Site icon Way2Freshers

SAP Hiring Fresher Software Associate – Cyber Defence

SAP building

SAP OFFICE

SAP known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management.

SAP looking for a Cyber Defence Associate to join  SAP’s digital enterprise team.

Job Designation : Cyber Defence Associate

Qualification :  Bachelor’s / Master’s degree

Experience : Freshers /  0-3 years

Skill Set :

  1. Expertise with one or more scripting languages (PowerShell, Python, Bash, etc.).
  2. Profound understanding of Network protocols (TCP/IP, TLS, HTTP, DNS, SMB, etc.).
  3. Good knowledge of Cloud security, Database and web application security.
  4. Familiar with File systems (exFAT, NTFS, ext4, APFS, etc. and Memory forensics.
  5. Strong ability to demonstrate analytical expertise, close attention to detail, excellent critical thinking, logic, and solution orientation.
  6. Willingness to learn and operate in a dynamic environment.
  7. Good listener with excellent communication skills, empathetic, collaborative.
  8. Good interpersonal and communication skills.

Job Description :

An SAP Global Security Operations Incident Responder is a crucial front-line defender of SAP’s digital enterprise. Our Incident Responders are responsible for triaging security alerts detected by Enterprise Detection and SIEM, analyzing all available data to determine if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, performing forensic investigations to determine the details around an attack, and providing guidance on remediation actions.

  1. Performs incident response duties as part of the global cyber incident response team
  2. Provide timely and relevant updates to SAP leadership and internal stakeholders
  3. Acts as a technical liaison for internal and external incident responders
  4. Carries out attack scope and root cause analyses by using forensic investigation methods
  5. Partner with internal teams to review monitoring requirements and create detection alerts
  6. Develop automated workflows that will reduce detection and response times
  7. Ensure the review and closure of resolved and end-user confirmed cybersecurity incidents
  8. Follow proper evidence handling and chain of custody protocols to produce written reports documenting digital forensic findings
  9. Review current process workflows and make improvements to detection and alerting mechanisms
  10. Identify increasing trend of repetitive incidents, and work with architecture, DevOps, and infrastructure teams to identify root cause and create action plans to increase resiliency
  11. Continuously monitor levels of service as well as interpret and prioritize threats through use of intrusion detection systems, firewalls, other boundary protection devices, and any security incident management products deployed
  12. Recognize potential, successful, and unsuccessful intrusion attempts and compromises through review and analyses of relevant event detail and summary information
  13. Test and maintain incident response plans and processes to address existingand emerging threats

Location : Bengaluru, Karnataka, India

Exit mobile version