Jobs
Interviews

827 Cissp Jobs - Page 2

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 8.0 years

22 - 25 Lacs

Mumbai

Work from Office

Essential Services : Role & Location fungibility At ICICI Bank, we believe in serving our customers beyond our role definition, product boundaries, and domain limitations through our philosophy of customer 360-degree. In essence, this captures our belief in serving the entire banking needs of our customers as One Bank, One Team. To achieve this, employees at ICICI Bank are expected to be role and loc ation-fungible with the understanding that Banking is an essential service .The role descriptions give you an overview of the responsibilities, it is only directional and guiding in nature. About the role We are looking for a skilled professional to join our Information Security Team as an Infrastructure Cloud Risk Assessment Manager. The candidate is expected to have a solid understanding and experience of major cloud-native architectures, expertise in identity and access management, familiarity with various data encryption methods, and knowledge of cloud compliance regulations. Key Responsibilities Identifying Vulnerabilities: Understanding of cloud architecture review, and virtualization. Conduct cloud security assessments, across but not limited to the following domains: * Network and Perimeter Security *Data Protection and Backup Management * Identity and Access Management * Log Management and Monitoring Analysis Identify and analyse the risks associated. Provide recommendations for the identified findings and develop the road-map. Implement Security Measures Develop and implement robust security measures for cloud environments, ensuring the confidentiality, integrity, and availability of data. Contribute in creating and enforcing security policies, procedures, and best practices across the organization. Reporting Contribute in creating and enforcing security policies, procedures, and best practices across the organization. Collaborate Work closely with cross-functional teams to integrate security controls seamlessly into cloud-based architectures and applications. Collaborate with other IT professionals, including network engineers, developers, and system administrators, to integrate cloud security measures into existing systems and processes. Qualifications & Skills Educational Qualification: Engineering Graduate in CS, IT, EC or InfoSec, CyberSec or MCA equivalent. Certifications Relevant certifications such as CISSP, CISM, AWS Certified Security, etc. Compliance Assist in securing the IT landscape/ecosystem built on-premises and multi-cloud environment. As an enterprise Network Security architect in the security domain crafted to ensure availability, reliability, security and performance and resilient architecture to address customers/client business challenges and accelerate technology adoption to improve the product services. AWS/Azure cloud security architecture, design, operations and service orchestration, including application security, architectural concepts, compliance requirements, data security, design requirements, infrastructure security, legal requirements, process and platform. Technical Skills Proficient in cloud security assessment, across all the deployment and service models IaaS, PaaS, SaaS. Experience with the cloud-native services across major cloud service providers (AWS, GCP, Azure, OCI). Control on security by design principle of applications hosted in public cloud (Azure, AWS, GCP, OCI). Technical understanding on zero-trust architecture and micro segmentation. Hands-on experience with SIEM (Security Information and Event Management) tools to proactively monitor, analyse, and respond to security incidents. Communication skills Outstanding communication abilities. Ability to effectively communicate the required recommendations. About the Business Group ICICI Banks Information Security Group believes in providing services to its customers in the safest and secure manner keeping in mind that data protection for its customers is as important as providing quality banking services across the spectrum. The CIA triad of Confidentiality, Integrity, and Availability is at the heart of building a comprehensive information security framework. The Bank also lays emphasis on customer elements like protection from phishing, adaptive authentication, awareness initiatives, and provide easy to use protection and risk configuration ability in the hands of customers. The Bank also undertakes campaigns to create awareness among customers on security aspects while banking through digital channels.

Posted 3 days ago

Apply

3.0 - 8.0 years

22 - 25 Lacs

Mumbai

Work from Office

Essential Services : Role & Location fungibility At ICICI Bank, we believe in serving our customers beyond our role definition, product boundaries, and domain limitations through our philosophy of customer 360-degree. In essence, this captures our belief in serving the entire banking needs of our customers as One Bank, One Team . To achieve this, employees at ICICI Bank are expected to be role and location-fungible with the understanding that Banking is an essential service . The role descriptions give you an overview of the responsibilities, it is only directional and guiding in nature. About the role We are looking for a skilled professional to join our Information Security Team as a DevSecOps Manager. As a DevSecOps Manager, you will be responsible for implementation of Security tools in DevOps CI/CD (Continuous integration/Continuous Delivery) pipeline and publish security standards and best practices for Developers teams. Key Responsibilities Identifying Vulnerabilities: Enable automated security scanning process to identify the known vulnerabilities in source code, Open-source library, and configuration. Provide technical leadership and direction in the DevSecOps domain. Analysis: Troubleshoot DevSecOps pipeline implementation issue and support for successful deployment. Implement DevSecOps with multiple agile teams across various platforms, environments, and instances. Implement Automated DevSecOps template-based solutions for cloud environments. Implement Security Measures: Understand the Security Requirements & Implement the new DevSecOps process. Integrate, Monitor and Improve Cloud Security controls via DevSecOps process in existing DevOps process. Perform assessment and help to mitigate Security findings and implement improvement Security measures. Configure Cloud Security Tools/Systems in a CI/CD Pipelines. Implementing Security scanning into Jenkins, Code Pipeline, and DevOps workflows. Define gating process metrics for security and implement in DevSecOps. Employ infrastructure as code to increase automation, scalability, and reliability. Reporting: Prepare and provide necessary metrics, detailed reports, artifacts, executive summary and dashboard to leadership on a regular frequency. Build and maintain a set of tools that enable developers to self-serve for remediation. Monthly Dashboard Reporting for Leadership. Collaborate: Capable of working in a dynamic environment, multi-department coordination and attaining the target. Qualifications & Skills Educational Qualification: Engineering Graduate in CS, IT, EC or InfoSec, CyberSec or MCA equivalent. Certifications: CSSLP, CISSP, GPEN, ECSA, CEH, CISM, CISA, or equivalent. Compliance: Good understanding of cyber security trends & hacking techniques. Experience in analysing threats of cloud and application components. Familiarity with OWASP, SANS vulnerabilities along with its validations in source code and other security frameworks & Compliance. Ability to review assessment reports to provide risk mitigation & recommendations on that basis. Technical Skills: Experience with various application security tools including SAST, DAST, Software composition analysis and application Penetration testing. Experience with Automation in testing or orchestration Selenium, Maven, Ant, Msbuild, Npm, Yarn, Jenkins, Gitlab, Bitbucket, etc. Knowledge of Agile and Scrum processes. Understanding of virtualization and container technologies (Docker, Kubernetes, etc). Communication Skills: Outstanding communication abilities. Ability to effectively communicate the required recommendations. About the Business Group ICICI Banks Information Security Group believes in providing services to its customers in the safest and secured manner, keeping in mind that data protection for its customers is as important as providing quality banking services across the spectrum. The CIA triad of Confidentiality, Integrity, and Availability is built on the vision of creating a comprehensive information security framework. The Bank also lays emphasis on customer elements like protection from phishing, adaptive authentication, awareness initiatives, and provide easy to use protection and risk configuration ability in the hands of customers. With this core responsibly, ICICI administer and promotes on going campaigns to create awareness among customers on security aspects while banking through digital channels.

Posted 3 days ago

Apply

12.0 - 18.0 years

37 - 55 Lacs

Mumbai

Work from Office

Essential Services : Role & Location fungibility At ICICI Bank, we believe in serving our customers beyond our role definition, product boundaries, and domain limitations through our philosophy of customer 360-degree. In essence, this captures our belief in serving the entire banking needs of our customers as One Bank, One Team . To achieve this, employees at ICICI Bank are expected to be role and location-fungible with the understanding that Banking is an essential service . The role descriptions give you an overview of the responsibilities, it is only directional and guiding in nature. About the role: As a SOC Analyst - Detection Engineering in the banks security operations center (SOC), the individual will be responsible to strengthen the creation and optimization of Analytical rules and alerts configured in the banks SIEM platform. Key Responsibilities: Business Understanding: Accountable to ensure all security anomalous activities are detected by the banks SIEM platform and false positives are kept to a minimum. You will be responsible to build analytical correlational rules in the banks SIEM platform covering network, systems and endpoints, cloud (SAAS, IAAS and PAAS) and applications (both COTS and internally developed). Collaborate: Verify the ingested logs and ensure log parsing to normalize the events. Implement a testing methodology to test the alerts configured and obtain sign off before releasing into production. Provide expert guidance and support to the security operations team in the use of for threat hunting and incident investigation. Analyzing the detected Incidents to identify lessons learned to improve response processes and make recommendations for enhancing security posture. Reporting: Develop and maintain documentation for Analytical rules processes and procedures. Stay Up to date with the latest trends and developments in cybersecurity and SIEM technologies and recommend improvements to the organization security posture. Qualifications & Skills Educational Qualification: Engineering Graduate in CS, IT, EC or InfoSec, CyberSec or MCA equivalent with experience in cloud security with any of the following - Microsoft Azure, Google cloud, Ability to develop and implement security policies, procedures and best practices. Experience: At least 5 years of experience working as a SOC analysts responsible to create SIEM rules/alerts. Hands-on experience in creation of security alerts in any of the commonly used SIEM solutions is a must. Certifications: SIEM Certification from any of the leading SIEM OEMs Splunk, Palo Alto, Securonix, LogRhythm, etc,. CEH or CISSP CCNA Security and/or any of the Cloud security certifications (AWS, GCP, Azure, OCI). Compliance: Knowledge of Networking components, Servers (RHEL, Windows, etc.) and Endpoints, cloud infrastructure along with Machine learning models used for detection of security alerts. Knowledge of various log types, event parsing and ingestion mechanisms across Systems, networks, cloud and commonly used applications in banks. Communication Skills: Excellent communication and interpersonal skills. Synergize with the Team: Working with the designated bank personnel to ensure alignment with RBI guidelines on detection of security alerts applicable to banks. Should have strong understanding of cybersecurity principles, threat detection and incident response. About the Business Group ICICI Bank’s Information Security Group believes in providing services to its customers in the safest and secured manner, keeping in mind that data protection for its customers is as important as providing quality banking services across the spectrum. The CIA triad of Confidentiality, Integrity, and Availability is built on the vision of creating a comprehensive information security framework. The Bank also lays emphasis on customer elements like protection from phishing, adaptive authentication, awareness initiatives, and provide easy to use protection and risk configuration ability in the hands of customers. With this core responsibly, ICICI administer and promotes on going campaigns to create awareness among customers on security aspects while banking through digital channels.

Posted 3 days ago

Apply

3.0 - 4.0 years

5 - 15 Lacs

Bengaluru, Karnataka, India

On-site

As aRisk Control AssuranceAnalyst, you will: Support the assurance of robust risk and control measures by aiding in the development and implementation of strategies compliant with SOX requirements and industry best practices Contribute to a team specializing in controls assurance. Depending on your experience and skills, your role might focus on assessing and monitoring IT system controls in alignment with established standards or ensuring regulatory compliance in our business operations and helping to streamline processes. As we expand our risk and control practices beyond SOX,youllhave the opportunity to broaden yourexpertiseand take on new challenges in different areas. Collaborate with international teams and cross-functional partners to align risk management practices and controls initiatives Utilize data analytics and automation tools to enhance our teams capabilities and support the organizations control improvement by driving automation and streamlining control processes Promote initiatives to increase awareness and understanding of internal controls and SOX requirements throughout the organization About You: 3 or more years of relevant work experience, or equivalent combination of education and experience, preferably within a regulated industry Familiarity with control assurance principles in technology and/or business processes Relevant professional certifications such as CISA, CIA,CISSPor others is a plus Experience with data analytics and automation tools is a plus Problem-solving abilities, adaptability, a learning mindset, and a team-player attitude Excellent communication skills, with the ability to work effectively with international teams

Posted 4 days ago

Apply

7.0 - 12.0 years

15 - 19 Lacs

Pune

Work from Office

Key Responsibilities Incident Response and Management: Lead the incident response process, including identification, containment, eradication, and recovery. Analyze and respond to complex security incidents and breaches. Conduct post-incident analysis and develop reports with recommendations to prevent future incidents. Security Monitoring and Analysis: Oversee the continuous monitoring of security alerts and events. Analyze logs and data from various sources (e.g., SIEM, firewalls, EDR, IDS/IPS) to identify suspicious activity. Perform advanced threat hunting and forensic analysis. Vulnerability Management: Conduct regular vulnerability assessments. Identify, prioritize, and remediate security vulnerabilities in systems and applications. Collaborate with IT and development teams to implement security patches and updates. Security Architecture and Engineering: Design and implement security solutions to protect the organization's networks, systems, and data. Develop and maintain security policies, standards, and procedures. Evaluate and recommend new security technologies and tools. Compliance and Risk Management: Ensure compliance with relevant regulatory requirements and industry standards (e.g., ISO 27001, NIST). Perform risk assessments and develop mitigation strategies. Document and maintain security controls and frameworks.Required Skills and Qualifications Technical Expertise: Advanced knowledge of cybersecurity principles, techniques, and technologies. Proficiency in using security tools such as SIEM, IDS/IPS, firewalls, and endpoint protection solutions. Experience with vulnerability management, penetration testing, and forensic analysis. Experience: Minimum of 7-10 years of experience in cybersecurity, with at least 2-3 years in an L3 or senior role. Proven track record of handling complex security incidents and leading incident response efforts. Experience in designing and implementing security architectures and solutions. Certifications: Relevant certifications such as CISSP, CISM, CEH, GIAC, or equivalent are highly desirable. Analytical and Problem-Solving Skills: Strong analytical skills with the ability to identify and mitigate security threats. Excellent problem-solving skills and the ability to think critically under pressure. Communication and Collaboration: Strong communication skills, both written and verbal. Ability to collaborate effectively with cross-functional teams and stakeholders.Preferred Skills and Qualifications Experience with cloud security (e.g., AWS, Azure, Google Cloud). Knowledge of scripting and automation tools (e.g., Python, PowerShell). Familiarity with regulatory requirements and standards (e.g., GDPR, HIPAA).

Posted 4 days ago

Apply

5.0 - 7.0 years

5 - 5 Lacs

Kochi, Thiruvananthapuram

Work from Office

Role Overview The Anti-Phishing Specialist leads the organization's efforts to detect, prevent, and respond to phishing attacks and other email-based threats. This role is pivotal in developing robust anti-phishing strategies, managing email security technologies, responding to incidents, and educating users to enhance organizational resilience against cyber threats. Key Responsibilities - Identify and facilitate takedown of phishing websites and rogue applications. - Proactively address a broad spectrum of cyber threats including DDoS, ransomware, business email compromise (BEC), spear phishing, whaling, vishing, and other social engineering attacks. - Monitor and analyze inbound emails to detect malicious content and recommend rule adjustments to reduce email-borne threats. - Design, implement, and maintain anti-phishing strategies, policies, and procedures. - Manage and optimize anti-phishing tools and platforms, including DMARC, DKIM, SPF, and secure email gateways. - Develop advanced detection rules and filters to counter evolving phishing tactics. - Lead phishing-related incident response efforts--containment, eradication, recovery, and post-incident review. - Deliver regular employee training and awareness programs on phishing prevention. - Collaborate with security teams to provide guidance on email security best practices. - Evaluate emerging anti-phishing technologies and recommend improvements. - Stay abreast of current phishing trends, attack methods, and mitigation techniques. - Produce detailed reports on phishing incidents, metrics, and defensive performance. Qualifications - Bachelor's degree in Computer Science, Information Security, or a related field. - 5+ years of hands-on experience in anti-phishing, email security, or a similar domain. - Strong expertise in email protocols (SMTP, etc.) and security standards (DMARC, DKIM, SPF). - Proven experience with enterprise email security solutions (e.g., Proofpoint, Mimecast, Ironscales). - Deep understanding of phishing tactics, social engineering, and email-based threat vectors. - Strong analytical, problem-solving, and communication skills. - Demonstrated leadership in mentoring or guiding security teams. - Preferred certifications: CISSP, Certified Email Security Manager (CESM), or equivalent. Required Skills SOC L2, Cyber Security, Phishing

Posted 4 days ago

Apply

1.0 - 5.0 years

0 Lacs

karnataka

On-site

As a Tech Delivery & Op Excellence Practitioner, you understand how to deliver value to clients and apply methods or certifications appropriately. Your attention to detail and deep expertise allow you to see inherent risks or improvement opportunities that others may not. You work directly with client teams to ensure a high standard of delivery and operational excellence is met. Key responsibility: - Risk and Compliance senior Analyst works with the Application service delivery organization and other compliance related functions to help: - Perform audits/reviews to assess risks in Application development and maintenance service environment - Manage risk in Application development and maintenance service to an acceptable level - Increase awareness of and compliance with policy and process-related matters - Support successful completion of various external compliance certification programs and internal compliance assessments - Introduce continual improvement including lessons learned from matters requiring intervention - The successful candidate for this role will be a member of a dedicated team operating a Controls and Compliance function, performing audit-style reviews of Application Development & Maintenance Services outsourcing engagements covering compliance matters and operational service management and service delivery good practice. Must-Have Skills/Qualifications: - Minimum of 1-year experience in Auditing principles and practices (sample qualifications*: CISA, ISO 27001 Lead Auditor) - Minimum of 1-year experience in Application security/audit roles in Application development & maintenance service industry (sample qualifications*: EC-Councils CASE, CEH, Agile Methodology, DevOps Certification, CMMI for Development) - Knowledge of secure SDLC models, secure coding standards, OWASP Top 10, threat modeling, SAST, DAST, single sign-on, Encryption - Minimum of 1-year experience in Operational compliance requirements - Contract Management/Service Reporting (including Service Level Agreements and Operational Level Agreements) - Risk management or assessment (sample qualification*: CRISC) - Knowledge of cloud environment and services (sample qualification*: Microsoft Azure/AWS/Google Certifications) - Team and stakeholder management Nice-to-Have Skills/Qualifications: - Data privacy and protection (sample qualifications*: CIPM, CIPT, CIPP) - CISSP, CISM, CISA, CCSK, CCSP - SOC1 and SOC2 (SSAE16/ISAE3402) awareness - Business Continuity and Disaster Recovery awareness (ISO 22301) Professional Attributes: 1. Good communication 2. Teamwork 3. Problem-solving capabilities 4. Work planning and management 5. Quick learner 6. Eager to take on responsible tasks 7. Dedicated and focused Educational Qualification: 1. MBA-Information Security/IT 2. BE/B-Tech with CS/IT/related domain 3. BSc-IT Additional Information: - Occasional within-country travel - Flexibility in working hours - 15 years full-time education,

Posted 4 days ago

Apply

8.0 - 12.0 years

0 Lacs

maharashtra

On-site

As a part of Cisco's Security team, you will play a crucial role in helping businesses maintain cyber resiliency in the face of rapidly evolving digital threats. Your efforts will contribute to preparing for, responding to, and recovering from cyber incidents, ultimately ensuring business acceleration for organizations. By providing guidance, utilizing cutting-edge tools, and offering trusted services, you will assist businesses in achieving cyber resiliency and safeguarding their operations. At Cisco, we are dedicated to developing a comprehensive security portfolio that caters to organizations of all sizes amidst an expanding and sophisticated threat landscape. Through investments in artificial intelligence (AI) and a range of security offerings, we aim to ensure end-to-end security for everything connected to an organization, from applications and services to end users. By leveraging AI and machine learning advancements, we empower security teams with simplified operations and heightened effectiveness. Our innovative solutions such as Cisco XDR and the security service edge (SSE) aim to enhance security operations and provide frictionless access across diverse locations and devices, ultimately benefiting both users and IT professionals. In your role, you will have a significant impact by engaging with customer executives to build deep relationships and establish yourself as a trusted advisor. By identifying customer business issues and challenges, you will communicate solutions in a thought-provoking and insightful manner. Your responsibilities will include presenting comprehensive business cases aligned with customers" strategies, calculating return on investment, negotiating agreements, and capturing market and industry insights. To excel in this role, you are required to have 8-12 years of experience in techno-commercial roles within the cybersecurity domain, knowledge of new technologies, and at least 3 years of experience in selling SaaS and subscription delivery models. Your track record should demonstrate success in achieving sales quotas, strong hunting skills, and the ability to communicate technical propositions at an executive level. Additionally, industry certifications like CISSP, CSSP, CEH, or a Bachelor's Degree in Cybersecurity are preferred, along with a good understanding of NIST guidelines, MITRE ATT&CK framework, and Cisco Security products. Joining Cisco means becoming a part of a diverse and inclusive environment where individual skills and perspectives are celebrated. We prioritize learning and development at every stage of your career, offering opportunities for growth and advancement. Our commitment to inclusion is reflected in our employee resource organizations and volunteer programs, allowing Cisconians to make a positive impact in their communities. By working with us, you will contribute to shaping a more inclusive future for all while embracing your unique talents and potential. Cisco offers a comprehensive benefits package for employees in the U.S. and Canada, including medical, dental, and vision insurance, a 401(k) plan with a matching contribution, disability coverage, life insurance, and wellbeing offerings. Your performance and achievements will be rewarded with a competitive incentive structure that recognizes and values your contributions to the organization's success.,

Posted 4 days ago

Apply

5.0 - 9.0 years

0 Lacs

noida, uttar pradesh

On-site

As a Senior Security Engineer at Adobe, you will be part of a global architecture and engineering team within Enterprise Security focused on securing access to Adobe data using Zero Trust best practices. Your responsibilities will include implementing a Zero Trust Solution, delivering access controls based on a zero trust strategy, and providing support to critical projects within the Enterprise Security organization. You will play a key role in enhancing the security posture for employees and data by researching, analyzing, troubleshooting, and supporting the delivery of security solutions aligned with team security strategies and key requirements. Your role will involve supporting the development and maturity of security services, policies, and standards to improve security posture. This includes creating clear documentation, proposing architectural standards, and leading programs to achieve security goals. You will collaborate with business units and vendor suppliers across Adobe to enhance their security posture and service architecture, as well as assist in evaluating and selecting security technologies in alignment with business partners and customers. To succeed in this role, you will need a Bachelor's degree in MIS, Computer Science, or Engineering, along with familiarity with Zero Trust solutions, Identity and Access Management technologies, and Public Cloud services. Knowledge of Web Application Security platforms, Single Sign-On, Authentication, Authorization, Federation Technologies, and Python will be beneficial. Excellent communication skills, certifications in Information Security and Cloud Technology, and the ability to work collaboratively and provide leadership within the organization are essential. We are seeking a highly skilled Senior Security Engineer to join our Global Enterprise Security Architecture team at Adobe. The ideal candidate will have extensive experience in leading large-scale security projects, driving Zero Trust initiatives, and advising on infrastructure security best practices. This role is crucial for supporting global enterprise security architecture efforts, enhancing corporate security authentication, and managing high-impact cybersecurity projects. Key Responsibilities include: - Providing leadership within the Enterprise Security Architecture & Engineering team and executing security initiatives across the organization. - Developing and implementing security solutions to address challenges in vendor security, corporate authentication, and cybersecurity risk management. - Advancing the organization's Zero Trust security model, setting standards, and implementing frameworks to secure digital assets. - Overseeing high-impact security projects, collaborating with stakeholders, and serving as a Trusted Advisor on infrastructure security best practices. If you require accommodation to navigate Adobe's website or complete the application process due to a disability or special need, please contact accommodations@adobe.com or call (408) 536-3015.,

Posted 4 days ago

Apply

5.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

Join us as a Senior Cyber Operations Analyst - Cyber Threat Hunting at Barclays, where you will be responsible for supporting the successful delivery of Location Strategy projects. Your role will involve planning, budgeting, ensuring agreed quality, and adhering to governance standards. As a key member of the team, you will lead the evolution of our digital landscape, driving innovation and excellence to provide unparalleled customer experiences. To excel in this role, you should possess the following experience: - Strong analytic skills. - Extensive experience in cyber security, particularly in threat hunting or incident response. - Proficiency in using security toolsets. - Previous exposure to scripting languages and data analysis. - Exceptional interpersonal skills, including the ability to brief, debrief, and present to senior executives effectively, along with active listening skills. - Strong communication skills, both verbal and written, enabling effective interactions with clients, colleagues, and external vendors. - Excellent time management and planning abilities, with experience working under pressure. - Capacity to stay organized and prioritize multiple incident priorities. - High standards of personal integrity, professional conduct, and ethics. - Skills in incident, problem, and change management. Additionally, the following skills are highly valued: - Familiarity with the Financial Services regulatory landscape and compliance issues. - Formal accreditations such as CompTIA Security+ or CISSP. - Proficiency in incident response and change management. Your performance may be evaluated based on critical skills relevant to the role, including risk and controls, change and transformation, business acumen, strategic thinking, digital and technology, as well as job-specific technical skills. The primary purpose of your role is to monitor operational controls" performance, implement and manage security controls, and apply lessons learned to safeguard the bank against cyber-attacks and respond to threats effectively. Key Accountabilities: - Manage security monitoring systems to alert, detect, and block potential cyber security incidents. - Identify emerging cyber security threats and collaborate with networks and conferences to enhance industry knowledge. - Analyze security information and event management systems to detect and prevent potential threats. - Triage data loss prevention alerts to prevent sensitive data exfiltration. - Manage cyber security incidents, including remediation and closure. As an Assistant Vice President, your responsibilities include advising on decision-making, contributing to policy development, and ensuring operational effectiveness. Collaborate with other functions and business divisions, lead a team, set objectives, coach employees, and appraise performance. If in a leadership role, demonstrate LEAD behaviors (Listen and be authentic, Energize and inspire, Align across the enterprise, Develop others). For individual contributors, lead collaborative assignments, guide team members, identify new project directions, consult on complex issues, mitigate risks, and strengthen controls. Collaborate with other areas to keep abreast of business activity and strategy. All colleagues are expected to embody Barclays Values of Respect, Integrity, Service, Excellence, and Stewardship, as well as the Barclays Mindset to Empower, Challenge, and Drive.,

Posted 4 days ago

Apply

8.0 - 12.0 years

0 Lacs

maharashtra

On-site

The job is located in Fort, Mumbai. You should possess a Bachelor's degree in Information Security, Computer Science, or a related field. Additionally, certifications such as CISA, ISO27001, ISO22301, and CISSP would be advantageous. Ideally, you should have 8 to 10 years of experience in a Senior Manager/AGM role. Your responsibilities will include: - Governance and Risk Management - Incident Management - Training and Awareness - Reporting and Documentation - Policy and Procedure Management - Audit Management This is a full-time position with benefits such as Provident Fund. The schedule for this role is a fixed shift. The preferred candidate will have a total of 8 years of work experience. The work location is in person.,

Posted 4 days ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

As the Lead (BISO) Business Information Security Officer at Computacenter, you will have a unique opportunity to join the Cybersecurity leadership team reporting directly to the Group CISO. Your primary role will involve partnering with senior security professionals to protect Computacenter and its customers from Cyber threats. By ensuring security risk awareness, mitigation, and alignment with the strategic objectives of the business, you will play a crucial role in safeguarding the organization. In this hybrid working role, you will spend two to three days a week in Bangalore, following Computacenter's Strategic Business Partner model. Your responsibilities will include owning the Cybersecurity lens for supporting and guiding the protection of the business from Cyber threats and risks. You will work closely with the broader Group Information Systems and Cybersecurity team to drive the implementation of the evolving Security Strategy under the guidance of the CISO. Your key responsibilities will be divided into four main areas: 1. **Functional Management (40%):** - Develop and implement the business unit security approach in alignment with business goals and objectives. - Define roles and responsibilities of the Lead BISO to meet Strategic Partner and CISO responsibilities. - Establish proactive initiatives to support market trends, business strategies, and compliance requirements. - Build and maintain relationships with senior management for Business Units and regional executives. 2. **CISO deputy (30%):** - Act as a security ambassador and deputize in the region on cybersecurity matters. - Oversee legal Security Compliance requirements within the region. - Support local MDs in adapting business strategy on information and cybersecurity. - Advise on information security, initiate security-related improvements, and support crisis management activities. 3. **Management responsibility (20%):** - Manage, develop, and coach security managers and staff to achieve goals. - Set objectives at individual and team levels and manage performance. - Represent the cybersecurity team on Computacenter topics and projects within the region. 4. **Financial Management (10%):** - Contribute to annual budget planning and manage spend in the budget. - Prepare business cases and controlling mechanisms for major expenditures. - Develop business cases to support investments in Information Security. To be successful in this role, you should possess a completed university degree, preferably a Master's, or comparable cybersecurity education. You should have 5-8 years of professional experience in Information Security/Cyber Security, including experience in Information Security Management Systems. Holding professional certifications such as CISM, CISSP, or CRISC is desirable. Strong knowledge of Information Security frameworks and standards, as well as legislative and regulatory Security compliance requirements, is essential. At Computacenter, with over 20,000 employees globally, we are at the forefront of digitization, advising organizations on IT strategy and implementing technology solutions across 70 countries. We offer leadership training, coaching, mentoring, and international opportunities to support your professional development and personal growth. Join us in driving digital transformation and making a difference in the world of technology. If you are ready to take on a challenging yet rewarding role as a Lead (BISO) Business Information Security Officer and contribute to the cybersecurity initiatives at Computacenter, we welcome your application. Your dedication and expertise will play a vital role in protecting our business and customers from Cyber threats.,

Posted 4 days ago

Apply

5.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

We are looking for a skilled and experienced Senior Network Engineer to join our team. The ideal candidate should have 5+ years of hands-on experience in managing and supporting enterprise network infrastructure, with expertise in routing, switching, firewalls, VPNs, and network security protocols. Your role will involve designing, implementing, and maintaining complex networks to ensure high availability, performance, and security for business-critical systems. It is essential to have experience with protocols like BGP, OSPF, and technologies such as load balancing and network monitoring tools. Experience with Juniper Hardware is a must, and relevant certifications such as CCNP, NSE, PCNSE, or JNCIA are preferred. As a Senior Network Engineer, your responsibilities will include managing IP connectivity and latency for all data center networks, configuring BGP transit and private peering, collaborating with the Architect team on networking solutions, and overseeing WAN installations. You will also be tasked with improving network performance, monitoring and scaling network bandwidth, implementing future service data centers, planning complex network upgrades and migrations, managing network security, and maintaining network hardware and software. We would like you to have at least five years of experience with Juniper Enterprise Routers and Switches, routing protocols such as BGP, OSPF, VRRP, and traffic engineering, network-based ACLs, policy-based routing, firewall management, NAT, VLANs, and switching. Your ability to generate and maintain technical documentation and network diagrams, work with carrier circuits, troubleshoot complex network issues, and contribute to monitoring and alerting systems is crucial. Experience with network automation tools, DevOps environments, and security protocols is highly desirable, along with operational knowledge of flow-based technologies, IPv6, and UNIX/Linux OS Networking. For this role, a Bachelor's degree in engineering or an equivalent degree from a well-known institute/university is required. PubMatic operates on a hybrid work schedule, with employees working three days in the office and two days remotely to maximize collaboration and productivity. Our benefits package includes paternity/maternity leave, healthcare insurance, broadband reimbursement, catered lunches, and more. Join PubMatic, a leading digital advertising platform, and be part of a team dedicated to providing transparent advertising solutions to publishers, media buyers, commerce companies, and data owners. Founded in 2006, PubMatic enables content creators to run a profitable advertising business that supports multi-screen and multi-format content demanded by consumers.,

Posted 4 days ago

Apply

10.0 - 14.0 years

0 Lacs

maharashtra

On-site

The role you are applying for will involve coordinating with Group CISO & the Asia Pacific Region (APR) Risk Management team to implement central directives regarding cybersecurity governance, conducting analysis, and organizing committees within APR. This position will report directly to the Regional Head of Risk Management, Asia Pacific Region (APR). The ideal candidate for this role should have experience working as a Chief Information Security Officer (CISO) with a background in Cyber Security, Cyber Risk Management, and Risk Management. You will be responsible for managing the APR region (Asia Pacific/Europe) and should have prior experience working with APR countries or other Asian countries, primarily Europe. It is essential to have expertise in developing and executing security strategies. Candidates with a history of frequent job changes (e.g., almost every year) will not be considered. Knowledge of EU regulations, such as DORA, is advantageous. Certifications such as CISSP, CISM, or CISA are required for this position. Your main responsibilities will include adapting Group documents to enhance local cyber resilience, organizing quarterly regional ISS Committees, cascading risk mapping to the local level, supporting the assessment of local third parties" security, advising on local/regional IT and Cyber Projects, and overseeing cybersecurity regulations in Asia Pacific. You will also be involved in conducting Cyber Risk assessments at a regional level and other risk management activities as needed. Candidates should hold a bachelor's degree in information technology, computer science, or a related field. Professional qualifications such as CISSP, CISM, or CISA are necessary. A minimum of 10 years of experience in IT management/cybersecurity governance or related fields, preferably in financial institutions, is required. You should have a strong understanding of security principles, standards, and technologies, including access control, network security, identity management, and cyber incident management. The candidate should possess strong communication and interpersonal skills to collaborate effectively with stakeholders at all levels. Being well-organized, detail-oriented, a good team player, and capable of establishing and maintaining effective working relationships with internal stakeholders are essential attributes for this role. Additionally, you should be able to work independently and demonstrate strong self-motivation.,

Posted 4 days ago

Apply

4.0 - 8.0 years

0 Lacs

maharashtra

On-site

The IT Security Manager is a key role within our IT Infrastructure department at Emkay. As the IT Security Manager, you will be responsible for implementing security measures to safeguard our systems and networks. Your main objective will be to identify and mitigate security risks, ensure compliance with industry standards, and develop strategies to protect sensitive information. Your primary responsibilities will include: 1) Implementation of Security Strategy: - Develop and execute the IT security strategy in alignment with organizational goals. - Conduct risk assessments and provide recommendations to enhance our security posture. - Collaborate with key stakeholders to implement security policies, standards, and procedures. - Enhance IT Infrastructure change management practices following ITIL processes. - Maintain a strong focus on vulnerability and patch management for the entire IT infrastructure. 2) Focus on Infrastructure Security: - Oversee the implementation of security measures for networks, systems, and applications. - Ensure data integrity and confidentiality through access controls and encryption. - Monitor and respond to security incidents, including assisting with forensic investigations. 3) Ensuring Security Compliance: - Ensure compliance with relevant regulatory requirements and industry standards. - Conduct regular assessments of the infrastructure and implement corrective actions as needed. - Stay informed about emerging security threats, vulnerabilities, and technologies. 4) Security Awareness: - Create and promote security awareness initiatives to educate the Infra team on the importance of cybersecurity. - Provide guidance to staff on security best practices and procedures. 5) Incident Response and Management: - Develop and maintain an incident response plan to address security breaches. - Lead and coordinate the response to security incidents, collaborating with internal teams and external partners as required. Qualifications required for this role include: - Bachelor's degree in computer science, Information Technology, or a related field. - Certified ITIL Practice Manager. - 4-5 years of experience in IT security roles focusing on managing security programs. - Industry certifications such as CISSP, CISM, ISO27001, or equivalent are highly desirable. - Strong knowledge of security frameworks, standards, and best practices. - Excellent communication and interpersonal skills. Additional requirements for the role include a strong ITIL background, the ability to keep up with industry trends and emerging technologies, proficient problem-solving and analytical skills with a focus on Cyber Security, demonstrated leadership and team management experience, good communication and interpersonal skills to build relationships with internal stakeholders, and the ability to work independently or as part of a team with a high level of self-motivation and initiative.,

Posted 4 days ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

Changing the world through digital experiences is what Adobe is all about. We give everyonefrom emerging artists to global brandseverything they need to design and deliver exceptional digital experiences. We are passionate about empowering people to craft beautiful and powerful images, videos, and apps, and transform how companies interact with customers across every screen. We are on a mission to hire the very best and are committed to building exceptional employee experiences where everyone is respected and has access to equal opportunity. We realize that new ideas can come from everywhere in the organization, and we know the next big idea could be yours. As a Senior Security Engineer at Adobe, you will be a part of a global architecture and engineering team within Enterprise Security dedicated to securing access to Adobe data using Zero Trust best practices. This role involves implementing a Zero Trust Solution at Adobe and delivering access controls based on a zero trust strategy. Additionally, you will be supporting other critical projects and services within the Enterprise Security organization focused on securing access and data. Your responsibilities will include researching, analyzing, troubleshooting, and supporting the delivery of security solutions aligned with team security strategies and key security requirements. You will also contribute to the development and enhancement of security services, policies, and standards to improve the security posture for employees and data. Collaborating with business units and vendor suppliers across Adobe, you will assist in improving security posture and service architecture, as well as help in the evaluation and selection of security technologies. To succeed in this role, you will need a Bachelor's degree in MIS, Computer Science, or Engineering, familiarity with Zero Trust solutions, Identity and Access Management technologies, and Public Cloud services. Knowledge of Web Application Security platforms, Single Sign On, Authentication, Authorization, Federation Technologies, and Python will be beneficial. Excellent communication skills, certifications in Information Security and Cloud Technology, strong interpersonal skills, and the ability to work collaboratively and build consensus across the organization are essential. We are seeking a highly skilled Senior Security Engineer to join our Global Enterprise Security Architecture team at Adobe. The ideal candidate will have significant experience leading large-scale security projects, driving Zero Trust initiatives, advising on infrastructure security best practices, and managing cybersecurity projects. This role is crucial for supporting global enterprise security architecture efforts and enhancing corporate security authentication. Key Responsibilities: - Provide leadership within the Enterprise Security Architecture & Engineering team, setting the strategy and executing security initiatives across the organization. - Act as a leader in advancing the organization's Zero Trust security model, setting standards, and implementing frameworks to secure digital assets across diverse environments. - Oversee high-impact, cross-functional security projects that align with the company's objectives, including vendor security management and global risk mitigation. - Serve as a Trusted Advisor on infrastructure security best practices, guiding teams on architecture decisions that align with our security roadmap. If you require an accommodation to navigate our website or complete the application process, please contact accommodations@adobe.com or call (408) 536-3015. Adobe values a free and open marketplace for all employees and has policies in place to ensure fair recruitment practices.,

Posted 4 days ago

Apply

7.0 - 12.0 years

14 - 19 Lacs

Bengaluru

Work from Office

Description: Information Security Risk Specialist Experience: 7 to 9 years Location: Bengaluru Key Responsibilities: • Develop, implement, and maintain an enterprise-wide information security risk management program. • Identify, assess, and document information security risks, ensuring alignment with business objectives. • Perform risk assessments, vulnerability analyses, and impact evaluations on IT systems and processes. • Collaborate with cross-functional teams to establish risk mitigation strategies and action plans. • Monitor, track, and report on risk metrics and key performance indicators (KPIs). • Stay updated on regulatory requirements and ensure compliance with standards such as ISO 27001, NIST, GDPR, etc. • Develop and maintain comprehensive process documentation and generate reports tailored to the needs of various stakeholders. • Drive security awareness programs and train employees on risk management practices. • Prepare and present detailed risk assessment reports to senior management. • Lead incident response planning and participate in cybersecurity investigations when necessary. Qualifications: Education: • Bachelors degree in Information Security, Cyber Security, Computer Science, Information Science, or a related field. • Advanced degrees (e.g., Masters) or certifications (e.g., CISSP, CRISC, CISM, CEH) are a plus. Experience: • 5+ years of experience in information security, risk management, or related domains. Skills and Competencies: • Comprehensive understanding of frameworks such as ISO 27001, NIST Cybersecurity Framework, COSO, and COBIT. • Proven analytical expertise in evaluating and prioritizing risks effectively. • Advanced proficiency in utilizing security tools for risk assessment and mitigation. • Strong preference for candidates with certifications like CISSP, CISM, CRISC, or equivalent. • Exceptional communication and presentation skills, with a proven ability to collaborate effectively across diverse teams. • Demonstrated problem-solving capabilities, including critical thinking and informed decision-making under pressure. • Skilled in leading security initiatives and managing projects across global teams. • A strategic mindset paired with keen attention to detail. • Resourceful and decisive under high-pressure situations. • An effective team player with exceptional interpersonal and collaboration skills. Drop your resume at sowmya.v@acesoftlabs.com

Posted 4 days ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Bengaluru

Work from Office

Be a contributing member of the collaborative team responsible for Optums Digital Certificate Services. This positionwill be responsible for ensuring the confidentiality, integrity, and availability of the enterprise certificate lifecyclemanagement platform along with the related core capabilities of ensuring domain validation and certificate operations including issuance, renewal, and revocation are always available for applications and platforms. Collaborate withother IT teams to drive certificate automation and other certificate management best practices. Provide operationalsupport in the day-to-day tasks involved with providing a centralized, enterprise certificate management platform. Primary Responsibilities: Provide operations support in the day-to-day tasks of managing certificates using Venafi Data Center Protect Engineer and develop tactical and strategic solutions to improve and automate certificate management Engineer and drive forward new initiatives that supports and enhance Certificate Lifecycle Management Provide innovative solutions to automate repetitive operational tasks Analyze, design, develop and deploy integrations to help adopt Venafi products in customer environments Participate as an independent contributor within an agile based team Comply with the terms and conditions of the employment contract, company policies and procedures, and any and all directives (such as, but not limited to, transfer and/or re-assignment to different work locations, change in teams and/or work shifts, policies in regards to flexibility of work benefits and/or work environment, alternative work arrangements, and other decisions that may arise due to the changing business environment). The Company may adopt, vary or rescind these policies and directives in its absolute discretion and without any limitation (implied or otherwise) on its ability to do so Required Qualifications: 4+ years of PKI, certificate management, or related experience Experience with certificate lifecycle management platforms, with emphasis on Venafi Scripting and automation experience leveraging Powershell, Python, or other scripting languages Understanding of X.509 certificates and general certificate management processes Serve as a subject matter expert regarding certificate management operation for internal teams Ability to participate in on call rotation Preferred Qualifications: Undergraduate degree in applicable area of expertise or equivalent experience CISSP or other security related certification Cloud Infrastructure experience in any of the major CSPs including MS Azure, AWS, or GCP Identity and Access Management experience At UnitedHealth Group, our mission is to help people live healthier lives and make the health system work better for everyone. We believe everyoneof every race, gender, sexuality, age, location and incomedeserves the opportunity to live their healthiest life. Today, however, there are still far too many barriers to good health which are disproportionately experienced by people of color, historically marginalized groups and those with lower incomes. We are committed to mitigating our impact on the environment and enabling and delivering equitable care that addresses health disparities and improves health outcomes an enterprise priority reflected in our mission.

Posted 4 days ago

Apply

6.0 - 11.0 years

30 - 35 Lacs

Pune

Work from Office

About The Role : Job Title: Technical Information Security Officer LocationPune, India Corporate TitleAVP Role Description The TISO acts based on the direction of and the tasks assigned by the Divisional TISO. The TISO is typically assigned a set of Application Software Assets and associated Databases (IT aspects only), Infrastructure Software Assets, IT Services, Hardware Assets or IT Assets associated with Building / Facilities. Therefore, the TISO assumes ownership for these assets from an IT Security perspective. The TISO executes all tasks that are assigned to this role based on defined and approved rules and processes. The Technical Information Security Officer (TISO) is 1st Line of Defence official of Deutsche Bank who is accountable for the security of enterprise information. What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities The TISOs responsibilities within the assigned CIO unit(s) comprise To accept the ownership and responsibility for assigned IT assets. To carry out the Information Security Risk and Compliance Assessments for the assigned IT assets and processes. To remain fully trained and skilled by completing the required Information Security training provided by CSO or as requested by the Principal TISO or the Divisional TISO. To support key role holders such as ITAOs and ISOs to develop a secure environment by evaluating the IT Security requirements as early as possible in the system development life cycle to select the applicable information security controls for implementation. To guide ITAOs on the implementation of compensating controls in case of deviations from the applicable information security controls. To approve the access control and user authorization approach of the assigned IT Assets. To execute and document periodical recertification of Access Rights in compliance with the DB Group Identity and Access Processes. To cooperate with key role holders such as ITAOs and Information Security Officers to put monitoring capabilities for IT Assets in place. To review the output of the monitoring jointly with the key role holders such as ITAOs, Information Security Offices and CSOs to avoid degradation of the required security level. To analyse and review the configuration of IT Assets and remediate gaps according to the applicable Information Security policies. To contribute to the Information Security Incident Management Process in the case of a security breach for their IT-Assets, if requested. To maintain the Information Security related documentation of assigned IT Assets in the DB Group IT Asset inventory. Your skills and experience Industry experience of 6-10 years. Rounded knowledge and experience of all the following Information Security processes; Application and Infrastructure Security Identity and Access management Information Security Incident and Problem Management Information Security Governance for business and technology Information Security Risk Management Expert knowledge of DB Information Security Principles, Policies, and Procedures Profound experience in business and IT processes and respective Information Security requirements. Extensive experience with financial markets and institutions. Excellent analytical skills, flexibility regarding problem solving. Excellent communication skills, fluent in English and local language (written/verbal) as appropriate. Ability to work in fast paced environment and keep pace with technical/ operational innovation. Open minded, able to share information, transfer knowledge and expertise to team members. Keeps pace with technical/operational innovation & maintains understanding of the CIO technologies, as well as CISO service and technology offerings. Education/Certification Degree in Information Security or a comparable education In addition, the following education/certification attainment will be beneficial: CISSP (Certified Information Systems Security Professional) or equivalent. ISSMP (Information Systems Security Management Professional). CISM (Certified Information Security Manager) or equivalent. How well support you

Posted 4 days ago

Apply

7.0 - 12.0 years

30 - 35 Lacs

Pune

Work from Office

About The Role : Job TitleInformation Security Specialist - AVP LocationPune, India Role Description The Information Security Analyst is responsible for supporting the execution of the Information Security strategy. The Information Security Analyst provides data and analysis to measure the effectiveness of Information Security controls across group wide products and services. The Information Security Analyst identifies and evaluates potential areas of Information Security threats by assessing the probability and impact and facilitates feedback for mitigation. Roles within Information Security may cover one or more areas of specialty, e.g., Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.); Information Security (IS) Operations (which may for example include, cyber threat operations; cyber forensics, protection against data leakage etc.) and IS Technology (which may include IS architecture, IS engineering, cryptographic services etc.) What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Review Risk Assessment (Application/Technical Risk profile) and Assurance spot checks for Compliance evaluation (e.g., IS/Cloud/SOx/MAS/Client Access Management/other regulatory controls) Analysis and verification of compliance issues Support stakeholder remediation activities Collect and review evidence (e.g., from de-centrally managed applications) Create compliance issue tickets and address issues to responsible stakeholders. Analyze and identify root causes. Provide and prepare data for management communication. Preparing reports for stakeholders and management Improvement and documentation of operational tracking activities Raise Business Requirements to Central Solutions run by other CSO teams. Your skills and experience Attitude of diligence and precision Ability to integrate in heterogeneous teams. Proactively driving topics, not shunning to address issues to higher management levels. Structured way of thinking and working Very good communicator Very good analytical and problem-solving skills Very good English (verbal and written) Experience in Excel (advanced) Good German skills beneficial Good Python programming skills beneficial Certifications in ISO 27001 or information security (e.g., CISSP, CISA) beneficial Practical experience in Governance or Compliance Monitoring beneficial. Knowledge about basic principles of Identity and Access Management beneficial How well support you . . . About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm We strive for a culture in which we are empowered to excel together every day. This includes acting responsibly, thinking commercially, taking initiative and working collaboratively. Together we share and celebrate the successes of our people. Together we are Deutsche Bank Group. We welcome applications from all people and promote a positive, fair and inclusive work environment.

Posted 4 days ago

Apply

2.0 - 7.0 years

9 - 13 Lacs

Bengaluru

Work from Office

About The Role : Job Title: Information Security Officer (ISO) LocationBangalore, India Corporate TitleAS Role Description The role of an Information Security Officer (ISO) is of a role holder aligned to a portfolio of applications (Application ISO). The ISO has the responsibility for the operational aspects of ensuring compliance with the Information Security Principles. The ISO is the primary contact for information security relevant matters within their area of responsibility. The ISO has a disciplinary reporting line into their Line Manager and a functional reporting line into the Divisional CISO. What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities To assume the ownership and responsibility for the assigned IT assets, in line with the DB Group Information Security management processes and the Divisional ISMS. To support the development and maintenance of Information Security policies and procedures pertaining to the Unit in accordance with the Information Security policies and procedures of DB Group. To support the management of IS Risks within the Risk Appetite defined by the ISR. To execute the IS Risk assessments and compliance evaluations for assigned IT assets To ensure the execution of information security risk management requirements in their area of responsibility as additionally defined by the Divisional ISO (e.g., conducting risk assessments on an organizational basis, preparing and implementing management action plans to mitigate identified risks) To ensure the implementation of Identity and Access Management Processes and the execution of a periodic recertification of User Access Rights in their area of responsibility To provide timely updates to the Divisional ISO regarding the aforementioned information security management tasks To ensure that application entries regarding information security (e.g., Data Protection and Data Privacy fields) in the Groups inventory of applications are accurate and up to date To implement Segregation of Duty (SoD) rules for the assigned IT assets To contribute to the Information Security incident management process in the case of a security breach Keep oneself informed of the Information Security Principles and its subordinate documents and liaise with any other necessary parties to accomplish their tasks. These resources may be e.g., the TISO, ITAO or any other subject matter experts To ensure appropriate documentation of information security risk management in area of responsibility. This includes major decisions including identified and assessed risks as well as risk mitigation measures To deliver all items requested during regulatory and internal Information Security related audits Your skills and experience Essential Candidate should have a minimum of 8 years of business experience in an operation management / risk management capacity, working knowledge in various banking products with strong communications skills Knowledge on Information Security Controls, Data Protection Policy, Information classification principles and segregation of duties requirements within Banking Operations Good understanding of Regulatory, Compliance, Risk & Control Knowledge Have sound knowledge of Identity and Access Management Process Ability to multitask and manage multiple deliverables / projects that are highly visible and of strategic importance to our clients Ability to effectively communicate with clients internally and externally Must be a team player and facilitator Desirable Solid technical understanding of the business (CB Operations) including strong knowledge of application security related processes. Knowledge of electronic banking products and flow of instructions Computer proficiency in MS Office and ability to utilize IT initiatives to achieve a high degree of operational efficiency, optimize costs and add value to the service provided Innovative approach to work and continuously identify and implement process improvements Seek opportunities to improve service processes, minimize operational risk and reduce costs Strong analytical skills, detail orientation, service commitment and solid people management skills Strong awareness of risk control Education / Certification Graduation degree CRISC DesiredCISA/CISM/CISSP How well support you

Posted 4 days ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Educational Qualification : 15 years full time education Summary :As an Application Developer, you will engage in the design, construction, and configuration of applications tailored to fulfill specific business processes and application requirements. Your typical day will involve collaborating with team members to understand project needs, developing innovative solutions, and ensuring that applications function seamlessly to support organizational goals. You will also participate in testing and troubleshooting to enhance application performance and user experience, contributing to a dynamic and collaborative work environment. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Assist in the documentation of application processes and workflows.- Engage in continuous learning to stay updated with industry trends and technologies. Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityIQ.- Strong understanding of identity governance and administration.- Experience with application integration and API management.- Familiarity with security protocols and compliance standards.- Ability to troubleshoot and resolve application issues effectively. Additional Information:- The candidate should have minimum 3 years of experience in SailPoint IdentityIQ.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 4 days ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Navi Mumbai

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NA Educational Qualification : 15 years full time education Summary :As an Application Developer, you will design, build, and configure applications to meet business process and application requirements. A typical day involves collaborating with various teams to understand their needs, developing solutions that align with business objectives, and ensuring that applications are optimized for performance and usability. You will also engage in problem-solving activities, providing support and enhancements to existing applications while ensuring that all development aligns with best practices and organizational standards. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate knowledge sharing sessions to enhance team capabilities.- Monitor project progress and ensure timely delivery of application features. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Strong understanding of application development methodologies.- Experience with security protocols and best practices in application development.- Familiarity with integration techniques for various applications.- Ability to troubleshoot and resolve application issues efficiently. Additional Information:- The candidate should have minimum 7.5 years of experience in CyberArk Privileged Access Management.- This position is based at our Mumbai office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 4 days ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Educational Qualification : 15 years full time education Summary :As an Application Developer, you will design, build, and configure applications to meet business process and application requirements. A typical day involves collaborating with various teams to understand their needs, developing solutions, and ensuring that applications function seamlessly within the existing infrastructure. You will engage in problem-solving activities, contribute to key decisions, and manage the development process to deliver high-quality applications that align with business objectives. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate knowledge sharing sessions to enhance team capabilities.- Monitor project progress and ensure timely delivery of application features. Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityIQ.- Good To Have Skills: Experience with identity governance and administration.- Strong understanding of application development methodologies.- Experience with integration of identity management solutions.- Familiarity with security protocols and compliance standards. Additional Information:- The candidate should have minimum 7.5 years of experience in SailPoint IdentityIQ.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 4 days ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Educational Qualification : 15 years full time education Summary :As an Application Developer, you will design, build, and configure applications to meet business process and application requirements. A typical day involves collaborating with various teams to understand their needs, developing solutions, and ensuring that applications function seamlessly within the existing infrastructure. You will engage in problem-solving activities, contribute to key decisions, and manage the development process to deliver high-quality applications that align with business objectives. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate knowledge sharing sessions to enhance team capabilities.- Monitor project progress and ensure timely delivery of application features. Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityIQ.- Good To Have Skills: Experience with identity governance and administration.- Strong understanding of application development methodologies.- Familiarity with integration techniques for various systems.- Experience in troubleshooting and resolving application issues. Additional Information:- The candidate should have minimum 5 years of experience in SailPoint IdentityIQ.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 4 days ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies