With more than 180,000 people in over
40 countries, Capgemini is a global leader in consulting, technology and
outsourcing services. The Group reported 2015 global revenues of EUR 11.9
billion. Together with its clients, Capgemini creates and delivers business,
technology and digital solutions that fit their needs, enabling them to achieve
innovation and competitiveness. A deeply multicultural organization, Capgemini
has developed its own way of working, the Collaborative Business Experience™,
and draws on Rightshore®, its worldwide delivery model.

Learn more about us atwww.capgemini.com.

Rightshore® is a trademark belonging to

Capgemini is an Equal Opportunity
Employer encouraging diversity in the workplace. All qualified applicants will
receive consideration for employment without regard to race, national origin,
gender identity/expression, age, religion, disability, sexual orientation,
genetics, veteran status, marital status or any other characteristic protected
by law.

This is a general description of the
Duties, Responsibilities and Qualifications required for this position.
Physical, mental, sensory or environmental demands may be referenced in an
attempt to communicate the manner in which this position traditionally is
performed. Whenever necessary to provide individuals with disabilities an equal
employment opportunity, Capgemini will consider reasonable accommodations that
might involve varying job requirements and/or changing the way this job is
performed, provided that such accommodations do not pose an undue hardship.

Click the following link for more
information on your rights as an Applicant:http://www.capgemini.com/resources/equal-employment-opportunity-is-the-law

Work Location: New York City, NY

and responding to events detected in the SIEM system Experience of
developing appropriate responses to security events Experience
working and writing log-correlation facilities under varied operating platforms.
incidents in a timely manner, working towards the root cause whenever possible Escalating
issues to the higher authority when appropriate Working with
team members to support security incident investigation process Responsible
for troubleshooting agent software issues. Perform
analysis of log files. Includes forensic analysis of system resource access. Knowledge of
firewalls and intrusion detection systems Understanding
of common network services (web, mail, FTP, etc), network vulnerabilities and
their payloads. Detail
understanding of endpoint security Symantec SEPM at enterprise level. Complete
E2E support and manage of Antivirus, HIPS, Host firewall, device and
application controls. Detail
understanding of endpoint security for servers TrendMicro Deep Security at
enterprise level. Complete E2E support and manage of Antivirus, HIPS, Host
firewall, device and application controls Knowledge of
modern Virus and Trojan infiltration methods and defences Knowledge of
Dell endpoint encryption, complete E2E support and manage endpoint encryption
and troubleshooting of preboot authentication issues. Knowledge and
operational experience on antispam and Websecurity content filtering solutions
SaaS model Should
possess excellent analytical and troubleshooting skills during virus outbreak
situations. Detail
understanding of Risk Assessment and VA/PT testing’s. Experience with security
assessment tools (Qualys Gaurd). Strong
understanding of security operations concepts: perimeter defense, data loss
protection, insider threat, kill chain analysis, risk assessment, and security
metrics. Ability to
read & understand network level traces of Windows, Linux, and other
operating systems at packet level Deep
technical understanding of modern operating systems and technologies Knowledge of
security standards, frameworks and
compliance regulations Strong IT and
analytical skills and proactive rather than reactive Team player
with good interpersonal skills and ability to work in strict timelines Good
communication skills, both orally and in writing. Willing to challenge and
desire to learn.

Apply now