Who you are:
We are actively seeking an experienced and highly skilled resource to join our elite cybersecurity team. In this role, you will play a critical part in shaping and implementing advanced security strategies to safeguard our organization against sophisticated cyber threats.What you’ll do:
Primary Responsibility:
- Oversee the deployment, configuration, and day-to-day management of Forcepoint Proxy solutions.
- Ensure the secure and efficient operation of the Proxy infrastructure.
- Develop and implement web security policies on the Forcepoint Proxy to safeguard against malicious content and threats.
- Regularly review and update Proxy policies based on emerging security threats.
- Collaborate with networking teams to seamlessly integrate Forcepoint Proxy into the existing network infrastructure.
- Ensure proper routing and connectivity for web traffic through the Proxy.
- Facilitate the onboarding of users onto the Forcepoint Proxy platform.
- Provide training and support to end-users on web security practices and Proxy usage.
- Monitor Forcepoint Proxy logs to identify and respond to security incidents.
- Conduct root cause analysis and troubleshoot issues related to Proxy functionality.
- Ensure Forcepoint Proxy configurations align with industry standards and compliance requirements.
- Conduct periodic security audits and assessments.
- Work closely with IT and security teams to integrate Forcepoint Proxy into the broader cybersecurity architecture.
- Collaborate on the implementation of security policies and practices.
- Fine-tune and optimize Proxy policies to balance security requirements with user experience.
- Continuously assess and enhance the performance of the Forcepoint Proxy solution.
- Maintain detailed documentation related to Forcepoint Proxy configurations, policies, and incident response procedures.
- Create and update standard operating procedures for Proxy management.
Secondary Responsibility:
- Good to have knowledge in Seclore IRM, MFA, AV/EDR, Proxy, Email security, O365 security.
- Monitor and manage MFA systems for secure user authentication.
- Investigate and respond to incidents related to MFA.
- Deploy and manage MFA solutions to enhance user authentication security.
- AV signature and platform version update as needed.
- Ensuring GPO policy push and updated on all endpoints
- AV/EDR agent deployment at endpoints/devices
- Troubleshooting of end user issues at endpoints for proxy
- Proxy agent installation and uninstallation at endpoint
- Conduct investigations into email and collaboration security incidents.
- Administer security features in Office 365 to protect email, files, and collaboration tools.
- Conduct thorough investigations into phishing and malware attacks.
- Manage and optimize email security solutions to safeguard against phishing and malware attacks.
How we’ll help you grow:
You’ll have access to all the technical and management training courses you need to become the expert you want to be.
Our team leads love to mentor in case of technical difficulty.
You have the opportunity to work in many different areas to figure out what really excites you
Required Technical and Professional Expertise
- Proven experience as a Proxy engineer, with a focus on Forcepoint solutions.
- Forcepoint Proxy certification is highly desirable.
- In-depth knowledge of web security concepts, content filtering, and threat prevention.
- Experience in incident response and troubleshooting related to Proxy solutions.
- Desired experience in Antivirus (AV) and EDR, Seclore IRM, MFA, Email security, O365 security.
- Worked on tools belongs to Forcepoint, CrowdStrike, McAfee ePO, Seclore, Gemalto Thales, Proofpoint, MS O365.
- Must have desire to learn or cross skill with new technologies.
- Must be able to work in morning, evening, and night shifts – Mandatory.
- Bachelor’s degree in engineering/information security, or a related field.
- Relevant certifications such as CEH, CISSP, CISM, CompTIA CASP+, or equivalent.
- Proven experience to work in a SOC environment.
- Deep technical knowledge of security technologies and advanced threat landscapes.
- Proven experience in managing and responding to complex security incidents.
- Strong analytical and problem-solving skills.
- Excellent communication and collaboration abilities.
- Ability to work in a fast-paced, dynamic environment.
Preferred Technical and Professional Expertise