Top CISO jobs that will be appropriate for cybersecurity professionals in 2022
The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems, and assets from both internal and external threats. Here are the top 10 CISO jobs that cybersecurity professionals should apply for in 2022.
Location: Mumbai, Maharashtra, India On-site
- Draft / Coordinate / Monitor IT process/policies to ensure compliance as per necessity by IT Act/ statutory regulatory (e.g. RBI, SEBI, GDBR, UIDAI, etc.) / info security (ISM) guidelines and circulars concerning Technology in coordination with internal external stakeholders
- Review of regulatory / Indian Govt. Information Technology / Data Security guideline as an when it circulates/publishes
- Conducting IT committee's as per ISM schedule and necessity advised by regulatory.- Drafting/Circulating MOM of IT committee meetings to respective members and business as when required
- Preparing updating business-wise IT infra details which are largely required for the Compliance/Legal team for regulatory filing
Director – CISO India Lead at Credit Suisse
Location: Pune, Maharashtra, India On-site
- Collaboration with Senior Management to develop strategic plans for the collection, and use in a manner that improves and increases its value while staying in sync with applicable cybersecurity regulations
- Deal with various regulators on the topic of Information security, cybersecurity, and technology risk
- Developing group-level regulatory reporting initiatives, including global coordination across multiple countries and demonstrating compliance to laws, regulations, and industry standards that govern cybersecurity through the application of standards and the best methodologies including NIST, FFIEC, COBIT, ITIL, and ISO
Location: Gurgaon, Haryana, India On-site
- Provide leadership to the enterprise's information security organization
- Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems
- Overseeing teams that you are responsible for responding to security incidents across a wide array of technologies, mitigating and containing impacts, coordinating remediation efforts, and summarizing and making recommendations for improvements
- Assist with Vendor Risk Management assessment and as required, with the Clients information security assessments received from time to time
Location: Greater Kolkata Area
- Preparing updating business-wise IT infra details which are largely required for the Compliance/Legal team for regulatory filing
- Review and filing of mandatory IT documentation with a respective regulatory body as necessary – Formalize, conduct vendor risk assessment audits, and ensure implementation of identified gaps
- Improvise and keep internal IT / IS manuals updated with all relevant regulations relating to IT. Periodic review of Information Security Manual (ISM) understanding business/regulatory/data security/technology etc
- Introducing and drafting process/policies based on findings /observations
- Periodic review of IT process/policies and issue an advisory note to overcome gaps/loops by highlighting risk associated with it
CISO GIAM Partner Relationship Management Lead (APAC) at Citi
Location: Chennai, Tamil Nadu, India
- Coordinate application testing efforts that support protecting the confidentiality, integrity, and availability of business information is stored and processed
- Educate and advise business and technical leaders on the development, deli, very, and management of security solutions
- Define and implement security policies and standards, and provide periodic Information Security (IS) management reports
- Provide security oversight for major system designs and monitor the implementation of approved Corrective Action Plans
- Plan and implement IS administration for Information Technology (IT) projects, and pshortlyhort to medium-term IS actions and resources
Senior Associate Global Security Office at Epsilon India
Location: Bengaluru North, Karnataka, India On-site
- Scripting Experience (Power Shell, PERL,…)
- Full Understanding of IAM concepts (Account Life Cycle Activities, Onboarding-Offboarding, RBAC, Active Directory)
- Proven ability to work in a Global Account Security or Identity Access Management program
- Ability to work creatively (Abstract concepts to concrete solutions, draw connectiopredictting, Vision/foresight) and analytically (examine information, understand what it means, interpret the information/data, spot patterns in the information) in a problem-solving environment
- Desire to work in an information systems environment and provide operational support
Senior Cybersecurity Defense Specialist at Tech Data
Location: Chennai, Tamil Nadu, India
- Perform Defensive Operations to protect, detect and respond to cyber threats and attacks using SIEM, vulnerability assessment, discovery, infrastructure (firewall, IPS/IDS, proxy, network capture), host-based security, forensics, etc
- Perform threat, vulnerability analysis, and data analysis for all enterprise and cloud enclaves
- Perform analysis to implement best security practices to systems and/or system architecture
- Evaluate remediation recommendations and develop mitigation measures
- Employ system security processes, methods, and tools and assure their consistent application
- Participates in the creation and maintenance of the enterprise's security architecture design
- Participate in the selection of security solutions, or enhancements to existing security solutions, to improve overall enterprise security
Specialist – Cyber Security at ZF Group
Location: Chennai, Tamil Nadu, India Hybrid
- Responsible for SW architecture and design for various AUTOSAR crypto modules such as CSM/Cryif/Crypto based on Customer requirements
- Responsible to interact with customers for requirement-related discussions for Cyber security requirements and implementation
- Responsible to understand Security Requirements and their analysis
- Deriving the security SW architecture from SW requirements as well as system architecture
- Creation of SW architecture alternatives as well as their evaluation
Senior Professional, Cyber Security-IND at Ingram Micro
Location: Chennai, Tamil Nadu, India On-site
- Prove L3 level support, manage the queue and lead incident response engagements, evaluate, and respond to incident response procedures and capabilities
- Managing the Security incidents queue tracking rack the SLA of tickets
- Analyze data, such as logspacketkets captures, from various sources within the enterprise, and concluded past and future security incidents
- Guiding the Junior team members with aspects of their job
- Demonstrate experience in working security technologies such as Security Incident and Event Management (SIEM), Endpoint Detection and Response (EDR), and Threat Hunting
Cyber Security Specialist at Magnus India Consulting Services
Location: Mumbai Metropolitan Region On-site
- Support cyber incident response actions to ensure proper assessment, containment, mitiga, and documentation
- Support cyber investigations contribution to large small-scale scale computer security breaches
- Review and analyze cyber threats and provide SME support and training for junior-level security analysts
- Maintain detailed tracking plan of all internal/external enrollment outcomes/recommendations and provide support through to implementation
- Act as a liaison between cyber-defense, engineering, security architecture, network & system operations, and functional project teams to ensure effective project implementation that meets incident response requirements
- applications joining the Visa network
Join our WhatsApp Channel to get the latest news, exclusives and videos on WhatsApp
_____________
Disclaimer: Analytics Insight does not provide financial advice or guidance. Also note that the cryptocurrencies mentioned/listed on the website could potentially be scams, i.e. designed to induce you to invest financial resources that may be lost forever and not be recoverable once investments are made. You are responsible for conducting your own research (DYOR) before making any investments. Read more here.