21 Job openings found

1 Opening(s)
12.0 Year(s) To 20.0 Year(s)
Not Disclosed by Recruiter
Key ResponsibilitiesSecurity Strategy Development:• The CISO takes a strategic approach to security identifying emerging threats and implementingproactive measures to protect the organization. They work closely with other stakeholders to alignsecurity initiatives with business goals.Risk Assessment and Management:• The CISO assesses the organization's security risks including potential vulnerabilities and potentialimpact. They ...
2 Opening(s)
10.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
Role and Responsibilities:Audit Representation:• Act as the primary representative for NPCI and customer audits related to information andcyber security.Cybersecurity Governance:• Drive the organization's cybersecurity strategy and ensure compliance with applicableregulatory/statutory guidelines, particularly those from RBI and NPCI.• Present cyber security risks, initiatives, and preparedness to the Board and its Committeesperiodically.Policy ...
1 Opening(s)
8.0 Year(s) To 20.0 Year(s)
22.00 LPA TO 40.00 LPA
To manage and oversee the information security of TCHFL, inclusion its systems and data. Assure that information created, acquired or maintained by TCHFL and its authorized users, is in accordance with its intended purpose and complies with statutory and regulatory requirements regarding information access, security and privacy in order to ...
1 Opening(s)
8.0 Year(s) To 20.0 Year(s)
27.00 LPA TO 30.00 LPA
• Implementing and embedding the Operational risk framework to identify, assess, monitor Vendor risk (Outsourcing & Non-Outsourcing Services) • Ensuring Gatekeeping of all new vendors to ensure onboarding requirements are completed prior to vendor services being consumed. • Co-ordination with Payments Teams to ensure ORM approval is validated before vendor ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
12.00 LPA TO 15.00 LPA
 Implementing and embedding the Operational risk framework to identify, assess,monitor Vendor risk (Outsourcing & Non-Outsourcing Services) Ensuring Gatekeeping of all new vendors to ensure onboarding requirements arecompleted prior to vendor services being consumed. Co-ordination with Payments Teams to ensure ORM approval is validated beforevendor creation and processing payments. Regular ...
2 Opening(s)
5.0 Year(s) To 10.0 Year(s)
15.00 LPA TO 22.00 LPA
 Implementing and embedding the Operational risk framework to identify, assess,monitor Vendor risk (Outsourcing & Non-Outsourcing Services) Ensuring Gatekeeping of all new vendors to ensure onboarding requirements arecompleted prior to vendor services being consumed. Co-ordination with Payments Teams to ensure ORM approval is validated beforevendor creation and processing payments. Regular ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
6.00 LPA TO 7.00 LPA
Job Title: Cyber Security Analyst (Asst Mgr II) Department: RMD Reports to: CISO Required Qualification: BE in Computer Science/Info security/ Information Technology/relevant stream or MCA/M.Tech – IT/Cyber Security Preferred Qualification: Professional Certification like Security+, CompTIA Network+ , CCNA , CEH, OSCP Skill, Knowledge & Trainings:  Knowledge of technical infrastructure, networks, databases and systems in relation to IT Security and IT Risk. ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
15.00 LPA TO 15.00 LPA
We need candidates with more experience in security operations and less in vendor risk management. While there will be some effort around vendor risk during the onboarding of new vendors as part of the JV, the primary focus of the role will shift to security operations once the vendors are ...
1 Opening(s)
5.0 Year(s) To 15.0 Year(s)
15.00 LPA TO 23.00 LPA
Implementing and embedding the Operational risk framework to identify, assess,monitor Outsourcing risk Ensuring Gatekeeping of all new outsourced vendors to ensure onboardingrequirements are completed prior to vendor services being consumed. Co-ordination with Payments Teams to ensure ORM approval is validated beforevendor creation and processing payments. Regular recon with the Payment ...
2 Opening(s)
5.0 Year(s) To 7.0 Year(s)
20.00 LPA TO 30.00 LPA
Position: Network Security Expertise  Experience : 5+ years Location:  Balewadi, Pune   Job Description:   Requirements:   - Offensive cybersecurity - Working knowledge of Networking Protocols  - Composing Suricata Signatures. (Even Snort is also fine, but that would be a less preferred alternative Managing Network and Cyber security projects to remediation of bugs in network, security, and all IT assets. Accountable for establishing effective leadership and ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile