22 Job openings found

1 Opening(s)
12.0 Year(s) To 20.0 Year(s)
Not Disclosed by Recruiter
Key ResponsibilitiesSecurity Strategy Development:• The CISO takes a strategic approach to security identifying emerging threats and implementingproactive measures to protect the organization. They work closely with other stakeholders to alignsecurity initiatives with business goals.Risk Assessment and Management:• The CISO assesses the organization's security risks including potential vulnerabilities and potentialimpact. They ...
2 Opening(s)
10.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
Role and Responsibilities:Audit Representation:• Act as the primary representative for NPCI and customer audits related to information andcyber security.Cybersecurity Governance:• Drive the organization's cybersecurity strategy and ensure compliance with applicableregulatory/statutory guidelines, particularly those from RBI and NPCI.• Present cyber security risks, initiatives, and preparedness to the Board and its Committeesperiodically.Policy ...
1 Opening(s)
10.0 Year(s) To 20.0 Year(s)
13.00 LPA TO 30.00 LPA
Role This role will be responsible for coordinating with Group CISO & the Asia Pacific Region (APR) Risk Management team in adapting central directives, controlling its implementation on cybersecurity governance, conducting analysis and organize committees within APR.  In addition, this rôle is directly report to the Regional Head of Risk Management, Asia ...
1 Opening(s)
8.0 Year(s) To 20.0 Year(s)
22.00 LPA TO 40.00 LPA
To manage and oversee the information security of TCHFL, inclusion its systems and data. Assure that information created, acquired or maintained by TCHFL and its authorized users, is in accordance with its intended purpose and complies with statutory and regulatory requirements regarding information access, security and privacy in order to ...
1 Opening(s)
15.0 Year(s) To 23.0 Year(s)
25.00 LPA TO 30.00 LPA
Job Summary: The Chief Information Security Officer (CISO) for the Internet Service Provider (ISP) industry is a senior executive responsible for safeguarding the organization's infrastructure, customer data, and networks against cyber threats. This role ensures the secure delivery of ISP services, compliance with telecom and cybersecurity regulations, and resilience against evolving ...
1 Opening(s)
8.0 Year(s) To 20.0 Year(s)
27.00 LPA TO 30.00 LPA
• Implementing and embedding the Operational risk framework to identify, assess, monitor Vendor risk (Outsourcing & Non-Outsourcing Services) • Ensuring Gatekeeping of all new vendors to ensure onboarding requirements are completed prior to vendor services being consumed. • Co-ordination with Payments Teams to ensure ORM approval is validated before vendor ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
12.00 LPA TO 15.00 LPA
 Implementing and embedding the Operational risk framework to identify, assess,monitor Vendor risk (Outsourcing & Non-Outsourcing Services) Ensuring Gatekeeping of all new vendors to ensure onboarding requirements arecompleted prior to vendor services being consumed. Co-ordination with Payments Teams to ensure ORM approval is validated beforevendor creation and processing payments. Regular ...
2 Opening(s)
5.0 Year(s) To 10.0 Year(s)
15.00 LPA TO 22.00 LPA
 Implementing and embedding the Operational risk framework to identify, assess,monitor Vendor risk (Outsourcing & Non-Outsourcing Services) Ensuring Gatekeeping of all new vendors to ensure onboarding requirements arecompleted prior to vendor services being consumed. Co-ordination with Payments Teams to ensure ORM approval is validated beforevendor creation and processing payments. Regular ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
6.00 LPA TO 7.00 LPA
Job Title: Cyber Security Analyst (Asst Mgr II) Department: RMD Reports to: CISO Required Qualification: BE in Computer Science/Info security/ Information Technology/relevant stream or MCA/M.Tech – IT/Cyber Security Preferred Qualification: Professional Certification like Security+, CompTIA Network+ , CCNA , CEH, OSCP Skill, Knowledge & Trainings:  Knowledge of technical infrastructure, networks, databases and systems in relation to IT Security and IT Risk. ...
1 Opening(s)
5.0 Year(s) To 15.0 Year(s)
15.00 LPA TO 23.00 LPA
Implementing and embedding the Operational risk framework to identify, assess,monitor Outsourcing risk Ensuring Gatekeeping of all new outsourced vendors to ensure onboardingrequirements are completed prior to vendor services being consumed. Co-ordination with Payments Teams to ensure ORM approval is validated beforevendor creation and processing payments. Regular recon with the Payment ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile