Jobs
Interviews

10 Cyber Resiliency Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 9.0 years

0 Lacs

karnataka

On-site

The Supplier Assurance Services (SAS) team is responsible for conducting comprehensive risk assessments of suppliers within JPMCs Corporate Third Party Oversight (CTPO) program. Additionally, SAS plays a crucial role in supporting JPMCs Cybersecurity and Technology functions by designing and implementing controls and processes to enhance the security posture of JPMCs supply chain. SAS operates under Global Supplier Services (GSS) and reports directly to JPMCs Global Head of Corporate Third Party Oversight. The SAS Risk Management function aims to standardize and centralize Assessment quality oversight and Supplier Issue Management activities. As an Associate in the Technology Risk and Control - Issue Management team within Global Supplier Services (GSS), your primary responsibility will be to conduct technology and cybersecurity control reviews. This role involves reviewing findings to ensure alignment with JPMC guidance, engaging with internal stakeholders to address Issue Management queries, collaborating with the LOB Delivery Manager and Information Security Manager to resolve findings through Action Plans and Risk Acceptance, and ensuring that relevant Action Plans/Risk Acceptances are remediated within agreed timeframes. Additionally, you will be responsible for managing the entire Issue Lifecycle, identifying process improvement opportunities, and supporting internal education and best practices sharing with peers and colleagues. Qualifications, capabilities, and skills required for this role include: - 5+ years of experience in Technology, Technology Risk & Controls, Technology Audit, Cybersecurity, Application Security, Cloud Security (SaaS, PaaS & IaaS), Network Security, Cyber Resiliency, and Third-Party Outsourcing Risk Management in a large enterprise environment. - Understanding of industry risk frameworks such as ISO27001, NIST Cybersecurity Framework, etc. - Strong written and verbal presentation skills at the senior management level. - Experience in debating issues with senior decision-makers and the ability to push back when necessary. Preferred qualifications, capabilities, and skills include certifications such as CISSP, CISA, CISM, CCSP, or CRISC.,

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

The Supplier Assurance Services (SAS) team is responsible for conducting comprehensive risk assessments of suppliers as part of JPMCs Corporate Third Party Oversight (CTPO) program. In addition, SAS plays a key role in supporting JPMCs Cybersecurity and Technology functions by implementing controls and processes to enhance the security posture of the supply chain. SAS operates within Global Supplier Services (GSS) and reports directly to the Global Head of Corporate Third Party Oversight. The SAS Risk Management function aims to standardize and centralize the quality oversight of assessments and Supplier Issue Management activities. As an Associate in the Technology Risk and Control - Issue Management team at GSS, your primary responsibility will be to conduct technology and cybersecurity control reviews. This involves reviewing findings to ensure alignment with JPMC guidance, validating closure evidence, and collaborating with internal stakeholders to address Issue Management queries. You will work closely with the LOB Delivery Manager and Information Security Manager to resolve findings through Action Plans and Risk Acceptance. Additionally, you will manage the entire Issue Lifecycle, including identification, creation, modifications, extensions, and validation of closure evidence. It is important to engage with Business Partners to ensure timely remediation of relevant Action Plans and Risk Acceptances. Furthermore, you will be responsible for understanding the Supplier Risk Assessment process, identifying process improvement opportunities, and sharing internal education and best practices with peers and colleagues. The ideal candidate for this role should have at least 5 years of experience in Technology, Technology Risk & Controls, Technology Audit, Cybersecurity, Application Security, Cloud Security (SaaS, PaaS & IaaS), Network Security, Cyber Resiliency, and Third-Party Outsourcing Risk Management within a large enterprise environment. Knowledge of industry risk frameworks such as ISO27001, NIST Cybersecurity Framework, and others is essential. Strong written and verbal communication skills are required, particularly at the senior management level. The ability to engage in constructive debates with senior decision-makers and push back when necessary is also valuable. Preferred qualifications for this role include certifications such as CISSP, CISA, CISM, CCSP, or CRISC.,

Posted 2 weeks ago

Apply

7.0 - 13.0 years

0 Lacs

haryana

On-site

As a Backup Admin specializing in NetBackup & Rubrik at FIS, you will play a crucial role in providing Subject Matter Expert (SME) level support for the data protection environment across FIS data centers globally. Your responsibilities will include developing and implementing comprehensive data protection and cyber resiliency strategies, designing and architecting data protection solutions in alignment with business objectives, collaborating with cross-functional teams to ensure data security and compliance, and managing and optimizing data protection technologies such as NetBackup, Rubrik, Veeam, or Commvault. You will be expected to develop and maintain automation scripts to streamline data protection processes, troubleshoot and resolve complex data protection issues, provide expert guidance on data protection best practices and emerging trends, and lead initiatives to enhance data protection capabilities and resilience. To excel in this role, you should have at least 3 years of relevant experience in NetBackup & Rubrik, proven experience as a Data Protection Engineer or similar role, in-depth knowledge of data protection and cyber resiliency principles, a strong understanding of data protection technologies, experience with cloud-based data protection solutions, familiarity with regulatory requirements and compliance standards, and proficiency in automation tools and scripting languages. Joining FIS will offer you an exciting opportunity to be part of the world's leading FinTech product MNC, providing you with a multifaceted job that carries a high degree of responsibility and a broad spectrum of opportunities for professional education and personal development. At FIS, you will find a culture that values openness, collaboration, entrepreneurship, passion, and fun, where talented individuals like yourself are empowered to tackle some of the most challenging and relevant issues in financial services and technology. FIS is committed to protecting the privacy and security of all personal information processed to provide services to clients. Therefore, FIS primarily follows a direct sourcing model for recruitment, with a limited portion of hiring through recruitment agencies. FIS does not accept resumes from recruitment agencies that are not on the preferred supplier list and disclaims responsibility for any associated fees related to resumes submitted through job postings or to any part of the company. If you are a curious, motivated, and forward-thinking individual with a passion for data protection and cyber resiliency, FIS welcomes you to join a team that values your expertise and offers a rewarding career opportunity in a dynamic and innovative environment.,

Posted 2 weeks ago

Apply

3.0 - 8.0 years

22 - 25 Lacs

Mumbai

Work from Office

Essential Services : Role & Location fungibility At ICICI Bank, we believe in serving our customers beyond our role definition, product boundaries, and domain limitations through our philosophy of customer 360-degree. In essence, this captures our belief in serving the entire banking needs of our customers as One Bank, One Team . To achieve this, employees at ICICI Bank are expected to be role and location-fungible with the understanding that Banking is an essential service . The role descriptions give you an overview of the responsibilities, it is only directional and guiding in nature. About the role As a Lead Information Security Resiliency and Vulnerability Assessment & Penetration Testing Manager, you will be responsible for defining the scope for annual Vulnerability Assessment & Penetration Testing (VAPT) activity and handling end-to-end third party VAPT assessment activity. The selected applicant, would be accountable for managing organizations cyber resiliency and for implementing cyber resilience goals. Key Responsibilities Business Understanding: Understanding/Knowledge of information security domains, risks, mitigation and overall management. Experience and knowledge of servers, networks, security devices etc. Collaborate: Interaction with various stakeholders/teams on daily basis. Ability to communicate effectively with Heads of various teams. Proactively coordinating with different teams for tracking and closure of open observations and escalating when necessary. Vendor Management: Facilitating the vendor with requirements for carrying out the VAPT assessment. Vendor selection, evaluation and finalization for the annual Vulnerability Assessment & Penetration Testing (VAPT) activity. Candidate should review the draft reports shared by vendors and suggest if any changes required, Validation of final reports. Timely communication of final reports to relevant stakeholders. Qualifications & Skills Educational Qualification: Engineering Graduate in CS, IT, EC or InfoSec, CyberSec or MCA equivalent. Certifications: ISO27001, CISSP, CISM Compliance: Candidate should validate the security controls deployed across DC, DR, NDR and COLO environment and prepare the quarterly resiliency report to share with senior management. Synergize with Team: Ability to work collaboratively with different teams for closure of activities. Strong analytical and problem-solving skills. Experience in the banking domain will add an advantage. Strong understanding and hands-on experience of VAPT activity and Information Security resiliency. Communication skills: Excellent communication and interpersonal skills. About the Business Group ICICI Banks Technology Risk Management Group believes in providing services to its customers in the safest and secure manner keeping in mind that data protection and secure Technology for its customers is as important as providing quality banking services across the spectrum. The CIA triad of Confidentiality, Integrity, and Availability is at the heart of building a comprehensive information security framework. The Bank also lays emphasis on customer elements like protection from phishing, adaptive authentication, awareness initiatives, and provide easy to use protection and risk configuration ability in the hands of customers. The Bank also undertakes campaigns to create awareness among customers on security aspects while banking through digital channels.

Posted 2 weeks ago

Apply

4.0 - 12.0 years

0 Lacs

karnataka

On-site

As a skilled and visionary Technical Manager specializing in Backup & Disaster Recovery (DR), you will be responsible for leading and modernizing the global data protection strategy at Siemens Healthineers. Your role will be crucial in ensuring the safeguarding of Healthineers data assets against ransomware threats, enhancing cyber resiliency, and implementing cutting-edge DR solutions across cloud and on-premise environments. You will drive the unification and standardization of backup solutions company-wide, while also overseeing IT service operations such as incident, request, change, knowledge management, and problem management. Your key tasks and responsibilities will include: - Leading the design, implementation, and lifecycle management of a unified backup and DR platform across all Siemens Healthineers locations. - Evaluating and integrating emerging technologies and industry trends such as immutable backups, cloud-native DR, BaaS, and DRaaS. - Migrating disparate backup solutions to a single enterprise-grade solution, leveraging technologies like Commvault. - Designing and enforcing backup strategies that defend against ransomware and other advanced threats. - Implementing modern cyber-resilient features including immutable backups, air-gap protection, forensic clean rooms, and automated anomaly detection and alerting. - Defining and ensuring alignment with business continuity strategies, recovery point objectives (RPO), and recovery time objectives (RTO). - Automating and conducting regular DR drills and post-mortem analyses to validate recovery readiness. - Leading and managing ITSM processes including incident, request, change, and problem management across backup and DR services. - Ensuring high availability and SLA compliance for backup/DR operations through proactive monitoring and reporting. - Driving continuous improvement initiatives in service delivery aligned with ITIL best practices. - Overseeing the budgeting, cost tracking, and optimization of backup and DR services. - Supporting business case development for tool consolidation and infrastructure investment. - Leading a global or distributed team of engineers and specialists, developing staff through coaching, training, and performance management to foster a culture of accountability, innovation, and service excellence. Qualifications required for this role include: - Bachelor's degree in Computer Science, Information Systems, or related discipline (Master's preferred). - 12+ years of experience in IT infrastructure roles, with 4+ years in a technical management or leadership position. - Experience with on-premises and cloud-native backup and recovery technologies. - Experience with Disaster Recovery solutions for both cloud (e.g., Azure, AWS) and on-premise environments. - Strong background in protecting data against ransomware and enhancing cyber resiliency. - Solid understanding of ITSM frameworks, preferably ITIL v4 certified. - Experience in managing global backup/DR migrations and solution unification projects. In terms of technical skills, you will need: - Experience in managing and designing Commvault-based backup environments. - Experience with on-premises and cloud-native backup/DR and recovery tools such as Commvault, Cohesity, Azure Backup, VMWare Site Recovery Manager, and Azure Site Recovery. - Experience implementing immutable backups, anomaly detection, and recovery solutions to withstand ransomware attacks. - Practical knowledge of configuring logical/physical air-gap architectures and immutable storage. - Experience backing up VMs, physical servers, databases, and integrating with platforms like VMware, Hyper-V, and SAN/NAS. - Proven ability to design, implement, and test DR strategies for both on-premise and cloud infrastructures. - Knowledge of regulatory requirements (e.g., GDPR, HIPAA) and ensuring backup solutions meet compliance and audit standards. - Experience with enterprise ITSM platforms like ServiceNow. - Strong communication and stakeholder management skills across business and technical teams. Siemens Healthineers values individuals who dedicate their energy and passion to a greater cause. As part of our global team, you will have the opportunity to innovate for healthcare, building on our legacy of pioneering ideas. We encourage ownership of work to support personal and professional growth in a flexible and dynamic environment.,

Posted 2 weeks ago

Apply

6.0 - 8.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl We are always moving forward always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Kyndryls Security & Resiliency is one of our most critical practices, ensuring enterprises, regardless of their size and complexity, remain secure, available, reliable, and resilient. We take Cybersecurity seriously. We&aposre not just invested; we&aposre committed. We&aposre not just protecting data; we&aposre empowering. Kyndryl is committed to making the world safer, not only by investing in state-of-the-art services and technologies but also by empowering underserved communities with essential cyber skills. When you walk through our doors, you&aposre not only joining a team but you&aposre also becoming part of a legacy. Welcome to Kyndryl, where Cybersecurity isn&apost just a job its a passion; a commitment to designing, running, and managing the most modern and reliable technology infrastructure that the world depends on every day. As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incident response, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations their infrastructure. In this role, you won&apost just monitor; you&aposll actively engage in the relentless hunt for cyber adversaries. In a world where every click and keystroke could be a potential gateway for attackers, your role will be nothing short of critical as you seek out advanced threats, attackers, and Indicators of Compromise (IOCs). Your expertise in endpoint detection and response (EDR) will be the shield that safeguards individual workstations, laptops, servers, and other devices from cybercrime. Your responsibilities go beyond vigilance. When it comes to network security, you&aposll utilize Network Detection and Response (NDR) to monitor the ever-flowing currents of network traffic. The incident management process will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You&aposll gather, analyze, and interpret data applying your own and external threat intelligence to uncover potential security threats and risks. These insights and your ability to analyze complex attack scenarios will be the foundation of our security strategy helping Kyndryl stay one step ahead of security breaches. In Cybersecurity Defense at Kyndryl, youre not just protecting the present youre shaping the future of digital security. Join us on this cybersecurity venture where your expertise and creativity will have a lasting impact in the world of digital defense. Your Future at Kyndryl When you join Kyndryl, you&aposre not just joining a company you&aposre entering a space of opportunities. Our partnerships with industry alliances and vendors mean you&aposll have access to skilling and certification programs needed to excel in Security & Resiliency, while simultaneously supporting your personal growth. Whether you envision your career path as a technical leader within cybersecurity or transition into other technical, consulting, or go-to-market roles were invested in your journey. Who You Are Youre good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others. Required Skills And Experience Provide and manage vulnerability scanning and assessment tools for traditional IT assets. 6 - 8 years of security analyst experience, preferably in a managed services environment Analyze scan results, prioritize findings using risk-based methodology. Deliver actionable remediation and mitigation recommendations. Maintain continuous visibility and reporting for servers, endpoints, and network infrastructure. Vulnerability Scanning: Tenable.io, Qualys, or Rapid7, Tanium (based on agreement) Vulnerability Scanning: Tenable.io, Qualys, or Rapid7, Tanium (based on agreement) Ticketing Integration: ServiceNow, Jira Reporting: Custom dashboards (Power BI/Tableau) or native tool reports Experience with cloud security, devops, cyber resiliency/incident management, Zero Trust, network/EDGE security, and emerging technologies such as IoT and AI. Experience threat hunting, proactively and iteratively searching to detect advanced threats that evade existing security solutions. Deep understanding of the current cyber threat landscape, the different tactics commonly used by adversaries and how you would investigate, contain and recover against their attacks Expertise with security incident response process. Preferred Skills And Experience Bachelors degree in Computer Science, Cybersecurity, Information Technology, or other related fields Preferred Certifications in Cyber Security: ECTHP (Certified Threat Hunting Professional) or?ECMAP (Malware Analysis Professional); other specialized security analyst certifications Experience in Cloud Security monitoring and in advanced analytics (UEBA) Being You Diversity is a whole lot more than what we look like or where we come from, its how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But were not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you and everyone next to you the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. Thats the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked How Did You Hear About Us during the application process, select Employee Referral and enter your contact&aposs Kyndryl email address. Show more Show less

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

The Supplier Assurance Services (SAS) team at JPMCs Corporate Third Party Oversight (CTPO) program is dedicated to conducting thorough risk assessments of suppliers. As an integral part of Global Supplier Services (GSS), SAS plays a crucial role in enhancing the security posture of JPMCs supply chain in collaboration with JPMCs Cybersecurity and Technology functions. Reporting directly to JPMCs Global Head of Corporate Third Party Oversight, SAS focuses on designing and implementing controls and processes to mitigate risks effectively. In the role of Associate, Supplier Cybersecurity Controls within the Supplier Assurance Services team, you will be responsible for conducting technology and cybersecurity control assessments of supplier environments. Your primary tasks will involve reviewing infrastructure, application stacks, and other technologies to ensure compliance with JPMC Corporate Policies & Standards. Working closely with JPMCs Global Cybersecurity and Technology team and JPMCs Lines of Business (LOBs), you will address the latest cyber risks prevalent in the industry. As part of the SAS team, you will evaluate action plans and risk acceptances across business lines where technology standards compliance falls short. Your key responsibilities will include managing all aspects of the control assessment of suppliers, leading onsite/virtual assessments, identifying and addressing control breaks and vulnerabilities within suppliers IT environments, and suggesting process improvements for enhanced operational efficiency and supplier posture. Additionally, you will support internal education initiatives and share best practices with peers, colleagues, and third parties while escalating any critical issues associated with suppliers as necessary. To excel in this role, you should possess at least 5 years of experience in Technology, Technology Risk & Controls, Technology Audit, Cybersecurity, Application Security, Cloud Security (SaaS, PaaS & IaaS), Network Security, Cyber Resiliency, and Third Party Outsourcing Risk Management within a large enterprise-level environment. It is essential to have a solid understanding of industry risk frameworks such as ISO27001, NIST Cybersecurity Framework, and others. Strong written and verbal presentation skills at the senior management level, along with the ability to engage in constructive debates with senior decision-makers and provide necessary pushback when required, are crucial for success in this position. Preferred qualifications for this role include certifications such as CISSP, CISA, CISM, CCSP, or CRISC, which can further enhance your expertise in supplier cybersecurity controls and risk management.,

Posted 3 weeks ago

Apply

10.0 - 14.0 years

0 Lacs

karnataka

On-site

You should have a successful track record of selling to large Indian enterprise and FTSE250 clients. With at least 10 years of experience in Cyber Security Services, industry Cyber Security Certifications are preferred. A strong technical acumen in Security is required, along with an understanding of the technical challenges and demands of Security solutions and products. Ideal experience includes consultative solution selling. You should have experience or relationships with leading OEMs such as Cisco Security, F5 Networks, Palo Alto Networks, Fortinet, Zscaler, Netskope, Crowdstrike, Cohesity, Rubrik, along with awareness of innovative start-ups. Your skills should include developing new relationships with customers and OEMs, recommending and positioning technical solutions to solve customer business challenges. Critical skills necessary are account planning with an extended team, calling at all levels within the customer's organization, and managing partner relationships. As part of the India-based security team, you will be responsible for developing sales strategy and executing it to achieve in-region sales and profit targets. You will also work with the wider global security team to develop sales strategy and execute against it for global sales and profit targets. Positioning Security solutions to large Indian-based financials/enterprise clientele and supporting global financials, primarily focusing on Indian-based enterprise clientele will be part of your responsibilities. You should be able to effectively profile target accounts and engage in professional networking to build relationships with C-level executives, Executive Directors, Managing Directors, and decision-making managers at targeted clients. Developing and maintaining client and OEM relationships with strategic partners is essential. Continued education on the evolving security landscape, including Security Strategy, Cyber Resiliency, Segmentation, Cloud Security, Zero Trust, Endpoint Security Architecture, SASE/SSE, Observability, Next Generation Firewall, Identity and Access Management, and Compliance requirements is expected. You should be comfortable with 70% travel as part of this role.,

Posted 3 weeks ago

Apply

5.0 - 7.0 years

7 - 9 Lacs

Pune

Work from Office

A new product from scratch in the world of data protection and cyber resiliency for mainframe data. You will handle complex problems that require in-depth knowledge of z/OS internals. You will collaborate across different BMC product lines, including new function development and product maintenance, and communicate with various teams to resolve customer issues. You will work as part of BMCs Cloud and team, specifically focusing on our AMI Cloud product family. AMI Cloud is BMC's high-performance data management and mainframe modernization solution. Here is how, through this exciting role, YOU will contribute to BMCs and your own success Apply z/OS internals experience to design complex operating system-level solutions and develop new products from scratch. Design, develop, troubleshoot, and debug software programs, including software tools, user interfaces, and cross-platform communication. Address a broad array of critical and unique issues and complex programs/solutions. Utilize in-depth knowledge of the product development process and mainframe product I/O operations. Exhibit a passion for developing high-quality software design and architecture, coding complex modules that meet functional and business requirements on schedule and within budget. Identify, prioritize, and execute tasks in the software development life cycle. Develop tools and applications by producing safe and Automate tasks through appropriate tools and scripting. Perform unit/module testing to identify errors and confirm programs meet specifications. Stay up to date with new technology and teach other developers how to incorporate new trends. Fix bugs, add enhancements, and convert software to other platforms. Generate ideas with team members and offer insightful solutions. Mentor less experienced colleagues. Troubleshoot complex problems at both application and systems levels. T o ensure youre set up for success, you will bring the following skillset & experience: 12 designing, testing, and implementing mainframe OEM vendor products and system exits in an IBM z/OS environment. Experience with low-level I/O, CCWs, appendages, TCP/IP, and Linux. Proven experience with architecting and developing complex low-level mainframe products. Extensive experience coding MVS assembler using MVS supervisor services, 64-bit, cross-memory services, and data management facilities. Diagnostic, debugging, and troubleshooting skills using IPCS, GTF, and XDC. Ability to work independently, solve complex problems, and effectively reassess work priorities. Team-leading experience with the ability to gather ideas, brainstorm, and present results in a cohesive manner. Knowledge of z/OS internals and control blocks. Experience supporting and developing MVS systems software. Familiarity with CI/CD and pipeline management tools. Experience with mainframe modernization tools and cloud systems. Whilst these are highly desirable and an advantage, our team can help you develop the following skills Experience using HSM, CA-Disk, Cyber Vault, zDP Experience using any Cloud technology (AWS, Azure, GCP, Docker, CI-CD). Experience working with storage and cloud products.

Posted 1 month ago

Apply

3.0 - 8.0 years

22 - 25 Lacs

Mumbai

Work from Office

Essential Services : Role & Location fungibility At ICICI Bank, we believe in serving our customers beyond our role definition, product boundaries, and domain limitations through our philosophy of customer 360-degree. In essence, this captures our belief in serving the entire banking needs of our customers as One Bank, One Team . To achieve this, employees at ICICI Bank are expected to be role and location-fungible with the understanding that Banking is an essential service . The role descriptions give you an overview of the responsibilities, it is only directional and guiding in nature. About the role As a Lead Information Security Resiliency and Vulnerability Assessment & Penetration Testing Manager, you will be responsible for defining the scope for annual Vulnerability Assessment & Penetration Testing (VAPT) activity and handling end-to-end third party VAPT assessment activity. The selected applicant, would be accountable for managing organizations cyber resiliency and for implementing cyber resilience goals. Key Responsibilities Business Understanding Understanding/Knowledge of information security domains, risks, mitigation and overall management. Experience and knowledge of servers, networks, security devices etc. Collaborate Interaction with various stakeholders/teams on daily basis. Ability to communicate effectively with Heads of various teams. Proactively coordinating with different teams for tracking and closure of open observations and escalating when necessary. Vendor Management Facilitating the vendor with requirements for carrying out the VAPT assessment. Vendor selection, evaluation and finalization for the annual Vulnerability Assessment & Penetration Testing (VAPT) activity. Candidate should review the draft reports shared by vendors and suggest if any changes required, Validation of final reports. Timely communication of final reports to relevant stakeholders. Qualifications & Skills Educational Qualification Engineering Graduate in CS, IT, EC or InfoSec, CyberSec or MCA equivalent. Certifications ISO27001, CISSP, CISM Compliance Candidate should validate the security controls deployed across DC, DR, NDR and COLO environment and prepare the quarterly resiliency report to share with senior management. Synergize with Team Ability to work collaboratively with different teams for closure of activities. Strong analytical and problem-solving skills. Experience in the banking domain will add an advantage. Strong understanding and hands-on experience of VAPT activity and Information Security resiliency. Communication skills Excellent communication and interpersonal skills.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies