Associate Mainframe Security Engineer
Pune, India JR012560Job Summary
An Associate Mainframe Systems Security Engineer assists in monitoring and analyzing system logs, developing and maintaining security policies, and participating in regular security assessments and audits.
Duties & Responsibilities
- Monitor and analyze system logs to identify security threats and vulnerabilities.
- Assist in the development and maintenance of security policies and procedures.
- Participate in regular security assessments and audits.
- Collaborate with other IT teams to ensure the security of the overall IT infrastructure.
Job Requirements & Qualifications
- Requires a Bachelor’s degree and 2 years of experience
- Identifies the objectives and scope of SIEM products and services. Describes the processes and procedures of SIEM. Illustrates the key features and benefits of SIEM. Describes the working principles of SIEM applications.
- Describes major components, add-ons and sub-systems. Documents the basic concepts and activities involved in maintaining the operating system environment. Explains the purpose of job control language and utilities. Identifies key functions performed by systems programming staff.
- Discusses the inter-relationship between software, hardware and telecommunications. Lists major software components and problems with the current software environment. Describes architectural principles, blueprints and standards. Identifies key aspects of the organization’s software infrastructure.
- Highlights the characteristics of excellent and poorly composed documentation. Describes basic writing standards and procedures of technical writing. Identifies available delivery alternatives (e.g. paper, on-line) in the local environment. Explains the basic concepts behind effective technical documentation.
- Describes basic information security concepts using relevant language. Identifies other or related products that offer similar functionality. Describes basic ESM functions, features and capabilities. Tells others where and how to find answers to implementation/maintenance related questions.
- Describes basic concepts of JCL using relevant language. Reads sequences of JCL statements and explains what they do. Indicates what JCL syntax, coding rules and conventions are. Explains the purpose and use of JOB, EXEC, and DD statements.
- Explains major benefits and the advantages of using REXX for application development. Describes the facilities of the REXX library. Describes major functions, features and capabilities of REXX. Identifies sources for REXX literature, reference materials and tutorials.
- Tells others where and how to find answers to questions on uses of TSO/ISPF. Describes basic TSO/ISPF concepts using relevant language. Describes major TSO/ISPF functions, features and capabilities. Identifies various in-house applications that can and cannot be accessed via TSO/ISPF.
- Describes key components of identity and access control and management. Lists major tasks performed by security administration function. Reviews record-keeping and reporting requirements. Cites examples of common access problems, breaches and associated resolutions.
Social Share
More career opportunities at Ensono
Explore additional openings with our team, and apply today.
Pune, India | JR011565
Director – Transformation -(JR011565)
Chennai, India | JR012373
Director, Mainframe Optimization
Poland | JR012406