<div><strong>BPM Overview:</strong></div>
<div><strong> </strong></div>
<div>What does BPM stand for? Innovation, opportunity, community, diversity, inclusivity, flexibility and so much more. B-P-M stands for βBecause People Matter,β because at our core, our people drive everything we do and how we do it.</div>
<div>We are a forward-thinking, full-service accounting firm providing modern solutions to businesses across the globe. We focus on comprehensive assurance, tax, and consulting services for our clients, and we provide our people and our community with the resources to lead meaningful and purposeful lives.</div>
<div> </div>
<div>While we are one of the largest California-based accounting firms, our flexible work locations and schedules mean we have professionals across the continent. Our teams and our clients drive us to provide quality services and ignite unique insights and ideas that contribute to our continued success. Our clients come from different backgrounds and industries, which keep our people intellectually challenged every day.</div>
<div> </div>
<div>BPM India Advisory Service Private Limited - Formerly known as βBurr Pilger Mayer India Private Limitedβ. (BPM India) is a subsidiary of BPM LLP. Founded in 1986, BPM is one of the largest California-based accounting and consulting firms, ranking in the top 50 in the country. With 17 different office locations, BPM serves emerging and mid-cap businesses as well as high-net-worth individuals in a broad range of industries, including financial services, technology, life science, manufacturing, food, wine and craft brewing, automotive, nonprofits, real estate and construction. The Firmβs International Tax Practice is one of the largest on the West Coast and its well-recognized SEC practice serves approximately 35 public reporting companies, mostly in the technology industry.</div>
<div> </div>
<div>
<div>
<p><strong>About the role:</strong></p>
<p>The Security Administratorβs role is to ensure the secure operation of the in-house computer systems, servers, and network connections. This includes checking server and firewall logs, scrutinizing network traffic, establishing and updating virus scans and troubleshooting. This person will also analyze and resolve security breaches and vulnerability issues in a timely and accurate fashion, and conduct user activity audits where required.</p>
</div>
</div>
Key Responsibilities:
Strategy & Planning
β’ Develop, implement, maintain, and oversee enforcement of policies, procedures, and associated plans for system security administration and user access based on industry-standard best practices.
β’ Experience with data management and governance using Microsoft Purview, including data classification, sensitivity labels, and compliance-related controls.
β’ Experience with the Microsoft Defender security suite, including Endpoint, Identity, Email, and Cloud App protection.
β’ Design and implement incident investigation and security alert response.
β’ Design and implement disaster recovery plans for operating systems, databases, networks, servers, and software applications.
β’ Assess need for any security reconfigurations (minor or significant) and execute them if required.
β’ Keep current with emerging security alerts and issues.
β’ Conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts.
Acquisition & Deployment
β’ Interact and negotiate with vendors, outsourcers, and contractors to obtain protection services and products.
β’ Recommend, schedule, and perform security improvements, upgrades, and/or purchases.
Operational Management
β’ Experience supporting and delivering information security projects across endpoint protection, data security, access controls, monitoring, incident response, and compliance initiatives.
β’ Deploy, manage, and maintain IT security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software.
β’ Administer and maintain end user accounts, permissions, and access rights.
β’ Manage connection security for local area networks, company web sites, and remote access.
β’ Manage and ensure the security of databases and data transferred both internally and externally.
β’ Design, perform, and/or oversee penetration testing of all systems to identify system weaknesses.
β’ Design, implement, and report on security system and end user activity audits.
β’ Monitor user, system, firewall logs, intrusion detections, and network traffic for unusual activity or violation of company security policy.
β’ Monitor servers, interpret capacity and regulation checks for resolution.
β’ Recommend scheduled (where appropriate) and ad-hoc fixes, security patches, disaster recovery procedures, and any other measures required in the event of a security breach.
β’ Download and test new security software and/or other security technologies.
β’ Perform systems backups.
β’ Provide on-call security support to end-users.
β’ Manage and/or provide guidance to junior members of the team.
Knowledge & Experience
β’ Broad hands-on knowledge of Microsoft security suites (Purview, Defender, etc.), firewalls, intrusion detection systems, anti-virus software, data encryption, and other industry-standard technologies and practices.
β’ In-depth technical knowledge of network, applications, cloud app integrations, PC, and platform operating systems.
β’ Working technical knowledge of current systems software, protocols, and standards.
β’ Strong knowledge of TCP/IP and network administration/protocols.
β’ Hands-on experience with device such as switches, routers, and firewalls.
β’ Knowledge of applicable practices and solutions related to data privacy and protection.
β’ Knowledge of law enforcement practices and procedures, such as 1L.
Personal Attributes
β’ Intuition and keen instincts to pre-empt attacks.
β’ High level of analytical and problem-solving abilities.
β’ Ability to conduct research into security issues and products as required.
β’ Strong understanding of the organizationβs goals and objectives.
β’ Strong interpersonal and oral communication skills.
β’ Strong investigative skills.
β’ Excellent attention to detail.
β’ Ability to effectively prioritize and execute tasks in a high-pressure environment.
β’ Able to work in a team-oriented, collaborative environment.
Qualification
Formal Education & Certification
β’ College university degree in the field of computer science and/or any engineering stream. ( e.g. B.Sc., B.Tech)
β’ Certification in Security areas is a value-add.