Network Security Consultant
Description of the role:
The Network Security Consultant will be responsible for implementing network and information security policies across the organization. The role holder will also assess IT- and network-related threats within and outside the organization and enforce necessary corrective actions and preventive measures.
- Implement back up and recovery procedures, and enforce security and integrity controls.
- Facilitate proof of concept (POC) and other business-related information security and compliance testing for applications and systems.
- Manage and maintain the firewalls and firewall clusters across geographies.
- Set up and deploy new firewall infrastructure, manage firewall capacity, and optimize firewall rules.
- Provide technical support on all internal/perimeter security aspects of firewall operations (e.g., VPNs, IDS/IPS, DLP, Web Filtering, Radius), and escalate security issues to vendors.
- Ensure disk- and file-level service and system encryption execution through support teams
- Work with business units to ensure data is classified correctly and implement gateway and endpoint DLP frameworks and continuous monitoring mechanisms.
- Assess, test, and select new security products and technologies, prepare cost estimates, and identify integration issues.
- Provide 24×7 on-call support and execute maintenance activities for both planned and unplanned activities to minimize disruption to the business.
- Test information security systems, firewalls, and upgrades, such as debugging, tracking, reproduction, logging, and resolving all identified problems, according to approved quality testing scripts, procedures, and processes.
- Troubleshoot and provide service support in diagnosing, resolving and fixing system, application, infrastructure, hardware, and software malfunctions.
- Establish and oversee formal risk analysis and self-assessment program for various information services systems and processes.
- Identify, investigate, and resolve security breaches through forensic analysis. Conduct physical examinations of property to ensure compliance with security policies and regulations.
- Conduct training programs to improve the security awareness of business users to minimize breaches and carry out security drills to identify the effectiveness of the awareness sessions and take corrective actions to fix the identified gaps.
- Coordinate with other teams to define security best practices and conduct regular audits to identify if they are adhering to the same.
- Be up to date with new threats and attacks and take actions to mitigate them.
- Collaborate with security consultants, organizations, vendors, suppliers, service providers, and external resources to analyze, recommend, install, and maintain infrastructure, systems, and software security applications.
- Work with cross-functional teams to evaluate risks, and recommend remediation solutions for identified vulnerabilities and track remediation.
- Develop knowledge and stay updated on Security monitoring tools and processes, and design and maintain technical security controls.
- Implement, maintain and administer information security documentation, guidelines, policies and procedures, instructions, recording and detailing operational procedures and system logs
Bachelor’s degree in computer science, information technology, engineering, or a related field with relevant certifications such as Cisco CCIE Security, CCNP Security, CISA (Certified Information Systems Auditor), CISSP(Certified Information Systems and Security Professional), or CISM(Certified Information Security Manager)
5 to 6 years of relevant experience in the design and maintenance of information security programs
From insights to thought-leadershipView More
Boost Infor CloudSuite’s order capturing efficiency with Fortude Customer Order Manager
From placing a customer order to delivering goods, having robust COM processes ensure a strong bottom line, positive impact to the cash flow, and increased customer satisfaction. Customer order placement—the head of the COM process—is a critical step. At this point, the customer service representatives should have the visibility to information such as inventory availability and the agility to complete order placements fast. Inability to ensure information accuracy at this level can cause issues when allocating, picking, and shipping goods. This blog post explains the means through which Fortude Customer Order Manager can streamline the customer order management in your Infor M3 or CloudSuite ERP solutions.
Crossing Boundaries: Journeying from Diversity to Inclusion
According to McKinsey’s May 2020 report, “Diversity Wins,” or in other words, “D&I is a powerful enabler of business performance. Companies whose leaders welcome diverse talent and include multiple perspectives are likely to emerge from the crisis stronger. In short: diversity wins, now more than ever.” Here at Fortude, we continue to make diversity part of our DNA. The mistake that is commonly made across several industries is that organizations leave it up to HR to foster inclusive environments. D&I is not an HR strategy; it’s a strategy that includes everyone – so, in order to be successful, we have to be successful together.
Extend Infor M3/CloudSuite’s EDI capabilities with Fortude EDI
Can your electronic document interchange (EDI) solution do more than just exchanging information? Fortude’s EDI Framework provides interfaces to hold, review, revise, and consolidate EDI transactions before posting them to Infor M3 and CloudSuite.
Bringing information closer to business users with Infor Ming.le
Infor Ming.le is an action-oriented social collaboration platform designed for business organizations. Simply put, Ming.le’s interface will remind you that of the popular social media platform Facebook, except Ming.le serves a unique purpose: bringing information from disparate systems closer to business users, helping them work smarter and faster.
Manage your business documents seamlessly with Infor Document Management (IDM)
Businesses often struggle to keep track and manage high volumes of physical and digital documents that are being created within an ERP system. Most businesses manage these documents manually, separately from the ERP process and business transaction. With this kind of a disjointed process, documents get saved in different systems and users have to switch between applications or spend time manually searching for documents.