Job Summary
Excellent understanding of ITIL & ITSM 2+ years of experience with Threat data protection and Vulnerability tools such as: CrowdStrike Symantec ATP/EDR/SDCS SEP 14 Qualys Symantec DLP(Endpoint and Network) CASB Encase 2+ years working on Verizon and Akamai CDN systems Experience and troubleshooting Web Proxies/DNS/Layer 7 security an asset Good understanding of certificates Experience with automation tools would be an asset Ability to multi-task and work under pressure Participate in DR
Responsibilities
Design and implement secure infrastructure solutions using CrowdStrike technology to protect endpoints and servers across diverse enterprise environments while ensuring high availability and performance for business critical services.Configure and optimize CrowdStrike policies and detection rules to reduce false positives improve alert fidelity and enable timely response to genuine threats impacting corporate assets and data.Perform end to end vulnerability management activities by scanning assessing prioritizing and tracking remediation of security weaknesses on infrastructure components in alignment with risk appetite and compliance expectations.Coordinate with application owners and system administrators to validate vulnerability scan results plan remediation windows and verify successful closure of findings without disrupting essential business operations.Apply ITIL aligned processes for incident problem and change management to ensure that infrastructure security changes are controlled documented and executed with predictable outcomes and minimum service impact.Conduct detailed troubleshooting and root cause analysis for security and infrastructure issues using logs metrics and endpoint telemetry to restore services quickly and prevent recurrence.Develop and maintain automation scripts and reusable tools that streamline vulnerability scanning configuration compliance checks and environment health validation across multiple platforms.Create and execute structured testing procedures for new security controls CrowdStrike configurations and infrastructure changes to validate functionality performance and compatibility before production rollout.Collaborate closely with security operations teams to refine detection use cases enrich incident context and ensure that CrowdStrike alerts translate into actionable response steps and measurable risk reduction.Prepare clear technical documentation standard operating procedures and runbooks for routine security operations troubleshooting workflows and escalation paths to support consistent quality of service across teams.Provide guidance to peers and partner teams on secure infrastructure practices baseline hardening standards and effective use of CrowdStrike features to uplift the overall cyber resilience of the organization.Track and report key performance indicators and risk metrics related to endpoint protection vulnerability exposure and incident trends to support transparent governance and informed decision making.Engage in continuous improvement activities by reviewing post incident learnings assessing emerging threats and recommending enhancements to tools processes and infrastructure designs that benefit customers and society through stronger security.
Qualifications
Demonstrate strong hands on experience with CrowdStrike implementation policy tuning endpoint onboarding and incident investigation in medium to large scale enterprise environments within the stated experience range.Show deep understanding of vulnerability management concepts including common vulnerability scoring prioritization methods and coordination of remediation with diverse technical stakeholders.Apply solid troubleshooting skills across operating systems networks and security tools to isolate complex issues and validate fixes through structured testing and verification activities.Exhibit practical knowledge of ITIL principles for incident problem and change processes and use that knowledge to maintain stable and predictable operation of infrastructure services.Communicate effectively with technical and non technical partners through concise documentation clear status updates and collaborative discussions focused on risk reduction outcomes.Display familiarity with hybrid work practices and remote collaboration tools to operate efficiently in distributed teams while maintaining high standards of security and delivery quality.Maintain a mindset of continuous learning across cyber security trends threat landscapes and automation techniques to keep infrastructure protections effective and aligned with organizational goals.
À propos de nous
Cognizant (NASDAQ: CTSH) est un concepteur d’IA et un fournisseur de services technologiques. Avec notre gamme de solutions IA full-stack, nous accompagnons nos clients au carrefour de l’investissement dans l’IA et de la valeur ajoutée. Notre grande expertise sectorielle, des processus et de l’ingénierie nous permet de convertir le contexte propre à chaque entreprise en systèmes technologiques amplificateurs du potentiel humain, générateurs de résultats tangibles et garants de l’avantage des acteurs internationaux dans un monde en constante évolution. Découvrez notre méthode sur www.cognizant.com ou suivez @cognizant.
Renseignments suppplémentaires sur l'emploi
Les informations sur la rémunération sont exactes à la date de publication. Cognizant se réserve le droit de modifier ces informations à tout moment, conformément aux lois applicables.
Les exigences linguistiques varient selon les postes, mais nous demandons à tous les candidats d’avoir une connaissance de base de l’anglais afin de faciliter les communications internes à l’échelle de l’entreprise. Pour les postes basés au Québec, une maîtrise de l’anglais est requise puisque vous fournirez des services et collaborerez avec des parties prenantes situées hors de la province, qui ne parlent pas nécessairement le français.
Cognizant est un employeur souscrivant au principe de l’égalité d’accès à l’emploi. Votre candidature et votre dossier ne seront pas examinés en fonction de la race, de la couleur, du sexe, de la religion, des croyances, de l'orientation sexuelle, de l'identité de genre, de l'origine nationale, du handicap, de l'information génétique, de la grossesse, du statut d'ancien combattant ou de toute autre caractéristique protégée telle que décrite par les lois fédérales, provinciales ou locales.
Si vous avez un handicap qui nécessite un aménagement raisonnable pour rechercher une offre d'emploi ou poser une candidature, envoyiez un courriel à [email protected] avec votre demande et vos coordonnées.