Average salary: Rs1,958,333 /yearly
More statsSearch Results: 8 vacancies
...Entity: ATCI – Local Security Support
Skill Keywords: CISA, Security+, Risk Management, Cybersecurity, Governance Risks & Compliance, ISMS, SSAE18 SOC1& SOC2, ISO27001, Internal Audit, Information Security Audit
Scope:
Information security for the Advanced Technology...
...clear advice based on evidence and accurate data
What will you be doing?
• Management of Information Security Management System (ISMS) for BX India.
• Manage Cloud Saas & Proxy security Governance on Network Security standard
• Accountable for maintenance of...
...IP’s.
· Create custom policy.
· Firmware upgrade.
· Version upgrade for DAM Oracle.
· DR build and drill as per schedule.
· Capacity planning.
· Incident/Problem management.
· Change management and execution.
· RCA submission.
· Adherence to ISMS policy....
...the twelve CISO functions that are listed above.
What will you be doing
. Management of Information Security Management System (ISMS) for BX India.
. Manage Cloud Saas & Proxy security Governance on Network Security standard
. Accountable for maintenance of ISO...
...bi-yearly lifecycle must be foreseen.
Providing material for the intranet cybersecurity portal.
Information Security Management (ISMS):
Setup and maintain the Envalior ISMS.
Develop, propose and negotiate a Statement of Applicability.
Identifying cyber- & information...
...disciplined, and analytical approach to problem solving with leadership skills.
. Has basic knowledge of audit requirements (PCI, HIPPA, SOX, ISMS etc.)
Qualifications we seek in you!
Minimum qualifications / Experience Requirements
. Relevant years working within the...
...pending tickets.
Processes
Maintain a good understanding of all NOC processes and implement them appropriately.
Following are some ISMS processes that NOC team is supposed to perform
1. Generating IBM Beekeeper reports for all users having IBM laptops every quarter....
Rs 30 - 40 lakhs p.a.
...Information Security posture of the
organization
• Ensuring periodic review of Information Security Policies, Risk Assessments and other
ISMS documents
• Data loss prevention strategy design and sustenance
• Privileged Access Management Compliance
• Overseeing various...