1) Ensuring that all the audits findings are closed within given time and providing proofs (that can be shown to the auditor) to the Bank
2) Assisting the design team while designing the architecture for new branches such that all the security best practices are in place from day one.
3) Ensuring that all the network devices are configured as per the Bank’s security policy, best practices to ensure Secured Network Architecture.
4) Configure and manage Firewalls IPS across the network
5) Work on the vulnerabilities pointed out by various agencies such as OEM, CERT, SOC, ISD, network department / other departments, government agencies, etc.
6) Providing selective resource access by configuring suitable access list on router. This includes hardening the perimeter security by configuring appropriate IP addresses and communication ports on router.
7) Masking private IP addresses by configuring NAT on routers. This can be made static or dynamic based on client’s policies.
8) c(like PAP, CHAP and AAA) 10)Implementing encrypted password management mechanisms on all supported devices Implementing privilege rights based on user rights for controlled access.
9) All requests for user creation, modification and deletion will be authorized by SBI concerned people in a prescribed format.
10) Ensuring security against asynchronous terminals, such as console terminals and from integrated modem line.
11) Disabling reverse telnet by default and enable only on need base
12) Prompt resolution of tickets raised by application owners.