Roles and Responsibilities Organizational strategic decision-making, system implementations, and the adoption of new processes and procedures improving the security, robustness of organizations infrastructure, IT projects and associated systems. Overseeing the teams that are working to identify and safeguard organization from all known and developing security threats, security weaknesses, software bugs and exploits. Overall responsibility for both the staff and management processes that keep the organization secure from the ever-present threats that an insecure and dangerous world creates. Ultimately responsible for overseeing organizations current Data, IT, Tools and Technology, Open-Source Usage, Community Edition Software Usage, External Integration Risks and Information Security and any new software or hardware modifications impacting upon overall data security.
Key Responsibilities o Knowledge of IRDAI standards & audit terminologies. o Ensure compliance with any related legislation, such as the Data Protection Act, ISO standards or relevant government regulations. o Accountable w.r.t vulnerability assessment, firewall settings, WAF, security settings across tech stack, hardening and patching compliances and other Information Security Activities o Review and ensure the completeness, accuracy of the checklist of minimum baseline definition for Servers, storage, OS, Middleware technologies and databases in coordinate with OEM and SI partners for any new tools and technology considering all aspects of security. o Work with OEM and SI partners to ensure enforcement and validation during implementation and on-going. o Manage all IT security projects implementation. o Handle license compliance and handle IT Security Audits and IT License Audits o Manage incidents related to information security. o Develop, manage, implement information security programs in the organization. o Manage risks and ensure compliance to information security policies. o Define IT risks and determine risk response options and evaluate their efficiency and effectiveness to manage risks. o Define IT security standards and measure adherence. o Preparing, review, updating, evidence management of all IT security related policies and procedure. o Preparing and review of IT security, tracking, governance, evidence. o Definition, Scoping, Creation and execution of IT and Data Security strategies enhancing the reliability and security of the IT systems, projects, and underlying data. o Overseeing managers and teams that you are responsible for, allocating resources to ensure that staff deliver secure and robust IT solutions to the organizations identified and agreed requirements. o Overseeing planning and execution of necessary vulnerability audits, penetration testing or forensic IT audits and investigations. Ensure that outputs improve organizational IT Security. o Best Practices in conducting the 3rd party vendor audit on Data and Information Security. o Coordinate and facing the Information security audit-External and internal. o Closure of all IT security audit observation-Internal and external. o IT Security Awareness Programs. o Oversee staff training in all the latest security awareness skills, check associated protocols, methodologies and procedures are implemented with DC team. o Coordination with PIM team for the user access management. o Coordination and follow up with other department for the closure of all IT security audit observation. o Assistance in managing information security incident response. o Exception management, evidence governance of day-to-day coordination for the IT Security activities o Best Practices implementation for User Access Review for all application o Create Policy & Process documents. o Follow up with team for completion and weekly reports. o Prepare InfoSec presentations o Strong Vendor co-ordination and evidence management. o Good understanding around ISO 27001 o CISM / CRISC certification will be added advantage. o Strong Inter-personal skills – ability to communicate clearly at all levels. o Good knowledge of IT Infrastructure and design.
Desired Candidate Profile
Salary: Not Disclosed by Recruiter Industry:Insurance Functional Area:Other Role Category:Other Employment Type:Full Time, Permanent
Key Skills
cloud securityCISSPInformation Securityrisk consultingCISACISOCyber security
Education- UG:B.Tech/B.E. in Any Specialization
VRS Advisory Services
To Be Disclosed Later
Company Info
View Contact Details+
Recruiter Name:Rishi Raman Contact Company:VRS Advisory Services Telephone:+91-9871303233 Website:https://ripplesindia.co.in
Skills:dispatch planning, SAP, Vendor Management, Logistics Planning, regulatory and compliance management, Loading & unloading, GST, automobile, Role and Responsibilities Responsible...
Apply For This Jobbr{display:none;}.css-58vpdc ul > li{margin-left:0;}.css-58vpdc li{padding:0;}]]> Content Writer Job Type Contract Experiance 0 to 1 Year Qualification Degree Technical skills seo...
Apply For This JobIntroduction As an Application Developer, you will lead IBM into the future by translating system requirements into the design and...
Apply For This JobFull Job Description Work Location: Okhla Phase II, Delhi Our company is searching for an experienced, reliable and task-oriented Executive...
Apply For This JobJob Description Proven experience as a .NET Developer or Application Developer Min 3 years with the ASP.NET framework, SQL Server...
Apply For This JobJob Description: ALPINE ENGG SERVICES PTE LTD STEEL FITTER (FRESH) ( Must be able to Speak Basic English) SALARY :...
Apply For This Job