Job Description
Roles and Responsibilities
- Define, implement, maintain, and improve information security processes under ISMS ISO 27001:2013 standard
- Develop and maintain a security architecture
- Update and maintain risk register for the organization
- Identify, manage, and maintain the technology tools required to implement the information security & compliance program
- Identify and involve relevant stakeholders (internal and external) to sustain Information Security & Compliance program
- Develop and maintain information asset inventories, along with their classification & Confidentiality-Integrity-Availability (CIA) rating
- Test, Review and Confirm the security aspects of new projects of all IT functions including Software development, Digitization projects and Infrastructure; by identifying security risks and requirements for new projects and system developments
- Ensure compliance of software licenses across the organisation
- Conduct Business Impact Analysis (BIA) by coordinating with Business units and IT team and plan for business continuity accordingly
- Test and exercise BC, DR, and incident management plans (penetration testing, etc.)
- Manage relationships with external stakeholders e.g. CERT-IN, and with third parties (vendors, suppliers, contractors, partners, critical infrastructure owners/operators) w.r.t. Information Security & Compliance
- Identify, review, assess, and enable business services/functions that rely on/impact information security (mergers and acquisitions, SAAS services, cloud services, mobile security strategy/guidelines, new mail applications)
- Measure and monitor cost, schedule, the performance of Information Security & Compliance Program
- Collect, analyse, triage, and disposition information from all threat sources
- Plan & Conduct period security & compliance audits including Internal audit, External audit, Vulnerability Assessment (VA), Penetration Testing (PT) etc.
- Ensure the closure of NCs / Observations from all security & compliance audits
- Detect, triage, analyse, respond to, and recover from suspicious events and security incidents
- Perform a forensic analysis and support investigations (includes interfaces with law enforcement)
- Conduct periodic review of the following:
- Acceptable use of IT assets
- Audit logging of users, applications, networks, systems, access to physical assets
- Users, applications, networks, systems, access to physical assets (includes intrusion prevention/detection, email/spam filtering, web filtering)
- Detection, analysis, and elimination of viruses and malicious code
- Vulnerability management
- Change Management for all IT functions including Infrastructure, Software Development, Digitization projects
- Logical identities and access controls
- Protection of assets and information flowing through removable media, network, communication facilities
- Physical access controls for critical/sensitive IT areas
Desired Candidate Profile
1. IT security certifications like CISSP, CEH, CISM etc. preferred
2. Knowledge of information security concepts and methodologies
3. Knowledge of compliances and IS standards (ISO 27001, BS25999, ISO 20000, OWASP, and so on)
4. Knowledge of Secure SDLC methodology
5. Knowledge of personal data protection regulations like EU GDPR preferred
6. Working knowledge of Linux, AIX and windows, AWS and AZURE Security Platforms/ Tools
7. Good communication skills
8. Good report writing skills
9. Process-Driven, Documentation-focused, Target-oriented and has eye for detail
10. Good leadership skills to lead internal/external team
11. Preferred - Understanding and Hands-on experience of enterprise security systems, tools, processes including SIEM, Firewalls, VPNs, DNS-Proxies, Sandboxing, Digital Certificate Management, Vulnerability Management, End-point Security Management, Penetration Testing, Web Application Firewalls
12. Experience in developing and/or maintaining security architecture for Operational Technology systems like IoT, MES, SCADA etc