Chief Information Security Officer (CISO)

15 - 20 years

0 Lacs

Posted:1 day ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description


1, PURPOSE OF THE JOB:

The purpose of the Head of Information Security role is to safeguard Jubilant Bhartia Group’s digital assets, operations, and reputation by establishing and leading a comprehensive cybersecurity strategy. The role ensures that information security is embedded into business processes, technology adoption, and regulatory compliance while enabling the Group’s digital transformation and innovation objectives. By driving governance, risk management, cyber defense, data protection, and security awareness, the Head of Information Security provides resilience against evolving threats, builds stakeholder trust, and empowers the organization to operate securely and competitively in global markets.


Job Context:

The Jubilant Bhartia Group operates across diverse industries including pharmaceuticals, life sciences, food services, and manufacturing, with a significant global footprint. In this highly digitized and regulated environment, protecting intellectual property, customer trust, critical infrastructure, and sensitive data is central to business resilience and growth.


The Head of Information Security plays a pivotal role in shaping and executing the Group’s cybersecurity vision. This role provides leadership in safeguarding IT and OT ecosystems, driving compliance with global regulations, and ensuring alignment of security programs with business strategy. With increasing cyber threats, regulatory expectations, and digital transformation initiatives, the position requires balancing robust security with business agility.


The role involves:

  • Developing a Group-wide cybersecurity strategy and governance framework.
  • Protecting enterprise systems, data, and operations from evolving threats.
  • Leading cyber defence, risk management, privacy, and compliance initiatives.
  • Driving awareness and culture change across diverse business units.
  • Acting as the primary interface with regulators, auditors, partners, and executive leadership on security matters.


Key Challenges:

The Head of Information Security faces the challenge of balancing strong cybersecurity with the Group’s growth and digital transformation goals, ensuring that controls do not hinder business agility. Securing both IT and OT environments is complex, especially as manufacturing plants, industrial systems, and supply chain ecosystems converge with enterprise IT. The role must navigate diverse global regulatory requirements such as the DPDP Act, GDPR & HIPAA, while also managing risks posed by third parties and extended vendor networks. Evolving threats like ransomware, advanced persistent attacks, and insider risks demand proactive defenses, intelligence-led operations, and rapid incident response. At the same time, building a security-first culture across varied business units and geographies, while developing and retaining skilled cybersecurity talent in a competitive market, remains a constant priority.


2, DETAILS OF THE JOB:


Designation & Job :

Work Location :

Reporting Manager:

Direct Reportees :

Team Size :


3, KEY ACCOUNTABILITIES:

Cyber Defense


  • Cloud Security -

    Secure workloads, applications, and data across public, private, and hybrid cloud platforms.
  • Endpoint Security -

    Protect laptops, desktops, mobiles, and OT devices from malware, ransomware, and unauthorized access.
  • Identity Security -

    Safeguard digital identities, enforce access controls, and manage privileged accounts.
  • Email / O365 Security -

    Defend corporate email and collaboration tools from phishing, spoofing, and business email compromise.
  • Threat Detection & Response-

    Monitor systems continuously, detect anomalies, and respond swiftly to security incidents.
  • Threat Intelligence & Hunting-

    Leverage internal and external intelligence to proactively identify and mitigate emerging threats.
  • Application Security-

    Embed security into the software development lifecycle and protect applications against vulnerabilities.
  • Vulnerability Management -

    Continuously identify, assess, and remediate vulnerabilities across IT, OT, and cloud environments.


Cybersecurity Strategy, Architecture & Program


  • Strategy -

    Define the long-term cybersecurity vision and align it with business and digital transformation goals.
  • Strategic Initiatives -

    Drive group-wide programs such as Zero Trust, cloud security, and OT/ICS security modernization.
  • Architecture -

    Establish and govern enterprise security architecture standards across IT, OT, cloud, and applications.


Data Security & Privacy


  • Web Security -

    Protect enterprise web applications and gateways against exploits, malware, and unauthorized access.
  • Engineering Incident / Request Resolution -

    Provide timely resolution of security-related incidents and requests raised by business or IT teams.
  • Policy Effectiveness-

    Ensure security policies are practical, up to date, and effectively enforced across the organization.
  • DLP Incident Response & Resolution -

    Monitor, investigate, and resolve data loss prevention alerts to prevent sensitive data exfiltration.
  • Data Classification

    - Protect sensitive business and customer data through classification, encryption, and retention controls.
  • Privacy Compliance

    - Ensure compliance with global privacy regulations (GDPR, DPDP Act, HIPAA, etc.).
  • Data Privacy -

    Implement consent management, anonymization, and data minimization practices and Conduct regular Privacy Impact Assessments (PIAs) for new initiatives.


Risk and Compliance


  • Governance -

    Establish cybersecurity governance structures, policies, and oversight aligned with business objectives.
  • Risk Management -

    Identify, assess, and prioritize cyber risks, integrating them with enterprise risk management frameworks.
  • Third-Party Risk Management -

    Evaluate and monitor security posture of vendors, partners, and supply chain entities handling sensitive data.
  • Compliance -

    Ensure adherence to regulatory, legal, and industry-specific security standards across geographies.
  • Audit Closure -

    Track, remediate, and close internal and external audit findings within agreed timelines.
  • Mitigation Task Completion -

    Ensure timely closure of identified risks, vulnerabilities, and incident-driven corrective actions.


Awareness & Training


  • Security Training & Awareness Campaigns -

    Develop structured programs and campaigns to build a security-first mindset across the organization.
  • Employee Engagement-

    Encourage active participation through gamification, contests, and recognition for secure behaviors.
  • Phishing & Social Engineering Readiness -

    Conduct simulations and drills to assess and improve employee resilience against phishing and manipulation.
  • Live Sessions -

    Deliver interactive workshops and townhalls with experts to address real-world threats and Q&A.


Skill Enhancement – Security Team


  • Certifications -

    Encourage and support attainment of industry-recognized certifications (e.g., CISSP, CISM, OSCP, CCSP, cloud security).
  • Trainings -

    Provide continuous learning opportunities through internal/external training programs, workshops, and knowledge-sharing sessions.
  • Tools and Technology Training -

    Ensure hands-on expertise in deployed security tools, platforms, and emerging technologies to strengthen operational effectiveness.


4, KEY INTERFACES

  • Regulators (FDA, CERT-In)
  • Industry bodies (DSCI, ISACA, NASSCOM)
  • External auditors and assessors
  • Security vendors, MSSPs, and technology partners
  • Group CDIO and IT Business Partners
  • CEOs and Business Heads
  • IT Infrastructure & IT Applications Support
  • Risk Management, Legal & Compliance
  • Internal Audit & Finance
  • BU Leadership, Manufacturing/OT Heads
  • HR (for awareness and training)


5, EDUCATION & EXPERIENCE


Education Qualification:

BE / B-Tech/ M-Tech/MBA or MCA from a reputed university.

Desired Certifications:


Experience Range:


Desirable experience:

  • 15–20 years in IT/OT Security, with at least 7 years in leadership roles
  • Exposure to large, diversified conglomerates with global operation
  • Proven track record in building security strategy and incident response at scale
  • Experience of working in Pharma Industry is desirable


6, SKILLS REQUIRED:


Cybersecurity Frameworks & Standards


Risk Management


Cloud Security

Expertise in AWS & Azure security controls; CSPM, CIEM, encryption, and shared responsibility models.


Identity & Access Management (IAM)


Network & Infrastructure Security


Endpoint & Mobile Security


Application Security


Threat Detection & Response


Data Security & Privacy


Vulnerability Management


Third-Party Security


Governance, Risk, and Compliance (GRC)


OT/ICS Security


Forensics & Incident Handling


Cryptography


Emerging Technologies


Behavioural Skills

  • Executive presence with ability to influence Board & CXO
  • Strategic mindset with business acumen
  • Strong decision-making under crisis
  • Collaborative and cross-functional leadership
  • High integrity and trustworthiness
  • Ability to inspire, mentor, and develop high-performing teams

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You