2,998 Information Security Manager jobs in India
Information Security Manager
Posted 13 days ago
Job Viewed
Job Description
The ideal candidate will have a wealth of experience tackling various hardware and software problems. They should be comfortable providing technology solutions to employees and working closely with third party software companies to adopt new technologies and efficiently use existing ones. This candidate should have prior experience working with information technology and understand the latest technology trends to ensure the technology in place is up to date.
Responsibilities
- Conduct vulnerability assessments and penetration tests to identify security weaknesses in an organization's systems and networks.
- Evaluate, rate, and perform risk assessments on assets.
- Prioritizing vulnerabilities discovered along with remediation timeline(s)
- Send and receive notifications to the SMEs of vulnerabilities within the environment.
- Maintain knowledge of the threat landscape.
- Provide reporting and analysis and follow up.
- Provide vulnerability analysis and produce reports for management.
- Develop and implement security policies and procedures to prevent cyber-attacks.
- Monitor network traffic and identify potential security threats.
- Investigate security incidents and provide recommendations for remediation.
- Conduct risk assessments to identify potential security threats and vulnerabilities.
- Stay up-to-date on the latest security threats and vulnerabilities.
- Provide training and guidance to other security professionals.
Skills
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 5+ years of experience in vulnerability management.
- Strong understanding of vulnerability assessment and penetration testing methodologies.
- Familiarity with vulnerability scanning tools and reporting solutions.
- Experience with risk assessment and prioritization techniques.
- Excellent communication and writing skills.
- Ability to work independently and as part of a team.
- Strong analytical and problem-solving skills.
Preferred Qualifications:
- GIAC GCIH certification.
- Experience with information security management systems (ISMS).
- Experience with cloud security.
- Experience in Tenable
Regards
Shyam J
Senior HR Analyst
106-109, Anna Salai, Guindy, Chennai –
M:
Information Security Manager
Posted 6 days ago
Job Viewed
Job Description
The ideal candidate will have a wealth of experience tackling various hardware and software problems. They should be comfortable providing technology solutions to employees and working closely with third party software companies to adopt new technologies and efficiently use existing ones. This candidate should have prior experience working with information technology and understand the latest technology trends to ensure the technology in place is up to date.
Responsibilities
- Conduct vulnerability assessments and penetration tests to identify security weaknesses in an organization's systems and networks.
- Evaluate, rate, and perform risk assessments on assets.
- Prioritizing vulnerabilities discovered along with remediation timeline(s)
- Send and receive notifications to the SMEs of vulnerabilities within the environment.
- Maintain knowledge of the threat landscape.
- Provide reporting and analysis and follow up.
- Provide vulnerability analysis and produce reports for management.
- Develop and implement security policies and procedures to prevent cyber-attacks.
- Monitor network traffic and identify potential security threats.
- Investigate security incidents and provide recommendations for remediation.
- Conduct risk assessments to identify potential security threats and vulnerabilities.
- Stay up-to-date on the latest security threats and vulnerabilities.
- Provide training and guidance to other security professionals.
Skills
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 5+ years of experience in vulnerability management.
- Strong understanding of vulnerability assessment and penetration testing methodologies.
- Familiarity with vulnerability scanning tools and reporting solutions.
- Experience with risk assessment and prioritization techniques.
- Excellent communication and writing skills.
- Ability to work independently and as part of a team.
- Strong analytical and problem-solving skills.
Preferred Qualifications:
- GIAC GCIH certification.
- Experience with information security management systems (ISMS).
- Experience with cloud security.
- Experience in Tenable
Regards
Shyam J
Senior HR Analyst
106-109, Anna Salai, Guindy, Chennai –
M:
exelatech.com • About EXELA • Instagram • LinkedIn
Information security manager
Posted today
Job Viewed
Job Description
The ideal candidate will have a wealth of experience tackling various hardware and software problems. They should be comfortable providing technology solutions to employees and working closely with third party software companies to adopt new technologies and efficiently use existing ones. This candidate should have prior experience working with information technology and understand the latest technology trends to ensure the technology in place is up to date.ResponsibilitiesConduct vulnerability assessments and penetration tests to identify security weaknesses in an organization's systems and networks.Evaluate, rate, and perform risk assessments on assets.Prioritizing vulnerabilities discovered along with remediation timeline(s)Send and receive notifications to the SMEs of vulnerabilities within the environment.Maintain knowledge of the threat landscape.Provide reporting and analysis and follow up.Provide vulnerability analysis and produce reports for management.Develop and implement security policies and procedures to prevent cyber-attacks.Monitor network traffic and identify potential security threats.Investigate security incidents and provide recommendations for remediation.Conduct risk assessments to identify potential security threats and vulnerabilities.Stay up-to-date on the latest security threats and vulnerabilities.Provide training and guidance to other security professionals.SkillsBachelor's degree in Computer Science, Information Security, or a related field.5+ years of experience in vulnerability management.Strong understanding of vulnerability assessment and penetration testing methodologies.Familiarity with vulnerability scanning tools and reporting solutions.Experience with risk assessment and prioritization techniques.Excellent communication and writing skills.Ability to work independently and as part of a team.Strong analytical and problem-solving skills.Preferred Qualifications:GIAC GCIH certification.Experience with information security management systems (ISMS).Experience with cloud security.Experience in TenableRegardsShyam JSenior HR Analyst106-109, Anna Salai, Guindy, Chennai – M: exelatech.com • About EXELA • Instagram •
Information Security Manager
Posted today
Job Viewed
Job Description
The ideal candidate will have a wealth of experience tackling various hardware and software problems. They should be comfortable providing technology solutions to employees and working closely with third party software companies to adopt new technologies and efficiently use existing ones. This candidate should have prior experience working with information technology and understand the latest technology trends to ensure the technology in place is up to date.
Responsibilities
- Conduct vulnerability assessments and penetration tests to identify security weaknesses in an organization's systems and networks.
- Evaluate, rate, and perform risk assessments on assets.
- Prioritizing vulnerabilities discovered along with remediation timeline(s)
- Send and receive notifications to the SMEs of vulnerabilities within the environment.
- Maintain knowledge of the threat landscape.
- Provide reporting and analysis and follow up.
- Provide vulnerability analysis and produce reports for management.
- Develop and implement security policies and procedures to prevent cyber-attacks.
- Monitor network traffic and identify potential security threats.
- Investigate security incidents and provide recommendations for remediation.
- Conduct risk assessments to identify potential security threats and vulnerabilities.
- Stay up-to-date on the latest security threats and vulnerabilities.
- Provide training and guidance to other security professionals.
Skills
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 5+ years of experience in vulnerability management.
- Strong understanding of vulnerability assessment and penetration testing methodologies.
- Familiarity with vulnerability scanning tools and reporting solutions.
- Experience with risk assessment and prioritization techniques.
- Excellent communication and writing skills.
- Ability to work independently and as part of a team.
- Strong analytical and problem-solving skills.
Preferred Qualifications:
- GIAC GCIH certification.
- Experience with information security management systems (ISMS).
- Experience with cloud security.
- Experience in Tenable
Regards
Shyam J
Senior HR Analyst
106-109, Anna Salai, Guindy, Chennai –
M:
Information Security Manager
Posted today
Job Viewed
Job Description
Responsibilities
END -->Our Principles
These are some of the principles that we strongly believe in, preach and actually follow as well.
Commitments
We clearly commit what we can do, by when can we do it and how we would do it, And then we do it.
Confidentiality
We are extremely paranoid about protecting the confidentiality of what we do, for whom and how we do it.
Comfortability
We ensure comfortability of you and your team with ours, which can only come from complete transparency.
Capability
We keep improving our already awesome capabilities by investing all resources at our disposal.
Information Security Manager Jobs
Information Security Manager Career Path
Information Security Manager Responsibilities
• Creating and managing security strategies
• Oversee information security audits, whether performed by organization or third-party personnel
•Manage security team members and all other information security personnel
• Provide training to information security personnel during onboarding
• Evaluate department budget and costs associated with technological training
• Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement
• Implement and oversee technological upgrades, improvements and major changes to the information security environment
• Serve as a focal point of contact for the information security team and the customer or organization
• Manage and configure physical security, disaster recovery and data backup systems
• Communicate information security goals and new programs effectively with other department managers within the organization
Information Security Manager Required Skills
• Bachelor’s degree
•Excellent communication skills.
• Strong communication skills with a collaborative spirit
• Good leadership and ability to organize.
• Organized, deadline-driven, and detail-focused.
Perception Perfection
CryptoMize is dedicated to ensure a prominent progress to how the world perceives you. We help you to establish your perception to the extent of perfection with our devised strategic plan and techniques.
Reputation
Sentiment
Promotional Parlance
CryptoMize introduces you to Promotional Parlance which not only promotes your cause but provides a personalized-edge. Our solutions are tailored in a strategic way that attracts the audience in a way that they are most receptive to.
Marketing
Outreach
Public Relations
CryptoMize formulates a proactive strategy to amplify your Media Outreach without compromising your reputation. CryptoMize assists you in communicating with your intended audience to achieve a global outreach.
Brand
Media
Political Catalysis
We bring efficiency to governance operations through intelligence and strategic thinking. By integrating digital approaches, CryptoMize seeks to improve Campaign Strategies and governance in general.
Politics
Consultancy
Policing Phronesis
CryptoMize, with the help of its special mix of Forensics and Consultancy, aims to handle all sorts of cyber crimes affecting your organisation and provide you with the best guidance for such situations.
Intelligence
Forensics
Privacy Enforcement
CryptoMize is driven by the belief that none of your valuable data should go unprotected. Our experts put concerted effort to preserve your privacy in order to minimize the impact of cybercrime.
Privacy
Security
What Makes Us Different?
CryptoMize offers a full spectrum of elite services derived with preemptive analysis and strategic planning to our clients. We work efficiently with our proficient and proactive team by utilising extraordinary tools.
Collaboration with Dignitaries
We collaborate with highly influential and prominent personalities around the world. Being transcendental and visionary has its own benefits, our supremacy of being omnipresent empowers us to command, control and maneuver information from the internet.
01Powerful Team
CryptoMize is the combination of a powerful team that works on a supportive, transparent and encouraging platform. With spontaneity and dedication to the advancement of technology, we aspire to be better at what we do for people who trust us with their information and projects.
02Triple-Proof Approach
We execute a triple-proof approach from conducting thorough research, developing strong strategies, to guaranteeing information security. This proves beneficial for our clients to reach their desired goal.
03Our Core Values
Trust
We seek to connect and build relationships with our clients.That is our core principle of our work ethic which we fully-abide to. We works on 3 principles: Respect, Honesty and Transparency.
Reliability
Commitment is an act, not a word. We believe in delivering and living up to your expectations. We have grown into a global agency only through our commitment to deliver and our reliability factor.
Safety
We are extremely paranoid about protecting our client’s safety of what we do, for whom and how we do it. We maintain absolute non disclosure and confidentiality to ensure that nothing sensitive goes out.
Passion
Our passion generates enthusiasm for what we do and how we do it. We inspire, find creative ways and nurture ideas with passion. We strategize based on audience attention.
Innovation
We believe in innovation, change and risk taking. With technology, we reinvent ourselves. Innovation is the reason how we are able to eliminate obstacles for cultivating growth.
Excellence
We ensure to maintain your eminence by reinventing ourselves with our core values that inspire excellence. We strive for quality in everything we do.
OUR PRESENCE
Our Journey So Far
Our presence is all across the globe. Our impact can be seen in 03+ continents and 30+ countries, we know how to shape people's digital lives. We have a vast range of projects, from running political campaigns, shaping people's perceptions to enforcing privacy, we work with a futuristic approach and always look ahead of time. We never restrict ourselves to specific sectors rather make sure that our services are requisites for any and everybody in the world. With our elite clientele we show supremacy of work and build trustworthy relationships. We believe intelligence is the future and aim towards collective good and growth of all! 3+ Our PresenceSuccessfully establishing ourselves globally in 3+ continents.
70+ Our ServicesGiving us an edge over everyone else who is trying to solve similar problems.
10+ Years of ExperienceServing great value to our clients since the past decade.
NEVERENDING OPPORTUNITIES FOR YOUOur Vision
In the days of yore, gathering intelligence was a matter of sending out spies. Today the world has changed, and intelligence is as much about technology as it is about people. We are redefining what it means to truly protect you and your business. From network security, to cloud recovery, to data recovery, CryptoMize focuses on your technology’s vulnerabilities so you can avoid pitfalls and stay ahead.
Information Security Manager
Posted today
Job Viewed
Job Description
Educational Qualifications: Certifications: Professional certifications such as Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certified Internal Auditor (CIA), or other relevant certifications are often required or preferred.
Technical Skills: Audit and Compliance: Strong understanding of IT audit methodologies, control frameworks, and compliance standards (e.g., COBIT, ISO 27001, NIST, PCI DSS).
Risk Assessment: Ability to conduct risk assessments and identify potential risks and vulnerabilities in IT systems and processes.
Security Knowledge: In-depth knowledge of information security principles, practices, and technologies, including network security, application security, and data security.
IT Governance: Understanding of IT governance frameworks and practices to ensure that IT aligns with business objectives.
Data Analysis: Proficiency in using data analysis tools and techniques to analyze large datasets and identify patterns or anomalies.
Audit Tools: Familiarity with audit tools and software commonly used in IT audit processes.
IT Systems Knowledge: Understanding of various IT systems, cloud platforms (AWS, GCP, Azure), and technologies, including operating systems, databases, and network infrastructure.
Experience: 3 years Audit Experience: Previous experience in IT auditing, either as an internal or external auditor, is often required.
Industry Knowledge: Familiarity with the financial services/FinTech industry or sector in which the organization operates is beneficial.
Soft Skills: Communication Skills: Strong verbal and written communication skills to effectively communicate audit findings and recommendations to both technical and non-technical stakeholders.
Analytical Skills: Strong analytical and problem-solving skills to assess complex IT systems and processes.
Attention to Detail: Meticulous attention to detail to identify and document potential risks and weaknesses.
Teamwork: Ability to work collaboratively with cross-functional teams, including IT professionals, business units, and management.
Ethical Conduct: High ethical standards and integrity to maintain confidentiality and objectivity in the audit process.
Adaptability: Ability to adapt to evolving technologies, regulations, and business environments.
Professional Development: Demonstrated commitment to ongoing professional development and staying updated on industry trends and best practices.
Keep in mind that these specifications may vary depending on the organization's specific needs and the complexity of its IT environment.
Thank you in advance for providing all required information!
Powered by JazzHR
Information Security Manager
Posted 11 days ago
Job Viewed
Job Description
The ideal candidate will have a wealth of experience tackling various hardware and software problems. They should be comfortable providing technology solutions to employees and working closely with third party software companies to adopt new technologies and efficiently use existing ones. This candidate should have prior experience working with information technology and understand the latest technology trends to ensure the technology in place is up to date.
Responsibilities
- Conduct vulnerability assessments and penetration tests to identify security weaknesses in an organization's systems and networks.
- Evaluate, rate, and perform risk assessments on assets.
- Prioritizing vulnerabilities discovered along with remediation timeline(s)
- Send and receive notifications to the SMEs of vulnerabilities within the environment.
- Maintain knowledge of the threat landscape.
- Provide reporting and analysis and follow up.
- Provide vulnerability analysis and produce reports for management.
- Develop and implement security policies and procedures to prevent cyber-attacks.
- Monitor network traffic and identify potential security threats.
- Investigate security incidents and provide recommendations for remediation.
- Conduct risk assessments to identify potential security threats and vulnerabilities.
- Stay up-to-date on the latest security threats and vulnerabilities.
- Provide training and guidance to other security professionals.
Skills
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 5+ years of experience in vulnerability management.
- Strong understanding of vulnerability assessment and penetration testing methodologies.
- Familiarity with vulnerability scanning tools and reporting solutions.
- Experience with risk assessment and prioritization techniques.
- Excellent communication and writing skills.
- Ability to work independently and as part of a team.
- Strong analytical and problem-solving skills.
Preferred Qualifications:
- GIAC GCIH certification.
- Experience with information security management systems (ISMS).
- Experience with cloud security.
- Experience in Tenable
Regards
Shyam J
Senior HR Analyst
106-109, Anna Salai, Guindy, Chennai –
M:
exelatech.com • About EXELA • Instagram • LinkedIn
Be The First To Know
About the latest Information security manager Jobs in India !
Sr. Information Security Manager
Posted today
Job Viewed
Job Description
Job Title
Sr. Information Security ManagerJob Description
#EOS
#LI-PHILIIN
You are part of the Enterprise IT ISC Security team, working closely with supply chain business leaders and business contacts at manufacturing sites and warehouse/distribution centers.
Your role is to:
You're the right fit if you have:
How we work together
We believe that we are better together than apart. For our office-based teams, this means working in-person at least 3 days per week. Onsite roles require full-time presence in the company’s facilities. Field roles are most effectively done outside of the company’s main facilities, generally at the customers’ or suppliers’ locations.
This role is an office-based role.
About Philips
We are a health technology company. We built our entire company around the belief that every human matters, and we won't stop until everybody everywhere has access to the quality healthcare that we all deserve. Do the work of your life to help the lives of others.
If you're interested in this role and have many, but not all, of the experiences needed, we encourage you to apply. You may still be the right candidate for this or other opportunities at Philips. Learn more about our commitment to diversity and inclusion .
#EEIT