logo

JobNob

Your Career. Our Passion.

Senior Information Technology Security Officer


Domnic Lewis International


Location

Bangalore | India


Job description

Hi Folks,

We are hiring for one of the world's well known European-Fortune 500 MNC known for its automobiles. Kindly go through the JD to know more about the opportunity.

Experience: 8 to 15 years

Location: C.V Raman Nagar, Bangalore

Work Mode: WFO (5 Days, General Shift)

Payroll: Permanent- on client's payroll

Position Overview:

We are currently seeking an experienced and highly capable Identity and Access Management (IAM) to join our client's team. The chosen candidate will play a pivotal role in defining how we secure our Identity and Access Management area. Collaboration with developers, architects, and DevOps teams to develop and maintain effective security measures, architecture, solutions, policies, and procedures will be a central aspect of this role.

Key Responsibilities:

  1. IAM Advisory: Provide advisory to teams and projects across all IAM topics as it relates to both cloud and on-premises enterprise technology, and the relationship between the architectures, requirements, pattern, etc. Participate in Identity and Access Management enterprise governance processes and drive IAM standards adoption. Subject-matter expertise across all IAM topics which provide IT security and risk advisory to Cyber Security leaders and IT teams. Drive the adoption of creative solutions to address complex, global IAM problems.
  2. IAM Oversight: Develop, implement, and continuously enhance the organization's strategic approach to IAM area, with the goal of mitigating risks and preventing breaches. Help build the security framework for how to collaborate with projects on IAM area topics and requirements.
  3. Policy Formulation: Craft, update, and enforce IAM policies, procedures, and guidelines in alignment with industry standards and regulatory requirements. Perform gap analyses of our adherence to information security control frameworks (ISO, ISF, NIST, etc.) Assess, identify, and implement new IT/OT security controls on various projects across organization. Review existing IAM policies, procedures, guidelines, and instructions update/create where gaps exist.
  4. Compliance Oversight: Monitor and ensure adherence to information protection laws and regulations, taking necessary actions to maintain compliance. Review coverage and effectiveness of existing IAM IT and OT security controls.
  5. Risk Evaluation: Conduct comprehensive assessments of IAM risks identifying vulnerabilities, assess potential impact, and recommend effective security measures. Perform risk management activities from the initial identification throughout assessment and identifying mitigating actions.
  6. Employee Training: Deliver training and awareness initiatives to educate employees on Identity and Access management area best practices.
  7. Security Reviews and Assessments: Regularly conduct security reviews and assessments to identify weaknesses and propose strategies for improvement. Assist in major vendor assessments and contractual negotiations in IAM area.
  8. Support development teams to secure identity related aspects of the software projects. Help in defining requirements, translating them into solution proposals and assess the outcome of the project to verify if it meets the security policies and market best practices.

Qualifications:


Job tags



Salary

All rights reserved