100 Cybersecurity Manager jobs in Chennai
Cybersecurity Program Manager
Posted today
Job Viewed
Job Description
Lead complex programs. Drive global cybersecurity impact.
At Scybers , we help global CIOs and CISOs deliver world-class cybersecurity programs . We’re looking for experienced program managers with 5+ years in IT, cybersecurity, telco, or technical engineering project management who are ready to manage high-impact, multi-stakeholder initiatives.
What you’ll bring:
Proven experience with program/project management methodologies (Agile, PMI, PRINCE2, or equivalent)
Strong stakeholder management and executive communication skills
Ability to learn new technical domains quickly and confidently manage cybersecurity and cloud-focused projects
Track record of leading cross-functional technical teams and delivering results under complexity
Strong risk, governance, and organizational skills to manage large, global client programs
What you’ll gain at Scybers:
Direct exposure to global CIO and CISO stakeholders
Work with a dynamic leadership team driving cybersecurity transformation
Hands-on experience managing cutting-edge SecOps, AI-driven detection, and cloud security programs
Opportunity to shape cybersecurity outcomes across industries like finance, healthcare, and technology
A career-defining step toward strategic leadership in cybersecurity
If you’re passionate about managing complexity and leading high-impact programs, this is your opportunity to grow with one of the fastest-growing cybersecurity firms .
Apply now and grow with Scybers.
Cybersecurity Program Manager
Posted today
Job Viewed
Job Description
Lead complex programs. Drive global cybersecurity impact.
At
Scybers
, we help global CIOs and CISOs deliver
world-class cybersecurity programs
. We're looking for experienced program managers with
5+ years in IT, cybersecurity, telco, or technical engineering project management
who are ready to manage high-impact, multi-stakeholder initiatives.
What you'll bring:
Proven experience with
program/project management methodologies
(Agile, PMI, PRINCE2, or equivalent)
Strong
stakeholder management and executive communication skills
Ability to
learn new technical domains quickly
and confidently manage cybersecurity and cloud-focused projects
Track record of leading
cross-functional technical teams
and delivering results under complexity
Strong risk, governance, and organizational skills to manage
large, global client programs
What you'll gain at Scybers:
Direct exposure to
global CIO and CISO stakeholders
Work with a
dynamic leadership team
driving cybersecurity transformation
Hands-on experience managing
cutting-edge SecOps, AI-driven detection, and cloud security programs
Opportunity to shape cybersecurity outcomes across industries like
finance, healthcare, and technology
A career-defining step toward
strategic leadership in cybersecurity
If you're passionate about managing complexity and leading high-impact programs, this is your opportunity to grow with one of the
fastest-growing cybersecurity firms
.
Apply now and grow with Scybers.
Cybersecurity program manager
Posted today
Job Viewed
Job Description
Cybersecurity Program Manager
Posted today
Job Viewed
Job Description
Lead complex programs. Drive global cybersecurity impact.
At Scybers , we help global CIOs and CISOs deliver world-class cybersecurity programs . We’re looking for experienced program managers with 5+ years in IT, cybersecurity, telco, or technical engineering project management who are ready to manage high-impact, multi-stakeholder initiatives.
What you’ll bring:
Proven experience with program/project management methodologies (Agile, PMI, PRINCE2, or equivalent)
Strong stakeholder management and executive communication skills
Ability to learn new technical domains quickly and confidently manage cybersecurity and cloud-focused projects
Track record of leading cross-functional technical teams and delivering results under complexity
Strong risk, governance, and organizational skills to manage large, global client programs
What you’ll gain at Scybers:
Direct exposure to global CIO and CISO stakeholders
Work with a dynamic leadership team driving cybersecurity transformation
Hands-on experience managing cutting-edge SecOps, AI-driven detection, and cloud security programs
Opportunity to shape cybersecurity outcomes across industries like finance, healthcare, and technology
A career-defining step toward strategic leadership in cybersecurity
If you’re passionate about managing complexity and leading high-impact programs, this is your opportunity to grow with one of the fastest-growing cybersecurity firms .
Apply now and grow with Scybers.
Business Development Manager- Cybersecurity
Posted today
Job Viewed
Job Description
Job Title: Business Development Manager
Experience: 5- 12 years
Key Responsibilities:
Qualifications:
Program / Project Manager – Cybersecurity
Posted today
Job Viewed
Job Description
AiiR Response specializes in AI-driven breach response and extortion management, automating negotiations, investigations, and recovery to significantly reduce incident costs and response times. With its CEIRA platform, AiiR streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach notifications for compliance. Designed for cyber insurers, enterprises, legal teams, and SOC/cybersecurity units, AiiR aims to cut breach costs by 65% and respond 50% faster, ensuring compliance and proactive breach management. Visit for more information.
We are seeking a highly skilled and proactive Program / Project Manager with a strong understanding of software development lifecycles (SDLC) and a background in cybersecurity, preferably in incident response . The ideal candidate will have excellent technical documentation and communication skills, strong organizational abilities, and the capability to manage complex projects with minimal direction.
This role requires a balance of technical knowledge, project management discipline, and business communication expertise.
- Lead and manage cross-functional programs and projects across development, cybersecurity, and incident response initiatives.
- Drive project planning, execution, and delivery while ensuring adherence to scope, timelines, and budget.
- Coordinate with development, security, and operations teams to track deliverables and resolve blockers.
- Prepare high-quality technical documentation, reports, and playbooks in clear and professional English.
- Create and deliver executive-ready PowerPoint presentations, project dashboards, and Excel-based trackers .
- Monitor and manage project risks, dependencies, and mitigation plans.
- Provide proactive leadership with minimal supervision, anticipating needs and taking ownership of outcomes.
- Ensure compliance with project management frameworks (Agile, Waterfall, or hybrid models) and industry best practices.
- 7+ years of experience in program or project management , preferably within technology or cybersecurity domains.
- Strong understanding of development lifecycles (SDLC) , Agile/Scrum, and DevOps methodologies.
- Exposure to cybersecurity projects , with preference for candidates experienced in incident response or breach management .
- Exceptional written and verbal communication skills in English , with proven ability to create technical and executive-level documents.
- Expertise in building presentations (PowerPoint) and project tracking spreadsheets (Excel/Google Sheets) .
- Proven ability to work independently, proactively identify challenges, and drive resolutions.
- PMP, PRINCE2, or equivalent project management certification (preferred).
- Bachelor’s or Master’s degree in Computer Science, Information Technology, Cybersecurity, or related field.
- Preferred to be located in Kochi.
- Knowledge of cybersecurity frameworks (e.g., NIST, ISO 27001, MITRE ATT&CK).
- Hands-on exposure to incident response workflows, breach playbooks, or SOC processes.
- Strong stakeholder management and ability to work with global teams across time zones.
- Familiarity with project management and collaboration tools (JIRA, Confluence, MS Project, Trello, etc.).
- Opportunity to work on cutting-edge cybersecurity and incident response projects .
- Collaborative and innovation-driven culture.
- Growth opportunities with a rapidly expanding global company.
- If you are a proactive project leader passionate about technology and cybersecurity, we’d love to hear from you.
Program / Project Manager – Cybersecurity
Posted today
Job Viewed
Job Description
AiiR Response specializes in AI-driven breach response and extortion management, automating negotiations, investigations, and recovery to significantly reduce incident costs and response times. With its CEIRA platform, AiiR streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach notifications for compliance. Designed for cyber insurers, enterprises, legal teams, and SOC/cybersecurity units, AiiR aims to cut breach costs by 65% and respond 50% faster, ensuring compliance and proactive breach management. Visit for more information.
We are seeking a highly skilled and proactive Program / Project Manager with a strong understanding of software development lifecycles (SDLC) and a background in cybersecurity, preferably in incident response . The ideal candidate will have excellent technical documentation and communication skills, strong organizational abilities, and the capability to manage complex projects with minimal direction.
This role requires a balance of technical knowledge, project management discipline, and business communication expertise.
- Lead and manage cross-functional programs and projects across development, cybersecurity, and incident response initiatives.
- Drive project planning, execution, and delivery while ensuring adherence to scope, timelines, and budget.
- Coordinate with development, security, and operations teams to track deliverables and resolve blockers.
- Prepare high-quality technical documentation, reports, and playbooks in clear and professional English.
- Create and deliver executive-ready PowerPoint presentations, project dashboards, and Excel-based trackers .
- Monitor and manage project risks, dependencies, and mitigation plans.
- Provide proactive leadership with minimal supervision, anticipating needs and taking ownership of outcomes.
- Ensure compliance with project management frameworks (Agile, Waterfall, or hybrid models) and industry best practices.
- 7+ years of experience in program or project management , preferably within technology or cybersecurity domains.
- Strong understanding of development lifecycles (SDLC) , Agile/Scrum, and DevOps methodologies.
- Exposure to cybersecurity projects , with preference for candidates experienced in incident response or breach management .
- Exceptional written and verbal communication skills in English , with proven ability to create technical and executive-level documents.
- Expertise in building presentations (PowerPoint) and project tracking spreadsheets (Excel/Google Sheets) .
- Proven ability to work independently, proactively identify challenges, and drive resolutions.
- PMP, PRINCE2, or equivalent project management certification (preferred).
- Bachelor’s or Master’s degree in Computer Science, Information Technology, Cybersecurity, or related field.
- Preferred to be located in Kochi.
- Knowledge of cybersecurity frameworks (e.g., NIST, ISO 27001, MITRE ATT&CK).
- Hands-on exposure to incident response workflows, breach playbooks, or SOC processes.
- Strong stakeholder management and ability to work with global teams across time zones.
- Familiarity with project management and collaboration tools (JIRA, Confluence, MS Project, Trello, etc.).
- Opportunity to work on cutting-edge cybersecurity and incident response projects .
- Collaborative and innovation-driven culture.
- Growth opportunities with a rapidly expanding global company.
- If you are a proactive project leader passionate about technology and cybersecurity, we’d love to hear from you.
Be The First To Know
About the latest Cybersecurity manager Jobs in Chennai !
Information Security Analyst
Posted 2 days ago
Job Viewed
Job Description
About the company
Lexitas is a high growth company. The Company is built on a belief that having strong personal relationships with our clients, and providing reliable, accurate and professional services, is the driving force of our success.
Lexitas offers an array of services including local and national court reporting, medical record retrieval, process service, registered agent services and legal talent outsourcing. Our reach is truly national as well as international.
Lexitas is a MNC Company that has set up a subsidiary in Chennai, India – Lexitas India Pvt. Ltd. This Indian company will be the Lexitas Global Capability Center, helping build a world class IT development team, and over time serve as a Shared Services hub for several of the corporate functions.
For More Information -
This is a Full-Time Job located in Chennai, India.
Summary:
This position supports information security, privacy, risk and compliance programs and activities under the direction of the VP of Information Security or designated Information Security Manager. The position assists in developing and maintaining a comprehensive security program for Lexitas. Providing functional and technical support is important to maintain security posture and protection of electronically and physically stored information assets across our systems. Tasks include supporting design, implementation, configuration, documentation, and maintenance to mitigate risk to the business and its computing resources and assets, as well as collaborating with applicable providers, managing and monitoring tools, and facilitating applicable processes and procedures.
Key Roles and Responsibilities :
- Supports IT security, privacy, risk and compliance systems, processes, supporting activities, with the ability to lead activities and programs.
- Monitors computer networks and associated tools and provider services for security, privacy, risk and compliance issues
- Supports the project management, tracking, and documentation of Information, Privacy, Risk, and Compliance programs, processes, and activities
- Investigate security breaches and cybersecurity incidents.
- Documents security breaches and assesses impact.
- Performs and/or supports security tests, risk assessments, and audits to uncover network, application, and process vulnerabilities and provides guidance and training to ensure violations do not persist.
- Tracks and facilitates the mitigation of vulnerabilities to maintain a high security standard.
- Supports best practices for IT security, privacy and compliance.
- Performs and supports 3rd party vulnerability management and penetration testing.
- Research security enhancements and makes recommendations to management.
- Stays current on information technology trends and security standards.
- Prepares reports that detail security, privacy, and compliance risk assessment findings.
- Supports Security Operations Center functions including monitoring and supporting Incident Response activities.
- Supports all related IT Security, Privacy, Risk and Compliance policies and provides guidance to the business.
- Other Information Security, Privacy, Risk, and Compliance duties as required.
Skills and Abilities:
- Experience with computer network and application vulnerability management and penetration testing, and techniques.
- Solid understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
- Ability to identify and mitigate network and application vulnerabilities.
- Good understanding of patch management
- Proficient with various OS
- Excellent written and verbal communication skills
- Knowledge of firewalls, antivirus, and intrusion detection system concepts
- Ability to support and document areas of Information Security, Privacy, Risk, and compliance processes and programs.
- Ability to support incident response process.
- Experience directing 3rd Party providers in the areas of Information Security, Privacy, Risk and Compliance
- Support information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
- Preferred KSA’s:
- Strong working knowledge and experience with primary Information Security, Privacy, Risk, and compliance standards and frameworks such as NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.
- Experience administering information security software and controls.
- Experience supporting process for managing network and application security.
- Network and system administration experience a plus.
- Good understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices.
- Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
- Learns and monitors the business processes for the areas of primary support responsibility.
- Support annual Security Baseline Audits and execution of recommendations.
- As part of the technology team, performs “Help Desk” day-to-day tasks in support of Information Security, Privacy, Risk, and Compliance.
Education and Experience:
- Bachelor’s degree in computer science or related field strongly preferred.
- IAT Level-2 technical certification strongly preferred (Comp TIA Security+ or CISSP) or ability to obtain within first 90 days of hire.
- 5+ years’ experience performing role of Information Security Analyst or SOC
- Demonstrated experience in responding to, managing, and resolving security incidents.
- Experience with LAN/WAN networking concepts, IP addressing and routing concepts, Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience with Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience working with Security Information and Even Management (SIEM) system is a plus.
Information Security Architect
Posted today
Job Viewed
Job Description
As a Principal Information Security Architect you will utilize your extensive cybersecurity knowledge including threat modeling, risk assessment, and security controls; expertise in secure software architecture design and security governance frameworks; proficiency in programming languages and security assessment tools.
Job Functions:
- Develop and communicate a strategic security vision and roadmap aligned with the organization's business objectives.
- Ensure that the security strategy guides security initiatives, technology choices, and risk management efforts.
- Design secure architectures for software systems and infrastructure, including threat modeling, security controls, and secure coding practices.
- Ensure that security designs are implemented consistently and meet industry best practices.
- Ensure compliance with industry regulations, standards, and internal security policies. Monitor and report on security compliance.
- Develop risk mitigation strategies, including security controls, incident response plans, and disaster recovery procedures.
- Ensure that the organization's workforce is educated about security risks and best practices.
- Lead and coordinate responses to security incidents, ensuring lessons learned are incorporated into security improvements.
Basic Qualifications:
- Bachelor's degree in a related field, such as computer science, information security, cybersecurity, or a related discipline
- 10 years of related experience in Information Security
Preferred Qualifications
- Master's degree in IT, Computer Science, information security, cybersecurity, or related field
- 12 years of related experience in Information Security
- Certification in relevant security domains (e.g., GDSA, CISSP-ISSAP, CISM, CISA)
Must be 18 years of age or older
Benefits
In line with our commitment to employee wellbeing, our total rewards benefits package is designed to support the physical, financial, and emotional health of our employees, tailored to meet their unique and evolving needs. Our approach considers our employees' whole selves, ensuring they can thrive both in and outside of work. Here are some of the benefits we offer, which may vary based on role, location, or hours worked:
- Healthcare (Medical, Dental, Vision)
- Paid Time Off, Volunteer Time Off, and Holidays
- Employer-Matched Retirement Plan
- Employee Stock Purchase Plan
- Short-Term and Long-Term Disability
- Infertility Treatment, Adoption and Surrogacy Assistance
- Tuition Reimbursement
These benefits are designed to enhance the health, protect the financial security, and provide peace of mind to our employees and their families.
Deluxe Corporation is an Equal Employment Opportunity employer:
All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, disability, sex, age, ethnic or national origin, marital status, sexual orientation, gender identity or presentation, pregnancy, genetics, veteran status or any other status protected by state or federal law.
Please view the electronic EEO is the Law Poster which serves to inform you of your equal employment opportunity protections as part of the application process.
Reasonable Accommodation for Job Seekers with a Disability:
If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please direct your inquiries to
Head - Information Security
Posted today
Job Viewed
Job Description
Job Purpose
To provide a hassle free trading environment to the clients. Satisfying the clients by providing a timely assistance thereby generating revenue to the organization and goodwill. Launching of New products in the online trading platform to the customers for satisfying their various investment needs
Job Context & Major Challenges
Job Context
ABM has a daily turnover of over 1,000 crores and has been rapidly improving its market shares in the various segments it operates in. In the otherwise fragmented equity broking business, ABM has doubled it market share to over 1.6% of retail cash equity volumes in the last 18 months. The commodity market shares have also doubled during this period. ABM remains one of the largest distributor for BSLI and BSLAMC and the largest distributor for other manufacturing organisations within ABFSG. ABM brings value to other line of business within ABFSG and adds Rs ~ 25-30 Crores to the bottom line of BSLI / BSLAMC / ABFL / ABPE etc ABM works in a highly regulated environment with a host of regulators like SEBI, RBI, AMFI, FMC, IRDA etc. regulating it s day to day operations.In addition to the regulator ABM is also subject to close monitoring and inspection through various agencies like NSE / BSE / NCDX / MCX/ NSDL / CDSL etc. AABM has a daily turnover of over 1,000 crores and has been rapidly improving its market shares in the various segments it operates in. In the otherwise fragmented equity broking business, ABM has doubled it market share to over 1.6% of retail cash equity volumes in the last 18 months. The commodity market shares have also doubled during this period. ABM remains one of the largest distributor for BSLI and BSLAMC and the largest distributor for other manufacturing organisations within ABFSG. ABM brings value to other line of business within ABFSG and adds Rs ~ 25-30 Crores to the bottom line of BSLI / BSLAMC / ABFL
/ ABPE etc ABM works in a highly regulated environment with a host of regulators like SEBI, RBI, AMFI, FMC, IRDA etc. regulating it s day to day operations.In addition to the regulator ABM is also subject to close monitoring and inspection through various agencies like NSE / BSE / NCDX / MCX/ NSDL / CDSL etc. ABM also operates in a highly competitive market mainly in fragmented industry with ABML competition from major National Broking houses like ICICI Securities, HDFC Securities, Angel Broking, MOFSL etc. and a range of local Broking outfits. On the other hand ABMML competition is from Major Distribution Houses like NJ India Invest, Bajaj Capital Prudent, IIFL and a range of Banks (both Indian and MNC). . Product Management Process: The Product Management process includes planning and execution throughout the product lifecycle, including gathering and prioritizing product and customer requirements and working closely with Technical Team and vendor and customer satisfaction goals are met. Product Maintenance: Coordinating with vendors and dev elopers for managing change during the UAT and post implementation phase. Impact Analysis of the Change Requests on the system and follow up on bugs. It also includes Version up gradation and Product enhancement as and when required. Product Support: Product support involves a series of activities which includes Providing Technical and Functional assistance to Internet clients throughout the trading hours and having a dedicated customer care desk for handling all types issues/queries.
Key Result Areas
KRA (Accountabilities) (Max 1325 Characters)
Supporting Actions (Max 1325 Characters)
KRA1 Product Management- Include gathering the requirements from the clients perspective and from a business perspective, doing benchmarking, preparing BRD's, undergoes thorough checking of the products in UAT, coordinating with the vendor for rectifying the bugs and also explaining the requirements to them
KRA2 Product Maintenance: The functionality checking of Trading Platforms has to be carried out on a regular basis. Should ensure that we are providing absolute error free software to the clients. On the event of an issue, should coordinate with the Vendors directly or in directly, should escalate the issue to the higher authorities and ensures that the issue is resolved at the earliest. Clients must be communicated well about the issue and also should provide them some alternatives till the issue has been resolved
KRA3 Product Support Providing support to the clients includes both Technical and Functional Assistance of Trading. When a new product is launched or some up- gradation has been taken place in a product, ensures that clients are all aware of the changes by providing Product Demos to the PAN India Branches, providing a support desk for all clients/branches, sending mailers/teasers etc.
KRA4 Exchange Compliance regarding IBT Submitting the IBT Trade/Volume confirmation in NSE and BSE.