Average salary: Rs4,956,907 /yearly
More stats ...complex concepts and can effectively communicate intricate ideas.
Role Description
As the Chief Information Security Officer (CISO), you will be responsible for developing and implementing an organization-wide information security strategy and framework. You will lead...
...Global CISO
Purpose of Role:
The information security team spread across the APAC and EMEA regions are responsible for maintaining, and supporting the cyber security, data protection and compliance function across both our group organisation and the services we provide...
Fast track growth & PnL ownership|Handling multiple clients About Our Client Our client is a renowned name in the automotive space. Job Description Responsibilities:
Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk...
...The CISO is responsible for overseeing the overall information security strategy of the organization, including risk management, cybersecurity policies, and defense strategies against cyber threats. This role involves ensuring the protection of IT infrastructure, edge devices...
...CISO India team support
Position Overview
Job Title - INFSEC Specialist
Location - Mumbai
Role Description
The Chief Information Security Office (CISO) as part of the TDI Chief Security Office is responsible for establishing and maintaining the enterprise...
Rs 22 - 40 lakhs p.a.
...roles within team
· Participate in selection process to identify the right talent for senior positions within the team
CISO,Cyber security,Information Security,IT Security
Designation: CISO - Tata Housing
Vacancies: 1
Experience: 8.0 Year(s) - 20.0...
...relevant position opens.
What Youll Do at Cisco
Youll be responsible for engaging with senior customer representatives including CISO and other C-suite stakeholders to engage on topics around CyberSecurity, adjacent technical areas, and application of technology and programs...
...Your Career The Regional CISO (Chief Information Security Officer) will serve as a trusted advisor to our most strategic customers in the region, actively helping transform their cybersecurity programs and maturity. Building these trusted relationships with C-level peers will...
Rs 4 - 13 lakhs p.a.
Suzlon is India’s leading renewable energy solutions provider offering a 360-degree total solutions package to its customers that covers the entire spectrum of wind energy projects. For more than two decades, our turnkey solutions and lifetime support combined with the best...
Ask:
20+years of experience. Currently working in a Tier 1 IT Services org playing the role of a CISO/1 level down from the CISO for Internal IT only. He/ She should have managed infosec and cyber security for internal/corporate IT across global teams
...Responsibilities:
Closely work with the CISO as the Head of Cyber Security Governance to champion organization wide Cyber Security Governance initiatives in line with the Cyber Security Strategy to ensure the CISO’s agenda is achieved as a whole.
For effective Cyber Security...
...DESCRIPTION
POSITION NAME
Information Security Manager
DEPARTMENT
Information Security
REPORTING POSITION
CISO
OBJECTIVE OF THE ROLE
To manage Information Security Governance, Risk and Compliance Management Program to ensure
....
...Product Management and other organizations (Amadeus Data Office ADO, Airline Solution Business Information Security Office , Corporate CISO and Corporate Legal/privacy) to ensure that the Airline Solutions Data are managed and used in compliance with Amadeus data governance...
...About the role The Compliance Manager will be responsible for supporting the CISO in planning and coordinating the implementation of compliance requirements such as ISO 27001, PCI DSS, RBI master directions, and Vendor Security assessments.
The ideal candidate is a motivated...
...keeping operational effectiveness. Responsibilities
Research, identify, and source top speakers within specified regions (preferably CISOs or CIOs).
Conduct introductory calls to present speaking opportunities and develop strategic relationships.
Work closely with...
...& Data Protection
Network and Links
Internal
IS&T VPs and Directors
Compliance Officer
Internal Audit
DPO, CSO, CIO, CISO
Legal Procurement
External
Customers
Suppliers
Local / regional authorities
An agile, inclusive and responsible culture...
...details below:
1) SAP BW Functional Consultant (Sr. Manager / AGM)
2) SAP BW Functional Consultant (Dy. Manager / Manager)
3) SAP CISO Functional Consultant (Dy. Manager / Manager)
4) SAP FICO Functional Consultant (Sr. Manager / AGM)
5) SAP FICO Functional...
...ticketing in a dedicated tool (Jira based) and follow-up with different stakeholders.
- Support regular preparation of OpCos with B-CISOs.
- Monitoring & Reporting (to support dashboard to senior management on a monthly basis).
- Strong authentication...
...function. Security Architect is responsible to enforce Information Security compliance within their area of responsibility in line with the CISO mandate and strategy as well as the bank’s risk appetite. Furthermore, Security Architect are the experts and points of escalation for...
...education, experience & knowledge
Graduate from any stream (Graduates in IT preferred)
Certification like AWS, GCP, MCITP preferred, Ciso Meraki
has experience in application support for 6- 7 years.
Knowledge of Office365, Google Workspace, AWS Infra, GCP, Server...
...creation of high performing teams delivering measurable improvements
Track record of operating and presenting to senior leadership level – CISO, CTO, CIO etc.
Experience managing delivery budgets (up to multi-million s), defining OKRs
Experience in capacity management,...
...arrangements may be subject to change on reasonable notice to ensure we meet the needs of our business.
Introduction:
To support the CISO Leadership team in ensuring that GTIS is compliant with provisioning and sustaining a Secure Operating environment as outlined in...
...implementation of operational and legal requirements regarding ISP are part of your tasks.
You will work closely with the Customer DPO / CISO and other ISPs (in developing and implementing improvement actions in the ISP context or in handling security incidents).
In your...
...enhancing the power of technology, the best of business processes. Together, we will Reimagine the Cisco experience. We are partners with CISO organization on vision, strategy and execution that continues to improve our security posture and reduce agreed risk.We build Software,...
...Processing. Work collaboratively with DWS NFRM global colleagues and other DWS Control Functions who support the relevant OR types (e.g., CISO for Information Security).
Challenge 1LoD`s Risk Governance in line with Global DWS framework as well as APAC local regulation...
...Monitoring setup.
Ability to handle complex environment consisting of Hybrid Cloud.
Understanding security issues (flow opening / CISO validation)
Understanding customer processes (Change Process)
Configure application monitoring, anomaly detection profiles creation...
...strategies for continuous improvement.Represent the software development team in meetings with senior management, and partner with CTO & CISO to lead the software development strategy and execution for the enterprise.Vendor Management & negotiation skills on multiple projects/...
...Linux, Burp Suite etc. on Windows and Linux.
- Good to have any one or more security certification like CEH, CHFI, ECSA, OSCP, CISSP, CISO, CISM, CISSP, CompTIA Security + and GSEC
- Experience with software testing and debugging.
- Experience with software version control...
...addition, they will work with 3rd party vendors and interface with stakeholders from technology, penetration testing, security consulting and CISO teams. What will you be doing
ï' Track all assessment requests and ensure all processes are followed.
ï' Provide baseline...
...Impact:
ASP is currently seeking a security analyst to provide operational technical direction and to provide tactical support of the CISO and ASP Product Security functions. This person will report directly to the Chief Information Security Officer and will be instrumental...