Job Description

We're Hiring: - Technology Risk - Governance
Location: Noida
Education: Graduate/Post-Graduate
Experience: 10+ Years
No of position - 1
Qualifications & Experience--
Education: Degree in Computer Engineering, Computer Science, or other IT related discipline
Certifications: Must have: One or more certification like CRISC, CISSP, CISM, CEH or relevant technology certifications such as ISO 27001 LI/ LA, NIST CSF, CIS
Experience: 7-10 years of work experience related to Cyber security tools implementation, configuration, and its administration. 1 years of experience in Application architecture, Dev Sec Ops, DAST, SAST, Secure coding and over all cloud security.
Travel Eligibility: Candidates must be willing/eligible to travel to/from India to other global, geographical regions.
✅ Position Summary
We are seeking a future team member for the role of Technology risk governance within Technology risk. The role is in Noida, India. This role will report to the Technology Risk governance leader providing oversight and challenge for technology risk and will make impact through following ways.
Candidate in this role will function as subject matter expertise within the discipline of Cybersecurity, IT security tools, concept, and architecture.
Candidates in this role will also be expected to possess the technical aptitude necessary to understand the modern technology, IT security tools, Cloud infrastructure, vulnerabilities, and current threat landscape.
Role will require building and maintaining working relationships with multiple business units, information technology teams, and engaging with various levels of senior management.
Ensures that the Technology risk to the organization’s information posed by a variety of cyber threats (cyberattacks; theft or corruption from within; etc.) is documented, tracked, and minimized.
Candidates will need to establish and maintain positive and productive relationships through ongoing dialogue with department direct reports, technical leads, internal business partners, senior management, and other interested parties.
✅ Key Responsibilities: Technology Risk governance manager is expected to--
Provide written updates, review summaries, and dashboards to senior management on a regular basis.
Continuously assess existing and new technical architectures and recommend actions to minimize cyber and technology risks.
Evaluate current and future security needs, proposing enhancements supported by recommendations and business‑case justifications.
Collaborate with Global IT, Global Information Security, Risk & Compliance, and other internal stakeholders to strengthen security posture.
Support development of training programs, review threat advisories and emerging technologies, and contribute to required policy creation and review.
Lead and coordinate cybersecurity framework, processes, tools, governance activities, and actively enhance the Technology Risk Governance Framework.
✅Core Competencies:
Strong written and verbal communicator with clear stakeholder engagement and crisp documentation.
Developing cyber security operation framework, its implementation and regular monitoring through continuous metrics report out.
IT and application architecture review from cyber security standpoint.
Cyber security implementation on the Cloud service provider environment, well versed with any one of the three main CSP (Azure, AWS, and GCP)
Information security and cyber security standard and guideline like ISMS (ISO ), NIST 800 – 53, CIS and IT general controls.
Understanding of network security risks, exploits, and vulnerabilities.
Proficiency in all the infrastructure layers, hardware, OS, virtualization, storage, network, database, and security
Offensive Security – Vulnerability assessment, Penetration testing, Red Team assessment, Threat advisories and threat intel and hunting.
Hands on experience and knowledge of including but not limited to followings.
Antivirus, Host based intrusion prevention, EDR, XDR
Vulnerability scanner
Security Information and event management solution
Security orchestration, automation, and response solution.
Patch management solution.
Data leakage solution
Intrusion prevention systems
Firewall
Web content filter
Web application firewall.
Cloud native application protection platform
Cloud Security posture management.
Cloud access security broker.
Secure access service edge.

Apply for this Position

Ready to join ? Click the button below to submit your application.

Submit Application