Chief Information Security Officer

15 - 20 years

20 - 25 Lacs

Posted:-1 days ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

Role Details

  • Role Title: Chief Information Security Officer

Background to the role

The Chief Information Security Officer (CISO) is responsible for developing and implementing the overall security strategy for [Company Name], an insurance player. The CISO will ensure the protection of information assets, IT infrastructure, applications, data owned / managed by the organization and compliance with industry-specific regulations. This leader will work closely with executive leadership, IT teams, operations teams, and external partners to design and enforce a robust cybersecurity posture across all aspects of the business.

Key Responsibilities

Strategy & Governance

  • Develop and implement the enterprise-wide information security strategy, aligning with business objectives and regulatory requirements.
  • Lead the Information Security Governance, Risk, and Compliance (GRC) program to ensure a proactive approach to cybersecurity risk management.
  • Establish and maintain a comprehensive Information Security Management System (ISMS) aligned with industry standards (e.g., ISO 27001, NIST etc.).
  • Provide regular reporting on the security status of the organization to executive leadership and the board of directors.
  • Develop and oversee cybersecurity budgets and resource allocation, ensuring optimal use of resources.

2.

  • Define and manage IT and cloud security strategies, ensuring secure deployment and management of cloud-based services.
  • Implement security controls for corporate IT infrastructure, including network security, endpoint protection, identity and access management (IAM), and data loss prevention (DLP).
  • Ensure effective monitoring, detection, and response to security threats and incidents within the IT and cloud environments.

3.

  • Develop and oversee secure software development practices, ensuring that security is integrated into all phases of the application lifecycle.
  • Implement secure coding standards, code reviews, and vulnerability scanning for internally developed and third-party applications.
  • Lead efforts to mitigate application-level threats such as SQL injection, cross-site scripting (XSS), and insecure APIs to name a few.

Supplier and Third-Party Security

  • Establish and maintain a supplier security management program to assess and manage cybersecurity risks from third-party vendors.
  • Work closely with procurement and supplier management teams to ensure that security standards are embedded in supplier contracts and procurement processes.
  • Regularly assess suppliers and third-party service providers for adherence to cybersecurity requirements.

Regulatory Compliance

  • Ensure compliance with all relevant industry regulations and standards, including those related to insurance, data protection (IRDAI, DPDPA etc.), and cybersecurity frameworks.
  • Monitor emerging regulatory requirements and adjust security strategies to ensure continuous compliance.
  • Oversee audits, security assessments, and certifications to validate the companys security posture.

Incident Response & Threat Management

  • Develop and lead the organizations incident response strategy, ensuring rapid containment and remediation of security incidents.
  • Oversee the Security Operations Center (SOC) and ensure 24/7 monitoring, threat detection, and incident response capabilities.
  • Lead investigations into security breaches and manage communications with internal stakeholders, regulators, and law enforcement when necessary.

Leadership and Team Management

  • Build, develop, and lead a high-performing cybersecurity team, fostering a culture of security awareness across the organization.
  • Provide leadership, mentoring, and development opportunities to team members, ensuring continuous professional growth.
  • Collaborate across departments to promote a strong cybersecurity culture, including organizing training and awareness programs for employees.

Experience Requirements

  • Minimum 15+ years of experience in information security management roles, with at least 5 years in Cyber Security leadership position.
  • Proven experience in developing and implementing cybersecurity strategies
  • Experience with IT security, cloud security, and application security etc.

Education Requirements

  • Bachelor’s or Master’s degree in Information Security, Computer Science, Engineering, or a related field.
  • Professional certifications such as CISSP, CISM, CISA (at least one) are highly desirable.

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You