Jobs
Interviews

1125 Iso 27001 Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

1.0 - 5.0 years

3 - 7 Lacs

gurugram

Work from Office

At American Express, our culture is built on a 175-year history of innovation, shared values and Leadership Behaviors, and an unwavering commitment to back our customers, communities, and colleagues. As part of Team Amex, you ll experience this powerful backing with comprehensive support for your holistic well-being and many opportunities to learn new skills, develop as a leader, and grow your career. Here, your voice and ideas matter, your work makes an impact, and together, you will help us define the future of American Express. The Global Risk Compliance (GRC) group within American Express is responsible for providing oversight and governance of risks to ensure that the company operates in a safe and sound manner within regulatory expectations. In a world increasingly subject to digitalization and the use of technology, technology risk management has become increasingly significant across organizations, becoming one of the key themes at board meetings. Cyberattacks have become increasingly commonplace and the trend continues to move upward. This individual contributor role is part of the second line technology risk management team within the GRC group, headed by the Chief Risk Officer (CRO) of the company. This is a unique opportunity to work with a team of diverse and talented professionals who are responsible for building the technology risk management program and providing independent risk oversight to the Information Technology (IT), Information Security (IS) and Business Continuity management (BCM) risks. Reporting to the Manager for Cybersecurity, Technology, and Resiliency Risk oversight, this position is responsible for supporting independent assessments and reporting of risks. The risks identified by this team are reported to the Senior Management, Risk Management Committees, Board of Directors, and Regulators. This position will be responsible for effectively collaborating with key stakeholders across lines of business and lines of defense to ensure risks are managed effectively and efficiently in accordance with the company policies and applicable regulatory requirements. Essential Job Functions: Assist in identifying and assessing IT and IS risks across applications, infrastructure, and third-party vendors. Support IT and IS risk assessments and recommend mitigation strategies. Monitor IT and IS risk trends and emerging threats to provide proactive recommendations. Assist in the testing and validation of IT and IS controls. Prepare IT and IS risk reports and dashboards for management review. Support internal and external audits related to IT and IS risk. Support the implementation of IT and IS risk management frameworks, policies, standards, and procedures. Maintain IT and IS risk registers and track remediation efforts for identified risks. Support independent, proactive risk management and oversight of information technology, information security and business continuity management risks generated within business processes or that occur due to use of Technology. Support data-driven reviews focused on technology, cyber security, and business continuity management risks. Support development and enhancement of data-driven key risk indicators and key performance indicators that provide real time and meaningful insights into the risk and performance trends. Stay knowledgeable of relevant regulations, guidelines industry standards. Support the design of independent Information Technology risk oversight program which defines the engagement and integration with various risk management programs, including Risk and Control Self Assessments, Business Continuity Management, New Product Approval, Mergers Acquisitions etc. Required Qualifications: Bachelor s Degree in related field. 3 + years of experience in IT and IS risk management across any of the three lines of defense. Proven ability to identify risks, analyze issues and derive meaningful insights about risk trends. by conducting interviews and analyzing large volumes of data. Excellent analytical skills with high attention to detail and accuracy. Excellent critical thinking and problem-solving skills. Excellent verbal, written and interpersonal communication skills. Willingness to challenge traditional thinking by actively engaging in constructive dialogue. Preferred: Educational background: Computer Science or Information Systems. Experience in risk management across cyber security, information technology, third party, business continuity management. Working knowledge of one or more of the data mining tools/technologies (e.g., Microsoft Excel: Pivot Tables SQL, SAS, Python, R). Industry certifications (e.g., CISSP, CISM, CISA, CRISC, ITIL, CBCM, CBCP, CBCI). Understanding of risk assessment methodologies, frameworks, and industry standards (e.g., COSO, COBIT, ISO 27001, ISO/IEC 20000-1, ISO 22301, FAIR or NIST RMF). Knowledge of relevant policies regulations (e.g., OCC Heightened Standards, FFIEC IT booklets). Experience with Governance, Risk and Compliance tools (e.g., Archer).

Posted 2 days ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

gurugram

Work from Office

Position: Senior Associate Department: Research Search Analytics Location: Gurgaon/ Bangalore Objectives This position leads the transactional/TM project delivery for a single or multiple client accounts in diverse areas of technology and Patent Services. The role involves understanding client requirements and formulating effective teams to ensure high quality delivery to clients. Additionally, the role also involves maintaining high engagement levels of team members and providing them growth opportunities in addition to supporting various operational activities related to clients and people. 1. Client a. Ensuring high Quality delivery and TAT compliance; 100% compliance to client SLAs. b. Building and fostering strong client relationships to ensure business stability and growth c. Ensuring closure of any feedback received from the client d. Supporting Sales/Solutioning teams on growth opportunities 2. People a. Providing trust and leadership, coaching and support to team members; and continue to improve capability for optimum results and retention b. Building a development and succession plan for the key resources c. Maintaining a balanced team in terms of compensation, skill and tenure 3. Operations a. Leading monitoring teams performance to ensure high efficiency in process operations and meet individual, project and team level targets b. Ensuring timely delivery of internal external reports c. Setting-up various processes and draft standard operating procedures (SOPs) d. Monitoring overall project operations and ensure their timely execution within budget 4. Misc. a. Displaying effective and responsive communication b. Participating in Learning and Development activities at various levels; supporting various Org/ BU wide initiatives Complying to all specific company policies to apply without exception, including but not limited to compulsory adherence of ISO/IEC 27001:2013 guidelines Experience: Good years of experience in Intellectual Property Patents, with a proven track record in leading team(s) and client account(s) In-depth knowledge of technical literature around subject matter expertise Good knowledge of various Patent Services, including Prior Art Searching, Infringement Analysis, Patent Analytics, etc. Knowledge of US Patent Law (35 USC 101, 102, 112 etc.) Ability to analyse complex issues and apply analytical thinking as SWOT to drive fast and effective solution. High level of computer proficiency in MS Office suite of applications. B.E./B.Tech. in Electronics and Communication Engineering, Computer Science and Engineering, Information Technology or equivalent Personal attributes: Must be well organized and able to juggle multiple tasks - dynamic, and action-orientated, which meets deadlines and makes it happen. Must have ability to build and maintain relationships, and work confidently with people at all levels Must possess an enthusiastic and approachable personality. Must be an excellent communicator (written and verbal) with the ability to earn trust and credibility. Must have ability to influence, network, negotiate, counsel and mediate Must have ability to demonstrate a high degree of confidentiality Must be willing to accept responsibility and make decisions based on experience, education and understanding of business/client needs. Please refer to our Privacy Policy at UnitedLex for information, https: / / unitedlex.com / privacy-policy / "ISO 27001:2022 is the standard that we follow in this organization , Based on this ISO document we have implemented 92 controls in UnitedLex across multiple offices and also with the help of this document we have implemented the Information Security Management System in the Organization"

Posted 2 days ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

mumbai

Work from Office

Collaborate to solve complex security problems as part of a highly dynamic, close-knit team of dedicated security professionals. Manage the effective response to security related incidents in accordance with the established incident response framework. Analyze, manage, investigate, and document from various sources such as logs and security tools. Deploy and manage information security controls for assigned areas Collect relevant data to support the preparation of information security dashboards. Participate in the administration of information security-related governance activities. Strong analytical and troubleshooting abilities to investigate, identify and resolve security incidents quickly and effectively. Perform real-time monitoring of third-party threat intelligence feeds, forums, and mailing lists to gather information on vulnerabilities, exploits and threat actors applicable to the fund. Produce threat intelligence reports to support operational and strategic security planning workstreams. Assess security incident trend data to determine systemic operational risks and then support the development of solutions to mitigate risks. Conduct information security risk assessments, recording issues in the risk register and driving mitigating actions. Coordinate the remediation of audit and/or self-identified control deficiencies. Act as a security advisor on various security risks and issues to various departments. 24 hour a day on-call requirement for up to 30% of the month. Works well in high-pressure and fast paced environment Undergraduate degree or college diploma in related field 5+ years of relevant experience Experience managing and deploying IT infrastructure or cyber security technologies preferred. Possess relevant cybersecurity certifications (i.e., CISSP, CompTIA Security+, or equivalent). Strong technical capabilities in the areas of firewalls, anti-virus, content filtering, SIEM, threat intelligence, security orchestration and automation, vulnerability management and cloud security Knowledge of common attack vectors, malware behavior, and security frameworks (e.g., MITRE ATT&CK, NIST, ISO 27001). Familiarity with SIEM, EDR, DLP, and other security technologies. Strong written and verbal communication skills Preferred: Scripting and querying skills (e.g., Python, PowerShell, KQL or Bash) for automation and investigation

Posted 2 days ago

Apply

4.0 - 6.0 years

6 - 8 Lacs

mumbai

Work from Office

KEY ACCOUNTABILITIES I. Software catalogue Lifecycle Governance Maintain and govern a centralized, authoritative software catalogue across IT, OT, and cloud environments. Standardize catalogue entries, reduce version sprawl, and ensure alignment with support and lifecycle policies. Classify and oversee applications (including SaaS, browser extensions, and AI tools) for security, risk, and compliance considerations. II. Process Governance Optimization Support intake, approval, and retirement processes for software assets. Partner with Cyber Security, Infrastructure, Procurement, and Software License Compliance teams on risk reviews, onboarding, and decommissioning of applications. Analyse usage and lifecycle data to recommend rationalization, consolidation, or retirement of redundant tools. III. Tool Automation Enablement Leverage SAM tools ServiceNow SAMPro for automated discovery, reconciliation, and reporting. Configure dashboards and reports to provide visibility into compliance, utilization, and lifecycle health. Contribute to workflow automation (e.g., software request and approval processes) to increase efficiency and reduce manual effort. IV. Stakeholder Collaboration Knowledge Sharing Build strong working relationships with global stakeholders in Cyber Security, Infrastructure, Procurement, Finance, Digital Workplace, Legal, and Software License Compliance. Contribute to governance frameworks, policies, and standards to strengthen enterprise-wide SAM practices. Maintain accurate process documentation and promote best practices across global teams. MINIMUM QUALIFICATIONS Education Full time graduation from an accredited university (Mandatory- Note: This is the minimum education criteria which cannot be altered) 4 6 years of total experience in IT Asset Management, with at least 3 years of dedicated experience in Software Asset Management (SAM). ServiceNow CSA certification (mandatory) Practical experience with software catalogue management and lifecycle governance. Hands-on experience with SAM tools such as ServiceNow SAMPro. Strong understanding of ITAM principles, procurement lifecycles, and software governance. Experience analyzing software usage and lifecycle data to drive cost and risk optimization. Knowledge of software lifecycle stages (procurement, deployment, upgrades, retirement). Strong communication, collaboration, and analytical problem-solving skills. Proficiency with Microsoft Office Suite (Word, Excel, PowerPoint, Teams). PREFERRED QUALIFICATIONS Advanced ServiceNow expertise with SAM module implementation and administration; CIS-SAM strongly preferred. Professional certifications in SAM/ITAM (e.g., CSAM, CHAMP, CITAM); ITIL v4 Foundation preferred. Knowledge of cloud SaaS licensing models (subscription, perpetual, enterprise agreements). Familiarity with IT Service Management (ITSM) processes and their integration with SAM. Technical proficiency with scripting languages (e.g., PowerShell, Python) for automation and reporting. Exposure to cybersecurity practices, including risk assessment and compliance frameworks (ISO 27001, SOX, NIST). Experience addressing software catalogue considerations in OT/ICS environments. Proven ability to work effectively in a global, matrixed organization with diverse cross-functional stakeholders.

Posted 2 days ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

hyderabad

Work from Office

Project manager Home Project Management Project manager Title: IT Project Manager BharathCloud is looking for an optimistic and organized IT Project Manager to ensure project gets delivered on-time and within budget. Description: An IT project manager oversees the planning, execution, and completion of IT projects, ensuring they are delivered on time, within budget, and meet specified requirements. They are responsible for managing resources, stakeholders, and risks, while also facilitating communication and collaboration within the project team. Key Responsibilities: Project Planning: Defining project scope, goals, objectives, and deliverables; creating project plans, timelines, and budgets. Resource Management: Assigning tasks, allocating resources (personnel, tools, budget), and ensuring the team has the necessary skills and support. Stakeholder Management: Communicating with stakeholders (clients, managers, vendors) to keep them informed of progress and manage expectations. Risk Management: Identifying, assessing, and mitigating potential risks to ensure project success. Project Execution: Overseeing the day-to-day activities of the project, monitoring progress, and ensuring adherence to timelines and budgets. Project Quality: Maintaining quality standards throughout the project lifecycle, ensuring that deliverables meet requirements and expectations. Collaboration Communication: Facilitating clear and effective communication within the project team and with stakeholders. Project Closure: Ensuring that all project deliverables are completed, documented and approved, and that the project is officially closed. Position Requirements: BSc/B.Tech in Electronic/computers Science or Engineering and/or equivalent work experience. Experience of 5-10 years in any of the IT/ITES based support center operations. Strong knowledge with IT Infrastructure technologies and systems in either cloud or IT managed services. Proficiency in project management software and MS Office/productivity tools. Strong knowledge in ITIL processes, Familiars with ITSM/ticketing systems/tools Fair knowledge in Information Security Management Systems like ISO 27001/ISO27017/ISO 27018 and Quality Management systems like ISO 9001 Fair knowledge is ITSM (IT Service Management Tool) and IT Infrastructure management tools. Strong communication and interpersonal skills. Professional attitude and appearance. Ability to manage multiple projects and tasks. Establish and maintain effective working relations with key stakeholders, employees and customers. Willingness to work extended hours, weekends and holidays as necessary. Strong understanding of project management methodologies (e.g., Agile, Waterfall). Excellent communication, interpersonal, and leadership skills. Ability to work effectively with diverse teams and stakeholders. Strong analytical and problem-solving skills. Project Management certifications (e.g., PMP, PRINCE2) are preferred. Job Type: Full-Time. Travel: Only on need basis Work Location: Hyderabad/Major cities of India

Posted 2 days ago

Apply

5.0 - 7.0 years

7 - 9 Lacs

hyderabad

Work from Office

Noc Manager Home NOC Noc Manager Title: Manager; Network Operations Center BharathCloud is looking for an optimistic and organized Network Ops Center Manager to oversee day-to-day operations and ensure system availability and reliability. Description: The Network Ops Center Manager will lead a dynamic team and ensure smooth daily operation of the network operations center (NOC). Primary objective is to ensure the operations are attended within agreed service Level agreement. Meeting Response and resolution in timely manner. The candidate will make certain the required infrastructure, resources and monitoring systems are available and operationally stable to meet the team s its customer requirements. The position works closely with other functional departments to identify, recommend, implement, and operate functional and cost-effective solutions for all aspects of the services managed by the NOC. The Network Ops Center Manager also takes care of the development and support of NOC team while leading critical network projects and operates within company policies and procedures. The Network Ops Center Manager is also instrumental in developing and/or vetting new technologies and services and aligning them with the organization s strategic vision. Key Responsibilities: Provide guidance, leadership and support to NOC team. Responsible to set, meet the SLA Metrix and achieving adherence. Responsible to get the highest customer feedback. Support teams during IT Infrastructure activities and for BharathCloud network. Support NOC team in designing, updating and monitoring data networking systems and equipment. Ensure compliance to various IT industry standard like ISO 20000, ISO 27001/17/18 with company guidelines. Responsible for setting up the processes, monitoring effectiveness and improvising thereafter. Producing service delivery performance and compliance reports. Implement strategic plans and goals for the team. Perform managerial duties such as timesheet approval and department scheduling. Facilitate the knowledge base management among teams. Responsible for improving the customer satisfaction and employee satisfaction. Introduce implement innovation/automations in the system to improve productivity and run systems error free. Responsible for improvising the productivity of the team. Make sure the team follows systems, process towards organization guidelines. Attend seminars, training sessions, and internal/external meetings. Working towards goals set by management to achieve service targets. All other duties as assigned. Position Requirements: BSc/B.Tech in Electronic/computers Science or Engineering and/or equivalent work experience. Experience of 5-7 years in any of the IT/ITES based support center operations. Strong knowledge in ITIL processes, life cycle and ITIL certification is mandatory. Fair knowledge in IT asset management/CMDB tools. Strong knowledge in administration of ITSM/ticketing systems. Good knowledge in project management tools. Fair knowledge in Information Security Management Systems Fair knowledge is ITSM (IT Service Management Tool) and IT Infrastructure management tools. Proven ability to manage a team in 24 7 operations. Proficient in MS Office/productivity tools. Strong communication and interpersonal skills. Professional attitude and appearance. Ability to manage multiple projects and tasks. Establish and maintain effective working relations with key stakeholders, employees and customers. Willingness to work extended hours, weekends and holidays as necessary. Job Type: Full-Time. Travel: Only on need basis with in India Work Location: Hyderabad, India

Posted 2 days ago

Apply

2.0 - 3.0 years

4 - 5 Lacs

kozhikode

Work from Office

Sr. Cyber Security Engineer | | TechBrein India Sr. Cyber Security Engineer Sr. Cyber Security Engineer JOB SUMMARY: Experience: 2-3 years Location: Calicut Requirements: Design, implement, and manage security tools and infrastructure (e.g., SIEM, IDS/IPS, firewalls, EDR, vulnerability scanners). Lead incident response efforts, including detection, triage, investigation, containment, and post-mortem analysis. Conduct risk assessments, penetration testing, and threat modeling to identify and mitigate security vulnerabilities. Drive security architecture and secure-by-design practices across the engineering lifecycle. Develop and enforce security policies, standards, and procedures. Monitor and respond to security alerts, anomalies, and system vulnerabilities. Collaborate with DevOps/IT teams to integrate security controls into CI/CD pipelines and cloud infrastructure. Provide guidance and mentorship to junior security engineers and cross-functional teams. Stay current with emerging threats, vulnerabilities, and security technologies. Required Qualifications: 2+ years of experience in security engineering, including hands-on technical security implementations. Deep understanding of security principles and best practices (network, application, cloud, and endpoint security). Experience with security tools (e.g., Splunk, CrowdStrike, Palo Alto, Qualys, etc.). Proficient in scripting or programming (Python, Bash, PowerShell, etc.). Familiarity with cloud platforms (AWS, Azure, or GCP) and securing cloud-native environments. Knowledge of common frameworks and standards (e.g., NIST, ISO 27001, OWASP, MITRE ATT&CK). Excellent problem-solving and communication skills Full name Email address Upload CV Upload your CV/resume or any other relevant file. Max. file size: 16 MB. Other Job Openings Sr. Cyber Security Engineer Schedule a meeting with Us Free Quote What type of IT product/service are you looking for? What are the current pain points? Following are optional, but it would be appreciated if you could fill them. I would like to be contacted through

Posted 2 days ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

gurugram

Work from Office

Internal Job Opportunity Power Apps Team Lead Uptitude is opening up an opportunity for a Power Apps Team Lead role. In line with our career progression framework, we will prioritise applications from our current Power Apps team members before advertising this role externally. Role Overview The Power Apps Team Lead will combine hands-on development with leadership and coaching responsibilities, guiding the team to deliver high-quality solutions and supporting individuals to grow in their careers. Key Responsibilities Lead & Mentor provide guidance, feedback, and coaching to team members, helping them progress through Uptitude s career path (Junior Senior Consultant Lead). Deliver Solutions design and develop Power Apps and Power Automate solutions that are secure, scalable, and client-focused. Architect & Govern ensure solutions align with best practices, data policies, and compliance requirements (e.g. ISO 27001, GDPR). Collaborate work with consultants, project managers, and stakeholders to translate business requirements into technical solutions. Drive Innovation promote reusability, low-code standards, and integration with Microsoft 365, Azure, and Dataverse. BU Task Management coordinate with Business Units to understand needs, align priorities, and ensure timely delivery of solutions. POC Creation with Team lead the design and development of proof-of-concepts with the team to validate feasibility and showcase potential solutions. Research & Development stay ahead of emerging Power Platform features, perform R&D to evaluate new capabilities, and drive adoption of innovative approaches. Requirements Strong experience with Microsoft Power Platform (Power Apps, Power Automate, Dataverse). Proven ability to coach or mentor junior developers and manage delivery priorities. Good understanding of solution architecture, security roles, and governance. Client-facing communication skills able to simplify technical detail for business users. A proactive mindset: willingness to step up, take ownership, and support others. Championship of Uptitude values and mission. Career Progression & Benefits Clear progression path within Uptitude s framework. Regular coaching and feedback sessions with workstream lead to support professional growth. Opportunity to influence Uptitude s Power Platform practice and culture. Exposure to enterprise projects across multiple industries. How to Apply If you re part of the Power Apps team and interested in stepping into a leadership role, please apply in Keka

Posted 2 days ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

chennai

Work from Office

Job Description We are looking for an experienced Project Manager Cybersecurity & Internal Audit to lead and coordinate audit-related projects with a focus on SOX compliance, IT controls, and Cybersecurity. This role requires strong project management capabilities, exceptional stakeholder management, and the ability to work seamlessly with cross-functional teams. The ideal candidate will possess deep knowledge of SOX IT control audits, cybersecurity risk frameworks, and have strong communication and coordination skills to drive successful audit engagements and ensure organizational compliance. Key Responsibilities: Manage and oversee internal audit projects, particularly focused on IT general controls, SOX compliance, and cybersecurity audits. Lead end-to-end project planning, including scope definition, resource allocation, timelines, issue tracking, and status reporting. Collaborate with internal audit, IT, Product & Engineering, Cybersecurity, Finance, and Business teams to ensure effective execution of audit plans and remediation activities. Coordinate SOX ITGC (IT General Controls) and process-level control testing, working with internal and external auditors as required. Facilitate the identification, assessment, and remediation of cybersecurity risks, ensuring alignment with frameworks such as NIST, ISO 27001, and COBIT. Develop and maintain stakeholder relationships to ensure transparency and alignment on audit priorities and expectations. Provide clear, concise project status updates to senior leadership and executive stakeholders. Drive continuous improvement in audit processes and control environments through feedback and lessons learned.. Qualifications Bachelor s degree in Information Systems, Business Administration, Accounting, Cybersecurity, or related field. 3 - 7 years of experience in project management, with at least 2 years supporting internal audit or SOX compliance initiatives. Good understanding of SOX ITGC, IT audit methodologies, and cybersecurity control frameworks. Demonstrated ability to manage multiple complex projects simultaneously in a cross-functional environment. Strong experience in stakeholder engagement, communication, and influencing at all organizational levels. Excellent verbal and written communication skills, with attention to detail and an ability to distill technical issues into Business terms. Proficiency in project management tools (e.g., MS Project, JIRA, Smartsheet). Preferred Qualifications: Project Management certification (e.g., PMP, PRINCE2). Audit or security certifications (e.g., CISA, CISSP, CRISC). Experience working with GRC platforms or audit management tools (e.g., AuditBoard, TeamMate).

Posted 2 days ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

gurugram

Work from Office

Deploy and manage CyberArk solutions to secure privileged access. Looking for candidates with proven PAM expertise and the ability to support enterprise-scale identity security infrastructure Cybersecurity Careers & Training Programs | Join Network Intelligence Contribute to a Safer Digital Future Join Our Elite Cyber security Community! At Network Intelligence, we have forged a unique culture that is as dynamic as the digital landscape we protect. It s a workplace where curiosity sparks innovation, where collaboration breeds resilience, and where excellence fuels our passion. The Maverick Mindset We encourage our team to think outside the box and embrace unconventional solutions. The Digital Guide Our team is dedicated to educating and empowering our clients, ensuring they are equipped to navigate the ever-evolving threat landscape. The Cyber Skill Arena We foster a culture of continuous learning, where our team can hone their skills, share knowledge, and stay ahead of the curve. The Digital Defenders We are a community of digital defenders united by a shared mission. Our culture is built on a foundation of camaraderie, support. Benefits and Perks Generous Leave Policy You get time to recharge and rejuvenate with our generous leave policy, offering ample time off to balance your work and personal life. Professional Development Opportunities We invest in your growth by providing opportunities for training, certifications, and career advancement. Employee Recognition Programs Celebrate your achievements and contributions with our employee recognition programs. We offer competitive salaries and benefits to attract and retain top talent. Growth and Development Our culture fosters growth and development in ways that go beyond traditional training programs. Here are a few unique aspects of our approach Mentorship for Mastery Get career guidance from our experienced mentors insights and expertise. The Learning Lab Access courses, workshops, and certifications for continuous learning through our in-house learning platforms. Cross-functional Collaboration Collaborate across teams to broaden your skills and gain diverse industry insights. Unlock personalized career plans that align with your unique goals and aspirations. Let us guide you on a path to success tailored just for you. Job Description: The BDE is responsible for connecting the US on-ground team with target customers through deep account/persona research and personalized multi-channel outreach. They will execute targeted campaigns using tools like LinkedIn Sales Navigator, Apollo, and HubSpot. Customized messaging will be crafted to align with each account s specific needs and pain points. Job Description: Lead a team of 8 to deliver cybersecurity governance and advisory services, including ISO 27001 audit support, VAPT/WAPT remediation tracking, and stakeholder engagement. Provide end-to-end program management, liaising with auditors and C-level executives to ensure compliance and timely issue resolution. Job Description: Hiring for an in-office OT Security role in Pune with 3 8 years experience, offering 6 15 LPA. Requires hands-on expertise in ICS/OT systems (SCADA, PLC, DCS), industrial protocols, and cybersecurity standards like IEC 62443, with a strong background in securing critical infrastructure environments. Work and Celebration Network Intelligence fosters a culture of continuous growth and evolution. In my journey at Network Intelligence, I have been allowed to grow within my role and venture into other avenues. This flexibility has nurtured my skills and elevated them to a remarkable extent. The organization is keen towards personal goals and provides an environment to achieve them effectively. I am proud to be part of this organization and the values it upholds! Senior Project Manager My time as a Compliance and Audit Subject Matter Expert at NI has been incredibly rewarding. The supportive environment has allowed me to collaborate closely with teams from various departments, helping to bridge gaps and work efficiently together. I love the transparent and integrity-driven culture in NI. Its a fantastic feeling to be part of a team that truly values the holistic growth of individuals. Subject Matter Expert in Compliance & Audit

Posted 2 days ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

mumbai, pune

Work from Office

The BDE is responsible for connecting the US on-ground team with target customers through deep account/persona research and personalized multi-channel outreach. They will execute targeted campaigns using tools like LinkedIn Sales Navigator, Apollo, and HubSpot. Customized messaging will be crafted to align with each account s specific needs and pain points. Cybersecurity Careers & Training Programs | Join Network Intelligence Contribute to a Safer Digital Future Join Our Elite Cyber security Community! At Network Intelligence, we have forged a unique culture that is as dynamic as the digital landscape we protect. It s a workplace where curiosity sparks innovation, where collaboration breeds resilience, and where excellence fuels our passion. The Maverick Mindset We encourage our team to think outside the box and embrace unconventional solutions. The Digital Guide Our team is dedicated to educating and empowering our clients, ensuring they are equipped to navigate the ever-evolving threat landscape. The Cyber Skill Arena We foster a culture of continuous learning, where our team can hone their skills, share knowledge, and stay ahead of the curve. The Digital Defenders We are a community of digital defenders united by a shared mission. Our culture is built on a foundation of camaraderie, support. Benefits and Perks Generous Leave Policy You get time to recharge and rejuvenate with our generous leave policy, offering ample time off to balance your work and personal life. Professional Development Opportunities We invest in your growth by providing opportunities for training, certifications, and career advancement. Employee Recognition Programs Celebrate your achievements and contributions with our employee recognition programs. We offer competitive salaries and benefits to attract and retain top talent. Growth and Development Our culture fosters growth and development in ways that go beyond traditional training programs. Here are a few unique aspects of our approach Mentorship for Mastery Get career guidance from our experienced mentors insights and expertise. The Learning Lab Access courses, workshops, and certifications for continuous learning through our in-house learning platforms. Cross-functional Collaboration Collaborate across teams to broaden your skills and gain diverse industry insights. Unlock personalized career plans that align with your unique goals and aspirations. Let us guide you on a path to success tailored just for you. Job Description: Deploy and manage CyberArk solutions to secure privileged access. Looking for candidates with proven PAM expertise and the ability to support enterprise-scale identity security infrastructure Job Description: Lead a team of 8 to deliver cybersecurity governance and advisory services, including ISO 27001 audit support, VAPT/WAPT remediation tracking, and stakeholder engagement. Provide end-to-end program management, liaising with auditors and C-level executives to ensure compliance and timely issue resolution. Job Description: Hiring for an in-office OT Security role in Pune with 3 8 years experience, offering 6 15 LPA. Requires hands-on expertise in ICS/OT systems (SCADA, PLC, DCS), industrial protocols, and cybersecurity standards like IEC 62443, with a strong background in securing critical infrastructure environments. Work and Celebration Network Intelligence fosters a culture of continuous growth and evolution. In my journey at Network Intelligence, I have been allowed to grow within my role and venture into other avenues. This flexibility has nurtured my skills and elevated them to a remarkable extent. The organization is keen towards personal goals and provides an environment to achieve them effectively. I am proud to be part of this organization and the values it upholds! Senior Project Manager My time as a Compliance and Audit Subject Matter Expert at NI has been incredibly rewarding. The supportive environment has allowed me to collaborate closely with teams from various departments, helping to bridge gaps and work efficiently together. I love the transparent and integrity-driven culture in NI. Its a fantastic feeling to be part of a team that truly values the holistic growth of individuals. Subject Matter Expert in Compliance & Audit

Posted 2 days ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

pune

Work from Office

Hiring for an in-office OT Security role in Pune with 3 8 years experience, offering 6 15 LPA. Requires hands-on expertise in ICS/OT systems (SCADA, PLC, DCS), industrial protocols, and cybersecurity standards like IEC 62443, with a strong background in securing critical infrastructure environments. Cybersecurity Careers & Training Programs | Join Network Intelligence Contribute to a Safer Digital Future Join Our Elite Cyber security Community! At Network Intelligence, we have forged a unique culture that is as dynamic as the digital landscape we protect. It s a workplace where curiosity sparks innovation, where collaboration breeds resilience, and where excellence fuels our passion. The Maverick Mindset We encourage our team to think outside the box and embrace unconventional solutions. The Digital Guide Our team is dedicated to educating and empowering our clients, ensuring they are equipped to navigate the ever-evolving threat landscape. The Cyber Skill Arena We foster a culture of continuous learning, where our team can hone their skills, share knowledge, and stay ahead of the curve. The Digital Defenders We are a community of digital defenders united by a shared mission. Our culture is built on a foundation of camaraderie, support. Benefits and Perks Generous Leave Policy You get time to recharge and rejuvenate with our generous leave policy, offering ample time off to balance your work and personal life. Professional Development Opportunities We invest in your growth by providing opportunities for training, certifications, and career advancement. Employee Recognition Programs Celebrate your achievements and contributions with our employee recognition programs. We offer competitive salaries and benefits to attract and retain top talent. Growth and Development Our culture fosters growth and development in ways that go beyond traditional training programs. Here are a few unique aspects of our approach Mentorship for Mastery Get career guidance from our experienced mentors insights and expertise. The Learning Lab Access courses, workshops, and certifications for continuous learning through our in-house learning platforms. Cross-functional Collaboration Collaborate across teams to broaden your skills and gain diverse industry insights. Unlock personalized career plans that align with your unique goals and aspirations. Let us guide you on a path to success tailored just for you. Job Description: The BDE is responsible for connecting the US on-ground team with target customers through deep account/persona research and personalized multi-channel outreach. They will execute targeted campaigns using tools like LinkedIn Sales Navigator, Apollo, and HubSpot. Customized messaging will be crafted to align with each account s specific needs and pain points. Job Description: Deploy and manage CyberArk solutions to secure privileged access. Looking for candidates with proven PAM expertise and the ability to support enterprise-scale identity security infrastructure Job Description: Lead a team of 8 to deliver cybersecurity governance and advisory services, including ISO 27001 audit support, VAPT/WAPT remediation tracking, and stakeholder engagement. Provide end-to-end program management, liaising with auditors and C-level executives to ensure compliance and timely issue resolution. Work and Celebration Network Intelligence fosters a culture of continuous growth and evolution. In my journey at Network Intelligence, I have been allowed to grow within my role and venture into other avenues. This flexibility has nurtured my skills and elevated them to a remarkable extent. The organization is keen towards personal goals and provides an environment to achieve them effectively. I am proud to be part of this organization and the values it upholds! Senior Project Manager My time as a Compliance and Audit Subject Matter Expert at NI has been incredibly rewarding. The supportive environment has allowed me to collaborate closely with teams from various departments, helping to bridge gaps and work efficiently together. I love the transparent and integrity-driven culture in NI. Its a fantastic feeling to be part of a team that truly values the holistic growth of individuals. Subject Matter Expert in Compliance & Audit

Posted 2 days ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

mumbai

Work from Office

Lead a team of 8 to deliver cybersecurity governance and advisory services, including ISO 27001 audit support, VAPT/WAPT remediation tracking, and stakeholder engagement. Provide end-to-end program management, liaising with auditors and C-level executives to ensure compliance and timely issue resolution. Cybersecurity Careers & Training Programs | Join Network Intelligence Contribute to a Safer Digital Future Join Our Elite Cyber security Community! At Network Intelligence, we have forged a unique culture that is as dynamic as the digital landscape we protect. It s a workplace where curiosity sparks innovation, where collaboration breeds resilience, and where excellence fuels our passion. The Maverick Mindset We encourage our team to think outside the box and embrace unconventional solutions. The Digital Guide Our team is dedicated to educating and empowering our clients, ensuring they are equipped to navigate the ever-evolving threat landscape. The Cyber Skill Arena We foster a culture of continuous learning, where our team can hone their skills, share knowledge, and stay ahead of the curve. The Digital Defenders We are a community of digital defenders united by a shared mission. Our culture is built on a foundation of camaraderie, support. Benefits and Perks Generous Leave Policy You get time to recharge and rejuvenate with our generous leave policy, offering ample time off to balance your work and personal life. Professional Development Opportunities We invest in your growth by providing opportunities for training, certifications, and career advancement. Employee Recognition Programs Celebrate your achievements and contributions with our employee recognition programs. We offer competitive salaries and benefits to attract and retain top talent. Growth and Development Our culture fosters growth and development in ways that go beyond traditional training programs. Here are a few unique aspects of our approach Mentorship for Mastery Get career guidance from our experienced mentors insights and expertise. The Learning Lab Access courses, workshops, and certifications for continuous learning through our in-house learning platforms. Cross-functional Collaboration Collaborate across teams to broaden your skills and gain diverse industry insights. Unlock personalized career plans that align with your unique goals and aspirations. Let us guide you on a path to success tailored just for you. Job Description: The BDE is responsible for connecting the US on-ground team with target customers through deep account/persona research and personalized multi-channel outreach. They will execute targeted campaigns using tools like LinkedIn Sales Navigator, Apollo, and HubSpot. Customized messaging will be crafted to align with each account s specific needs and pain points. Job Description: Deploy and manage CyberArk solutions to secure privileged access. Looking for candidates with proven PAM expertise and the ability to support enterprise-scale identity security infrastructure Job Description: Hiring for an in-office OT Security role in Pune with 3 8 years experience, offering 6 15 LPA. Requires hands-on expertise in ICS/OT systems (SCADA, PLC, DCS), industrial protocols, and cybersecurity standards like IEC 62443, with a strong background in securing critical infrastructure environments. Work and Celebration Network Intelligence fosters a culture of continuous growth and evolution. In my journey at Network Intelligence, I have been allowed to grow within my role and venture into other avenues. This flexibility has nurtured my skills and elevated them to a remarkable extent. The organization is keen towards personal goals and provides an environment to achieve them effectively. I am proud to be part of this organization and the values it upholds! Senior Project Manager My time as a Compliance and Audit Subject Matter Expert at NI has been incredibly rewarding. The supportive environment has allowed me to collaborate closely with teams from various departments, helping to bridge gaps and work efficiently together. I love the transparent and integrity-driven culture in NI. Its a fantastic feeling to be part of a team that truly values the holistic growth of individuals. Subject Matter Expert in Compliance & Audit

Posted 2 days ago

Apply

6.0 - 12.0 years

8 - 14 Lacs

hyderabad, chennai, gurugram

Work from Office

Job Description IAM PAM Specialist Experience: 6 to 12 years Location: Chennai Education: B.E./ B.Tech/ MCA Role Overview Responsible for designing, implementing, and managing enterprise Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions across hybrid and multi-cloud environments. This role will focus on securing both user and privileged accounts, enforcing least privilege policies, integrating IAM/PAM platforms, and ensuring compliance with security governance frameworks and regulatory requirements. The ideal candidate will have deep hands-on expertise with CyberArk, HashiCorp Vault, SailPoint IdentityNow , and cloud IAM services in AWS or Azure . Key Responsibilities Identity and Access Management (IAM) Manage the identity lifecycle: provisioning, modifying, and de-provisioning users, roles, and groups. Implement identity federation across Active Directory (AD) , LDAP , Azure AD , and third-party SaaS platforms. Deploy authentication solutions including MFA, SSO (SAML, OIDC) , and passwordless authentication. Apply and maintain Role-Based Access Control (RBAC) policies. Configure and manage cloud IAM services (either one) : AWS: IAM roles, JSON policies, SCPs, Identity Center (SSO), resource-based and identity-based policies. Azure: Azure AD, Conditional Access, PIM, and Identity Governance. Support and manage IGA solutions such as SailPoint IdentityNow, including certifications, access reviews, and policy enforcement. Privileged Access Management (PAM) Design, implement, and manage PAM solutions to secure and monitor privileged accounts. Manage and configure CyberArk components (Vault, PVWA, PSM, CPM, EPM). Administer and automate secret management with HashiCorp Vault . Manage Azure privileged access using Entra PIM and Conditional Access. Oversee AWS privileged access, including IAM roles, Secrets Manager, and SCP enforcement. Integrate PAM platforms including SailPoint, ForgeRock, CyberArk . Perform periodic audits, access reviews, and compliance reporting. Desired Skills PAM Tools: CyberArk, HashiCorp Vault. IAM Tools: SailPoint IdentityNow, Microsoft Entra, AWS IAM. Authentication Technologies: MFA, SSO, Passwordless Auth. Access Control Models: PoLP, RBAC. Cloud IAM Expertise: AWS IAM, SCPs, Azure AD, Conditional Access, PIM. Integration Skills: API-based and directory-based integrations with IAM/PAM. Knowledge of compliance frameworks (SOX, GDPR, ISO 27001, NIST). Qualifications

Posted 2 days ago

Apply

8.0 - 12.0 years

25 - 30 Lacs

hyderabad, chennai, gurugram

Work from Office

Job Description Position: Information Technology Risk Management Consultant Location: Chennai Experience: 8-12 years Education: B.E./ B.Tech./MCA Role Overview Responsible for developing, implementing, and maintaining the organisation s IT Risk Management framework. This role focuses on identifying, assessing, and mitigating risks to protect information assets, ensure regulatory compliance, and enhance overall IT governance. The position requires a deep understanding of risk frameworks, threat modelling, control evaluation, and GRC tools, combined with strong stakeholder management skills. Job Profile: Conduct comprehensive risk assessments: identification, impact analysis, heatmap/matrix creation, inherent vs. residual risk scoring, and control gap analysis. Perform threat modelling and develop detailed risk scenarios for IT infrastructure, applications, and cloud environments. Align IT risk practices with industry frameworks and standards (ISO 27005/27001, NIST RMF, PCI DSS, DORA). Evaluate and maintain IT controls and security posture, recommending enhancements where necessary. Support internal and external IT audit processes, ensuring timely remediation of findings. Work with GRC teams (ServiceNow GRC, RSA) to track and manage risk compliance workflows. Prepare and present risk dashboards, KRIs, and management reports to senior leadership. Desired Skills Proven experience in IT Risk Management frameworks, threat modelling, and risk scenario planning. Strong understanding of regulatory requirements and compliance frameworks. Expertise in GRC platforms (ServiceNow GRC, RSA). Proficiency in risk scoring methodologies and control gap analysis. Preferred Certifications CRISC Certified in Risk and Information Systems Control / CISSP - Certified Information Systems Security Professional (Preferred) PMI-RMP Project Management Institute Risk Management Professional (Optional) ISO 27001 / 27005 Risk Manager Certification (Optional) Qualifications

Posted 2 days ago

Apply

12.0 - 15.0 years

25 - 35 Lacs

bengaluru

Work from Office

CISSP certification Strong in Security principles, Threat handling, IAM, Secure system design Expertise in Network Security & Endpoint Protection Hands-on with Firewall, Proxy, WAF, SIEM, EDR/AV RBI, ISO 27001, NIST, PCI-DSS, GDPR, HIPAA

Posted 3 days ago

Apply

6.0 - 11.0 years

13 - 18 Lacs

pune

Work from Office

Job Purpose Were looking for a Cloud Network & Security Engineer to manage and scale our internet-facing infrastructure, CDN performance, cloud network layers, and security edge controls, across platforms like Akamai, Cloudflare, AWS CloudFront, and cloud environments including AWS, OCI, and GCP. Duties and Responsibilities A-Minimum required Accountabilities for this role Manage and optimize Akamai CDN (NetStorage, multi-pathing, property rules, EdgeWorkers, cache policies). Maintain and operate DNS infrastructure with Akamai Edge DNS, Route 53, or Cloudflare DNS. Configure and troubleshoot Application Load Balancers (ALBs) across AWS and OCI. Administer Cloudflare and CloudFront configurations, including page rules, WAF settings, caching behavior, and certificate management. Configure firewall DNAT/SNAT rules, ingress/egress traffic flows, and IP-based access controls. Implement and maintain Web Application Firewalls (WAF) policies (Akamai Kona, Cloudflare WAF, AWS WAF). Secure ingress traffic to origin with mutual TLS, Origin Shield, and Akamai/Cloudflare Bot Management tools. Design and manage multi-cloud network topologies (VPCs, transit gateways, VPNs, interconnects) across AWS, GCP, and OCI. Manage and enforce network security posture across OCI, AWS, and GCP, including Security Groups, NACLs, routing tables, and Firewall-as-a-Service. Ensure full compliance with RBI Cybersecurity Framework, ISO 27001, and CERT-In directives. B-Additional Accountabilities pertaining to the role Optimize multi-path traffic routing strategies using CDN geo-redundancy and cloud-native tools (like Route 53 latency routing, OCI DNS steering). Participate in internal performance benchmarking of CDNs, WAFs, and edge networks. Collaborate with the AI/ML team on projects involving traffic anomaly detection, auto-tuning CDN rules, and security pattern recognition. Support cloud DevOps and Infra teams in embedding network security into CI/CD pipelines. Maintain and optimize cost-efficient bandwidth usage and egress patterns using caching and edge compute strategies. Manage automation of CDN configuration and deployment using Terraform, Akamai Property Manager APIs, Cloudflare Workers, etc. Conduct regular CDN & cloud security posture assessments, performance audits, and configuration reviews. Work closely with SOC to correlate WAF logs, CDN logs, DNS query patterns, and detect malicious behaviors at the edge. Key Decisions / Dimensions Require additional resource Major Challenges Resource requirement Required Qualifications and Experience a)Qualifications Post Graduates with 612 years of relevant experience in enterprise network and security domains b)Work Experience 612 years in enterprise network and security roles, preferably in regulated financial services or fintech environments. Deep hands-on expertise with: oAkamai (NetStorage, WAF/Kona, Edge DNS, Property Manager, EdgeWorkers) oCloudflare (WAF, DNS, Bot Protection, Workers, Magic Transit) oAWS CloudFront, Route 53, ALB, and Shield oOCI Load Balancer, Networking, DNS, and FastConnect oFirewall configuration (DNAT/SNAT, IP filtering, ACLs) Strong understanding of: oHTTP/S protocols, CDN caching rules, TLS termination, edge performance oIngress/egress filtering, Zero Trust networking, DDoS protection techniques oMulti-cloud networking patterns and IPSEC/GRE VPNs oInfrastructure-as-Code (Terraform, CloudFormation, Akamai CLI/API) Compliance & Security: Familiarity with RBI cybersecurity guidelines, ISO 27001 controls, and VAPT/VAS remediation workflows. Experience with SIEM log integration from CDNs, WAFs, DNS, and cloud firewalls. Certifications (Preferred): Akamai ACA or ACE AWS Certified Advanced Networking / Security Specialty Cloudflare Zero Trust / Workers Specialist Cisco CCNP Security, Fortinet NSE, or equivalentc)

Posted 3 days ago

Apply

4.0 - 6.0 years

12 - 18 Lacs

mumbai

Work from Office

Role: Senior Infosec Engineer Reference Code: HR1175749300792697 Experience: 4-6 years Salary: Confidential (based on experience) Opportunity Type: Office (Mumbai) Placement Type: Full time Permanent Position (*Note: This is a requirement for one of Uplers Clients) Senior Infosec Engineer As a Senior Information Security Engineer, youll be the go-to guardian of our security and compliance framework. Youll own everything from ISO 27001 and SOC 2 audits (Internal and External) to Customerthird-party risk assessments, customer security requests, and internal ISMS management. You’ll work across product, engineering, and legalteams to ensure we’re notjust compliant—but secure by design. If you’re someone who knows how to manage an audit without breaking a sweat and gets a kick out of spotting gaps in security systems,this one’s for you. We are the match if you... Speak fluentISO 27001, SOC 2, and ISMS for 4 - 6 years Have experience owning and running end-to-end compliance audits Experienced in handling ISMS management end to end Responding to customerthird party risk assessments questionnaires and facing customerAudits Can guide control owners like a boss (and notjust with fancy dashboards) Enjoy writing and updating InfoSec policies (yes, we know that’s rare!) Know how to communicate security stuffto non-security folks Have worked in a SaaS environment or wantto secure one now Love working across multiple teams and hate working in silos Have strong knowledge of cloud platforms (GCP preferred, others okay too) Hold one or more certifications (mandatory): ISO 27001 LeadAuditor, CISA, CISSP Here’s what your day would look like... Maintain and manage ISMS as perISO 27001 and SOC 2 standards Coordinate and lead internal and external audits Oversee annual policy renewals, updates, documentation and ISMS activities Face third-party/vendorrisk assessments from our customer Respond to security questionnaires from customers and partners Track and close compliance deliverables with internal stakeholders Identify gaps in technical or procedural controls and work with teams to fix them Train internalteams on compliance expectations and workflows Monitor and improve security metrics across the org Stay up to date with industry trends and frameworks

Posted 3 days ago

Apply

4.0 - 9.0 years

2 - 7 Lacs

thane, navi mumbai, mumbai (all areas)

Work from Office

WALKIN DRIVE - 11th, 12th Sept : between 2 pm to 5 pm only. 13th Sept, Saturday : between 9 am to 12 pm only. Mizuho Global Services Pvt Ltd (MGS) is a subsidiary company of Mizuho Bank, Ltd, which is one of the largest banks or so called Mega Banks of Japan. MGS was established in the year 2020 as part of Mizuho's long-term strategy of creating a captive global processing center for remotely handling banking and IT related operations of Mizuho Banks domestic and overseas offices and Mizuho's group companies across the globe. At Mizuho we are committed to a culture that is driven by ethical values and supports diversity in all its forms for its talent pool. Direction of MGSs development is paved by its three key pillars, which are Mutual Respect, Discipline and Transparency, which are set as the baseline of every process and operation carried out at MGS. Whats in it for you? Immense exposure and learning Excellent career growth Company of highly passionate leaders and mentors Ability to build things from scratch Company website : - https://www.mizuhogroup.com/asia-pacific/mizuho-global-services We are seeking a skilled and vigilant L2 for handling Governance Risk and Compliance for MGS. The Ideal candidate will ensure that an organizations operations and procedures meet government and industry compliance standards with a strong focus on ISO 27001 implementation and policy preparation. Roles & Responsibilities: 1. Risk Management: Identify, assess, and manage risks related to information security, privacy, and regulatory compliance. 2. ISO 27001 Implementation: Lead the implementation and maintenance of ISO 27001 standards, including conducting internal audits and managing certification processes. 3. Policy Development: Develop, update, and enforce security policies, standards, and procedures to ensure compliance with regulatory requirements. 4. Compliance Monitoring: Monitor and ensure adherence to industry regulations and standards, such as GDPR, NIST, and SOX. 5. Audits and Assessments: Conduct regular audits and risk assessments to identify gaps and recommend improvements. 6. Vendor Risk Management: Evaluate and manage third-party vendors to ensure they meet organizational security requirements. 7. Security Controls: Test and monitor the effectiveness of security controls and recommend enhancements. 8. Regulatory Research: Stay updated on regulatory changes and ensure the organization complies with new requirements. Mandate Skills:- Good Verbal and Written communication skills. Good Team player. Possess Positive and learning attitude. Excellent problem-solving skills and attention to detail. Strong documentation skills (creation of dashboards for regular reporting) Relevant certifications (e.g., CISA, CISM, ISO 27001) are a plus. Sense of Ownership, Priorities and Autonomous. Good to have at least one certification (ISO 27001 LI, ISO27001 LA) Knowledge of banking business and information technology practices and trends in banking sector Ability to communicate effectively, both orally and in writing. Qualifications: Graduation/Post graduation in, Computers, Information Systems, Computer Science, or Information technology systems Experience: 4+ years of work experience as GRC Consultant and relevant experience hands on of 4 years including Risk management, risk assessment, 2nd line defence in risk, control assessment, control review, control testing, ITGC Control, Gap Analysis, Creating and making policies And procedures, Information Security Officer - ISO 27001 certified, Corporate IT Governance, Risk & Compliance, auditing. Address: - Mizuho Global Services India Pvt. 11th Floor, Q2 Building Aurum Q Park, Gen 4/1, Ttc, Thane Belapur Road, MIDC Industrial Area, Ghansoli, Navi Mumbai- 400710. Please Note : Candidates residing within 20KMs radius from the office location will ONLY be considered. WALKIN DRIVE - 11th, 12th Sept : between 2 pm to 5 pm only. 13th Sept, Saturday : between 9 am to 12 pm only.

Posted 3 days ago

Apply

1.0 - 3.0 years

1 - 4 Lacs

gurgaon/gurugram

Work from Office

What you'll do We are seeking a highly skilled and motivated Information Security Executive to join our team. The ideal candidate will have in-depth knowledge of ISO 27001, ISO 27701, ISO 27002, ISO 27005, GDPR 2016, and DPDP Act 2023. This role involves preparing and maintaining security policies, processes, and procedures, conducting internal audits, and leading monthly review meetings to ensure our organization remains compliant and secure. - Key Responsibilities Develop and Maintain Security Policies and Procedures: Create, update, and enforce information security policies, processes, and procedures in line with ISO 27001, ISO 27701, ISO 27002, and ISO 27005 standards. Ensure compliance with GDPR 2016 and DPDP Act 2023 regulations. Communicate and train staff on security policies and procedures. - Internal Audits: Plan, conduct, and document internal audits to ensure compliance with established security standards and regulations. Identify and address vulnerabilities and non-compliance issues. Work with relevant departments to implement corrective actions and continuous improvements. - Monthly Review Meetings: Organize and lead monthly security review meetings. Present audit findings, security incidents, and risk assessments to senior management. Monitor and report on the effectiveness of the security measures implemented. - Compliance and Governance: Ensure ongoing compliance with relevant data protection laws and regulations. Stay updated on changes in legislation and standards affecting information security. Liaise with regulatory bodies as needed. Qualifications Bachelor's degree in Information Security, Computer Science, or a related field. Professional certifications will be an added advantage. Proven experience in information security management, particularly in ISO 27001, ISO 27701, ISO 27002, and ISO 27005. Strong understanding of GDPR 2016 and DPDP Act 2023. Excellent communication and interpersonal skills. Strong analytical and problem-solving abilities. Ability to work independently and as part of a team. Skills and Competencies Technical Expertise: Deep knowledge of information security principles, standards, and frameworks. Policy Development: Proficiency in developing and implementing security policies, processes, and procedures. Audit and Compliance: Experience conducting internal audits and ensuring compliance with security standards and regulations. Risk Management: Ability to conduct risk assessments and develop risk mitigation strategies. Communication: Strong ability to communicate complex security concepts to non-technical stakeholders.

Posted 3 days ago

Apply

4.0 - 9.0 years

35 - 40 Lacs

pune

Work from Office

Position: Senior Cybersecurity Specialist Hardware & IoT Security Experience: 4 – 8 Years Location: Pune (Work from Office) Notice Period: Immediate Joiners preferred Job Description We are looking for an experienced Senior Cybersecurity Specialist with strong expertise in Hardware & IoT Security, VA/PT, Ethical Hacking, and Embedded System Security . The role involves securing IoT devices, hardware components, and embedded systems while ensuring compliance with global cybersecurity frameworks. Key Responsibilities Design and implement security strategies for IoT devices, hardware, and embedded systems . Conduct Vulnerability Assessment & Penetration Testing (VA/PT) and provide remediation support. Perform ethical hacking simulations to identify and mitigate risks. Ensure compliance with ISO 21434, NIST, ISO 27001, GDPR, IEC 62443 standards. Implement secure boot, crypto engines, TPM/HSM, and TrustZone/OP-TEE mechanisms. Work on security aspects of automotive systems ( ECUs, Telematics, ADAS, Inverters, Gateways ). Mandatory Skills Hardware & IoT Security VA/PT (Vulnerability Assessment & Penetration Testing) Ethical Hacking Embedded System Security Compliance knowledge (ISO 21434, NIST, ISO 27001, GDPR) Preferred Skills (Good to Have) Experience with CAN bus data distribution Secure architecture (TrustZone, OP-TEE, OpenSSL, Crypto engines) Automotive cybersecurity exposure Qualifications Bachelor’s degree in Computer Science / Information Security or related field. 4–8 years of relevant cybersecurity experience. Certifications such as CEH, OSCP, CISSP, CISA/CISM are an added advantage.

Posted 3 days ago

Apply

4.0 - 6.0 years

6 - 8 Lacs

ahmedabad

Work from Office

The Information Security Consultant will support planning, execution, and reporting of operational and system IT internal controls and risk management within the company. This role will act as a point of contact for Cybersecurity Governance, Risk, and Compliance . The role will work closely with the Technology functional teams and internal business lines in the day-to-day operational delivery of the overall Cybersecurity Compliance program. Teaming with the Cybersecurity Compliance Manager, the Information Security Consultant will: Monitor changes in business processes, information systems, management and operations, and accordingly maintain an assessment to risk. Build and maintain productive relationships with process owners. Through effective leadership, ensure audits of control effectiveness and design and other projects are completed in an efficient manner, and within established deadlines. Through the effective review of department work, ensure that the assessments of internal control structure related to processes audited are supported through sufficient and adequately documented evidence. Continually evaluate the efficiency and effectiveness of the internal controls and department functions, and identify areas of improvement. Assist with internal investigations. Promote good practice of Information Security Compliance to staff and associated contractors. Provide direct and specific guidance to the department internal control process owners as appropriate for each process owner of the department and the work being performed. Perform risk assessments related to controls in scope for work being performed. Responsibilities Maintain awareness of current compliance, audit professional standards and any associated legislation changes, and apply where appropriate to the internal IT controls and audit function. Maintain awareness of current issues and significant changes within the business environment and business processes. Periodically determine the need for revisions to control processes. Demonstrate effective interaction with all levels of management and business partners. Review specific control risk assessments to ensure efficiency and effectiveness in addressing key risks associated with the respective auditable entity or entities. Review risk questionnaire submissions to identify key risks associated with the respective vendorservice and work with stakeholders to mitigate and advise. Ensure that appropriate communication has been made in advance with compliance and internal process & service owners regarding the timing and logistics of each audit and review. Anticipate problems and obstacles to the timely and efficient completion of audits and compliance reviews. Recommend solutions to anticipated and incurred problems and obstacles impeding the timely completion of such audit and reviews. Through an understanding of internal controls, standards and applicable policies, procedures, and country regulations, review evidence to ensure the assessment of the effectiveness and efficiency of internal controls is adequate and sufficiently supported and documented, and the departmental and professional standards are adequately upheld. Ensure issues and exceptions are fully identified and properly defined, and recommendations are adequately formulated to address the root cause of identified issues in a beneficial manner. Ensure issues and recommendations are adequately and effectively communicated to owners on a proactive basis during the course of each audit or review. Review final process owners responses for adequacy and completeness. Ensure appropriate and timely follow-up audit work is performed to properly update the status of outstanding reported issues, and adequate communication is provided to management on a proactive basis. Use the firms various methods of internal communication to direct colleagues and the wider organization to current, new policies and essential compliance information. Sounds like you? To apply you need to be: Experience & Education Experience in evaluating third parties for the presence of fundamental information security controls. College diploma or university degree in the field of computer science, information systems, or computer engineering Exposure to any GRC technologies to perform risk management. Good understanding of compliance standards/framework like ISO 27001/27002, NIST, SOC1, SSAE16/SOC2, CIS. Knowledge of technical domains such as network security , cloud security , application security and penetration test concepts. Experience in conducting risk assessments and applying concept of inherent and residual risk in order to draw appropriate conclusion and articulate the same to non-technical audiences. Minimum of 4 years IT experience; or equivalent combination of education and experience Minimum of 4 years' experience of contributing to the success of a range of midsize-to-large multi-country initiatives. Experience in designing and managing compliance and risk management controls and processes in day to day IT operations and projects. Experience in undertaking and reporting on internal audits of IT operations, applications and projects. Experience working in the corporate sectors (financial services, telecommunications or utilities) Experience working in real estate services industry Technical Skills & Competencies High level of written and oral English communication skills. High level of analytical, conceptual, and problem-solving abilities. Affable, credible and can communicate effectively with clients and colleagues. Good research skills and the ability to manage details Ability to present ideas in user-friendly language. Ability to effectively prioritize and execute tasks in a high-pressure environment. Team player with experience working in a team-oriented, collaborative environment Quality focused and highly flexible Thinks ahead and anticipate problems, issues and solutions Certified Information Systems Auditor (CISA) Information Technology Infrastructure Library (ITIL) Foundation

Posted 4 days ago

Apply

4.0 - 6.0 years

6 - 8 Lacs

bengaluru

Work from Office

The Information Security Consultant will support planning, execution, and reporting of operational and system IT internal controls and risk management within the company. This role will act as a point of contact for Cybersecurity Governance, Risk, and Compliance . The role will work closely with the Technology functional teams and internal business lines in the day-to-day operational delivery of the overall Cybersecurity Compliance program. Teaming with the Cybersecurity Compliance Manager, the Information Security Consultant will: Monitor changes in business processes, information systems, management and operations, and accordingly maintain an assessment to risk. Build and maintain productive relationships with process owners. Through effective leadership, ensure audits of control effectiveness and design and other projects are completed in an efficient manner, and within established deadlines. Through the effective review of department work, ensure that the assessments of internal control structure related to processes audited are supported through sufficient and adequately documented evidence. Continually evaluate the efficiency and effectiveness of the internal controls and department functions, and identify areas of improvement. Assist with internal investigations. Promote good practice of Information Security Compliance to staff and associated contractors. Provide direct and specific guidance to the department internal control process owners as appropriate for each process owner of the department and the work being performed. Perform risk assessments related to controls in scope for work being performed. Responsibilities Maintain awareness of current compliance, audit professional standards and any associated legislation changes, and apply where appropriate to the internal IT controls and audit function. Maintain awareness of current issues and significant changes within the business environment and business processes. Periodically determine the need for revisions to control processes. Demonstrate effective interaction with all levels of management and business partners. Review specific control risk assessments to ensure efficiency and effectiveness in addressing key risks associated with the respective auditable entity or entities. Review risk questionnaire submissions to identify key risks associated with the respective vendorservice and work with stakeholders to mitigate and advise. Ensure that appropriate communication has been made in advance with compliance and internal process & service owners regarding the timing and logistics of each audit and review. Anticipate problems and obstacles to the timely and efficient completion of audits and compliance reviews. Recommend solutions to anticipated and incurred problems and obstacles impeding the timely completion of such audit and reviews. Through an understanding of internal controls, standards and applicable policies, procedures, and country regulations, review evidence to ensure the assessment of the effectiveness and efficiency of internal controls is adequate and sufficiently supported and documented, and the departmental and professional standards are adequately upheld. Ensure issues and exceptions are fully identified and properly defined, and recommendations are adequately formulated to address the root cause of identified issues in a beneficial manner. Ensure issues and recommendations are adequately and effectively communicated to owners on a proactive basis during the course of each audit or review. Review final process owners responses for adequacy and completeness. Ensure appropriate and timely follow-up audit work is performed to properly update the status of outstanding reported issues, and adequate communication is provided to management on a proactive basis. Use the firms various methods of internal communication to direct colleagues and the wider organization to current, new policies and essential compliance information. Sounds like you? To apply you need to be: Experience & Education Experience in evaluating third parties for the presence of fundamental information security controls. College diploma or university degree in the field of computer science, information systems, or computer engineering Exposure to any GRC technologies to perform risk management. Good understanding of compliance standards/framework like ISO 27001/27002, NIST, SOC1, SSAE16/SOC2, CIS. Knowledge of technical domains such as network security , cloud security , application security and penetration test concepts. Experience in conducting risk assessments and applying concept of inherent and residual risk in order to draw appropriate conclusion and articulate the same to non-technical audiences. Minimum of 4 years IT experience; or equivalent combination of education and experience Minimum of 4 years' experience of contributing to the success of a range of midsize-to-large multi-country initiatives. Experience in designing and managing compliance and risk management controls and processes in day to day IT operations and projects. Experience in undertaking and reporting on internal audits of IT operations, applications and projects. Experience working in the corporate sectors (financial services, telecommunications or utilities) Experience working in real estate services industry Technical Skills & Competencies High level of written and oral English communication skills. High level of analytical, conceptual, and problem-solving abilities. Affable, credible and can communicate effectively with clients and colleagues. Good research skills and the ability to manage details Ability to present ideas in user-friendly language. Ability to effectively prioritize and execute tasks in a high-pressure environment. Team player with experience working in a team-oriented, collaborative environment Quality focused and highly flexible Thinks ahead and anticipate problems, issues and solutions Certified Information Systems Auditor (CISA) Information Technology Infrastructure Library (ITIL) Foundation

Posted 4 days ago

Apply

0.0 - 2.0 years

2 - 4 Lacs

gurugram

Work from Office

About Us UnitedLex India Private Limited (Erstwhile iRunway) is a data and professional services company delivering outcomes that create value for high-performing law firms and corporate legal departments in the areas of litigation and investigations, intellectual property, contracts, compliance, and legal operations. Kindly go through our company website by clicking on below link Company Website: Legal Data Analytics & Management Solution by UnitedLex Role:- Analyst Location:- Gurgaon Shift: 1:30 PM -10:30 PM Roles and responsibilities Analyst/Associate/ AR Billing Clerk charges and invoices customers for services rendered. The Billing Clerk applies applicable discounts, special rates, or credit terms; and ensures all invoices are correct before sending them to customers or insurance providers. The role monitors E-billing progress, including status reporting, while participating in billing operations client implementations, deductions, and system maintenance, and ensures that functions are run efficiently. 1. Compile and bill attorney hours per contract specifications 2. Issues debit and credit memos and statements to customers monthly, cancels or void invoices, and responds to customer concerns relating to billing 3. Responding to client requests or transferring to the necessary department 4. Follows up on delinquent payments and resubmit billing as needed 5. Tracks status of billed invoices 6. Revise and resubmits short-paid and rejected invoices 7. Reviews time entries on pre-bills and requests revisions of insufficient entries 8. Determines expenses and fess that were short-paid or rejected that cannot be recovered 9. Gathers and organizes supporting documentation for expense charges 10. Updates and maintains customer contact information master files 11. Works closely with all accounting departments & Project Managers 12.Maintains and updated master file with special billing instructions for each customer 13. Assists in providing audit materials when requested Desired candidate profile 1. Bachelor s degree in accounting or finance 2. 0-2 years experience working in a AR billing specialist role 3. Very good written and verbal communication skills 4. Good research/analysis skills, and knowledge of contract to cash cycle 5. Moderate level of excel knowledge, able to create dashboards and reports using excel. Proficient in Microsoft Office; including Word, Excel & Outlook Personal Attributes: 1. Perform day to day tasks based on the standard processes 2. Administrative skills general administrative and clerical work 3. Organization skills able to prioritize and execute many assignments in quick and efficient manner 4. Strong customer service skills 5. Works efficiently in a fast-paced environment 6. Problem-solving skills 7. High awareness and understanding of confidential information Please refer to our Privacy Policy at UnitedLex for information, https: / / unitedlex.com / privacy-policy / "ISO 27001:2022 is the standard that we follow in this organization, based on this ISO document we have implemented 92 controls in UnitedLex across multiple offices and also with the help of this document we have implemented the Information Security Management System in the Organization"

Posted 4 days ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

gurugram

Work from Office

About Us UnitedLex India Private Limited (Erstwhile iRunway) is a data and professional services company delivering outcomes that create value for high-performing law firms and corporate legal departments in the areas of litigation and investigations, intellectual property, contracts, compliance, and legal operations. Kindly go through our company website by clicking on below link Company Website: Legal Data Analytics & Management Solution by UnitedLex Role :- Senior Associate- Monetization Location :- Gurgaon/Bangalore Shift :- 8:30 am-5:30 pm, 10:30 am-7:30 pm Overview This position executes projects in diverse areas of technology and Patent Services. The role involves understanding project requirements, in Intellectual Property domain and ensuring high quality deliverables for the clients. It involves dealing with various with WLAN (Wi-Fi 5/6/7, WFA), 3GPP standards. Additionally, the role also involves guiding team members on client projects. Role and responsibilities 1. Client a. Ensuring high Quality delivery and TAT compliance; 100% compliance to client SLAs. b. Ensuring closure of any feedback received on the project. 2. People a. Contributing to training/upskilling team members, as required; b. Providing in-depth feedback and feedforward to team members on various projects, as and when required 3 . Operations a. Meeting individual and project level targets b. Ensuring timely delivery of internal & external reports c. Executing various processes and standard operating procedures (SOPs) 4. Misc . a. Displaying effective and responsive communication b. Participating in Learning and Development activities at various levels; supporting various BU wide initiatives (as required) c. Complying to all specific company policies to apply without exception, including but not limited to compulsory adherence of ISO/IEC 27001:2013 guidelines. Experience B.Tech/M.Tech (ECE/CS/EEE) with minimum 3+ years of experience in infringement analysis/ claim charting. Should have experience working in telecom as technology domain. Experience in Wi-Fi will be added advantage. Keywords to be looked in resume: 3GPP, 6G, 5G, 4G/LTE, WLAN, Wireless, Telecom, Wi-Fi, ETSI, IEEE, IEEE 802.11. Should have done 20 claim charts. Personal attributes Must have ability to build and maintain relationships, and work confidently with people at all levels Must possess an enthusiastic and approachable personality. Must be an excellent communicator (written and verbal) with the ability to earn trust and credibility. Must have ability to demonstrate a high degree of confidentiality Must be willing to accept responsibility and make decisions based on experience, education and understanding of project needs. Kindly share your updated resume. And requested details. Please refer to our Privacy Policy at UnitedLex for information, https: / / unitedlex.com / privacy-policy / "ISO 27001:2022 is the standard that we follow in this organization , Based on this ISO document we have implemented 92 controls in UnitedLex across multiple offices and also with the help of this document we have implemented the Information Security Management System in the Organization"

Posted 4 days ago

Apply

Exploring Iso 27001 Jobs in India

With the increasing focus on data security and privacy, the demand for professionals skilled in iso 27001 is on the rise in India. Companies across various industries are actively seeking individuals with expertise in implementing and maintaining information security management systems. If you are considering a career in iso 27001, here is a comprehensive guide to help you navigate the job market in India.

Top Hiring Locations in India

  1. Bangalore
  2. Mumbai
  3. Delhi
  4. Pune
  5. Hyderabad

Average Salary Range

The average salary range for iso 27001 professionals in India varies based on experience levels. Entry-level positions may start at around INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 15-20 lakhs per annum.

Career Path

Typically, a career in iso 27001 progresses from roles such as Information Security Analyst or Compliance Analyst to Senior Information Security Officer, Information Security Manager, and ultimately Chief Information Security Officer (CISO).

Related Skills

In addition to expertise in iso 27001, professionals in this field are often expected to have knowledge in areas such as risk management, IT security, compliance regulations, security audits, and incident response.

Interview Questions

  • What is the purpose of iso 27001? (basic)
  • How do you ensure compliance with iso 27001 standards in an organization? (medium)
  • Can you explain the difference between risk assessment and risk treatment in the context of iso 27001? (medium)
  • What are the key components of an information security management system (ISMS)? (basic)
  • How do you handle security incidents in accordance with iso 27001 guidelines? (medium)
  • What is the role of a risk owner in the context of iso 27001? (advanced)
  • How do you conduct an internal audit for iso 27001 compliance? (medium)
  • Can you explain the concept of continual improvement in iso 27001? (basic)
  • How do you ensure that information security policies are effectively implemented throughout an organization? (medium)
  • What are the benefits of iso 27001 certification for an organization? (basic)
  • How do you identify and assess information security risks in a company? (medium)
  • What are the key controls recommended by iso 27001 for information security management? (medium)
  • How do you measure the effectiveness of an information security management system (ISMS)? (medium)
  • Can you discuss the role of senior management in achieving iso 27001 compliance? (advanced)
  • How do you address non-conformities identified during an iso 27001 audit? (medium)
  • What are the main objectives of iso 27001 implementation? (basic)
  • How do you ensure that information security objectives are aligned with the overall business goals of an organization? (medium)
  • What are the different stages of an iso 27001 certification process? (basic)
  • How do you handle security incidents involving third-party vendors or suppliers? (medium)
  • Can you explain the concept of risk appetite in the context of iso 27001? (advanced)
  • How do you ensure that employees are adequately trained on information security best practices in line with iso 27001 requirements? (medium)
  • What are the key challenges organizations face when implementing iso 27001? (medium)
  • How do you conduct a gap analysis for iso 27001 compliance? (medium)
  • Can you discuss the importance of management commitment in iso 27001 implementation? (medium)

Closing Remark

As you prepare for iso 27001 job opportunities in India, remember to showcase your knowledge and experience in information security management. Stay updated on the latest trends and best practices in the field, and approach interviews with confidence. With dedication and continuous learning, you can build a successful career in iso 27001 in India. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies