Job Summary
Excellent understanding of ITIL & ITSM 2+ years of experience with Threat data protection and Vulnerability tools such as: CrowdStrike Symantec ATP/EDR/SDCS SEP 14 Qualys Symantec DLP(Endpoint and Network) CASB Encase 2+ years working on Verizon and Akamai CDN systems Experience and troubleshooting Web Proxies/DNS/Layer 7 security an asset Good understanding of certificates Experience with automation tools would be an asset Ability to multi-task and work under pressure Participate in DR
Responsibilities
Design and implement secure infrastructure solutions using CrowdStrike technology to protect endpoints and servers across diverse enterprise environments while ensuring high availability and performance for business critical services.Configure and optimize CrowdStrike policies and detection rules to reduce false positives improve alert fidelity and enable timely response to genuine threats impacting corporate assets and data.Perform end to end vulnerability management activities by scanning assessing prioritizing and tracking remediation of security weaknesses on infrastructure components in alignment with risk appetite and compliance expectations.Coordinate with application owners and system administrators to validate vulnerability scan results plan remediation windows and verify successful closure of findings without disrupting essential business operations.Apply ITIL aligned processes for incident problem and change management to ensure that infrastructure security changes are controlled documented and executed with predictable outcomes and minimum service impact.Conduct detailed troubleshooting and root cause analysis for security and infrastructure issues using logs metrics and endpoint telemetry to restore services quickly and prevent recurrence.Develop and maintain automation scripts and reusable tools that streamline vulnerability scanning configuration compliance checks and environment health validation across multiple platforms.Create and execute structured testing procedures for new security controls CrowdStrike configurations and infrastructure changes to validate functionality performance and compatibility before production rollout.Collaborate closely with security operations teams to refine detection use cases enrich incident context and ensure that CrowdStrike alerts translate into actionable response steps and measurable risk reduction.Prepare clear technical documentation standard operating procedures and runbooks for routine security operations troubleshooting workflows and escalation paths to support consistent quality of service across teams.Provide guidance to peers and partner teams on secure infrastructure practices baseline hardening standards and effective use of CrowdStrike features to uplift the overall cyber resilience of the organization.Track and report key performance indicators and risk metrics related to endpoint protection vulnerability exposure and incident trends to support transparent governance and informed decision making.Engage in continuous improvement activities by reviewing post incident learnings assessing emerging threats and recommending enhancements to tools processes and infrastructure designs that benefit customers and society through stronger security.
Qualifications
Demonstrate strong hands on experience with CrowdStrike implementation policy tuning endpoint onboarding and incident investigation in medium to large scale enterprise environments within the stated experience range.Show deep understanding of vulnerability management concepts including common vulnerability scoring prioritization methods and coordination of remediation with diverse technical stakeholders.Apply solid troubleshooting skills across operating systems networks and security tools to isolate complex issues and validate fixes through structured testing and verification activities.Exhibit practical knowledge of ITIL principles for incident problem and change processes and use that knowledge to maintain stable and predictable operation of infrastructure services.Communicate effectively with technical and non technical partners through concise documentation clear status updates and collaborative discussions focused on risk reduction outcomes.Display familiarity with hybrid work practices and remote collaboration tools to operate efficiently in distributed teams while maintaining high standards of security and delivery quality.Maintain a mindset of continuous learning across cyber security trends threat landscapes and automation techniques to keep infrastructure protections effective and aligned with organizational goals.
The Cognizant community:
We are a high caliber team who appreciate and support one another. Our people uphold an energetic, collaborative and inclusive workplace where everyone can thrive.
- Cognizant is a global community with more than 300,000+ associates around the world.
- We don’t just dream of a better way – we make it happen.
- We take care of our people, clients, company, communities and climate by doing what’s right.
- We foster an innovative environment where you can build the career path that’s right for you.
About us:
Cognizant (Nasdaq: CTSH) is an AI Builder and technology services provider, building the bridge between AI investment and enterprise value by building full-stack AI solutions for our clients. Our deep industry, process and engineering expertise enables us to build an organization’s unique context into technology systems that amplify human potential, realize tangible returns and keep global enterprises ahead in a fast-changing world. See how at www.cognizant.com or @cognizant.
Cognizant is an equal opportunity employer. Your application and candidacy will not be considered based on race, color, sex, religion, creed, sexual orientation, gender identity, national origin, disability, genetic information, pregnancy, veteran status or any other characteristic protected by federal, state or local laws.
Disclaimer:
Compensation information is accurate as of the date of this posting. Cognizant reserves the right to modify this information at any time, subject to applicable law.
Applicants may be required to attend interviews in person or by video conference. In addition, candidates may be required to present their current state or government issued ID during each interview.