1 Opening(s)
3.0 Year(s) To 8.0 Year(s)
15.00 LPA TO 25.00 LPA
Perform assessment of IT and cybersecurity policies, standards and other documentation
Identify gaps in policy, process and standard implementation
Conduct discussions, take leadership and drive closure of identified open issues in assessments
Liaise with IT, Infra and business teams as required to drive Information and cybersecurity projects
Release periodic dashboards\reports
1 Opening(s)
15.0 Year(s) To 20.0 Year(s)
Not Disclosed by Recruiter
JOB DESCRIPTION
1. Information Security Risk Management: Identifying and assessing information securityrisks within the bank's operations and technology infrastructure.2 .Developing risk treatment plan to mitigate and address identified risks and fine tunebased on the risk posture3. Vendor and Third-Party Risk Management: Assessing and managing the security risksassociated with third-party vendors and ...
1 Opening(s)
7.0 Year(s) To 10.0 Year(s)
13.00 LPA TO 13.00 LPA
Hands on exposure in Infrastructure and Cloud Platform. Am looking for someone who’s from Financial background (preferred AMC ) and having hands on experience in managing Windows/Non Windows/Databases/Datacenter/Networking and any of the Cloud platform exposure (good to have AWS). Wintel Admin, DNS handling, Intune Management, Storage, O365 & Any of CP ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
BASIC PURPOSE:
The primary responsibility of the Internal Auditor/IT is to perform the Information Systems (IT) audit testing related to the Sarbanes-Oxley Section 404 (SOX) audit plan. Additionally, to conduct information system audits of CCH IT processes, environments, systems, and projects. The Internal Auditor will assist in evaluating the risk levels, ...
1 Opening(s)
5.0 Year(s) To 7.0 Year(s)
Not Disclosed by Recruiter
Purpose: The Data Protection and Privacy Specialist will be instrumental in ensuring the organization's compliance with the Personal Data Protection Law (PDPL) and other relevant data protection regulations. The Specialist will be responsible for conducting reviews/assessments, developing and implementing privacy training programs, developing policies/procedures, managing data subject rights, conducting data ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
IS Audits - Application, IT Infrastructure, Information Security including Cyber Security,IT Vendor Audits
RESPONSIBILITIES
IS Audits - Application, IT Infrastructure, Information Security including CyberSecurity, IT Vendor Audits. Identifying critical issues (with respect to process/ compliance / revenue leakage)and suggesting appropriate cost-effective controls. Release of reports on timely manner and coordinating with ...
1 Opening(s)
6.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
6-10 years ,
SSL certificate management (Local / wild card),
Management of different Certificate Authorities (CA) for user and computers through group Policy, Management of Public Key Infrastructure (PKI)
PKI-SSL certificate management Location-PuneYear of exp-5+ Yrs • Must have skills : SSL certificate management (Local / wild card), Management of different Certificate ...
1 Opening(s)
3.0 Year(s) To 15.0 Year(s)
7.00 LPA TO 15.00 LPA
Roles & Responsibilities:
Hands-on VA/PT/App Sec assessment
Participate in security Architecture reviews
Support in system/application integrations to Security operations center
Monitor network traffic
Support in writing rules/alerts
Support in Governance, risk and compliance activities
Conduct reviews of bank application, network and server infrastructure under the guidance of supervisor
Secondary Responsibilities:
Configure Security solutions as may be required
As an individual contributor be ...
1 Opening(s)
5.0 Year(s) To 7.0 Year(s)
15.00 LPA TO 20.00 LPA
Position: Vulnerability Analyst Experience: 5 – 7 Years Location: Chennai Employment Type: Full-Time, Permanent Department: IT & Information Security Industry: IT Services & Consulting Role Category: IT SecurityJob DescriptionKey Responsibilities:- Deep understanding of the vulnerability management lifecycle and tools (e.g., DefectDojo, Tenable)- Integration and automation of vulnerability tools with other systems- ...
4 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Vertical - Information Security Management
Job Purpose-
Ability to learn, understand and work with team to gain insight into SOC and cyber forensic functions
Functional Responsibility
1.Perform Level1 SOC monitoring2. Timely escalation of incident if the same is not remediated within TAT3. Improve adherence to TAT over a period of time
Competencies Required-
1. Good understanding of network, ...