🌎
This job posting isn't available in all website languages

Senior Manager - Head of Technology Security Compliance and Vulnerability Management - Mumbai, Hyderabad, Chennai

📁
Senior Manager-IT
📅
50266 Requisition #

Head of technology security compliance and vulnerability management


Determine security controls by evaluating business requirements, research and propose information security controls, review security controls and architecture for technology solutions, conduct security and vulnerability analysis.

  • Define and align security standards, frameworks with overall business and technology security architecture elements to mitigate threats as they emerge.
  • Propose security solutions to balance business requirements with information and cyber security requirements
  • Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
  • Provide solid understanding in vulnerability management and information security. Coordinate, build and maintain relationships with internal and external stakeholders.
  • Support technology teams for vulnerability assessment, communication with other functions and various levels of leadership, technical expertise.
  • Evaluate both system and application scans and architecture designs for security vulnerabilities providing remediation recommendations.
  • Perform security testing and evaluations of various components associated with technology solutions (operating systems, databases, network devices), architecture, configuration and design documents in order to identify security vulnerabilities, weaknesses, or policy violations..
  • Develop and improve KPIs, metrics, and trending for vulnerability management functions.
  • Document new, and update existing, processes and procedures used for the Vulnerability Management Program.
  • Create and conduct security testing processes/methodologies, security configuration and architecture best practices with regards to security of operating systems, databases, network devices and related technology components.
  • Assess full life cycle of IT systems and sub systems to include operational, management and technical security.
  • Govern and report security compliance for servers, endpoints and network devices across on-premise and cloud against established security controls and security management platforms.
  • Act as a liaison to internal/external audit functions.


Head of technology security compliance and vulnerability management


Determine security controls by evaluating business requirements, research and propose information security controls, review security controls and architecture for technology solutions, conduct security and vulnerability analysis.

  • Define and align security standards, frameworks with overall business and technology security architecture elements to mitigate threats as they emerge.
  • Propose security solutions to balance business requirements with information and cyber security requirements
  • Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
  • Provide solid understanding in vulnerability management and information security. Coordinate, build and maintain relationships with internal and external stakeholders.
  • Support technology teams for vulnerability assessment, communication with other functions and various levels of leadership, technical expertise.
  • Evaluate both system and application scans and architecture designs for security vulnerabilities providing remediation recommendations.
  • Perform security testing and evaluations of various components associated with technology solutions (operating systems, databases, network devices), architecture, configuration and design documents in order to identify security vulnerabilities, weaknesses, or policy violations..
  • Develop and improve KPIs, metrics, and trending for vulnerability management functions.
  • Document new, and update existing, processes and procedures used for the Vulnerability Management Program.
  • Create and conduct security testing processes/methodologies, security configuration and architecture best practices with regards to security of operating systems, databases, network devices and related technology components.
  • Assess full life cycle of IT systems and sub systems to include operational, management and technical security.
  • Govern and report security compliance for servers, endpoints and network devices across on-premise and cloud against established security controls and security management platforms.
  • Act as a liaison to internal/external audit functions.

Previous Job Searches