red team/blue team exercises.
  • Understanding of incident response frameworks.
  • Experience with SIEM and SOAR platforms.
  • Expertise with digital forensic toolsets.
  • Knowledge of basic security principles.
  • Understanding of security vulnerabilities.
  • Familiarity with Internet, network protocols.
  • Knowledge of network and host security issues.
  • Understanding of malicious code and threats.
  • Experience with Risk Analysis and Management.
  • Familiar with ITIL service management.
Perks:
  • Flexible working hours.
  • Comprehensive well-being benefits and programs.

Add these skills to join the top 1% applicants for this job

team-management
cross-functional
communication
risk-management
game-texts
incident-response
threat-intelligence
splunk

Wolters Kluwer Global Business Services (GBS) is designed to provide services to the business units in the areas of technology, sourcing, procurement, legal, finance, and human resources. These global centers promote team collaboration using best practices around a specific focus area to drive results and enhance operational efficiencies. There is a constant endeavor to benchmark against best-in-class industry standards to improve the quality of deliverables, increase cost savings, enhance productivity, and reduce time to market for products and applications.

We have an amazing opportunity for an IT Security Manager (Incident Management), available within our Global Business Services division!

This position has been created due to growth! The IT Security Analyst (Incident Management) will be responsible for monitoring and response to all emerging security incidents to protect and enhance the confidentiality, integrity, and availability of assets.

This position is in person in either Pune or Chennai offices.

As the IT Security Manager (Incident Management), you will lead information gathering efforts during investigation into suspected and confirmed security incidents to protect personal and confidential information at WK. In this role, you will be required to demonstrate proficiency in incident analysis, data gathering and information synthesis in every area of IT security management. Your role will also include interfacing with and responding to internal business unit IT representatives and stakeholders at all levels during emerging security incidents, real or simulated.

Responsibilities:

  • Primarily responsible for the response to and recovery from emerging information security incidents, acting as the focal point leading response efforts and ensuring effective action to contain and remediate the situation
  • Respond to cybersecurity incidents and perform triage to assess the severity of the incident and determine the appropriate response.
  • Conduct open-source intelligence (OSINT) investigations to identify and track down malicious actors and their tactics, techniques, and procedures (TTPs).
  • Participate in red team/blue team exercises to test and improve the organization's incident response capabilities.
  • Collaborate with other members of the cybersecurity team to develop and implement security controls and incident response procedures.
  • Provide technical guidance and support to junior incident responders as needed.
  • Maintain up-to-date knowledge of the latest security threats and trends through continuous learning and professional development.
  • Perform forensically sound collections of ESI from laptops, desktops, mobile devices, hard drives, servers and cloud data sources both onsite and remotely.
  • Verify, extract and analyze systems, logs and malware data in support of investigations and litigation systems
  • Drive efficient, repeatable, proactive, integrated, and mature cyber defense and response
  • Supports the investigation of reported security breaches and, in coordination with WK global security operations, develop procedures to respond to security incidents and assist with investigations
  • Contributes to the analysis and delivery of findings to internal customers with impactful, comparative, interpretative security analysis in a clear, consistent, and factual manner.
  • Responsible for establishing communications bridges and meetings in support of response efforts
  • Responsible for maintaining proper group focus during investigation activities and redirecting efforts in support of timely recovery
  • Responsible for aggregating information relevant to the situation and synthesizing probable root cause
  • Responsible for developing and recommending best course of action based on solid security principles
  • Driving the incident response process from detection through containment and eradication.
  • Accountable for documenting all WK and partner activity, taken in response to emerging situations
  • Accountable for the day-to-day review and assessment of security events that may become or contribute to security incidents.
  • Ensures work is compliant with WK enterprise policies, procedures and the local business plan
  • Responsible for ensuring appropriate post-mortem and lessons-learned sessions are conducted, following incident restoration of service
  • Responsible for organizing and taking part in cross-functional incident exercise activities, ensuring that policy and procedure are followed
  • Responsible for ensuring knowledge of IT security and emerging threat scenarios is current
  • Responsible for reviewing threat intelligence sources is support of WK security situational awareness
  • Responsible for assisting in the development of vulnerability and threat related communications for potential dissemination to warn WK employees of an emerging situation
  • Responsible for ensuring information arising from incident response activities, that would result in configuration changes or other modifications to ensure WK security posture, is communicated to the proper operational contacts for execution.

Other Duties:

  • Performs other duties as assigned by supervisor

Job Qualifications:

Bachelor's Degree in Computer Science/MIS or equivalent experience

  • 11+ years of total experience in Information Technology
  • 7+ years of professional experience in an information security function, including analyzing and applying information security risk management, and privacy practices
  • 3+ years in an information security incident handling role
  • Strong understanding of network protocols and security technologies, including firewalls, intrusion detection systems, and encryption.
  • Experience with open-source intelligence (OSINT) tools and techniques.
  • Experience with cloud and physical forensic investigations, delivering executive reports
  • Knowledge of red team/blue team exercises and experience participating in such exercises.
  • Technical understanding of incident response frameworks and methodologies with a focus on automation.
  • Experience with Intel, SIEM, and SOAR platforms, such as, ThreatConnect/MISP, Snowflake/ Splunk, and Swimlane/DeMisto
  • Expertise with commercial and open-source digital forensic toolsets such as Encase, AccessData, SIFT, Axiom Flexible working hours to support a global operation
  • Required Interpersonal Skills
  • Experience engaging with executive level individuals during the conduct of incident response
  • Excellent oral and written communication ability
  • Ability to present complex technical issues and findings to diverse audiences in both technical and non-technical parlance, both orally and in writing
  • Diplomacy in working with customers and stakeholders
  • Ability to follow policy and procedure
  • Ability to work in a team and at times perform under stress
  • Demonstrate integrity in dealing with potentially sensitive data and restricted information
  • Exceptionally self-motivated with a superior analytical, evaluative, and problem-solving abilities
  • Ability to set and manage priorities judiciously
  • Required Technical Skills
  • Knowledge of basic security principles to include confidentiality, integrity, and availability; access control, authentication, and authorization; privacy and non-repudiation
  • Understanding of security vulnerabilities and exposures, and from where they arise
  • Familiarity with the Internet, its network protocols, and network applications and services
  • Knowledge of network security issues and host/system security issues
  • Understanding of malicious code of various types and various threat vectors
  • Experience with Risk Analysis and Risk Management
  • Basic understanding of programming and scripting, advanced knowledge a plus
  • Required Incident Handling Skills
  • Through good communication and documentation, presents a consistent front to customers and stakeholders
  • Ability to synthesize data from technical skills listed above to understand and identify intruder techniques
  • Ability to utilize interpersonal skills listed above to communicate with customers and stakeholders and bring quick resolution
  • Demonstrated ability to analyze ongoing situations for the potential of a security incident
  • Ability to maintain incident records in support of WK recovery, regulatory and legal requirements
  • Familiar with ITIL service management methodology.
  • Prior experience in a 24x7x365 operations environment.
  • Strong technical skills in security assessments of external service providers, providing security guidance, and participating in mock security breach exercises
  • Experience with GDPR and GDPR compliance implementations
  • Experience and/or SME knowledge of the ISO 27001, NIST 800-53, NIST CSF and PCI DSS.
  • Preferred certifications: CISSP, ITIL, GCIH, CERT/CC CSIH, GCTI, GCFR, GCFA, GIME, GCFE
  • Multiple language capability desired

Set alerts for more jobs like IT Security Manager
Set alerts for new jobs by Wolters Kluwer
Set alerts for new Cyber Security jobs in India
Set alerts for new jobs in India
Set alerts for Cyber Security (Remote) jobs

Contact Us
hello@outscal.com
Made in INDIA 💛💙