Average salary: Rs2,283,148 /yearly
More stats ...equivalent educational qualification.
~5 to 7 years of industry experience
~ Experience in risk management and conducting third-party vendor risk assessments.
~ Knowledge of security frameworks (e.g., ISO 27001, NIST CSF, SOC2) and regulatory requirements (e.g., GDPR,...
...What You Can Expect
The security Analyst will establish, enhance, and monitor controls supporting the security, governance, risk, and compliance objectives. The analyst will be a part of our growing team of cyber professionals.
About The Team
Zoom's Information Technology...
...In this role, you will:
Lead moderately complex initiatives and deliverables within Secured Lending Underwriting functional area and contribute to large-scale planning related to functional area deliverables
Review and analyze moderately complex business challenges within...
...Competencies:
1. Proficient in planning and executing Cybersecurity Risk Management program activities
2. Keen understanding of leading... ...on prem and cloud environments.
7. In-depth knowledge of cloud security principles, technologies, and best practices, with hands-on...
Job Description :- Candidate should be in Network Security. - Required knowledge of Cloud Security , SOC Experience , Data & application Security , Incident Management , Identity Theft , NIST , Baseline Security standards, Email Security.- Certification required related to cloud...
...This position is responsible to implement and maintain Information Security Compliance program globally. Responsibilities include monitoring... ...and Legal teams to identify and manage privacy, data protection risks, and compliance requirements to help meet stakeholder expectations...
...start the conversation.
Position Objectives…
Differentiate Iron Mountain as a trusted guardian by delivering world-class safety, risk, security, and resiliency initiatives.
Safeguard assets and maintain shareholder value through risk-based, data-driven solutions aligned...
...Working in Information Security Management, you'll design and implement processes and tools that safeguard the firm's computing environment. Creating action plans, mitigating risks, and resolving control issues, you'll gain key insight into today's complex risk and regulatory...
...About the Role:
Position Title: AVP - Cyber Security
Location: Bengaluru
Job Profile
Position details:
To support Vulnerability... ...solutions to complex problems, lead major initiatives in risk reduction surrounding vulnerabilities.
Ensure that processes are...
...Job Description
What You'll Do
Avalara’s Organizational Risk, Resilience, Compliance and Audit team (ORRCA) is responsible for managing... ...experience
~3+ years of work experience in IT Audit, IT Security, or IT Risk Management
~Experience working with ISO 27001, SOC 1...
...certification Standards Organization (ISO) 27001
Participate in global risk management projects from planning through fieldwork and reporting... ...that all outstanding issues are followed up
Draft and publish security and risk management documents.
Provide advice and input for...
...Job Description
Team Description The Data Security and Infrastructure Risk (DSIR) Team sits within the Wealth Management (WM) Risk organization and strives to find the right balance between risk management and business enablement. The team works to ensure that our clients...
...Job Description
As a Vice President - Risk & Controls Officer within the CTC Organization, our Information Security professionals are passionate about information security and control solutions for computing environments. While managing a world-class team of technology...
...Overview
The Information Security Risk Analyst cum Auditor plays a crucial role in ensuring the security and integrity of our organizational information systems. They are responsible for identifying, analyzing, and mitigating security risks while also conducting audits...
...Job Description
Position
Manager
Incumbent
No
Department
Enterprise Risk Management
Function
Information Security
Reporting to
Saurabh Gugnani
Band
4
Location
Gurgaon HO
Team size (Direct/Indirect...
...ll Be Doing
Own the platform vision to enable the product teams in Financial Systems with a highly performing, reliable, trustful, secure and compliant infrastructure platform, and extend our Financial Systems capabilities through a blend of SAP software, AWS services and...
...Budget : As per market standards
Experience : 36 Years
NP : Immediate to April joiners only
Location : Bangalore WFO
Risk Security & Compliance Analyst
Certification : ISO 27001 LI CISSP / CISM / CISA IAM Consultant
Job Responsibilities:
Implementation...
...India and we are looking for people who are experts in Application Security. You will be responsible for security assessments and penetration... ...and Skills set-
We are seeking a skilled and motivated Risk Analyst & Vulnerability Management professional to join our Product...
...Purpose through acting with integrity and if you embody the meaning of Be Alight.
Learn more at careers.alight.com.
ROLE : SAP Security specialist
RESPONSIBILITIES :
SAP Security specialist is responsible for designing and creating SAP Security authorizations and...
...Lead the design, implementation, and maintenance of data privacy and security policies, procedures, and controls
Monitor, measure and ensure governance of controls for compliance such as IRDAI, AADHAAR Act and Data Protection Bill (India)
Ensures the security and protection...
The Lead Information Security Governance & Risk Specialist identifies and specializes in analyzing and securing mobile applications and devices against cybersecurity threats. This role will support mobile application governance reviews, by tracking and assessing mobile application...
...experience of the Indian business environment.
Responsibility
1. Level: Consultant and below.
2. Area of expertise- Physical security risk assessments, security designing (Security designing being a specialized field, you may or may not find both skills in the same...
...Role/Job Description
1. Control and report on security by design principle of applications hosted on the public cloud (Azure... ...4. Handle security alerts (Skynet) or incident.
Manage IT risk and SSI compliance:
Frame and plan:
Contribute to the...
...safeguarding an organization's assets, employees and customers.
Own security operations, manage security personnel and ensure compliance with... ...regulations and standards - playing a pivotal role in minimizing risks, protecting assets and ensuring the company's well-being....
$ 60000 p.a.
...Job description
About the Role
You are a fearless, seasoned security professional with an interest in new and emerging technology. You... ...work on tight deadlines with little guidance and are well-versed in risk, security, and controls. You can get to the root of a problem and...
...for
The Controls Design & Development team within First Line Risk And Controls is building its team to enhance the cybersecurity and... ...experience
Minimum 5 years of experience working in Information Security or general IT areas related to risk management, controls...
...and frameworks of PCI DSS and ISO27001, and maintaining a strong
security posture in the face of evolving cyber threats. Also to evaluate,... ...fostering a proactive approach to managing information security risks.
Job Description:
Security Governance and Compliance:
○ Support...
...Infrastructure, RPA and Automation, Digital Transformation, Cyber Security, Blockchain or Enterprise Architecture, GIC Digital and... ...benchmarking to guide the development of our program. Cybersecurity risk is managed as part of enterprise risk at GMI. We assess technical...
About the Position
Job Title: Team Lead- Information Security Risk Management
Who We Are:
Take-Two Interactive Software, Inc. is a leading developer, publisher, and marketer of interactive entertainment for consumers around the globe. For more than 25 years, our development...
...worldwide presence across financial markets, we enable businesses and economies around the world to fund innovation, manage risk and create jobs.
Physical Security and the Property Function provide a range of services globally in a sophisticated and multifaceted operating...