• Senior Manager - Cyber Security Jobs in Delhincr

  • Alois Staffing
  • Delhincr
  • Save Job
  • 10 - 25 Years
  • Posted : 26 days ago

Job Description:

Role Sr Manager - Cybersecurity

Reporting to VP - Information Security

Location Gurgaon

Competency Requirements

- Aid in the creation of a clear current and future state enterprise security architecture, as well as, in the resulting strategic roadmap

- Work closely with IT functional area engineers and architects to ensure adequate security solutions are in place throughout all business systems and platforms to mitigate identified risks sufficiently and to meet business objectives and regulatory requirements

- Develop the business, information and technical artifacts that constitute the enterprise information security architecture and solutions

- Serve as a security expert helping project teams comply with information security policies, industry regulations, and best practices

- Research, design and advocate new technologies, architectures, and security products that will support security requirements for the enterprise and its customers

- Contribute to the development and maintenance of the information security strategy in a cross-fertilizing manner (security strategy drives architecture, and architecture feeds back into security strategy)

- Analyzes business impact and exposure, based on emerging security threats, vulnerabilities and risks

- Partner in the design of a security architecture review board and process and monitor adherence to security policies, standards, and procedures where security architecture is involved

- Maintain a full life-cycle security architecture model

- Support and contribute to change-management-process improvements

- Develop and standardize authentication schemes (such as OAuth, SAML, WS-Sec, etc) across the IT environment to ensure consistent and integrated access controls for systems and applications and across locations, providers and customers

- Develop and write standard documents as they pertain to architecture or security technology solutions

- Translate findings based on risk assessments, audits, or other such observations into well-designed security architecture

- Partner with various resources both inside information security as well as in other IT departments to establish a good understanding of capabilities, business needs, and areas for improvement

- Provide regular reporting on the current status of the information security architecture efforts (both at a program and a project level) Produce a current state map for any ad-hoc or planned PCI-assessment by either internal or external partners

- Perform additional duties as assigned by management

- Should have experience managing security and compliance for BPO environments

- Should have thorough knowledge on Security and compliance risks and countermeasures associated with BPO

- Should have a broad knowledge of security policies and practices, including ISO 27001 and Payment Card Industry (PCI)

- Ability to effectively communicate security and risk-related concepts to a broad range of technical and non-technical staff

- Reasonable technical understanding of the following areas

A) Application security,

B) Cloud/virtualization security,

C) Server/OS security,

D) Identity and access management,

E) Network security,

- Experience in designing and reviewing security controls for BPO

- Should have a broad technical foundation and can understand the network, operating system, database, and application development design and support as necessary to be able to analyze issues and recommend solutions for the detection, remediation, and prevention of security vulnerabilities

- Excellent communication skills Ability to influence and persuade at all levels, and strong relationship management skills

- Directly supervise associates, performing cyber security responsibilities including interviewing, selection, and training

- Develops and documents additional or modified protection measures for those threats and identifies protection measures/practices that apply to all site systems

- Plan and coordinate the execution of cyber security programs and projects managing scope, resources, cost, and schedule

- Oversees all cyber technical work and ensures vulnerabilities and or cyber breaches are remediated per approved plans and processes

Hands-on experience working on Security tools and technologies such as



C) VA/PT tools

- Experience in developing and implementing Security Incident Response plans for large organizations


- Work with the CISO to set the strategic direction and planning for Information Security, including annual and long-term security and compliance goals

- Manage the overall security strategy and establish company-wide standards and controls, including directing updates or creation of related policies, procedures, programs, and guidelines to ensure company-wide information security and assurance

- Work with the CISO to create a roadmap for continuous program improvements with defined metrics and reporting mechanisms

- Work directly with the client services team, information security manager, and clients to answer security and compliance related questions and develop internal resources for frequently asked questions

- The successful candidate will have a minimum of 10+ years management experience in Information Security, Privacy, Risk and Compliance and possess sufficient technical proficiency

- Oversee the review of applications and technology environments during the development or acquisitions process to assure compliance with corporate security policies and directions

- Oversee incident response planning and exercises, the investigation of security breaches, the review of investigations after breaches or incidents, including impact analysis and recommendations

- Oversee the function of the Security Operations Center

- Translate corporate and client requirements related to security and regulatory compliance to current and future capabilities, products, and projects

- Take ownership of key partnerships with 3rd party security service and technology product vendors and partners

- Coordinate and track all information technology and security related audits including the scope of audits, units involved, timelines, auditing agencies, and outcomes

- Evaluate suspected security breaches, work with subject matter experts, and recommend corrective actions

- The design and implementation of a threat management system

- Lead IT security incident response to coordinate and manage resolution to current or potential threats, incidents, or vulnerabilities

Profile Summary:

Employment Type : Full Time
Functional Area : Other
Salary : Not Mentioned
Deadline : 18th Mar 2020

Key Skills:

Company Profile:

Not Mentioned

These free online tutorials may interest you

People who search this job also searched for the following Keywords

Salary trends based on over 1 crore profiles

View Salaries

All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status