Cybersecurity Operations Specialist (FinTech | India)

5 - 10 years

0 Lacs

Posted:1 day ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Contractual

Job Description

About audax audax means courage. To have the courage to change the banking scene, eliminating constraints caused by existing legacy infrastructure. Our mission is to empower banks and financial institutions to scale and modernise at speed, reaching new customers without breaking the bank. We began our journey supplying services to and powering Standard Chartered’s white-label plug and play Banking-as-a-Service (BaaS) solution, Standard Chartered nexus, through our technology capabilities. At audax, we seek go-getters who are hungry for growth and can bring fresh perspectives. Website - https://www.audax.io What You’ll Do We are looking for a results-driven Cybersecurity Operations Specialist to manage and enhance our security infrastructure. This role covers firewall, proxy, and EDR management, threat detection, incident response, and vulnerability remediation. You’ll collaborate with cross-functional teams to embed security best practices, ensure compliance, and lead proactive defense strategies. Firewall, Network Proxy, and EDR Management: Firewall Management: Oversee the configuration, maintenance, and monitoring of firewall systems to enforce security policies and control network traffic effectively. Network Proxy Management: Manage proxy servers to secure internet traffic, optimize performance, and troubleshoot issues as needed. Endpoint Detection and Response (EDR) Management: Manage EDR tools across endpoints, configure policies for threat detection and response, and analyze endpoint data for security anomalies. Threat Detection and Content Creation: Write and refine rules, signatures, and queries to detect security threats effectively. Develop and update security detection content for SIEM (Security Information and Event Management) systems. Vulnerability and Threat Management: Manage vulnerability assessment and remediation programs, prioritizing and mitigating security vulnerabilities. Coordinate with technology operations teams to apply patches and updates to systems and applications. Monitor and respond to emerging threats, implementing proactive measures to protect systems and data. Incident Response: Perform security monitoring and triaging for potential threats and SIEM alerts. Develop and maintain incident response plans and procedures, coordinating responses during security incidents or breaches. Lead incident response teams, ensuring timely resolution and post-incident analysis to prevent future occurrences. Access Review and Security Exceptions: Establish and maintain access review processes to ensure appropriate access rights and permissions. Manage and review user requests for security exceptions, balancing business needs with security requirements. Implement controls and monitor activities to detect unauthorized access attempts and policy violations. Collaboration with Engineering Teams: Work closely with engineering teams to integrate security best practices into the development lifecycle. Conduct security reviews of infrastructure, applications, and new technologies, providing recommendations for security enhancements. Collaborate on the design and implementation of secure architecture and solutions. Service Management: Provide oversight of security service delivery, ensuring SLAs (Service Level Agreements) are met. Manage relationships with security service providers and vendors, evaluating services and negotiating contracts. Compliance and Reporting: Ensure compliance with relevant security standards, regulations, and best practices. Generate regular reports on security metrics, incidents, vulnerabilities, and operational status. Participate in audits and assessments related to security operations. Audit Management: Manage and coordinate security audits conducted internally or by external auditors. Prepare audit responses and action plans, implementing corrective measures and tracking progress. What We’re Looking For Bachelor’s degree in Computer Science, Information Technology, or related field; advanced degree or certifications (e.g., CISSP, CISM) preferred. 5-10 years of relevant Information & Cybersecurity (ICS) experience in security operations / management, with at least 2 years experiences in managing security operations team. Proven experience in a security operations role with hands-on experience in firewall management, network proxy, EDR, incident response, and threat detection. Strong understanding of security principles, protocols, and technologies. Experience with access control, vulnerability management, audit management, and compliance frameworks (e.g., PCI-DSS, GDPR). Strong acumen in setting up risk frameworks, policies, standards, baselines and procedures. Good hands-on experience reviewing cloud, application, information and cyber security. Good understanding of technology (e.g. cloud and containers) and Agile development concepts. Ability to explain theoretical concepts to team members with varying ICS backgrounds. Good knowledge of retail banking products and processes with a focus on digital products, functions, features and processes. Good understanding of industry trends and developments including impact on the business. Why Join Us? Be Part of a Bold Vision – At audax, we’re not just building software – we’re transforming how financial institutions and businesses manage risk, compliance, and growth. Join a team that’s fearless in challenging the status quo. Flexible, People-First Workplace – We value the importance of Family, Team, Self. In that order. Competitive Rewards and Startup Perks – We offer competitive salaries and meaningful benefits that look after your well-being. Privacy Notice: Please note: by submitting your application, you acknowledge that you have read and understood audax’s Privacy Policy for Employees, Freelancers, Contractors and Job Applicants (the “Policy”), and consent to the collection, use and disclosure of your personal data by audax for the purposes set out in the Policy. You may withdraw consent for such collection, use and disclosure, and make an access or correction request in respect of your personal data, in accordance with the Policy by emailing dpo@audax.io. Show more Show less

Mock Interview

Practice Video Interview with JobPe AI

Start Cybersecurity Interview Now

My Connections audax

Download Chrome Extension (See your connection in the audax )

chrome image
Download Now

RecommendedJobs for You