Get new jobs by email
- ...This is a full-time on-site role as a Manager located in Bengaluru. As a manager, you... .../Master's in Computer Science, Information Security, or related field. Experience: 10+... ...cybersecurity, cryptography, incident response, vulnerability assessment, SIEM, IAM, and compliance...SuggestedFull time
- ...InterGlobe Business Solutions Private Limited. Job Title: Manager – Information Security Location: Gurugram Department: Information Security... ...DSS, and GDPR requirements. Manage incident response, vulnerability management and security monitoring activities....Suggested
- ...Company : Vermont Information Processing India Pvt. Ltd. VIP is... ...Department : Information Security Reports To : Information... ...hands-on Information security manager who can lead, manage, and... ...reviewing processes, analyzing vulnerabilities and supporting the...SuggestedContract work
- ...Responsibilities: 1. Enterprise IT Risk Assessment & Control Framework Oversight... ...data assets. Define and manage control frameworks to address... ...control strategies to reduce vulnerabilities and ensure operational... ...broader IT governance. 2. Security Operations & Incident...SuggestedHybrid workLocal areaShift work
- ...Information Security Manager Work Location : Jaipur Job Type : Full Time Legal Entity : Vconnex Pvt Ltd. Qualifications : Any Graduations (BCA,... ...27001 standards. Conduct ISO 27001 gap analysis, risk assessments, and audits to ensure compliance. Define and enforce information...SuggestedPermanent employmentFull timeRemote job
- ...IT Security Manager Job Location : Karapakkam OMR, Chennai. Key Responsibilities : To assist the IT Security Head in the following... ...update IT security plan. Review and conduct regular vulnerability assessments and close noticed gaps. Work with the Applications team...Suggested
- ...Senior Manager – Information Security Location: Mumbai (Andheri) Department: IT Reports to: Head of IT Job Summary The Senior Manager... ...cross-functional efforts to mitigate risks and remediate vulnerabilities. Manage vulnerability management programs, ensuring...SuggestedHybrid work
- ...Position Overview The Manager of Information Security is responsible for overseeing the development, implementation, and management of an organisation... ...and IT systems, protecting them from cyber threats and vulnerabilities. The Manager will work closely with various teams to...Suggested
- ...modernize practices and take them to the next level. The IT Manager Security & Infrastructure is responsible for overseeing the... ...response protocols. ~ Conduct regular risk assessments, vulnerability scans, and penetration tests; develop remediation plans....SuggestedWork at officeLocal area
- ...and ready-to-deploy business process management solutions to help businesses achieve optimization... ...is a full-time, on-site role for an Information Security Manager, based in Pune. The... .... Daily tasks include conducting risk assessments, monitoring network security, addressing...SuggestedFull time
- To handle technical information security aspects of Aditya Birla Capital (NBFC) including handling information security tools,... ...for IT assets of the organization Third-party Risk Management: Review the risk assessments of third-party vendors, ensuring compliance with security...Suggested
- ...organizations threat intelligence and vulnerability management initiatives. You will lead a small team... ...techniques, and procedures (TTPs), and assess potential impacts on the organization.... ...EDR, SIEM, and SOAR. - Coordinate with security operations teams to block IoCs in advance...Suggested
- ...The Information Security Risk Manager will be responsible for identifying, assessing, and mitigating information security risks within the organization. This role involves developing and implementing risk management strategies, ensuring compliance with security policies, and...Suggested
- ...conduct comprehensive risk assessments of new and existing third-party... .... Evaluate third-party security questionnaires audit reports... ...to improve supplier security management processes. Identify... ...degree in Computer Science Information Security Cybersecurity Risk...SuggestedFull timeContract workFor contractors
- ...Review and update of the information asset register in accordance... ...requirements Responsible for managing, tracking, update and monitor... ...Conduct policy and process risk assessment of vendors, while onboarding,... ...the same. Assist in IT security product & services risk assessment...Suggested
- About the job :Job Role : Information Security ManagerJob Details : Information Security Manager reports to the CISO and will be one of the key roles managing the Company... .../ reviewing Nonconformity reports.- Risk assessments and Internal audits as per ISO 27001, CSA, ISO 2...Contract work
- ...The Vulnerability Manager position is responsible for managing the identification of vulnerabilities... ...reports to actionable and prioritized information to enable engineers to focus on... ...serve as a critical member of the Cyber Security Team and will enable EagleView to achieve...
- ...regulatory compliance under RBI guidelines for NBFCs, managing internal policies, and driving the information security framework (data protection, IT audits, and cyber... ...Framework, and IT Act. • Conduct IT risk assessments, vendor security reviews, and penetration testing...Full time
- ...have an amazing opportunity for an IT Security Manager (Incident Management), available within... ...Manager (Incident Management), you will lead information gathering efforts during investigation... ...incidents and perform triage to assess the severity of the incident and determine...Work at officeLocal areaRemote jobFlexible hours
- JOB DESCRIPTION Job Title Sr. Information Security Manager Job Description #L1PHILIN #EOS In this role, you have the opportunity... ...(e.g., Nozomi Guardian, Armis, Claroty) and perform vulnerability assessments by applying frameworks like MITRE ATT&CK and STRIDE...Full timeWork at office3 days week
- The Information Security Manager is responsible for overseeing and implementing the organization's information security program to ensure the confidentiality... ...efforts, ensuring GDPR compliance, managing risk assessments, and developing security policies and procedures. The...
- ...About this role: Wells Fargo is seeking an Information Security Engineering Associate Manager In this role, you will: Supervise a team of engineers... ...standards Identify current or emerging security vulnerabilities or issues, perform risk assessments and evaluate...
- Information Security & (DPO) Manager Start Date Starts Immediately... ...policies, standards, and procedures. Conduct regular risk assessments, vulnerability assessments, and penetration tests to identify...Contract workImmediate start
- ...Key Responsibilities: Security Strategy & Governance Develop and implement the organization's comprehensive information security strategy and roadmap. Ensure compliance... .... Conduct threat modeling, vulnerability assessments, and security audits. Manage AWS IAM...
- ...are seeking a seasoned and strategic Senior Security Leader to head our regional Information Security and Risk Management (ISRM) team in our Bangalore office. This individual... ..., incident response, threat detection, and vulnerability management. Manage and grow a team of...Work at officeLocal areaRelocationShift work
- ...Role: We are seeking an experienced Offensive Security Manager to lead and deliver high-impact security assessments and consulting engagements for our clients.... ...execute offensive security strategies that identify vulnerabilities and enhance security resilience. Provide...
- The Cyber Security Awareness Specialist plays a critical role in... ...protecting the Bank's assets and information and integrating... ...to data protection and risk management. Key Responsibilities Include... ...Phishing Simulations and Assessments Conduct phishing simulation...
- ...Position Summary Level: Manager Work you'll do: Design core AWS platform security architecture, including areas such... ...and conducting system security vulnerability and risk analysis Provide product... ...experience in doing security assessment against NIST Frameworks, SANS,...Hybrid work
- ...We are seeking an experienced Chief Information Security Officer (CISO) to lead and enhance the... ...risk and readiness, overseeing risk assessments, incident response, and compliance with... ...functions. Responsibilities include vulnerability management, threat monitoring, business...
- ...hierarchically attached to the IT Manager responsible of the CyberSOC... ...(IoCs) through our security tools (EDR, SIEM, SOAR, etc.... ..., etc.). • Communicate on vulnerabilities related to the software used... ...the scope of Vulnerability Assessment Service. • Analyze on request...
