Average salary: Rs2,150,000 /yearly
More statsGet new jobs by email
- ...and IT Infrastructure review (Windows, Oracle etc.) # Information Security Review (Information Security Risk Assessment, Development of ISMS framework documents, development of Information security policy, related procedures and templates in accordance with ISO Standards (ISO...SuggestedLong term contractImmediate startShift work
- ...(Classification society, IMO, Solas, ISPS code, MARPOL etc.) comply with the relevant regulation • Ensure proper verification by the ISM overriding authority onboard of the vessels on the works relating to and affecting safety and pollution prevention • Consult with/advise...SuggestedFull timeContract workFor contractorsFor subcontractorWork at officeLocal areaHome office
- ...and IT Infrastructure review (Windows Oracle etc.) # Information Security Review (Information Security Risk Assessment Development of ISMS framework documents development of Information security policy related procedures and templates in accordance with ISO Standards (ISO 2...SuggestedLong term contractFull timeContract workImmediate startShift work
- ...setup. You are passionate about using GRC tooling and automation to manage technology risk. Core responsibilities will include: ISMS Alignment: Ensuring technology controls, processes, and people in India are fully aligned with the global ISMS and local requirements....SuggestedWork at officeLocal areaImmediate startRemote jobHome office
- ...internal stakeholders Experience with IT Service Management and ITIL framework are preferred Certifications such as OCSP, ITIL, ISMS professional, CISSP or similar are added advantage Experience with malware defense tools and technologies such as anti-virus software...SuggestedShift work
- ...senior management in a clear, actionable manner.Key Responsibilities :1. Governance, Risk & Compliance (GRC) :- Strengthen and maintain ISMS aligned with ISO 27001 including policy formation, reviews, controls implementation, and audit readiness.- Lead and refine security...SuggestedContract work
- ...a reputed institute with a technology background. ~ A leading cybersecurity qualification such as CISSP CISA CCSP CISM or ISO 27001 ISMS. ~ Well versed with cybersecurity and privacy requirements as defined in NIS2 GDPR & CCPA. ~ Practical exposure to security framework...SuggestedFull timePart timeFlexible hours
- ...privacy policies, impact assessments, compliance reports, and implementation roadmaps Support cybersecurity governance initiatives, ISMS documentation, and ongoing compliance activities Collaborate with legal, IT, and business teams to embed privacy-by-design and security...SuggestedFull timeWeekday work
- ...timeline along with high quality deliverables. Lead and execute IT internal audit engagements IT engagements Exposure to IT controls ISMS COBIT reviews and IT audits Experience in performing ICFR IT audits in Banking Oil & Gas and Telecom Sectors is preferred....SuggestedFull time
- ...Information Security Analyst you will be responsible for managing third party risk management, assisting the Infosec team in implementing ISMS related activities and protecting systems and assets from external and internal threats. Leegality is an ISO 27001 certified...SuggestedContract workHybrid workImmediate startFlexible hours
- ...Information Responsible for safeguarding sensitive company data against unauthorized access, use, or disclosure, and for reporting any suspected security incidents in line with the organization's ISMS (Information Security Management System) policies and procedures....SuggestedFull timeContract workLocal areaNight shift
- ...Information Responsible for safeguarding sensitive company data against unauthorized access, use, or disclosure, and for reporting any suspected security incidents in line with the organization's ISMS (Information Security Management System) policies and procedures....SuggestedFull time
- ...company data against unauthorized access use or disclosure and for reporting any suspected security incidents in line with the organizations ISMS (Information Security Management System) policies and procedures Work on bug fixing and improving application performance....SuggestedFull timeRemote job
- ...company data against unauthorized access use or disclosure and for reporting any suspected security incidents in line with the organizations ISMS (Information Security Management System) policies and procedures. Remote Work : No Employment Type : Full-time...SuggestedFull timeRemote job
- ...company data against unauthorized access use or disclosure and for reporting any suspected security incidents in line with the organizations ISMS (Information Security Management System) policies and procedures. Remote Work : No Employment Type : Full-time...SuggestedFull timeRemote job
- ...network, servers, virtualization).- Experience with endpoint security, firewalls, VPNs, and patch management.- Familiarity with ISO 27001 / ISMS standards.- Excellent troubleshooting and communication skills.- Ability to ensure business continuity under pressure. (ref:hirist.tech...Full time
- ...company data against unauthorized access use or disclosure and for reporting any suspected security incidents in line with the organizations ISMS (Information Security Management System) policies and procedures. Remote Work : No Employment Type : Full-time...Full timeRemote job
- ...years of relevant work experience in Information Security, with third party risk management as a primary responsibility. ISO 27001 /ISMS Standard. ISO 31000 Standard / risk assessment Knowledge of security frameworks like NIST Cyber Security Framework and regulations...Full timeContract workFor subcontractorHybrid workWork at officeLocal area
- ...company data against unauthorized access use or disclosure and for reporting any suspected security incidents in line with the organizations ISMS (Information Security Management System) policies and procedures. Remote Work : No Employment Type : Full-time...Full timeRemote job
- ..., NIST CSF, SOC 2, and other governance/control frameworks. ~ Experience leading enterprise-level privacy programs, GRC initiatives, ISMS/PIMS implementations, and audit management. ~ Familiarity with privacy and GRC tools (e.g., Securiti.ai, OneTrust, BigID). ~ Certifications...Full timeHybrid workFlexible hours
- ...company data against unauthorized access use or disclosure and for reporting any suspected security incidents in line with the organizations ISMS (Information Security Management System) policies and procedures. Remote Work : No Employment Type : Full-time...Full timeRemote job
- ...company data against unauthorized access use or disclosure and for reporting any suspected security incidents in line with the organizations ISMS (Information Security Management System) policies and procedures. Remote Work : No Employment Type : Full-time...Full timeRemote job
- ...opportunity for career progression. ~ GMC- Group medical coverage ~ Gratuity is paid as per applicable law, which is over. ISMS Responsibilities: -Be aware and comply with the ISMS Policy, procedures, and objectives; -Actively participate in ISMS exercises;...Work at officeImmediate startDay shift
- ...company data against unauthorized access use or disclosure and for reporting any suspected security incidents in line with the organizations ISMS (Information Security Management System) policies and procedures. Remote Work : No Employment Type : Full-time...Full timeRemote job
- ...company data against unauthorized access use or disclosure and for reporting any suspected security incidents in line with the organizations ISMS (Information Security Management System) policies and procedures. Remote Work : No Employment Type : Full-time...Full timeHybrid workRemote job
- ...active LBS as per plan 3. Engagement & Activity Management High engagement levels to be maintained at Branch levels with support from ISM. 4. APE new business growth as per AOP 5. Renewal book/Persistency maintain desired level of First Year and overall persistency across...Full timeWork at office
- ...Confirms that property/properties are in compliance with appropriate Marriott International Policies (MIPs) and Information Security Manuals (ISMs). Implements solutions as directed to resolve discrepancies. Places equipment orders as directed relating to personal computers...Full timeLocal area
- ...company data against unauthorized access use or disclosure and for reporting any suspected security incidents in line with the organizations ISMS (Information Security Management System) policies and procedures. Remote Work : No Employment Type : Full-time...Full timeRemote job
- ...company data against unauthorized access use or disclosure and for reporting any suspected security incidents in line with the organizations ISMS (Information Security Management System) policies and procedures. Remote Work : No Employment Type : Full-time...Full timeRemote job
- ...company data against unauthorized access use or disclosure and for reporting any suspected security incidents in line with the organizations ISMS (Information Security Management System) policies and procedures. Remote Work : No Employment Type : Full-time...Full timeRemote job
