What Jobs are available for Information Security Management in India?
Showing 2551 Information Security Management jobs in India
Senior Information Security Analyst - Risk Management
Posted 5 days ago
Job Viewed
Job Description
As a Senior Information Security Analyst, your primary focus will be on identifying, assessing, and mitigating information security risks. You will conduct regular security assessments, vulnerability scans, and penetration tests to uncover potential weaknesses. Your responsibilities will include developing and implementing security policies and procedures, monitoring security systems for suspicious activity, and responding to security incidents. You will play a key role in developing and delivering security awareness training to employees. A strong understanding of various security frameworks (e.g., ISO 27001, NIST) and compliance regulations is essential.
The ideal candidate will possess extensive experience in information security, with a deep understanding of cybersecurity principles, threats, and best practices. Proven experience with security tools such as SIEM, IDS/IPS, firewalls, and endpoint protection solutions is required. Excellent analytical and problem-solving skills are crucial for incident response and forensic analysis. You should have strong communication and interpersonal skills, with the ability to explain complex security concepts to both technical and non-technical audiences. A Bachelor's or Master's degree in Computer Science, Information Security, or a related field is required. Relevant certifications such as CISSP, CISM, or CEH are highly valued. You will contribute to the continuous improvement of the organization's security posture and play a vital role in safeguarding digital assets.
Responsibilities:
- Conduct information security risk assessments and vulnerability analyses.
- Develop and implement security policies and procedures.
- Monitor security systems and respond to security incidents.
- Perform penetration testing and vulnerability scanning.
- Manage and configure security tools and technologies.
- Develop and deliver security awareness training programs.
- Ensure compliance with relevant security standards and regulations.
- Investigate security breaches and develop remediation plans.
- Contribute to the development of the cybersecurity strategy.
- Stay up-to-date with the latest security threats and trends.
Is this job a match or a miss?
Information Security Analyst - Vulnerability Management
Posted 1 day ago
Job Viewed
Job Description
Key Responsibilities:
- Conduct regular vulnerability scans using industry-standard tools (e.g., Nessus, Qualys, Rapid7) across servers, endpoints, and network devices.
- Analyze scan results, prioritize vulnerabilities based on risk and impact, and validate findings.
- Track the remediation of identified vulnerabilities, working closely with IT operations, development, and system administration teams.
- Develop and maintain comprehensive vulnerability management reports for technical teams and senior management.
- Assist in the selection, implementation, and configuration of vulnerability scanning tools and platforms.
- Contribute to the development and enforcement of vulnerability management policies and procedures.
- Stay current with emerging threats, vulnerabilities, and security best practices.
- Support incident response activities by providing context and information related to system vulnerabilities.
- Develop dashboards and metrics to measure the effectiveness of the vulnerability management program.
- Collaborate with security architects to ensure secure design principles are integrated into new systems and applications.
- Perform penetration testing exercises and report on findings as required.
- Provide guidance and support to other security team members.
Qualifications:
- Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or a related field.
- Minimum of 3 years of experience in information security, with a primary focus on vulnerability management.
- Hands-on experience with vulnerability scanning tools and techniques.
- Strong understanding of common vulnerabilities (e.g., OWASP Top 10), network protocols, and operating system security.
- Proficiency in analyzing scan reports and prioritizing remediation efforts.
- Familiarity with scripting languages (e.g., Python, PowerShell) for automating security tasks is a plus.
- Excellent analytical, problem-solving, and communication skills.
- Ability to work independently and collaborate effectively within a team.
- Knowledge of IT compliance frameworks (e.g., ISO 27001, NIST) is desirable.
- Relevant security certifications such as CompTIA Security+, CEH, or OSCP are advantageous.
Is this job a match or a miss?
Manager- Information Security, Vulnerability and Risk Management)
Posted 13 days ago
Job Viewed
Job Description
Role: Manager Information Security (Release Management)
Experience-8+Yrs
Location-Hyderabad
Mandatory Skills- Cyber security & Security engineer, Release & Change Management, Vulnerability Management.
Domain Expertise:
- Strong understanding of the insurance industry.
- Experience working with multiple vendors and global teams.
Technical Skills:
- Proficient in tools like JIRA, ServiceNow, Fortify, and vulnerability management platforms.
- Basic knowledge of Java, Linux, and HTML.
- Skilled in running scans, generating reports, and troubleshooting tool issues.
Process & Operations:
- Hands-on experience in release and change management.
- Familiar with ISO and SOC audit processes.
- Manages L1 and L2 tickets, ensuring SLA compliance.
- Coordinates production releases and post-implementation reviews.
Access & Security Management:
- Manages application access and license renewals.
- Owns ServiceNow access/removal request process.
- Guides teams in resolving access and vulnerability issues.
Collaboration & Leadership:
- Participates in change advisory board meetings.
- Coordinates with stakeholders for smooth release execution.
- Leads scan template reviews and vulnerability assessments
Roles and Responsibilities,
This JD provides an overview of the Security Architect or Technology Leads role and responsibilities.
Skill Set
- Good domain knowledge in Insurance Industry.
- Hands-on experience on any vulnerability management tool
- Hands on experience in JIRA, ServiceNow and Fortify Tool.
- Exposure in release and change management process.
- Basic Knowledge in Java, Linux, and HTML.
- Experience in handling L1 and L2 tickets to adhere to SLA guidelines.
- Good to handle application access management process in automated way.
- Experience in working with multiple vendors and geographically distributed teams.
- Minimal knowledge in handling ISO and SOC audits.
2. Handling JIRA Activities
- Experience in creating projects in JIRA.
- Able to handle tickets, manage SLAs.
- Adhering to process in terms in JIRA setup while creating entries for different projects.
3. Release and change management process.
- Coordinate with different stake holders for successful implementation of production releases.
- Actively participating in change control and change advisory board meetings.
- Manage relationships and coordinate work between different teams.
- Review Post implementation issues coming out from Releases.
4. Managing audits
- Knowledge in handling SOC audits.
- Gathering data for SOC audits and able to project and explain the artifacts in External audits.
- Certifications on audit process would be preferred.
5. Handling ServiceNow development activities
- Complete ownership in handling ServiceNow user access/removal request process.
- Able to perform form level changes on Incident management module.
- Able to work on multi tenancy model.
- ITIL certification is preferred.
6. Handling vulnerability management
- Hands on experience on any vulnerability management tool.
- Able to run the scans/reports on any tool.
- Expertise in addressing tool issue.
- To Handle access related and license renewal related issues.
- Trouble shoot on any tool issues and guiding team in fixing them.
- Able to coordinate with external stake holders/vendors.
- Coordinating with project teams on scan template reviews.
- Identify the severity of vulnerability/issue and guide project teams in addressing the fixes.
- Handling code moves, ASAM tickets and SOC audits.
- Certifications on ITIL process mandatory.
- Certifications on Security process would be preferred.
- Able to setup the criteria and standards for vulnerabilities based on the application type (internet/intranet).
- Expertise in addressing tool issue.
- Creating and implementing security protocols and procedures to safeguard an organization's systems and data
Regards,
Infosys BPM Recruitment team
Is this job a match or a miss?
Lead Data Protection Officer
Posted 1 day ago
Job Viewed
Job Description
Responsibilities:
- Develop, implement, and maintain the organization's data protection strategy and framework.
- Ensure compliance with all applicable data protection laws and regulations.
- Advise business units on data protection obligations and risks associated with new projects and initiatives.
- Conduct regular data protection impact assessments (DPIAs) and monitor their outcomes.
- Manage and respond to data subject rights requests (e.g., access, rectification, erasure).
- Develop and deliver data protection training programs for employees.
- Oversee data breach incident response plans and manage breach notifications.
- Act as the primary liaison with data protection authorities and supervisory bodies.
- Maintain records of data processing activities and data protection policies.
- Monitor and audit compliance with data protection policies and procedures.
- Stay updated on evolving data privacy laws, regulatory guidance, and industry best practices.
- Lead and mentor a team of data privacy professionals.
- Bachelor's or Master's degree in Law, Information Security, Computer Science, or a related field.
- Minimum of 8 years of experience in data privacy, data protection, or legal/compliance roles, with at least 3 years in a senior or leadership position.
- In-depth knowledge of global data privacy regulations (e.g., GDPR, CCPA, PDPB) and their practical application.
- Proven experience conducting Data Protection Impact Assessments (DPIAs) and managing data subject rights requests.
- Strong understanding of data processing operations, IT security principles, and risk management.
- Excellent analytical, problem-solving, and strategic thinking skills.
- Exceptional communication, negotiation, and interpersonal skills.
- Ability to work independently, manage complex projects, and lead teams effectively in a remote environment.
- Professional certifications such as CIPP/E, CIPP/US, CIPM, or CDPSE are highly desirable.
- Experience in developing and delivering privacy training is a plus.
This position necessitates collaboration with various global stakeholders, including those potentially involved in operations or regulatory liaison in the region of Dehradun, Uttarakhand, IN .
Is this job a match or a miss?
Senior Data Protection Officer
Posted 1 day ago
Job Viewed
Job Description
Key responsibilities include:
- Developing, implementing, and maintaining comprehensive data protection policies and procedures across the organization.
- Monitoring compliance with data protection laws, regulations, and internal policies.
- Conducting Data Protection Impact Assessments (DPIAs) and advising on privacy risks associated with new projects and technologies.
- Acting as the primary point of contact for data protection supervisory authorities.
- Handling data subject access requests (DSARs) and ensuring timely and compliant responses.
- Providing expert advice and training to employees on data protection principles and best practices.
- Investigating and managing data privacy breaches, including reporting to regulatory bodies where necessary.
- Staying abreast of evolving data protection legislation and guidance globally.
- Collaborating with legal, IT, security, and business units to embed privacy-by-design and privacy-by-default principles.
- Maintaining records of data processing activities.
The ideal candidate will possess a law degree or a Master's degree in a relevant field such as Data Privacy, Information Security, or Compliance. Professional certifications such as CIPP/E, CIPM, or CDPSE are highly desirable. A minimum of 8 years of experience in data protection, privacy law, or compliance is required, with significant experience in a DPO or senior privacy role. Proven expertise in GDPR and other relevant global privacy regulations is essential. Strong understanding of data processing operations, IT systems, and data security principles is crucial. Excellent analytical, problem-solving, and communication skills are paramount. The ability to manage complex issues, influence stakeholders at all levels, and drive change in a remote setting is expected. This role is instrumental in safeguarding sensitive information and maintaining our client's reputation for privacy. This position is based in **Delhi, Delhi, IN**, but will be performed entirely remotely.
Is this job a match or a miss?
Senior Data Protection Officer
Posted 1 day ago
Job Viewed
Job Description
Key responsibilities include conducting Data Protection Impact Assessments (DPIAs), managing data subject access requests (DSARs), and overseeing breach response procedures. The ideal candidate will have extensive experience in privacy program management, risk assessment, and the implementation of technical and organizational security measures. You will be tasked with staying current on evolving privacy laws and best practices, and translating these into practical, actionable policies and procedures for a distributed workforce. Strong leadership capabilities, exceptional communication skills, and the ability to influence stakeholders across diverse departments are crucial.
This role requires a deep understanding of data processing activities, data flows, and the associated risks. You will be responsible for creating and delivering privacy training programs to employees, fostering a culture of privacy awareness throughout the organization. Collaboration with legal, IT, security, and business teams will be essential to ensure that privacy considerations are embedded into all new projects and product developments. The Senior Data Protection Officer will also engage with supervisory authorities as needed. This is an exceptional opportunity for a seasoned privacy professional to make a significant impact in a remote-first environment, shaping the company's approach to data protection and building trust with customers and partners worldwide.
Qualifications:
- Advanced degree in Law, Information Security, or a related field.
- Certified Information Privacy Professional (CIPP/E, CIPP/US) or equivalent certification is highly preferred.
- Minimum of 8 years of experience in data protection, privacy law, or information security, with at least 3 years in a senior leadership role.
- In-depth knowledge of global data protection regulations (e.g., GDPR, CCPA, LGPD).
- Proven experience in developing and implementing privacy programs, conducting DPIAs, and managing DSARs.
- Expertise in risk management and privacy by design principles.
- Excellent communication, presentation, and interpersonal skills, with the ability to explain complex legal concepts to non-legal audiences.
- Experience in building and leading remote teams.
- Strong analytical and problem-solving abilities.
- Ability to work autonomously and manage time effectively in a remote setting.
Is this job a match or a miss?
Data Protection & Privacy _Guwahati
Posted 17 days ago
Job Viewed
Job Description
Job Description Server Management & Data Protection
Work Location: Guwahati
Responsibilities:
Privacy Team @ Jio is focused on automating various aspects of the Privacy Program. Privacy Data Protection Technology Team specifically is engaged operationalizing state of the art technologies to drive the Privacy Automation Program in Jio.
Deployment and management of IT infrastructure systems including the webservers, application servers and database servers
Work with various Jio teams to setup the operating system and other infrastructure to deploy the IT infrastructure systems
Deploy various system components including opensource technologies on for enabling the environment for the set up of IT infrastructure systems
Deploy application and provide ongoing monitoring and maintenance support.
Installation, administration & maintenance of ETL (Extract-Transform-Load) solution such as Informatica Solution components (PowerCenter, Test Data Management, Dynamic Data Management) or similar solution .
Create Rules, Policies for identifying Sensitive Data stored in Jios Infrastructure. Hands on with Regular Expressions.
Liaison with Application Support & DBA Team for establishing connectivity for discovery targets.
Design, Configure & Implement Data Transformation Workflows.
Troubleshoot and address errors encountered in scans & Data Transformation. Liaison with Product Support for troubleshooting and feature enhancement requirements.
Integrate Incident Reports into Solutions Analytics Platform either inhouse or otherwise.
Monitor & analyse Workflow Executions.
Installation, administration & maintenance of DLP Solution or other similar leak detection components including developed inhouse
Configure Targets, Policies & perform discovery scans for identifying Personally Identifiable data (PII) or other sensitive data.
Troubleshoot and address errors encountered in scans. Liaison with Product Support for troubleshooting and feature enhancement requirements.
Monitor & analyse Incidents and track to closure.
Perform Rules, Policies fine tuning to enhance productivity of the process.
Perform Rules, Policies, Workflow, Data Domains & Patterns fine tuning to enhance productivity of the process.
Perform Data Classification to identify & categorize Sensitive, Personal data.
Writing scripts (Shell, Python, AWK/GAWK, VBScript) for Data Discovery, Transformation.
Integrate Incident Reports into Analytics Platform.
Enhance Analytics platform to manage Incidents and generate actionable reports for management decisions.
Assuring that the use of technologies to sustain, and do not erode, privacy protections relating to the use, collection, and disclosure of personal information.
Conducting a privacy impact assessment of proposed rules on the privacy of personal information, including the type of personal information collected and the number of people affected
Work with other internal stake holders to enable the implementation of privacy requirements within the organization
Document identified issues and discuss with business owners for their review and acceptance.
Communicate issues with various stake holder and track implementation and closure of these issues.
Support periodic reporting of the issues as required by management.
Qualification : B.E./B.Tech/MCA
Work experience : 5-12 Years
5-12 years of experience in Information Security and Privacy with atleast 2-3 years of experience in system administration preferably Linux based operating systems, experience in security technologies such Data Leak prevention systems or data classification, security incident handling, and similar.
Systems administration experience in Data Leakage prevention (DLP), sensitive data scanning and searching.
Database administration experience including performing of ETL functions. Experience in ETL tools similar to Informatica, etc.
Exposure of Information Technology systems / services / for Security / Privacy implementation
Exposure to technical application architecture that handle PII data
Understanding of Privacy concepts and current use of technology in the area of Privacy.
Strong conceptual understanding of IT technology, systems, concepts
Good understanding cryptographic controls for the protection of data
Good understanding of computer and networking protocols
Strong interest in security vulnerability and conceptual understanding of security vulnerabilities
Interest in project management, tracking and management activities
Interest in the areas of risk management and security management standards such as ISO 27001, ISO 22301, Cobit, PCI-DSS, others
Competencies /Expertise Required (Functional & Behavioral)
- Systematic problem-solving skills, with the ability to think.
- Excellent in analytical thinking for translating data into informative visuals and reports.
- Adaptable to change.
- Quick Learner Open learn and work on new technologies and products
Is this job a match or a miss?
Be The First To Know
About the latest Information security management Jobs in India !
Data Protection & Privacy _Guwahati
Posted 3 days ago
Job Viewed
Job Description
Job Description Server Management & Data Protection
Work Location: Guwahati
Responsibilities:
Privacy Team @ Jio is focused on automating various aspects of the Privacy Program. Privacy Data Protection Technology Team specifically is engaged operationalizing state of the art technologies to drive the Privacy Automation Program in Jio.
Deployment and management of IT infrastructure systems including the webservers, application servers and database servers
Work with various Jio teams to setup the operating system and other infrastructure to deploy the IT infrastructure systems
Deploy various system components including opensource technologies on for enabling the environment for the set up of IT infrastructure systems
Deploy application and provide ongoing monitoring and maintenance support.
Installation, administration & maintenance of ETL (Extract-Transform-Load) solution such as Informatica Solution components (PowerCenter, Test Data Management, Dynamic Data Management) or similar solution .
Create Rules, Policies for identifying Sensitive Data stored in Jios Infrastructure. Hands on with Regular Expressions.
Liaison with Application Support & DBA Team for establishing connectivity for discovery targets.
Design, Configure & Implement Data Transformation Workflows.
Troubleshoot and address errors encountered in scans & Data Transformation. Liaison with Product Support for troubleshooting and feature enhancement requirements.
Integrate Incident Reports into Solutions Analytics Platform either inhouse or otherwise.
Monitor & analyse Workflow Executions.
Installation, administration & maintenance of DLP Solution or other similar leak detection components including developed inhouse
Configure Targets, Policies & perform discovery scans for identifying Personally Identifiable data (PII) or other sensitive data.
Troubleshoot and address errors encountered in scans. Liaison with Product Support for troubleshooting and feature enhancement requirements.
Monitor & analyse Incidents and track to closure.
Perform Rules, Policies fine tuning to enhance productivity of the process.
Perform Rules, Policies, Workflow, Data Domains & Patterns fine tuning to enhance productivity of the process.
Perform Data Classification to identify & categorize Sensitive, Personal data.
Writing scripts (Shell, Python, AWK/GAWK, VBScript) for Data Discovery, Transformation.
Integrate Incident Reports into Analytics Platform.
Enhance Analytics platform to manage Incidents and generate actionable reports for management decisions.
Assuring that the use of technologies to sustain, and do not erode, privacy protections relating to the use, collection, and disclosure of personal information.
Conducting a privacy impact assessment of proposed rules on the privacy of personal information, including the type of personal information collected and the number of people affected
Work with other internal stake holders to enable the implementation of privacy requirements within the organization
Document identified issues and discuss with business owners for their review and acceptance.
Communicate issues with various stake holder and track implementation and closure of these issues.
Support periodic reporting of the issues as required by management.
Qualification : B.E./B.Tech/MCA
Work experience : 5-12 Years
5-12 years of experience in Information Security and Privacy with atleast 2-3 years of experience in system administration preferably Linux based operating systems, experience in security technologies such Data Leak prevention systems or data classification, security incident handling, and similar.
Systems administration experience in Data Leakage prevention (DLP), sensitive data scanning and searching.
Database administration experience including performing of ETL functions. Experience in ETL tools similar to Informatica, etc.
Exposure of Information Technology systems / services / for Security / Privacy implementation
Exposure to technical application architecture that handle PII data
Understanding of Privacy concepts and current use of technology in the area of Privacy.
Strong conceptual understanding of IT technology, systems, concepts
Good understanding cryptographic controls for the protection of data
Good understanding of computer and networking protocols
Strong interest in security vulnerability and conceptual understanding of security vulnerabilities
Interest in project management, tracking and management activities
Interest in the areas of risk management and security management standards such as ISO 27001, ISO 22301, Cobit, PCI-DSS, others
Competencies /Expertise Required (Functional & Behavioral)
- Systematic problem-solving skills, with the ability to think.
- Excellent in analytical thinking for translating data into informative visuals and reports.
- Adaptable to change.
- Quick Learner Open learn and work on new technologies and products
Is this job a match or a miss?
Data Protection Risk Expert - SAP ECS
Posted 3 days ago
Job Viewed
Job Description
At SAP, we keep it simple: you bring your best to us, and we'll bring out the best in you. We're builders touching over 20 industries and 80% of global commerce, and we need your unique talents to help shape what's next. The work is challenging - but it matters. You'll find a place where you can be yourself, prioritize your wellbeing, and truly belong. What's in it for you? Constant learning, skill growth, great benefits, and a team that wants you to grow and succeed.
**What you'll do:**
+ 13 Years of Experience in compliance related areas.
+ Working closely with cross-functional teams
+ Proposing practical solutions or improvements to ensure ongoing compliance
+ Ensuring accuracy in compliance reports, documentation, and audits
+ Clearly conveying compliance concerns to stakeholders
+ Upholding data protection and compliance standards even under pressur
**IT skills** : SAP SAC, MS SharePoint incl. SharePoint Lists, MS Power Automate, MS Power BI, MS Excel, MS PowerPoint.
**Soft skills** : Attention to detail, excellent communication skills and analytical thinking, good time management, good adaptability in respond to frequent change of regulations and internal processes, hands-on and can-do attitude.
**PET Compliance - Key Responsibilities**
+ **Legal Compliance:** Serve as the key contact/ SPOC for SAP's Procedure Enrolment Tool (PET) within the LoB, which supports compliance with GDPR requirements. PET functions as SAP's central repository for Records of Processing Activities (ROPA) in accordance with Article 30.1 of the GDPR
+ **Reporting & Documentation:**
+ Prepare and deliver monthly PET compliance reports.
+ Conduct quarterly PET Quality Reviews.
+ Review ECS processes and procedures to support ongoing compliance efforts.
+ **Audit Support:**
+ Provide documentation and evidence for Data Protection and Privacy (DPP) controls.
+ Support internal and external audits, including walkthroughs for DPMS audits (e.g., ISO 27701).
+ **Security Concept Approval:**
+ Act as a subject matter expert on the Security Concept Approval process, ensuring alignment with SAP's security standards.
**Supplier Compliance - Key Responsibilities**
+ **Reporting & Documentation:**
+ Prepare monthly compliance reports focused on CDPA (Contractor Data Protection Agreement) adherence by ECS suppliers.
+ **Supplier Compliance Management:**
+ Address and discuss compliance concerns regarding supplier data processing with relevant stakeholders.
+ Collaborate closely with the Supplier Governance Team and SAP's Data Protection Enablement Team to ensure robust compliance safeguards.
+ **Annual Review:**
+ Conduct annual evaluations of Data Transfer Factsheets to ensure accuracy and compliance.
**Security Risk Management - Key Responsibilities**
+ **Legal Compliance:** Serve as the key contact/ SPOC for SAP's Security Risk Management incl. related Risk Management controls within the LoB, supporting compliance with KRITIS and CIPAU requirements. Serve as the key contact/SPOC for SAP Global Security Cloud Compliance team, specifically the assigned Security Risk Managers for the LoB
+ **Reporting & Documentation:**
+ Prepare and deliver monthly Top X Risk reports.
+ Continuously update Risk Register and ISO Risk-Control Map.
+ Review, adapt and enhance Risk Management processes and procedures to support ongoing compliance efforts.
+ **Audit Support:**
+ Provide documentation and evidence for Risk Management controls.
+ Support corporate, internal and external audits, including walkthroughs for Risk Management audits.
+ **Migration to SAP Security Passport:**
+ Act as a subject matter expert on the migration to SAP Security Passport incl. post-processing, quality assurance, consistent reporting etc., ensuring consistency with Risk Register and PowerBI reporting
**Meet your team**
Welcome to the SAP Enterprise Cloud Services Data Protection Risk & Quality Office! We are the guardians of the SAP Enterprise Cloud Services Data Protection including Supplier Governance, Risk Management and Quality Management Processes and related Controls, ensuring adherence to the SAP Global Data Protection and Privacy, Risk Management and Quality Management Policies and in this way zero non-compliance across relevant audits, attestations, and certifications, while making SAP a trusted partner in the cloud.
Our dynamic and positive team is looking forward to meeting you and shaping the future of data protection and privacy including supplier governance, risk management and quality management together with you!
Apply now and start your career at SAP - we can't wait to welcome you to our team
#SAPInternalT4
**Bring out your best**
SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best.
**We win with inclusion**
SAP's culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone - regardless of background - feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better world.
SAP is committed to the values of Equal Employment Opportunity and provides accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team:
For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program ( , according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training.
Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability, in compliance with applicable federal, state, and local legal requirements.
Successful candidates might be required to undergo a background verification with an external vendor.
**AI Usage in the Recruitment Process**
For information on the responsible use of AI in our recruitment process, please refer to our Guidelines for Ethical Usage of AI in the Recruiting Process ( .
Please note that any violation of these guidelines may result in disqualification from the hiring process.
Requisition ID: | Work Area: Administration | Expected Travel: 0 - 10% | Career Status: Professional | Employment Type: Regular Full Time | Additional Locations: #LI-Hybrid
Is this job a match or a miss?
Lead Privacy Counsel - Global Data Protection
Posted 1 day ago
Job Viewed
Job Description
Key responsibilities include:
- Developing, implementing, and managing comprehensive global data privacy policies and procedures.
- Providing expert legal advice on privacy implications of new products, services, and business initiatives.
- Conducting privacy risk assessments and advising on mitigation strategies.
- Managing data subject requests and breach notification processes.
- Drafting and negotiating data processing agreements and privacy clauses in vendor contracts.
- Staying current with evolving global privacy laws and regulations (e.g., GDPR, CCPA, India DPDP Act) and advising on necessary compliance measures.
- Collaborating with engineering, product, marketing, and security teams to embed privacy-by-design principles.
- Training employees on data privacy best practices and requirements.
- Representing the company in interactions with data protection authorities.
- Managing external counsel and coordinating privacy compliance efforts across different regions.
Is this job a match or a miss?