3,129 Information Security Management jobs in India
Executive – Information Security (Proxy Management)
Posted today
Job Viewed
Job Description
- Proxy Health checkup and monitoring
- Policy creation and modification
- Internet access provisioning
- Working on day to day ticketing tool
- Daily / Weekly / Monthly backup
- Incidence Response
- Audit reporting
- Upgradation of devices
- Email release and SPAM mail analysis
- SPF, DMARK, DKIM policy review and update
- Email restriction / device upgrade
Team Leader – Information Security (Proxy Management)
Posted today
Job Viewed
Job Description
- Proxy Health checkup and monitoring
- Policy creation and modification
- Internet access provisioning
- Working on day to day ticketing tool
- Daily / Weekly / Monthly backup
- Incidence Response
- Audit reporting
- Upgradation of devices
- Email release and SPAM mail analysis
- SPF, DMARK, DKIM policy review and update
- Email restriction / device upgrade
Information Security Analyst - Vulnerability Management
Posted 8 days ago
Job Viewed
Job Description
Key Responsibilities:
- Conduct regular vulnerability assessments and penetration tests of IT systems and applications.
- Utilize vulnerability scanning tools to identify security weaknesses.
- Analyze scan results, prioritize vulnerabilities based on risk, and develop remediation plans.
- Collaborate with IT operations and development teams to implement security patches and fixes.
- Monitor security alerts and incident response activities related to vulnerabilities.
- Develop and maintain documentation for vulnerability management processes and policies.
- Stay current with the latest security threats, vulnerabilities, and industry best practices.
- Provide security awareness training and guidance to staff.
- Contribute to the continuous improvement of the organization's security posture.
- Assist in ensuring compliance with relevant security standards and regulations.
Qualifications:
- Bachelor's degree in Computer Science, Information Security, or a related field.
- Proven experience as an Information Security Analyst or in a similar cybersecurity role.
- Hands-on experience with vulnerability management tools (e.g., Nessus, Qualys, Rapid7).
- Strong understanding of network security, operating systems, and web application security.
- Knowledge of common attack vectors and security vulnerabilities (e.g., OWASP Top 10).
- Excellent analytical and problem-solving skills.
- Proficiency in scripting languages (e.g., Python, PowerShell) is a plus.
- Relevant security certifications (e.g., CISSP, CompTIA Security+) are preferred.
- Strong communication and collaboration skills.
Data protection officer
Posted 1 day ago
Job Viewed
Job Description
Manager- information security, vulnerability and risk management)
Posted 1 day ago
Job Viewed
Job Description
Senior Information Security Analyst, Vulnerability Management
Posted 13 days ago
Job Viewed
Job Description
As a Senior Information Security Analyst, your core responsibilities will include planning, executing, and reporting on vulnerability assessments and penetration tests. You will manage and configure vulnerability scanning tools, analyze scan results, and prioritize remediation efforts based on risk. This involves working closely with IT operations, development teams, and system owners to ensure timely and effective patching and remediation of identified vulnerabilities. You will develop and maintain vulnerability management policies, procedures, and metrics, and contribute to the continuous improvement of our security posture.
The ideal candidate will have a deep understanding of common vulnerabilities, exploitation techniques, and security best practices. Experience with various operating systems, network protocols, and cloud environments is essential. Proficiency in vulnerability scanning tools such as Nessus, Qualys, or Rapid7 is required. Strong analytical and problem-solving skills are crucial for interpreting scan data and providing actionable remediation guidance. Excellent communication and interpersonal skills are necessary to effectively collaborate with technical teams and present findings to management. This is an opportunity to make a significant impact on the security of a leading organization.
Key Responsibilities:
- Conduct vulnerability assessments and penetration testing.
- Manage and operate vulnerability scanning tools.
- Analyze scan results and prioritize remediation activities.
- Collaborate with IT teams for vulnerability remediation.
- Develop and maintain vulnerability management policies and procedures.
- Report on vulnerability metrics and security posture.
Qualifications:
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 5+ years of experience in information security, with a focus on vulnerability management.
- Proficiency with vulnerability scanning tools (Nessus, Qualys, etc.).
- Strong understanding of network security, system administration, and common vulnerabilities.
- Experience with scripting for automation (e.g., Python, PowerShell).
- Relevant certifications such as CISSP, CEH, or OSCP are a plus.
Senior Data Protection Officer
Posted 10 days ago
Job Viewed
Job Description
Key Responsibilities:
- Develop, implement, and maintain the organization's data protection strategy and policies.
- Ensure compliance with applicable data privacy laws and regulations (e.g., GDPR, CCPA, India's DPDP Act).
- Conduct Data Protection Impact Assessments (DPIAs) and Privacy Risk Assessments.
- Manage and respond to data subject access requests (DSARs).
- Develop and deliver data protection training programs for employees.
- Oversee the process for handling and investigating personal data breaches.
- Advise business units on privacy considerations in new projects and initiatives.
- Liaise with data protection supervisory authorities and other regulators.
- Manage the organization's record of processing activities.
- Stay updated on evolving data protection laws and best practices.
- Bachelor's degree in Law, Information Technology, Business Administration, or a related field.
- Professional certifications such as CIPP/E, CIPP/US, or CIPM are highly desirable.
- Minimum of 7 years of experience in data privacy, compliance, or information security.
- In-depth knowledge of global data protection laws and regulations.
- Experience in conducting privacy risk assessments and managing data breaches.
- Strong analytical and problem-solving skills.
- Excellent written and verbal communication skills.
- Ability to work effectively with cross-functional teams and advise senior management.
Be The First To Know
About the latest Information security management Jobs in India !
Data Protection & Privacy _Guwahati
Posted today
Job Viewed
Job Description
Job Description Server Management & Data Protection
Work Location: Guwahati
Responsibilities:
Privacy Team @ Jio is focused on automating various aspects of the Privacy Program. Privacy Data Protection Technology Team specifically is engaged operationalizing state of the art technologies to drive the Privacy Automation Program in Jio.
Deployment and management of IT infrastructure systems including the webservers, application servers and database servers
Work with various Jio teams to setup the operating system and other infrastructure to deploy the IT infrastructure systems
Deploy various system components including opensource technologies on for enabling the environment for the set up of IT infrastructure systems
Deploy application and provide ongoing monitoring and maintenance support.
Installation, administration & maintenance of ETL (Extract-Transform-Load) solution such as Informatica Solution components (PowerCenter, Test Data Management, Dynamic Data Management) or similar solution .
Create Rules, Policies for identifying Sensitive Data stored in Jios Infrastructure. Hands on with Regular Expressions.
Liaison with Application Support & DBA Team for establishing connectivity for discovery targets.
Design, Configure & Implement Data Transformation Workflows.
Troubleshoot and address errors encountered in scans & Data Transformation. Liaison with Product Support for troubleshooting and feature enhancement requirements.
Integrate Incident Reports into Solutions Analytics Platform either inhouse or otherwise.
Monitor & analyse Workflow Executions.
Installation, administration & maintenance of DLP Solution or other similar leak detection components including developed inhouse
Configure Targets, Policies & perform discovery scans for identifying Personally Identifiable data (PII) or other sensitive data.
Troubleshoot and address errors encountered in scans. Liaison with Product Support for troubleshooting and feature enhancement requirements.
Monitor & analyse Incidents and track to closure.
Perform Rules, Policies fine tuning to enhance productivity of the process.
Perform Rules, Policies, Workflow, Data Domains & Patterns fine tuning to enhance productivity of the process.
Perform Data Classification to identify & categorize Sensitive, Personal data.
Writing scripts (Shell, Python, AWK/GAWK, VBScript) for Data Discovery, Transformation.
Integrate Incident Reports into Analytics Platform.
Enhance Analytics platform to manage Incidents and generate actionable reports for management decisions.
Assuring that the use of technologies to sustain, and do not erode, privacy protections relating to the use, collection, and disclosure of personal information.
Conducting a privacy impact assessment of proposed rules on the privacy of personal information, including the type of personal information collected and the number of people affected
Work with other internal stake holders to enable the implementation of privacy requirements within the organization
Document identified issues and discuss with business owners for their review and acceptance.
Communicate issues with various stake holder and track implementation and closure of these issues.
Support periodic reporting of the issues as required by management.
Qualification : B.E./B.Tech/MCA
Work experience : 5-12 Years
5-12 years of experience in Information Security and Privacy with atleast 2-3 years of experience in system administration preferably Linux based operating systems, experience in security technologies such Data Leak prevention systems or data classification, security incident handling, and similar.
Systems administration experience in Data Leakage prevention (DLP), sensitive data scanning and searching.
Database administration experience including performing of ETL functions. Experience in ETL tools similar to Informatica, etc.
Exposure of Information Technology systems / services / for Security / Privacy implementation
Exposure to technical application architecture that handle PII data
Understanding of Privacy concepts and current use of technology in the area of Privacy.
Strong conceptual understanding of IT technology, systems, concepts
Good understanding cryptographic controls for the protection of data
Good understanding of computer and networking protocols
Strong interest in security vulnerability and conceptual understanding of security vulnerabilities
Interest in project management, tracking and management activities
Interest in the areas of risk management and security management standards such as ISO 27001, ISO 22301, Cobit, PCI-DSS, others
Competencies /Expertise Required (Functional & Behavioral)
- Systematic problem-solving skills, with the ability to think.
- Excellent in analytical thinking for translating data into informative visuals and reports.
- Adaptable to change.
- Quick Learner Open learn and work on new technologies and products