Corporate

Cyber Risk Service - Information security management system

Coimbatore, Tamil Nadu
Work Type: Full Time

Cyber Risk Services – Information Security Management System

• Risk Management and Compliance services help organizations develop practical solutions to achieve better

visibility over key components of the cyber risk program.

• Information Security services help organisations assess and evolve the values, beliefs, tone, conduct and

understanding of risk culture to align with their strategy and business practices.

• The third party risk management service help evaluate and manage third-party risk related to

outsourcing, licensing, alliances, and other business partnerships across the organisation to maximise

business performance, streamline information technology and licensing costs, and optimise supply chains.

Job description

Service line Cyber Risk Services – Information Security Management System

Job level Across levels

Graduation B.E / B.Tech (Tier 1/2) in Computer Science, Information Technology or


related fields


Professional qualification ISO 27001 LA/LI, ISO 31000 LA/LI, ISO 22301 LA/LI, CISA, ITIL, or


equivalent certification preferred


Work experience 2 to 10 Years


The key job responsibilities include the following:

• Responsible for ISO 27001 based Information Security Management System implementation and

sustenance

• Responsible for advising clients on Business Continuity Planning, IT Disaster Recovery planning

• Assess client information security posture, identify the gaps/risks in the existing environment and develop

solutions to mitigate the identified gaps/risk

• Responsible to assist client in review / implement Information Security controls in areas as mentioned, but

not limited to: Change management process, Incident management process, Backup process, User

identity and access management, Antivirus management, SLA performance and monitoring, Media

handling & Exchange of information, Physical and environmental Security, and Media & Information

Handling

• Responsible to assist client in developing information assets inventory and classification

• Responsible for conducting clients vendors risk assessment and providing a holistic view of clients risk

exposure due to outsourcing

• Responsible for advising and assisting clients to develop and implement Information classification

framework

• Conduct Information Systems audits covering IT infrastructure assets

• Advice clients on data privacy, data leakage prevention, identity and access management

• Serves as technical lead or subject matter specialist on security and privacy implementation projects,

responsible for design, build, testing and deployment of solutions

• Demonstrates ability to work independently on projects with limited supervision

• Demonstrates understanding of complex business and information technology management processes

• Demonstrates working knowledge of firm tools and methodologies that may be suitable for the

engagement

• Manages day-to-day client relationships at mid and lower levels.


The key skills required are as follows:

• Working knowledge in one or more security and privacy domains such as: security governance policies

and procedures, risk management, compliance, access control, network security, security architecture,


security incident response, disaster recovery, business continuity management, privacy and data

protection

• Experience in leveraging industry standards and frameworks such as ISO/IEC 17799, ISO/IEC 27001,

COBIT, ITIL, etc.

• Demonstrates in-depth knowledge of security and privacy controls and risk management process

• Experience in data protection technologies such as encryption, data discovery, data masking, data

redaction, etc.


• Possesses certifications such as ISO27001 LA/ LI, ISO22301 LA/LI, CISSP, CISA, CISM certification-

preferred


Additional Skills

• Strong communication skills (written & verbal)

• Demonstrates ability to write technical reports and documents

• Demonstrates knowledge of one or more industry or functional area

• Preferred Skills - CISSP, GSEC, GCIH, CEH, LPT, CCSK, eGRC tools like Archer, OpenPages

Submit Your Application

You have successfully applied
  • You have errors in applying