Information Security Manager

Year    Noida, Uttar Pradesh, India

Job Description

Description Position at Softline International The ISM is responsible for establishing and maintaining an information security program to ensure that information assets of companies under his/her responsibility are adequately protected. This posi

Description Position at Softline International The ISM is responsible for establishing and maintaining an information security program to ensure that information assets of companies under his/her responsibility are adequately protected. This position is The ISM position requires an information security expert with sound experience in project management, technical background i.e. information security technologies with business-oriented mindset. The ISM will proactively work with IT and other business units to implement practices that meet defined policies and standards for information security. He or she will also manage and conduct a variety of IT-related risk mitigation activities. The ISM serves as the process owner of all assurance activities related to the availability, integrity and confidentiality of customer, business partner, employee and business information in compliance with the organization's information security policies. A key element of the ISM's role is coordinating with CISO to meet business expectations. The ISM must be highly knowledgeable about information systems are maintained in a fully functional, secure mode. The ISM coordinates the IT organization's technical activities to implement and manage security infrastructure, and to provide regular status and service-level reports to management. The ISM must be able to clearly deliver areal information security context both technical, legal, organizational, and etc. to his manager and CISO. Expertise in leading project teams and developing and managing projects is essential for success in this role. Other project management tasks will include resource balancing across multiple IT and security teams, task prioritizing and project reporting. ISM is expected to communicate with highly technical staff as they work to accomplish company and personal development goals and must, therefore, have proven technical skills. Documentation and presentation skills, analytical and critical thinking skills are key requirements of the ISM's position. Roles and responsibilities Responsibilities (describe) The ISM's job is composed of a variety of activities, including very tactical, operational activities in support of the ISM's program initiatives, such as: . Business and CISO support . Security liaison . Architecture/engineering support . Operational tasks Business and CISO support . Customize as per areal specific, seek for approval, implement and monitor information security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization. . Manage and influence enterprise's information security organization via policies, procedures, standards, using specific tools for reporting and continues audit of risks and controls, improve user awareness, controls critical process are in place like BCP&DRP, perform information security incidents management and reporting, conduct internal audits and investigations, and etc. . Facilitate information security management through making sure requests from CISO are properly addressed locally with due care and done timely with expected result. . Develop, maintain and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices. . Create, communicate and implement a risk-based process for vendor risk management (remote access, cloud security), including the assessment and treatment for risks that may result from partners, consultants and other service providers. . Develop, seek for approval and manage information security budgets. Monitor and report them for variances. . Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users. . Work directly with the business units to facilitate IT risk assessment: provide consultancy up-on request, conduct risk pre-views for projects, and etc. . Lead incidents response and handling. Report incidents as appropriate. . Meet KPIs defined by manager and CISO. . Provide regular reporting on the current status of the information security program to manager and CISO. . Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection, as well as SoD controls. . Develop and enhance an information security management framework based on the National Information Assurance Policy Architecture/engineering support . Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures. . Ensure that security programs comply with relevant laws, regulations and policies to minimize or eliminate risk and audit findings. . Define and facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings. . Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company's reputation. . Monitor the external threat environment for emerging threats, and advise CISO and relevant stakeholders on the appropriate courses of action. . Develop and oversee effective disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event. Provide direction, support and in-house consulting in these areas. . Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security. . Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, privacy, risk management, compliance and business continuity management. . Consult with IT and security staff to ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software. . Recommend and coordinate the implementation of technical controls to support and enforce defined security policies. . Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment provide technical and managerial expertise for the administration of security tools. . Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements liaise with IT management to align existing technical installed base and skills with future architectural requirements. . Develop a strong working relationship with the security engineering team to develop and implement controls and configurations aligned with security policies and legal, regulatory and audit requirements. Security liaison . Liaise among the information security team and corporate compliance, audit, legal and HR management teams as required. . Minimize penalties and claims from Governmental agencies. Liaise with external agencies, such as law enforcement and other advisory bodies as necessary, to ensure that the organization maintains a strong security posture. . Assist resource owners and IT staff in understanding and responding to security audit failures reported by auditors. . Manage security issues and incidents, and participate in problem and change management forums. Ensuring timely reporting and adequate participation in investigation for ICT security incidents, with Q-CERT and / or Law Enforcement agencies as applicable. . Work with various stakeholders to report to CISO identified information asset, owners, classified data and systems as part of a control framework implementation. . Work with the IT and business stakeholders to define metrics and reporting that effectively communicate successes and progress of the security program. Operational tasks . Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements. . Lead and coordinate operational components of incident management, including detection, response and reporting. Maintain information security incidents database. . Maintain a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices, and laws and regulations. . Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk. . Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and comply with policies and audit requirements.

Beware of fraud agents! do not pay money to get a job

MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Related Jobs

Job Detail

  • Job Id
    JD2928064
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Permanent
  • Job Location
    Noida, Uttar Pradesh, India
  • Education
    Not mentioned
  • Experience
    Year