Cyber Security Architect - Phoenix, United States - Wipro Limited

Wipro Limited
Wipro Limited
Verified Company
Phoenix, United States

2 weeks ago

Mark Lane

Posted by:

Mark Lane

beBee recruiter


Description

Overview:

About Wipro
Wipro Limited (


NYSE:
WIT,


BSE:
507685,


NSE:
WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients' most complex digital transformation needs.


We leverage our holistic portfolio of capabilities in consulting, design, engineering, operations, and emerging technologies to help clients realize their boldest ambitions and build future-ready, sustainable businesses.


A company recognized globally for its comprehensive portfolio of services, strong commitment to sustainability and good corporate citizenship, we have over 250,000 dedicated employees serving clients across 66 countries.

We deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world.
-
A PROUD HISTORY OF OVER 75 YEARS:

-
FY22 REVENUE 10.

4 BN USD:

-
WE'RE PRESENT IN 66 COUNTRIES:

-
OVER 1,400 ACTIVE GLOBAL CLIENTS

Position:

IFS Security POC

  • Designing the initial Architecture
  • Create a solution document and visual workflow.
  • Develop solution document/reference blue print diagram
:

-
Live Demonstration:

A series of demonstrations (Proof of Concept) will be held and recorded for future viewing. This PoC will illustrate the technical capabilities of the tool(s) mentioned within the solution document. Wipro will procure the necessary infrastructure to host a simulated deployment of this solution.

  • Develop a
    Project Roadmap:

a document used to define stories/tasks broken into manageable pieces which if followed, will result in a functional deployment of the intended solution.

This breakdown will follow best practices using the SCRUM/Agile methodologies.

  • Develop a
    Kubernetes Heterogeneous Cluster Guide:
a guide which covers the process to follow in deploying a mixed cluster using the Kubernetes tool.
-
Build Threat Model:

this model will detail the attack surface of an accurately deployed rendition of this solution. Mitigation measures, and overall security score can be tracked within it.
-
Assessment Runbook:

The runbook will detail what steps/procedures must be followed to complete a security vulnerability assessment manually.

Completing the steps detailed by this SOP document will result in an updated, accurate accounting of the current security posture of the deployed solution.

This will be relative to the threat surface defined within the Threat Model.

**Wipro is an Equal Employment Opportunity employer and makes all employment and employment-related decisions without regard to a person's race, sex, national origin, ancestry, disability, sexual orientation, or any other status protected by applicable law.

More jobs from Wipro Limited