1 Opening(s)
10.0 Year(s) To 20.0 Year(s)
13.00 LPA TO 25.00 LPA
Role
This role will be responsible for coordinating with Group CISO & the Asia Pacific Region (APR) Risk Management team in adapting central directives, controlling its implementation on cybersecurity governance, conducting analysis and organize committees within APR.
In addition, this rôle is directly report to the Regional Head of Risk Management, Asia ...
1 Opening(s)
8.0 Year(s) To 20.0 Year(s)
22.00 LPA TO 40.00 LPA
To manage and oversee the information security of TCHFL, inclusion its systems and data. Assure that information created, acquired or maintained by TCHFL and its authorized users, is in accordance with its intended purpose and complies with statutory and regulatory requirements regarding information access, security and privacy in order to ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
15.00 LPA TO 15.00 LPA
Security and Privacy Vendor Manager
The Security and Privacy Vendor Manager reports into the Chief Information Security Officer (CISO) and is accountable and responsible, on a global basis, for all Security and Privacy vendors for Company.
Your Role The Security and Privacy Vendor Manager is responsible for managing relationships with security vendors ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
15.00 LPA TO 15.00 LPA
Job Purpose (Job Summary): Security and Privacy Governance Risk and Compliance Manager
The Department
The Governance and Risk Compliance Manager reports into the Chief Information Security Officer (CISO) and is accountable and responsible, on a global basis, for all Security and Privacy governance, controls and compliance activities
Your Role
The GRC Manager will establish and ...
1 Opening(s)
5.0 Year(s) To 15.0 Year(s)
15.00 LPA TO 23.00 LPA
Implementing and embedding the Operational risk framework to identify, assess,monitor Outsourcing risk Ensuring Gatekeeping of all new outsourced vendors to ensure onboardingrequirements are completed prior to vendor services being consumed. Co-ordination with Payments Teams to ensure ORM approval is validated beforevendor creation and processing payments. Regular recon with the Payment ...
2 Opening(s)
5.0 Year(s) To 7.0 Year(s)
20.00 LPA TO 30.00 LPA
Position: Network Security Expertise
Experience : 5+ years
Location: Balewadi, Pune
Job Description:
Requirements:
- Offensive cybersecurity
- Working knowledge of Networking Protocols
- Composing Suricata Signatures. (Even Snort is also fine, but that would be a less preferred alternative
Managing Network and Cyber security projects to remediation of bugs in network, security, and all IT assets.
Accountable for establishing effective leadership and ...
1 Opening(s)
5.0 Year(s) To 20.0 Year(s)
12.00 LPA TO 30.00 LPA
Job Role
Lead and manage a team of IT Auditors to deliver multiple IT Audit assignments including IT Application and Infrastructure Audits, Application Security Assessments, Vendor Audits, Concurrent Audits, Thematic Assignments, Regulatory submissions etc.
Develop the Risk Based Audit Framework, meeting RBI regulations and adopting ISO 27001 Standards and preparing the IT ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
Suzlon is India’s leading renewable energy solutions provider offering a 360-degree total solutions package to its customers that covers the entire spectrum of wind energy projects. For more than two decades, our turnkey solutions and lifetime support combined with the best-in-class products have created value for our customers throughout the ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
20.00 LPA TO 25.00 LPA
Actively hunt and grow the >+500 users Mid Market and enterprise segment by developing funnel of such opportunities and working closely with partners to grow and manage these accounts.
Target and develop net new opportunities through research, identify key contacts and decision-makers, and grow the pipeline
You will lead all aspects of ...
1 Opening(s)
15.0 Year(s) To 20.0 Year(s)
50.00 LPA TO 60.00 LPA
Responsibilities
Operational:
Understanding business processes and assessing the criticality of the technological solutions being used to carry out business functions.
Review business Level processes and new initiatives for Cyber security requirements and help in incorporating industry best practices.
Continuously monitor and assess execution of security policy and validate necessary controls are in place.
Support security ...