
Specialist I - Information Security
- Bangalore, Karnataka
- Permanent
- Full-time
- Handle (with minimal guidance from the supervisors) internal/external compliance audits to ensure compliance with ISO 27001/ISO 22301/ISO 27701 requirement as well as process specific requirements.
- Responsible for the effective documentation of internal audits (reports) external audit documentation.
- Help the team for effective external audit facilitation and the related responsibilities.
- Point out the non-conformance areas related to information security with assistance from the supervisor.
- Ensure that policies are updated as and when required and eliminate the discrepancies of old policy versions.
- Conduct information security awareness training programs for all the employees contractors and approved system users.
- Evaluate IT Controls’ implementation and perform Risk Assessment.
- Carry out technical vulnerability assessments of IT systems and processes to identify potential vulnerabilities. Make recommendations to control any risks identified and ensure that they are implemented.
- Collect review and analyse latest technologies and tools.
- Analyse user requirements and steps required to perform the VAPT/Red Teaming.
- Interact with and communicate detailed technical requirements to the team.
- Lead Security Assessment scoping independently based on security standards like OWASP.
- Lead Web Application Penetration Testing Network Penetration Testing Mobile Penetration Testing and Code Review independently based on the guidance from leads.
- Learn and understand existing and emerging security management practices.
- Independently handle the evidence collection from multiple teams as part of any external audits.
- Assist in customer assurance activities.
- Assist in the process automation activities.
- Mentor and Lead A band employees.
- Number of external audit facilitation activities.
- Number of Threats/Risks/Vulnerabilities reported per year.
- Number of NCs in external audits on assigned domains.
- Number of areas of responsibility on cross domains.
- Performance of ISMS/BCMS/PIMS/QMS in the responsible centre/regions.
- Awareness activities conducted and the percentage of adoption in the responsible centre/regions.
- Noticeable initiatives taken to improve the process.
- Less than two stake holder escalations.
- More than three appreciation from the stakeholders/supervisors.
Presentations decks for internal/ external discussions
Audit /Security Assessment reportsProcess: * Internal ISMS audits – independently carry out auditsprepare audit reports and ensure timely closure of audit reports * Compliance Audits – Representation in certification auditsconduct preparatory session and evidence collection * Risk Assessment - IT Controls’ implementation and assess risks
- Infosec activities – training material
co-ordinate with other teams for trainings conducting * Customer Assurance – independently handle customer assurance requirements and evidence collection
- Policy – Identify discrepancies in the policies and addressing it
- Vulnerability Assessment and Penetration Testing/Red Teaming Activities
- CM activities
- Executing other location responsibilities
- Able to interpret all scenarios applicable to the business for identifying the potential risks associated with various functions/services.
- Proficiency in Network Security Controls' implementation like IAM IPS/IDS E-Mail Security Controls Cloud Security Controls etc.
- Proficiency in Technical Vulnerability Assessment and Management.
- Strong compliance auditing knowledge.
- Detail oriented customer oriented result delivery oriented analytical thinking
- Strong Excel and Dashboard skills.
- Excellent Presentation and communication skills
- Excellent verbal and written communication skills required including the ability to effectively communicate in both highly technical and non-technical environments
- A great problem solver with the knack of coaching others to do the same
- Good at working in a team and with other teams
- Good time management
- A desire for continuous learning and skill development.
- Self-motivated and enthusiastic
- Should have a strong understanding of concepts of Information Security Business Continuity and Data Privacy VAPT Red Teaming and various compliance standards.
- Knowledge on ISO and other Compliance standards efficient to evaluate the security controls.
- Knowledge on ISO 22301/27001/9001/27701 Risk Management incident management awareness activities customer assurance etc.
- Knowledge on standard SDLC and project management life cycles.
- Knowledge on the operations of various functional units like HR REFM IT Finance etc. and units involved in IT Asset lifecycle management.
- Expert on security testing standards like OWASP Top 10 SANS 25 etc.
- Good at OWASP cheat sheets and other security frameworks.
- Expert on Linux commands.
- Expert on Scripting Languages like Shell Script Python etc.
- Development and Testing knowledge would an added advantage.
- Hands on experience in RSA Archer Postman Burp Suite Nessus Nmap Genymotion MobSF Drozer etc.
- Good to have Certifications like ISO 27001/22301/9001/27701 Lead Auditor/Implementor CISA CRISC SSCP ECSA (Practical) ECES CHFI OSEE etc.