Contractor - Cyber Security Job
Pune, IN
Yash Technologies
YASH Technologies is a leading Digital Solution Company for Business IT Solutions. YASH is a Right Sized Technology Partner of Choice.YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation.
At YASH, we’re a cluster of the brightest stars working with cutting-edge technologies. Our purpose is anchored in a single truth – bringing real positive changes in an increasingly virtual world and it drives us beyond generational gaps and disruptions of the future.
We are looking forward to hire Cyber Security Professionals in the following areas :
Position Name: Lead Consultant
Description
YASH is a Digital services enabler organization delivering vast portfolio of digital services to customers across the globe. Our topline services include Cybersecurity services. We are looking for a candidate with strong cyber security skills pertaining length and breadth of cyber security including ISMS. This role will be part of vibrant YASH’s Cyber Security Operations Center services team.
Position: Lead Consultant
Number: 1
Location: Across India
Total Experience: 8 to 10 Years
The Cyber Security Manager develops strategic and tactical plans for risk management. He/ She establishes the governance framework for information security to provide assurance that information security strategies are consistent with applicable laws and regulations. He/ She identifies key security initiatives and programs through a risk based approach. He/ She communicates new key security initiatives and risks to top management and stakeholders to ensure that information risk is understood and identified. He/ She monitors and reports the performance of the security program to senior management. The Cyber Security Manager advises management on the impact of the organisation's key risks. He/ She recommends mitigation controls for the organisation's key risks and manage key projects
- Analyse and correlate information security events to identify appropriate event handling actions.
- Assess operational and implementation costs, and evaluate them against the potential business impact if the policies and controls are not implemented.
- Assess the effectiveness of the measures against security risk management plan.
- Develop IT security policy and operational procedures based on information collected.
- Develop a documented action plan containing policies, practices and procedures that mitigate the identified risks.
- Document information related to IT security attacks, threats, risks and controls.
- Establish a standard methodology for performing security tests in accordance with security requirements.
- Establish review procedures based on organisation's security risk management plan.
- Evaluate effectiveness of current incident response plan against industry good practices.
- Evaluate response plans periodically to ensure relevance.
- Identify threats and risks that are relevant to organisation's operations and systems.
- Monitor the effectiveness of action plans in addressing information risks.
- Obtain corporate management's endorsement of security policies, standards and procedures by articulating cost and benefits.
- Perform comparative analysis of security service performance level parameters against security information sources.
- Prepare information security performance report based on results from analysis and correlation of information security events.
- Rate and categorise potential security incidents.
- Recommend suitable enhancements to improve information security performance.
- Review business and security environment to identify existing requirements.
- Review security policies, standards and procedures by considering the threats identified and other information collected.
- Test incident response plans periodically to ensure response times and executed procedures are acceptable
Qualifications:
- Degree or equivalent qualification in Electronics, Computer Engineering, Electrical engineering, networking, or equivalent practical experience,
Other requirements
- Travel will be required on need basis,
- You will be working during client business hours based on the project you will be allocated into,
- Office reporting is flexible and encourage hybrid working for this role. However, reasonable reporting into office for project meetings and client meeting attendance is mandatory,
- All working days reporting may be subjected to project or organization demand.
At YASH, you are empowered to create a career that will take you to where you want to go while working in an inclusive team environment. We leverage career-oriented skilling models and optimize our collective intelligence aided with technology for continuous learning, unlearning, and relearning at a rapid pace and scale.
Our Hyperlearning workplace is grounded upon four principles
- Flexible work arrangements, Free spirit, and emotional positivity
- Agile self-determination, trust, transparency, and open collaboration
- All Support needed for the realization of business goals,
- Stable employment with a great atmosphere and ethical corporate culture
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Agile Governance Incident response ISMS Risk management SOC
Perks/benefits: Career development Flex hours Team events Transparency
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.