Key Responsibilities: Lead the end-to-end risk management lifecycle from risk identification, assessment, and analysis to mitigation planning and implementation. Experience in GDPR, data privacy and protection and Risk management tools. Design, implement, and regularly update risk management checklists , templates, and reporting mechanisms. Develop and maintain a comprehensive risk register and associated documentation. Align risk management practices with global standards like ISO 31000 and ISO 27005. Required Skills and Qualifications: 5-7 years of proven experience in a risk analyst or similar role. In-depth knowledge of GDPR , data privacy and protection principles, and compliance frameworks. Proficient in using Risk Management tools (e.g., RSA Archer, LogicManager, RiskWatch, or similar platforms). Familiarity with international risk management standards (ISO 31000, ISO 27005 preferred). Exceptional communication and interpersonal skills to work with diverse teams across regions. NOTE- Prior work experience in Compliance standards for UK financial industry would be added advantage.
TITLE- SOC ANALYST-L3 JOB DESCRIPTION: Responsible for responding to security incidents identified by internal controls or external SOC partners Strictly adhere to service level agreements (SLAs), metrics and business scorecard obligations for ticket handling security incidents and events. Hands-on experience with Security Information and Event Management (SIEM) tools such as Splunk, IBM Q-Radar, Microsoft Sentinel, LogRhythm, or ArcSight. Proficient in Incident Response and automation workflows as it relates to Security Operations. Detects, identifies, and responds to cyber events, and incidents in line with cyber security policies and procedures. Should be capable of independently leading and managing security event investigations with minimal guidance from SOC leadership, while effectively collaborating with other departments as needed Evaluate and update current SOC procedures and runbooks as required or directed. QUALIFICATION REQUIRED: Bachelors degree in computer science, Information Technology, Business or equivalent discipline Minimum 5 years of technical experience in Security Operations Center (SOC) and Information Security required. SIEM certification or Security technology related certification is a plus. Candidate should be willing to work in 24*7*365 shifts Candidate should be able to work from Ares Office located in Mumbai Experience- 5 to 7 years Location-Mumbai (In office) Shift- Rotational shifts Notice- Immediate joiners NOTE- Candidates are expected to attend inperson interview in Mumbai.
Key Responsibilities: Perform vulnerability assessments and management in OT environments using Claroty VM. Analyze and triage OT vulnerabilities, assign remediation priorities, and track closure with asset owners. Work closely with SOC/IR teams to validate, escalate, and remediate OT security incidents. Conduct periodic security assessments, threat detection, and reporting for OT systems. Support development of SOPs and best practices for OT vulnerability management. Provide technical guidance and security recommendations for industrial networks. Requirements: Proven hands-on experience in OT/ICS Security . Strong working knowledge of Claroty VM or similar OT security platforms. Understanding of OT/ICS protocols and environments. Experience in vulnerability lifecycle management and remediation coordination. Strong analytical, problem-solving, and communication skills. EXPERIENCE- 4-6 YEARS LOCATION- Banglore WORK MODE- Hybrid NOTICE- Immediate joiners prefered.