Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
- Third-party Risk Management: Review the risk assessments of third-party vendors, ensuring compliance with security standards and mitigating potential threats.
- Application Security testing: It includes the review of technical assessment (code review, application security & vulnerability assessment) of partner & internal infrastructure.
- Data Security: Review of the Access controls, Encryption, and Data Loss Prevention (DLP) controls to safeguard confidential data. Review of the security controls implemented for cloud environments and services.
- Internal & External Regulatory Audits & Compliance: Lead internal and external regulatory audits to assess the effectiveness of security controls, vulnerability assessments, ensuring compliance with relevant standards and regulations. Organize Information Security Committee (ISC) meetings with Senior Management.
- Information Security Awareness & Emergency Response: Ensure Information Security awareness for all employees and vendor staff. Conduct tabletop exercises to discuss various business disruption scenarios for Senior Management.
- Security Operations Centre (SOC) monitoring: Monitoring & closure of the security alerts observed by the centralized SOC & vulnerabilities observed in the infrastructure & networks. Brand protection & Dark web alerts monitoring & closure.
- Security tools implementation & monitoring: Security Architecture review, Network review, Implementation, monitoring & support of various security tools (PAM, Guardicore, DAM, DLP, EDR, VAPT etc.) as per the organizational requirements.
Key Skills
Ranked by relevanceReady to apply?
Join Aditya Birla Capital and take your career to the next level!
Application takes less than 5 minutes

