2,998 Information Security Manager jobs in India

Information Security Manager

Chennai, Tamil Nadu SourceHOV

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

The ideal candidate will have a wealth of experience tackling various hardware and software problems. They should be comfortable providing technology solutions to employees and working closely with third party software companies to adopt new technologies and efficiently use existing ones. This candidate should have prior experience working with information technology and understand the latest technology trends to ensure the technology in place is up to date.


Responsibilities

  • Conduct vulnerability assessments and penetration tests to identify security weaknesses in an organization's systems and networks.
  • Evaluate, rate, and perform risk assessments on assets.
  • Prioritizing vulnerabilities discovered along with remediation timeline(s)
  • Send and receive notifications to the SMEs of vulnerabilities within the environment.
  • Maintain knowledge of the threat landscape.
  • Provide reporting and analysis and follow up.
  • Provide vulnerability analysis and produce reports for management.
  • Develop and implement security policies and procedures to prevent cyber-attacks.
  • Monitor network traffic and identify potential security threats.
  • Investigate security incidents and provide recommendations for remediation.
  • Conduct risk assessments to identify potential security threats and vulnerabilities.
  • Stay up-to-date on the latest security threats and vulnerabilities.
  • Provide training and guidance to other security professionals.


Skills

  • Bachelor's degree in Computer Science, Information Security, or a related field.
  • 5+ years of experience in vulnerability management.
  • Strong understanding of vulnerability assessment and penetration testing methodologies.
  • Familiarity with vulnerability scanning tools and reporting solutions.
  • Experience with risk assessment and prioritization techniques.
  • Excellent communication and writing skills.
  • Ability to work independently and as part of a team.
  • Strong analytical and problem-solving skills.


Preferred Qualifications:

  • GIAC GCIH certification.
  • Experience with information security management systems (ISMS).
  • Experience with cloud security.
  • Experience in Tenable



Regards

Shyam J

Senior HR Analyst


106-109, Anna Salai, Guindy, Chennai –

M:

exelatech.com About EXELA Instagram LinkedIn

This advertiser has chosen not to accept applicants from your region.

Information Security Manager

Chennai, Tamil Nadu SourceHOV

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

The ideal candidate will have a wealth of experience tackling various hardware and software problems. They should be comfortable providing technology solutions to employees and working closely with third party software companies to adopt new technologies and efficiently use existing ones. This candidate should have prior experience working with information technology and understand the latest technology trends to ensure the technology in place is up to date.

Responsibilities

  • Conduct vulnerability assessments and penetration tests to identify security weaknesses in an organization's systems and networks.
  • Evaluate, rate, and perform risk assessments on assets.
  • Prioritizing vulnerabilities discovered along with remediation timeline(s)
  • Send and receive notifications to the SMEs of vulnerabilities within the environment.
  • Maintain knowledge of the threat landscape.
  • Provide reporting and analysis and follow up.
  • Provide vulnerability analysis and produce reports for management.
  • Develop and implement security policies and procedures to prevent cyber-attacks.
  • Monitor network traffic and identify potential security threats.
  • Investigate security incidents and provide recommendations for remediation.
  • Conduct risk assessments to identify potential security threats and vulnerabilities.
  • Stay up-to-date on the latest security threats and vulnerabilities.
  • Provide training and guidance to other security professionals.

Skills

  • Bachelor's degree in Computer Science, Information Security, or a related field.
  • 5+ years of experience in vulnerability management.
  • Strong understanding of vulnerability assessment and penetration testing methodologies.
  • Familiarity with vulnerability scanning tools and reporting solutions.
  • Experience with risk assessment and prioritization techniques.
  • Excellent communication and writing skills.
  • Ability to work independently and as part of a team.
  • Strong analytical and problem-solving skills.

Preferred Qualifications:

  • GIAC GCIH certification.
  • Experience with information security management systems (ISMS).
  • Experience with cloud security.
  • Experience in Tenable

Regards

Shyam J

Senior HR Analyst

106-109, Anna Salai, Guindy, Chennai –

M:

exelatech.com • About EXELA • Instagram • LinkedIn

This advertiser has chosen not to accept applicants from your region.

Information security manager

Chennai, Tamil Nadu SourceHOV

Posted today

Job Viewed

Tap Again To Close

Job Description

The ideal candidate will have a wealth of experience tackling various hardware and software problems. They should be comfortable providing technology solutions to employees and working closely with third party software companies to adopt new technologies and efficiently use existing ones. This candidate should have prior experience working with information technology and understand the latest technology trends to ensure the technology in place is up to date.ResponsibilitiesConduct vulnerability assessments and penetration tests to identify security weaknesses in an organization's systems and networks.Evaluate, rate, and perform risk assessments on assets.Prioritizing vulnerabilities discovered along with remediation timeline(s)Send and receive notifications to the SMEs of vulnerabilities within the environment.Maintain knowledge of the threat landscape.Provide reporting and analysis and follow up.Provide vulnerability analysis and produce reports for management.Develop and implement security policies and procedures to prevent cyber-attacks.Monitor network traffic and identify potential security threats.Investigate security incidents and provide recommendations for remediation.Conduct risk assessments to identify potential security threats and vulnerabilities.Stay up-to-date on the latest security threats and vulnerabilities.Provide training and guidance to other security professionals.SkillsBachelor's degree in Computer Science, Information Security, or a related field.5+ years of experience in vulnerability management.Strong understanding of vulnerability assessment and penetration testing methodologies.Familiarity with vulnerability scanning tools and reporting solutions.Experience with risk assessment and prioritization techniques.Excellent communication and writing skills.Ability to work independently and as part of a team.Strong analytical and problem-solving skills.Preferred Qualifications:GIAC GCIH certification.Experience with information security management systems (ISMS).Experience with cloud security.Experience in TenableRegardsShyam JSenior HR Analyst106-109, Anna Salai, Guindy, Chennai – M: exelatech.com • About EXELA • Instagram •

This advertiser has chosen not to accept applicants from your region.

Information Security Manager

Chennai, Tamil Nadu SourceHOV

Posted today

Job Viewed

Tap Again To Close

Job Description

The ideal candidate will have a wealth of experience tackling various hardware and software problems. They should be comfortable providing technology solutions to employees and working closely with third party software companies to adopt new technologies and efficiently use existing ones. This candidate should have prior experience working with information technology and understand the latest technology trends to ensure the technology in place is up to date.


Responsibilities

  • Conduct vulnerability assessments and penetration tests to identify security weaknesses in an organization's systems and networks.
  • Evaluate, rate, and perform risk assessments on assets.
  • Prioritizing vulnerabilities discovered along with remediation timeline(s)
  • Send and receive notifications to the SMEs of vulnerabilities within the environment.
  • Maintain knowledge of the threat landscape.
  • Provide reporting and analysis and follow up.
  • Provide vulnerability analysis and produce reports for management.
  • Develop and implement security policies and procedures to prevent cyber-attacks.
  • Monitor network traffic and identify potential security threats.
  • Investigate security incidents and provide recommendations for remediation.
  • Conduct risk assessments to identify potential security threats and vulnerabilities.
  • Stay up-to-date on the latest security threats and vulnerabilities.
  • Provide training and guidance to other security professionals.


Skills

  • Bachelor's degree in Computer Science, Information Security, or a related field.
  • 5+ years of experience in vulnerability management.
  • Strong understanding of vulnerability assessment and penetration testing methodologies.
  • Familiarity with vulnerability scanning tools and reporting solutions.
  • Experience with risk assessment and prioritization techniques.
  • Excellent communication and writing skills.
  • Ability to work independently and as part of a team.
  • Strong analytical and problem-solving skills.


Preferred Qualifications:

  • GIAC GCIH certification.
  • Experience with information security management systems (ISMS).
  • Experience with cloud security.
  • Experience in Tenable



Regards

Shyam J

Senior HR Analyst


106-109, Anna Salai, Guindy, Chennai –

M:

exelatech.com About EXELA Instagram

This advertiser has chosen not to accept applicants from your region.

Information Security Manager

Delhi, Delhi CryptoMize

Posted today

Job Viewed

Tap Again To Close

Job Description

Responsibilities

END -->

Our Principles

These are some of the principles that we strongly believe in, preach and actually follow as well.

Commitments

We clearly commit what we can do, by when can we do it and how we would do it, And then we do it.

Confidentiality

We are extremely paranoid about protecting the confidentiality of what we do, for whom and how we do it.

Comfortability

We ensure comfortability of you and your team with ours, which can only come from complete transparency.

Capability

We keep improving our already awesome capabilities by investing all resources at our disposal.

Information Security Manager Jobs

Information Security Manager Career Path

Information Security Manager Responsibilities


• Creating and managing security strategies
• Oversee information security audits, whether performed by organization or third-party personnel
•Manage security team members and all other information security personnel
• Provide training to information security personnel during onboarding
• Evaluate department budget and costs associated with technological training
• Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement
• Implement and oversee technological upgrades, improvements and major changes to the information security environment
• Serve as a focal point of contact for the information security team and the customer or organization
• Manage and configure physical security, disaster recovery and data backup systems
• Communicate information security goals and new programs effectively with other department managers within the organization

Information Security Manager Required Skills


• Bachelor’s degree
•Excellent communication skills.
• Strong communication skills with a collaborative spirit
• Good leadership and ability to organize.
• Organized, deadline-driven, and detail-focused.

Our Services Know More About Us

Perception Perfection

CryptoMize is dedicated to ensure a prominent progress to how the world perceives you. We help you to establish your perception to the extent of perfection with our devised strategic plan and techniques.

Reputation

  • Reputation Analysis
  • Damage Control
  • Review Optimization
  • Threat Analysis
  • Crisis Management
  • Reputation Monitoring
  • Sentiment

  • Digital Listening
  • Sentiment Analysis
  • Dialogue Control
  • Review Management
  • Trend Management
  • Search Management
  • Promotional Parlance

    CryptoMize introduces you to Promotional Parlance which not only promotes your cause but provides a personalized-edge. Our solutions are tailored in a strategic way that attracts the audience in a way that they are most receptive to.

    Marketing

  • Buzz Marketing
  • Content Marketing
  • Local Business Marketing
  • Search Engine Marketing
  • Social Media Marketing
  • Black Hat Marketing
  • Outreach

  • Trend Analysis
  • Viral Maketing
  • Link Building
  • Website Traffic
  • SEO
  • Social Media Management
  • Public Relations

    CryptoMize formulates a proactive strategy to amplify your Media Outreach without compromising your reputation. CryptoMize assists you in communicating with your intended audience to achieve a global outreach.

    Brand

  • Brand Analysis
  • Brand Monitoring
  • Brand Protection
  • Brand Augmentation
  • Competitor Analysis
  • Competition Management
  • Media

  • Content Creation
  • Media Monitoring
  • Local Visibility
  • Mass Communication
  • Influencer Marketing
  • Identity Management
  • Political Catalysis

    We bring efficiency to governance operations through intelligence and strategic thinking. By integrating digital approaches, CryptoMize seeks to improve Campaign Strategies and governance in general.

    Politics

  • Demography Derivation
  • Constituency Profileration
  • Party Propulsion
  • Candidate Supremacy
  • Competition Management
  • Voter Enticement
  • Consultancy

  • Media Consultancy
  • Marketing Consultancy
  • Political Consultancy
  • IT Consultancy
  • Privacy Consultancy
  • Security Consultancy
  • Policing Phronesis

    CryptoMize, with the help of its special mix of Forensics and Consultancy, aims to handle all sorts of cyber crimes affecting your organisation and provide you with the best guidance for such situations.

    Intelligence

  • Governance Support
  • Open Source Intelligence
  • Big Data Mining
  • Stretegic Intelligence
  • Operational Intelligence
  • Tactical Intelligence
  • Forensics

  • Mobile Forensics
  • Network Forensics
  • Data Recovery
  • Reverse Engineering
  • Cyber Forensics
  • Cyber Crime Investigation
  • Privacy Enforcement

    CryptoMize is driven by the belief that none of your valuable data should go unprotected. Our experts put concerted effort to preserve your privacy in order to minimize the impact of cybercrime.

    Privacy

  • Encryption
  • Anonymity
  • Data Privacy
  • Infrastructure Privacy
  • Information Privacy
  • Communication Privacy
  • Security

  • Communication Security
  • Data Security
  • Security Training
  • Website Security
  • Penetration Testing
  • Vulnerability Assessment
  • What Makes Us Different?

    CryptoMize offers a full spectrum of elite services derived with preemptive analysis and strategic planning to our clients. We work efficiently with our proficient and proactive team by utilising extraordinary tools.

    Collaboration with Dignitaries

    We collaborate with highly influential and prominent personalities around the world. Being transcendental and visionary has its own benefits, our supremacy of being omnipresent empowers us to command, control and maneuver information from the internet.

    01

    Powerful Team

    CryptoMize is the combination of a powerful team that works on a supportive, transparent and encouraging platform. With spontaneity and dedication to the advancement of technology, we aspire to be better at what we do for people who trust us with their information and projects.

    02

    Triple-Proof Approach

    We execute a triple-proof approach from conducting thorough research, developing strong strategies, to guaranteeing information security. This proves beneficial for our clients to reach their desired goal.

    03

    Our Core Values

    Trust

    We seek to connect and build relationships with our clients.That is our core principle of our work ethic which we fully-abide to. We works on 3 principles: Respect, Honesty and Transparency.

    Reliability

    Commitment is an act, not a word. We believe in delivering and living up to your expectations. We have grown into a global agency only through our commitment to deliver and our reliability factor.

    Safety

    We are extremely paranoid about protecting our client’s safety of what we do, for whom and how we do it. We maintain absolute non disclosure and confidentiality to ensure that nothing sensitive goes out.

    Passion

    Our passion generates enthusiasm for what we do and how we do it. We inspire, find creative ways and nurture ideas with passion. We strategize based on audience attention.

    Innovation

    We believe in innovation, change and risk taking. With technology, we reinvent ourselves. Innovation is the reason how we are able to eliminate obstacles for cultivating growth.

    Excellence

    We ensure to maintain your eminence by reinventing ourselves with our core values that inspire excellence. We strive for quality in everything we do.

    OUR PRESENCE

    Our Journey So Far

    Our presence is all across the globe. Our impact can be seen in 03+ continents and 30+ countries, we know how to shape people's digital lives. We have a vast range of projects, from running political campaigns, shaping people's perceptions to enforcing privacy, we work with a futuristic approach and always look ahead of time. We never restrict ourselves to specific sectors rather make sure that our services are requisites for any and everybody in the world. With our elite clientele we show supremacy of work and build trustworthy relationships. We believe intelligence is the future and aim towards collective good and growth of all! 3+ Our Presence

    Successfully establishing ourselves globally in 3+ continents.

    70+ Our Services

    Giving us an edge over everyone else who is trying to solve similar problems.

    10+ Years of Experience

    Serving great value to our clients since the past decade.

    NEVERENDING OPPORTUNITIES FOR YOU

    Our Vision

    In the days of yore, gathering intelligence was a matter of sending out spies. Today the world has changed, and intelligence is as much about technology as it is about people. We are redefining what it means to truly protect you and your business. From network security, to cloud recovery, to data recovery, CryptoMize focuses on your technology’s vulnerabilities so you can avoid pitfalls and stay ahead.

  • We have a singular vision – to be the ultimate ‘go-to’ company for digital reputation management. Our approach is holistic, covering reputation management, social media management, and crisis management.
  • We uncover security flaws in your technology, identify new threats, and create proactive measures to protect you.
  • We provide innovative IT solutions to clients of all sizes. Our expertise is in all levels of the information technology stack, including network architecture and cybersecurity.
  • This advertiser has chosen not to accept applicants from your region.

    Information Security Manager

    MonetaGo Asia Pacific Private Limited

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Educational Qualifications: Certifications: Professional certifications such as Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certified Internal Auditor (CIA), or other relevant certifications are often required or preferred.

    Technical Skills: Audit and Compliance: Strong understanding of IT audit methodologies, control frameworks, and compliance standards (e.g., COBIT, ISO 27001, NIST, PCI DSS).

    Risk Assessment: Ability to conduct risk assessments and identify potential risks and vulnerabilities in IT systems and processes.

    Security Knowledge: In-depth knowledge of information security principles, practices, and technologies, including network security, application security, and data security.

    IT Governance: Understanding of IT governance frameworks and practices to ensure that IT aligns with business objectives.

    Data Analysis: Proficiency in using data analysis tools and techniques to analyze large datasets and identify patterns or anomalies.

    Audit Tools: Familiarity with audit tools and software commonly used in IT audit processes.

    IT Systems Knowledge: Understanding of various IT systems, cloud platforms (AWS, GCP, Azure), and technologies, including operating systems, databases, and network infrastructure.

    Experience: 3 years Audit Experience: Previous experience in IT auditing, either as an internal or external auditor, is often required.

    Industry Knowledge: Familiarity with the financial services/FinTech industry or sector in which the organization operates is beneficial.

    Soft Skills: Communication Skills: Strong verbal and written communication skills to effectively communicate audit findings and recommendations to both technical and non-technical stakeholders.

    Analytical Skills: Strong analytical and problem-solving skills to assess complex IT systems and processes.

    Attention to Detail: Meticulous attention to detail to identify and document potential risks and weaknesses.

    Teamwork: Ability to work collaboratively with cross-functional teams, including IT professionals, business units, and management.

    Ethical Conduct: High ethical standards and integrity to maintain confidentiality and objectivity in the audit process.

    Adaptability: Ability to adapt to evolving technologies, regulations, and business environments.

    Professional Development: Demonstrated commitment to ongoing professional development and staying updated on industry trends and best practices.

    Keep in mind that these specifications may vary depending on the organization's specific needs and the complexity of its IT environment.

    Thank you in advance for providing all required information!

    Powered by JazzHR

    This advertiser has chosen not to accept applicants from your region.

    Information Security Manager

    Tamil Nadu, Tamil Nadu SourceHOV

    Posted 11 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    The ideal candidate will have a wealth of experience tackling various hardware and software problems. They should be comfortable providing technology solutions to employees and working closely with third party software companies to adopt new technologies and efficiently use existing ones. This candidate should have prior experience working with information technology and understand the latest technology trends to ensure the technology in place is up to date.


    Responsibilities

    • Conduct vulnerability assessments and penetration tests to identify security weaknesses in an organization's systems and networks.
    • Evaluate, rate, and perform risk assessments on assets.
    • Prioritizing vulnerabilities discovered along with remediation timeline(s)
    • Send and receive notifications to the SMEs of vulnerabilities within the environment.
    • Maintain knowledge of the threat landscape.
    • Provide reporting and analysis and follow up.
    • Provide vulnerability analysis and produce reports for management.
    • Develop and implement security policies and procedures to prevent cyber-attacks.
    • Monitor network traffic and identify potential security threats.
    • Investigate security incidents and provide recommendations for remediation.
    • Conduct risk assessments to identify potential security threats and vulnerabilities.
    • Stay up-to-date on the latest security threats and vulnerabilities.
    • Provide training and guidance to other security professionals.


    Skills

    • Bachelor's degree in Computer Science, Information Security, or a related field.
    • 5+ years of experience in vulnerability management.
    • Strong understanding of vulnerability assessment and penetration testing methodologies.
    • Familiarity with vulnerability scanning tools and reporting solutions.
    • Experience with risk assessment and prioritization techniques.
    • Excellent communication and writing skills.
    • Ability to work independently and as part of a team.
    • Strong analytical and problem-solving skills.


    Preferred Qualifications:

    • GIAC GCIH certification.
    • Experience with information security management systems (ISMS).
    • Experience with cloud security.
    • Experience in Tenable



    Regards

    Shyam J

    Senior HR Analyst


    106-109, Anna Salai, Guindy, Chennai –

    M:

    exelatech.com • About EXELA • Instagram • LinkedIn

    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Information security manager Jobs in India !

    Sr. Information Security Manager

    Bengaluru, Karnataka Philips

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    JOB DESCRIPTION

    Job Title

    Sr. Information Security Manager

    Job Description

    #EOS

    #LI-PHILIIN

    You are part of the Enterprise IT ISC Security team, working closely with supply chain business leaders and business contacts at manufacturing sites and warehouse/distribution centers.

    Your role is to:

  • Develop and implement comprehensive OT security strategies that align with industry best practices and regulatory requirements.
  • Identify OT vulnerabilities and perform remediation without causing system unavailability.
  • Deploy Firewalls to segment OT systems from other standard IT environments.
  • Define Security Policy Framework customized for Supply Chain Technologies
  • Identify appropriate tools/solutions in the areas of inventory collection, vulnerability management, antivirus, endpoint detection and response.
  • Develop and maintain robust ISC security controls to protect Philips business from security breaches/ incidents.
  • Hands-on experience in designing and deploying multiple OT IDS solutions.
  • Experience with handling well-known OT technologies - Nozomi Guardian, Claroty and Microsoft Defender for IoT (CyberX).
  • Experience in conducting risk assessments, and maturity assessment for OT systems and products to identify and prioritize security threats and weaknesses.
  • Evaluate new cybersecurity threats and IT trends and develop effective security controls.
  • Establish regular governance with service owners to review security control status.
  • Liaison with Philips Information Security Office in driving the security Improvement Program.
  • Define and report on information security KPIs.
  • Analyze the application end-to-end, prepare threat modelling (STRIDE, PASTA & DREAD) based on different risk scenarios, and drive to fix those risks.
  • Prepare security use cases / functional requirements that new solutions must meet. Validate that those requirements are met when the solution is delivered.
  • Perform defensive/offensive assessments on the IT environment/applications to simulate attacks by real threat actors.
  • Perform attack pattern analysis based on MITRE Attack framework and support solution development to address the pattern.
  • Understanding of SOC operations and Splunk is preferred.
  • You're the right fit if you have:

  • Bachelor’s or Master’s degree in Information Technology and or commensurate experience in delivering security solutions.
  • Overall Enterprise IT Security experience of 12 yrs or more.
  • Security Certifications such as CISSP, CISM, CISA, CIPP etc. preferred
  • Excellent English language communication skills, both verbal and written. Cross-cultural etiquette, customer-centric and collaborative mindset.
  • Works autonomously within established procedures and practices.
  • Good command of stakeholder management, judgement, conflict resolution, risk & mitigations.
  • Provides leadership to the global team at strategic, tactical, and operational levels
  • Maintains current knowledge of industry and regulatory trends and developments for enterprise technology.
  • Specialized in a number of Security domains such as incident response, operational assessment of security posture, and general security management.
  • Thorough understanding of Security Management principles, Security governance principles
  • Good knowledge of MITRE Framework, IEC 62443/NIST 800:23/
  • How we work together

    We believe that we are better together than apart. For our office-based teams, this means working in-person at least 3 days per week. Onsite roles require full-time presence in the company’s facilities. Field roles are most effectively done outside of the company’s main facilities, generally at the customers’ or suppliers’ locations.

    This role is an office-based role.
     

    About Philips
     

    We are a health technology company. We built our entire company around the belief that every human matters, and we won't stop until everybody everywhere has access to the quality healthcare that we all deserve. Do the work of your life to help the lives of others.

  • Learn more about our business .
  • Discover our rich and exciting history .
  • Learn more about our purpose .
  • If you're interested in this role and have many, but not all, of the experiences needed, we encourage you to apply. You may still be the right candidate for this or other opportunities at Philips. Learn more about our commitment to diversity and inclusion .

    #EEIT

    This advertiser has chosen not to accept applicants from your region.
     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Information Security Manager Jobs