3,789 Ciso jobs in India

Chief Information Security Officer (CISO)

Bhubaneshwar, Orissa ISERVEU TECHNOLOGY

Posted today

Job Viewed

Tap Again To Close

Job Description

Company Description- 
iServeU is Asia’s leading banking infrastructure platform provider enabling financial enterprises to offer embedded banking services to their end customers. iServeU is one of the few certified partners with National Payment Corporation of India (NPCI), VISA for various products.
iServeU also provides a cloud-native, micro services-enabled, distributed platform with over 5000 possible product configurations with a low code/no code interface to banks, NBFCs, Fintech, and other regulated entities.•We process around 2500 transactions per second by levering distributed & auto scale technology like K8.•Our core platform combines of 1200+ micro services.•Our customer list includes Fintech start-ups, top tier private banks to PSU bank. We operate in five countries and help
customers constantly change the way financial institutions operate and innovate.•Our solutions currently empowers over 20 banks and 250+ enterprises across India and abroad.•Our platform seamlessly manages the entire transaction lifecycle, including withdrawals, deposits, transfers, payments, and lending through various channels like digital, branch, agents.Our team of 500+ employees, with over 80% in technology roles is spread across offices in Bhubaneswar, Bangalore and Delhi. We have raised $8 million in funding to support our growth and innovation.For more details visit:

Job Description:

The Chief InformationSecurity Officer (CISO) is a senior-level management position responsible foroverseeing an organization’s information security. The CISO will be the head of information security department.

Job Brief:
We’re looking for a Chief Information Security Officer to lead and oversee ourorganization’s information security program. This includes developing andimplementing security policies and procedures, managing security technologiesand overseeing security awareness training. The ideal candidate will haveextensive experience in information security, including experience withsecurity risk management, incident response and forensics

ChiefInformation Security Officer (CISO) Duties:

  • Manage all security operations for the IT/IS department.
  • Set and enforce compliance regulations and standards
  • Develop information security policies
  • Develop policies, procedures, and standards
  • Maintain adequate controls
  • Maintain data confidentiality
  • Enforce regulations, procedures, standards, and policies
  • Monitor and continuously assess risk
  • Control and document all activities performed by employees
  • Provide guidance and direction for all IT/IS staff
  • Advise management on IT/IS costs and budgets
  • Develop, implement, and adhere to a company code of conduct
  • Develop, implement, and adhere to a company code of ethics
  • Approve all employee IT/IS access requests
  • Provide IT/IS departmental and project specific oversight
  • Provide IT/IS project management support
  • Proactively identify

  • Chief Information Security Officer (CISO)Responsibilities:

  • Serve as the company’s lead information security officer, overseeing all security initiatives, policies, and procedures
  • Develop, implement, and monitor information security policies and procedures
  • Develop and implement information security strategies including vulnerability assessments and penetration testing, and cybersecurity awareness and training
  • Translate IT security risks into actionable requirements
  • Develop and maintain an information security budget and oversee IT spending
  • Research emerging security threats and vulnerabilities and advise management on appropriate countermeasures
  • Create and implement strategic plans to secure the company’s IT infrastructure
  • Perform risk assessment and vulnerability analysis
  • Promote the company’s information security reputation
  • Evaluate adequacy of third-party service providers
  • Perform IT asset inventories and provide detailed reports for budgetary purposes
  • Develop and implement security incident response plans
  • Monitor and audit IT and company records
  • Award IT contracts and ensure compliance with contract terms
  • Develop and enforce IT
  • This advertiser has chosen not to accept applicants from your region.

    Ciso- Chief Information Security Officer

    Ahmedabad, Gujarat Talent Leads HR Solutions

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Opening: 1 Nos.
    - Job ID: 61890
    - Employment Type: Full Time
    - Reference:

    - Work Experience: 15.0 Year(s) To 20.0 Year(s)
    - CTC Salary: 40.00 LPA TO 50.00 LPA
    - Function: IT Infrastructure & IT Security / Support
    - Industry: IT-Software/Software Services
    - Qualification: B.Tech/B.E. - Computers; MBA/MMS/MPM/PGDM - Information Technology
    - Location:

    - Ahmedabad
    **Responsibilities**

    **Operational**:

    - Understanding business processes and assessing the criticality of the technological solutions being used to carry out business functions.
    - Review business Level processes and new initiatives for Cyber security requirements and help in incorporating industry best practices.
    - Continuously monitor and assess execution of security policy and validate necessary controls are in place.
    - Support security governance processes and serve as cyber security interface to the business.
    - Enable User education/ awareness on Cyber Policy and its enforcement.
    - Identify, report service level attainment results, and highlight improvement opportunities.
    - Drive continuous process improvements for Cyber operations and benchmark them with industry standards

    **Project Management**
    - Design and implement BU level Cyber security projects as per the business requirements.
    - Lead and manage projects that drive execution of security policy and validation of necessary controls.

    **Risk Management & Compliance**
    - Oversee deployment of strategic interventions to mitigate risks and address vulnerabilities.
    - Forefront initiatives to monitor and drive adherence of Cyber operations to protocols, legal and regulatory compliances at group and business level.
    - Build security reporting dashboards for capturing risk status of different systems.
    - Revisit operations policies/ frameworks in accordance to changing business, technology landscape and regulatory environment.

    **Security Audit**
    - Plan and implement the internal audit of IT, OT, and business processes across the organization in collaboration with the Group and Business Audit and assurance counterparts.
    - Ensure testing and evaluation of system controls, policies, and procedures as required.
    - Empanel audit agencies for security audit and ensure audits are conducted as defined and co-lead interface with auditors.
    - Monitor and track all security controls for potential issues, perform verification assessment of controls and determine and update necessary controls to ensure documentation in enterprise security plan.
    - Identify and maintain a repository of leading security practices and standards used. Report on the implementation of leading practices and standards and map them to controls and metrics.

    **Vendor-Partner Management and Engagement**
    - Track partner performance to ensure project delivery basis expected quality, timelines and budgetary considerations, and address non-performance; Conduct regular partner performance reviews based on project criticality.
    - Manage escalations related to partner (non)performance, scoping issues, partner pay-outs.
    - Cultivate strategic relationships with partners and effectively leverage them for value additions.
    - Engage with partners on a frequent basis for a win-win relationship; Facilitate organization of capability road shows/ POCs by partners to increase partner engagement with the organization

    **People Management**
    - Working with Cyber, IT and OT teams
    - Communication with sites.
    - Coordination with other departments and functions
    - Coordination with other organizations
    - Dealing with service providers.

    **KRAs with Outcomes (Jobs which brings value to the organization)**

    **Domain**

    **KRA (Key Result Ares)**

    **KPI (Key Performance Indicator)**
    Minimizing Business Impact
    Minimizing Business impact due to Cybersecurity issues.
    - Business Loss due to Cybersecurity issues. (% of EBITDA)
    Security Review
    Review of Service requests and New Projects w.r.t Cybersecurity
    - Requests reviewed within SLA (%).
    - Projects reviewed within SLA (%).
    Ensure Compliance
    Compliance to Legal and Regulatory guidelines related to Cybersecurity
    - Compliance to Legal and Regulatory guidelines. (% compliance against total requirements)
    - Timely communication and co-ordination with the regulatory agencies (%).
    Ensuring effectiveness of Security Controls
    Ensuring security controls are effective for endpoints, servers, and network.
    - Ensuring Coverage of endpoint security agents (%)
    - Ensuring Coverage of Server security agents (%)
    - Ensuring policy review and other effectiveness measures of network security (%)
    Vulnerability Remediation
    Closure of Identified vulnerabilities
    - % Of Vulnerabilities closed as per policy requirement.
    Cybersecurity Awareness
    To facilitate and nurture deep-rooted cybersecurity culture.
    - To develop relevant processes and systems, and behavioral training to employees to sustain cybersecurity consciousness and culture in the businesses.
    Cybersecurity governance
    Establish and manage governance in cyber security function
    - Governance MIS
    This advertiser has chosen not to accept applicants from your region.

    Chief Information Security Officer

    Vasai Virar, Maharashtra Bassein Catholic Co-Operative Bank

    Posted 1 day ago

    Job Viewed

    Tap Again To Close

    Job Description

    Profile :

    • Primarily responsible for articulating and enforcing the policies that the UCB uses to

    protect its information assets apart from coordinating the cyber security related issues / implementation within the Bank as well as relevant external agencies.

    • Responsible for ensuring compliance to various instructions issued on information/cyber security by RBI.
    • Responsible to place a separate review of cyber security arrangements/ preparedness of the Bank before the Board on a quarterly basis.
    • Responsible for bringing to the notice of the Board about the vulnerabilities and cyber security risks that the Bank is exposed to.
    • Manage and monitor the C-SOC and drive cyber security related projects and can have a dotted relation with Chief Information Officer (CIO) for driving such projects.
    • By virtue of the role as member secretary of information security and/or related committees(s), if any, may ensure, inter alia, current/emerging cyber threats to banking (including payment systems) sector and the Banks preparedness in these aspects
    • Responsible for sustenance of the compliances achieved on year on year basis.


    Experience :

    • IT related work experience of minimum 15 years, of which at least 10 years of experience in Information Security in Financial Institutions.


    Qualification :

    • Bachelor/Master Degree in Engineering in any one of the following disciplines:

    a) Computer Science

    b) Information Technology

    c) Electronics and Communication

    d) Cyber Security

    • Master of Computer Applications (MCA)
    • Master in Business Administration (MBA) - Systems / IT

    (Higher qualifications will be given preference)

    Professional Qualification :

    The candidate should possess any one of the following certificates:

    a) Certified Information Systems Security Professional (CISSP)

    b) Certified Information Security Manager (CISM)

    c) Certified Chief Information Security Officer (CCISO)

    d) Certified Information Systems Auditor (CISA)


    Skills :

    • Exposure to Core Banking Solution, Digital Banking, Networking and IT Infrastructure solutions.
    • Knowledge of IT governance & compliances.
    • Requisite technical background and expertise.
    This advertiser has chosen not to accept applicants from your region.

    Chief Information Security Officer

    Hyderabad, Andhra Pradesh Bharat Financial Inclusion Limited (100% subsidiary of IndusInd Bank Ltd.)

    Posted 4 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    POSITION SUMMARY:


    The incumbent will lead the organization’s cybersecurity function, overseeing threat monitoring, risk assessment, data protection, and incident response. Responsibilities include designing secure IT architectures, governing identity and access controls, implementing risk-mitigation programs, conducting investigations, and ensuring compliance through effective governance.


    KEY ACCOUNTABILITIES/ KEY RESPONSIBILITIES:


    Security Operations & Incident Response:

    • Oversee a robust Security Operations Center (SOC) functionality, potentially outsourced or augmented by automation, to provide real-time monitoring and analysis of immediate cyber threats targeting the organization's systems and data.
    • Develop and implement incident response plans, encompassing procedures for timely detection, containment, eradication, and recovery from security breaches or data loss events.
    • Lead and coordinate effective responses to security incidents, minimizing downtime and mitigating potential financial and reputational damage to the organization and its clients.

    Cyber Risk Management & Intelligence:

    • Proactively identify, assess, and mitigate information security risks across the entire IT ecosystem and business processes, including evaluating the risks associated with emerging technologies and digital transformation initiatives.
    • Stay abreast of the evolving cyber threat landscape, including targeted attacks, ransomware, and insider threats, and translate complex technical risks into understandable insights for the leadership team and board of directors.
    • Develop and maintain a comprehensive risk management framework, incorporating robust risk assessments, vulnerability management, and continuous monitoring to strengthen the organization's security posture.

    Data Loss & Fraud Prevention:

    • Implement and enforce data protection policies and controls to prevent unauthorized access, misuse, or exfiltration of sensitive client information and organizational data, whether from external sources or internal staff.
    • Employ advanced anti-fraud and anomaly detection systems, including transaction monitoring and behavioral pattern analysis, to safeguard financial assets and preserve client trust.

    Security Architecture & Engineering:

    • Lead the planning, selection, and implementation of security hardware and software solutions, including designing secure network and IT infrastructure aligned with industry best practices and regulatory compliance.
    • Develop and maintain a robust and scalable security architecture that supports the organization's digital transformation initiatives and ensures the security of its expanding digital footprint.
    • Regularly review and update security systems to ensure their effectiveness against evolving threats and vulnerabilities, prioritizing a proactive approach to security by design rather than a reactive one.

    Identity & Access Management (IAM):

    • Design and implement an effective Identity and Access Management (IAM) framework to ensure that only authorized personnel have appropriate access to sensitive data, systems, and client information based on the principle of least privilege.
    • Enforce strong authentication mechanisms, including Multi-Factor Authentication (MFA), to minimize the risk of unauthorized access due to compromised credentials.
    • Regularly audit and review user access privileges to ensure they remain aligned with job functions and organizational policies, promptly revoking access for departing employees and those changing roles.

    Security Program Management:

    • Develop and implement a comprehensive security program roadmap, encompassing a structured approach to securing the organization's digital infrastructure and promoting a security-first culture across all departments.
    • Lead and manage the security team, fostering a culture of continuous learning and professional development, equipping them with the skills to address emerging security challenges.
    • Effectively allocate resources, including budget and personnel, to ensure the successful execution of security initiatives and compliance with regulatory requirements.

    Investigations & Forensics:

    • Lead and oversee investigations into security incidents and data breaches, determining the root cause, assessing the scope of the breach, and collaborating with internal and external parties as needed.
    • Conduct forensic analysis to recover and analyze digital evidence, identifying the attackers' methods and supporting legal proceedings or regulatory reporting as necessary.
    • Develop and implement corrective measures and lessons learned from security incidents to prevent future occurrences and strengthen the organization's cyber resilience.

    Governance & Compliance:

    • Establish and maintain a robust information security governance framework that aligns with the organization's objectives, regulatory requirements (including RBI regulations for Microfinance Companies), and industry best practices.
    • Ensure continuous compliance with all applicable laws, regulations, and industry standards, including those related to data protection, privacy, and financial operations.
    • Act as the primary point of contact for regulatory bodies and internal/external auditors on all information security matters, ensuring transparency and proactive reporting.


    DESIRED PROFILE:

    Qualifications and Skills

    • Experience: 12+ years of relevant work experience with a bachelor’s degree in computer science or related field.
    • Should have prior experience in handling Cybersecurity Operations Management, Cyber Risk & Intelligence, Data Protection & Fraud Prevention, Security Architecture, Identity & Access Management, Digital Forensics & Incident Investigation, Governance & Compliance
    • Knowledge on RBI regulations related to security is important.
    • Cyber Security Certifications are added advantages (CISA, CISSP, CISM)
    This advertiser has chosen not to accept applicants from your region.

    Chief Information Security Officer

    Thane, Maharashtra Aimhire

    Posted 6 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    This advertiser has chosen not to accept applicants from your region.

    Chief Information Security Officer

    Hyderabad, Andhra Pradesh Centific

    Posted 6 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    The next frontier of AI begins with Centific

    Centific is a Seattle-based tech company pioneering the future of AI one breakthrough at a time. Learn how we’re transforming the world through safe and scalable AI and empowering businesses to unlock the full potential of their data.


    Domain: AI Platform & Data Foundry | Sectors: Healthcare, Public Sector, Retail


    Position Summary

    The Chief Information Security Officer (CISO) is responsible for leading the security, privacy, and compliance strategy across a cutting-edge AI platform and data foundry product suite. This role is critical in ensuring secure AI development and deployment across regulated industries such as healthcare, public services, and retail, where data sensitivity, ethical AI use, and regulatory compliance are paramount.


    Key Responsibilities

    Security Strategy & Architecture

    • Define and execute a comprehensive security strategy aligned with business goals, product architecture, and sector-specific regulatory requirements.
    • Lead the design and implementation of secure-by-design principles across AI pipelines, including RAG, RLHF, HITL, and red teaming modules.

    Governance & Risk Management

    • Establish and maintain governance frameworks for AI model lifecycle management, including auditability, explainability, and safety scoring.
    • Conduct regular risk assessments and threat modeling, particularly for AI-specific threats such as data poisoning and adversarial attacks.

    Incident Response & Resilience

    • Develop and lead the enterprise-wide incident response program, including detection, containment, investigation, and recovery.
    • Coordinate cross-functional response to security incidents and ensure continuous improvement through post-incident reviews and simulations.

    Compliance & Regulatory Alignment

    • Ensure compliance with global and sector-specific regulations, including HIPAA, HITECH, GDPR, CCPA, PCI-DSS, FedRAMP, and the EU AI Act.
    • Lead certification and audit readiness efforts (e.g., ISO 27001, SOC 2, HITRUST).

    Sector-Specific Security Oversight

    • Healthcare: Secure PHI/PII in AI-driven diagnostics, imaging, and patient engagement systems.
    • Public Sector: Align with NIST 800-53 and FedRAMP for civic AI deployments and law enforcement use cases.
    • Retail: Protect customer data used in personalization, sentiment analysis, and recommendation engines.

    Security Awareness & Culture

    • Champion a security-first culture through training, awareness campaigns, and executive engagement.
    • Develop role-based security education programs tailored to engineering, product, and business teams.

    Customer & Partner Trust

    • Serve as the executive voice on security in customer engagements, RFPs, and co-sell partnerships.
    • Lead responses to customer security questionnaires and ensure transparency in data handling practices.

    Operational Excellence

    • Build and manage a centralized Command Control Center for real-time monitoring of AI systems, infrastructure, and compliance metrics.
    • Continuously improve security operations through automation, analytics, and threat intelligence integration.


    Qualifications

    • 10+ years in cybersecurity leadership, with 3+ years in AI/ML or data platform environments.
    • Proven experience securing AI systems in healthcare, public sector, or retail domains.
    • Deep understanding of cloud-native architectures (AWS, Azure, GCP), DevSecOps, and infrastructure-as-code.
    • Strong knowledge of regulatory frameworks: HIPAA, GDPR, CCPA, NIST, FedRAMP, PCI-DSS.
    • Certifications such as CISSP, CISM, CCSP, or emerging AI governance credentials are preferred.


    Preferred Attributes

    • Experience with AI-specific compliance frameworks and ethical AI principles.
    • Familiarity with data marketplaces, synthetic data generation, and human-in-the-loop (HITL) systems.
    • Ability to influence executive stakeholders and shape product security strategy in a fast-paced, innovation-driven environment.
    This advertiser has chosen not to accept applicants from your region.

    Chief Information Security Officer

    Hyderabad, Andhra Pradesh Bharat Financial Inclusion Limited (100% subsidiary of IndusInd Bank Ltd.)

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    POSITION SUMMARY:

    The incumbent will lead the organization’s cybersecurity function, overseeing threat monitoring, risk assessment, data protection, and incident response. Responsibilities include designing secure IT architectures, governing identity and access controls, implementing risk-mitigation programs, conducting investigations, and ensuring compliance through effective governance.

    KEY ACCOUNTABILITIES/ KEY RESPONSIBILITIES:

    Security Operations & Incident Response:
    Oversee a robust Security Operations Center (SOC) functionality, potentially outsourced or augmented by automation, to provide real-time monitoring and analysis of immediate cyber threats targeting the organization's systems and data.
    Develop and implement incident response plans, encompassing procedures for timely detection, containment, eradication, and recovery from security breaches or data loss events.
    Lead and coordinate effective responses to security incidents, minimizing downtime and mitigating potential financial and reputational damage to the organization and its clients.
    Cyber Risk Management & Intelligence:
    Proactively identify, assess, and mitigate information security risks across the entire IT ecosystem and business processes, including evaluating the risks associated with emerging technologies and digital transformation initiatives.
    Stay abreast of the evolving cyber threat landscape, including targeted attacks, ransomware, and insider threats, and translate complex technical risks into understandable insights for the leadership team and board of directors.
    Develop and maintain a comprehensive risk management framework, incorporating robust risk assessments, vulnerability management, and continuous monitoring to strengthen the organization's security posture.
    Data Loss & Fraud Prevention:
    Implement and enforce data protection policies and controls to prevent unauthorized access, misuse, or exfiltration of sensitive client information and organizational data, whether from external sources or internal staff.
    Employ advanced anti-fraud and anomaly detection systems, including transaction monitoring and behavioral pattern analysis, to safeguard financial assets and preserve client trust.
    Security Architecture & Engineering:
    Lead the planning, selection, and implementation of security hardware and software solutions, including designing secure network and IT infrastructure aligned with industry best practices and regulatory compliance.
    Develop and maintain a robust and scalable security architecture that supports the organization's digital transformation initiatives and ensures the security of its expanding digital footprint.
    Regularly review and update security systems to ensure their effectiveness against evolving threats and vulnerabilities, prioritizing a proactive approach to security by design rather than a reactive one.
    Identity & Access Management (IAM):
    Design and implement an effective Identity and Access Management (IAM) framework to ensure that only authorized personnel have appropriate access to sensitive data, systems, and client information based on the principle of least privilege.
    Enforce strong authentication mechanisms, including Multi-Factor Authentication (MFA), to minimize the risk of unauthorized access due to compromised credentials.
    Regularly audit and review user access privileges to ensure they remain aligned with job functions and organizational policies, promptly revoking access for departing employees and those changing roles.
    Security Program Management:
    Develop and implement a comprehensive security program roadmap, encompassing a structured approach to securing the organization's digital infrastructure and promoting a security-first culture across all departments.
    Lead and manage the security team, fostering a culture of continuous learning and professional development, equipping them with the skills to address emerging security challenges.
    Effectively allocate resources, including budget and personnel, to ensure the successful execution of security initiatives and compliance with regulatory requirements.
    Investigations & Forensics:
    Lead and oversee investigations into security incidents and data breaches, determining the root cause, assessing the scope of the breach, and collaborating with internal and external parties as needed.
    Conduct forensic analysis to recover and analyze digital evidence, identifying the attackers' methods and supporting legal proceedings or regulatory reporting as necessary.
    Develop and implement corrective measures and lessons learned from security incidents to prevent future occurrences and strengthen the organization's cyber resilience.
    Governance & Compliance:
    Establish and maintain a robust information security governance framework that aligns with the organization's objectives, regulatory requirements (including RBI regulations for Microfinance Companies), and industry best practices.
    Ensure continuous compliance with all applicable laws, regulations, and industry standards, including those related to data protection, privacy, and financial operations.
    Act as the primary point of contact for regulatory bodies and internal/external auditors on all information security matters, ensuring transparency and proactive reporting.

    DESIRED PROFILE:
    Qualifications and Skills
    Experience: 12+ years of relevant work experience with a bachelor’s degree in computer science or related field.
    Should have prior experience in handling Cybersecurity Operations Management, Cyber Risk & Intelligence, Data Protection & Fraud Prevention, Security Architecture, Identity & Access Management, Digital Forensics & Incident Investigation, Governance & Compliance
    Knowledge on RBI regulations related to security is important.
    Cyber Security Certifications are added advantages (CISA, CISSP, CISM)
    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Ciso Jobs in India !

    Chief Information Security Officer

    Hyderabad, Andhra Pradesh Centific

    Posted 1 day ago

    Job Viewed

    Tap Again To Close

    Job Description

    The next frontier of AI begins with Centific
    Centific is a Seattle-based tech company pioneering the future of AI one breakthrough at a time. Learn how we’re transforming the world through safe and scalable AI and empowering businesses to unlock the full potential of their data.

    Domain: AI Platform & Data Foundry | Sectors: Healthcare, Public Sector, Retail

    Position Summary
    The Chief Information Security Officer (CISO) is responsible for leading the security, privacy, and compliance strategy across a cutting-edge AI platform and data foundry product suite. This role is critical in ensuring secure AI development and deployment across regulated industries such as healthcare, public services, and retail, where data sensitivity, ethical AI use, and regulatory compliance are paramount.

    Key Responsibilities
    Security Strategy & Architecture
    Define and execute a comprehensive security strategy aligned with business goals, product architecture, and sector-specific regulatory requirements.
    Lead the design and implementation of secure-by-design principles across AI pipelines, including RAG, RLHF, HITL, and red teaming modules.
    Governance & Risk Management
    Establish and maintain governance frameworks for AI model lifecycle management, including auditability, explainability, and safety scoring.
    Conduct regular risk assessments and threat modeling, particularly for AI-specific threats such as data poisoning and adversarial attacks.
    Incident Response & Resilience
    Develop and lead the enterprise-wide incident response program, including detection, containment, investigation, and recovery.
    Coordinate cross-functional response to security incidents and ensure continuous improvement through post-incident reviews and simulations.
    Compliance & Regulatory Alignment
    Ensure compliance with global and sector-specific regulations, including HIPAA, HITECH, GDPR, CCPA, PCI-DSS, FedRAMP, and the EU AI Act.
    Lead certification and audit readiness efforts (e.g., ISO 27001, SOC 2, HITRUST).
    Sector-Specific Security Oversight
    Healthcare: Secure PHI/PII in AI-driven diagnostics, imaging, and patient engagement systems.
    Public Sector: Align with NIST 800-53 and FedRAMP for civic AI deployments and law enforcement use cases.
    Retail: Protect customer data used in personalization, sentiment analysis, and recommendation engines.
    Security Awareness & Culture
    Champion a security-first culture through training, awareness campaigns, and executive engagement.
    Develop role-based security education programs tailored to engineering, product, and business teams.
    Customer & Partner Trust
    Serve as the executive voice on security in customer engagements, RFPs, and co-sell partnerships.
    Lead responses to customer security questionnaires and ensure transparency in data handling practices.
    Operational Excellence
    Build and manage a centralized Command Control Center for real-time monitoring of AI systems, infrastructure, and compliance metrics.
    Continuously improve security operations through automation, analytics, and threat intelligence integration.

    Qualifications
    10+ years in cybersecurity leadership, with 3+ years in AI/ML or data platform environments.
    Proven experience securing AI systems in healthcare, public sector, or retail domains.
    Deep understanding of cloud-native architectures (AWS, Azure, GCP), DevSecOps, and infrastructure-as-code.
    Strong knowledge of regulatory frameworks: HIPAA, GDPR, CCPA, NIST, FedRAMP, PCI-DSS.
    Certifications such as CISSP, CISM, CCSP, or emerging AI governance credentials are preferred.

    Preferred Attributes
    Experience with AI-specific compliance frameworks and ethical AI principles.
    Familiarity with data marketplaces, synthetic data generation, and human-in-the-loop (HITL) systems.
    Ability to influence executive stakeholders and shape product security strategy in a fast-paced, innovation-driven environment.
    This advertiser has chosen not to accept applicants from your region.

    Chief Information Security Officer

    Thane, Maharashtra Aimhire

    Posted 3 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Job Opening: Chief Information Security Officer (CISO)
    Location: Thane
    Employment Type: Full-Time | Senior Leadership
    Department: Security & Compliance

    About the Role
    We’re looking for an experienced and visionary Chief Information Security Officer (CISO) to lead our company-wide information security strategy. As a key member of the senior leadership team, you’ll be responsible for protecting our systems, data, and applications while aligning security initiatives with our business goals.
    This role requires a strong leader with deep technical expertise, a strategic mindset, and a passion for building secure, scalable, and compliant environments—especially within fast-paced, SaaS or technology-driven companies.

    Key Responsibilities
    Strategic Leadership
    Define and drive the overall information security vision, strategy, and roadmap.
    Provide executive-level guidance on risk management, compliance, and emerging threats.
    Embed security best practices into business operations through cross-functional collaboration.
    ️ Risk & Security Program Management
    Develop and enforce comprehensive security policies, standards, and procedures.
    Lead enterprise-wide risk assessments, threat modeling, and vulnerability analysis.
    Monitor and respond to security threats, alerts, and reports in real time.
    Incident Response & Recovery
    Lead the development and execution of incident response strategies and playbooks.
    Oversee security investigations and coordinate cross-functional remediation efforts.
    Act as point-of-contact for stakeholders and regulators during security events.
    Compliance & Audit
    Ensure compliance with frameworks and regulations like ISO 27001, GDPR, SOC 2, etc.
    Support internal and external audits, and drive closure of any findings.
    Maintain comprehensive documentation of security policies and incident history.
    Security Awareness & Culture
    Promote a culture of security through ongoing training and awareness programs.
    Collaborate with department leaders to ensure security is part of everyday practices.
    Technical Leadership
    Oversee the implementation and management of tools like SIEM, IDS/IPS, firewalls, and encryption.
    Conduct regular penetration testing and vulnerability assessments.
    Stay ahead of industry trends and technologies to continually improve defenses.
    Application Security Oversight
    Partner with engineering teams to integrate security into the SDLC.
    Lead secure code reviews, vulnerability assessments, and application threat modeling.
    Define and enforce secure coding standards; train teams on AppSec best practices.

    What We’re Looking For
    Education & Certifications
    Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field.
    Advanced certifications preferred: CISSP, CISM, OSCP, CEH, or equivalent.

    Experience
    12+ years in information security, with leadership in enterprise environments.
    Strong background in SaaS or technology-led companies.
    Proven ability to align security programs with business strategy.

    Skills & Competencies
    Deep knowledge of security frameworks (NIST, ISO 27001) and compliance standards (GDPR, SOC 2).
    Expertise in cloud security (AWS, GCP, or Azure).
    Strong communication and leadership skills to influence at all levels.
    Hands-on experience with security tools (SAST, DAST, SIEM, IDS/IPS, encryption).
    Analytical and data-driven approach to problem-solving.

    Why Join Us?
    Influence and own the end-to-end security strategy at the highest level.
    Work with a collaborative, mission-driven leadership team.
    Drive innovation in a high-impact role where security is a top priority.
    This advertiser has chosen not to accept applicants from your region.

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Ciso Jobs