Netaji Subhash Place, Guru Govind Singh College, New Delhi, Delhi, India
Monitor and advice on information security issues related to the systems and workflow to ensure the internal security controls, appropriate and operating as intended.
Coordinate and execute IT security projects.
Coordinate response to information security incidents.
Develop and publish Information Security policies, procedures, standards and guidelines based on knowledge of best practices and compliance requirements.
Conduct data classification assessment and security audits and manage remediation plans.
Collaborate with IT management, the legal department, safety and security, and law enforcement agencies to manage security vulnerabilities.
Create, manage and maintain user security awareness.
Conduct security research in keeping abreast of latest security issues.
Hector and Streak Consulting Pvt Ltd
Navi Mumbai, Maharashtra, India
1. To manage
Compliance with Company information security policies, standards, procedures and guidelines
Compliance with Company Group information security requirements, as directed by Group CISO
Compliance with information security requirements of government of India and regulators
Technical security risk assessments like Vulnerability Assessment, Penetration Testing, Application Security Testing, Network Security Architecture Review, Password Compliance Review, Firewall Rule base Reviews, Firewall Configuration Reviews etc.
Security risk assessments for general controls like process reviews, assessment at outsourced vendor locations, branch locations etc.
Sustenance of ISO 27001:2013 certification and practices for all types of controls
Evaluation of all new firewall requests and other requests, identify the inherent risks in discussion with the requestor, network team and production support team, compare with recommendation of secure network architecture/policies/procedures and accordingly advise the requestor.
Evaluation of existing IT network security systems to determine the potential risk and advise mitigation measures.
Evaluation of existing network architecture, placement of servers, creation of VLANs, security zones/DMZ to determine the potential risk and advise mitigation measures
Development and Review of Secure Configuration Documents for different systems and devices
Evaluation of security patch implementation as per Company systems environment
Development of Information Security awareness training program and promote security culture
Evaluation of new security products and monitor implementation of security software/products
2. To work closely with various teams and functions to ensure effective implementation of Information Security controls. 3. To oversee Security Log Monitoring activities and mitigations of events/incidents 4. To prepare and present compliance/audit reports 5. To prepare Dashboards and Action Taken Reports of various security assessments/reviews 6. To ensure that when exceptions/deviations / non-adherence to the Information Security Policies are proposed by the IT Owner/Business Owner, the risk assessment process is completed and appropriate recommendations are put up to senior management. 7. To stay informed about global best practices and latest developments in the field of information security including technology and management practices.
Mumbai, Maharashtra, India
Exp: 5-7 yrs in large enterprise IT security sales
Salary range: 7L to 9L pa CTC
Selling PKI based solution in large corporates and enterprise clients
Selling HSM ( hardware security module) based solutions
ACPL Systems Pvt Ltd
We are hiring Information Security Professionals openings at Delhi / Gurgaon / Mumbai / Bangalore . Network Security Experts VA/PT experts Web and DLP experts CISCO Security Security Operations - at all levels .