Associate Lead Consultant - GRC (Governance, Risk and Compliance) Job
Bangalore, KA, IN
Yash Technologies
YASH specialists provide information, establish contacts and build bridges between the local decision-makers in German companies and the YASH teams.YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation.
At YASH, we’re a cluster of the brightest stars working with cutting-edge technologies. Our purpose is anchored in a single truth – bringing real positive changes in an increasingly virtual world and it drives us beyond generational gaps and disruptions of the future.
We are looking forward to hire GRC (Governance, Risk and Compliance) Professionals in the following areas :
Experience
3-5 Years
Job Description
- Conducting security assessments and risk analysis of IT systems and networks to identify vulnerabilities and potential threats.
- Developing and implementing security policies and procedures to mitigate risks and ensure compliance with regulatory requirements.
- Providing recommendations and guidance to clients on best practices for security and risk management.
- Conducting security awareness training for employees to promote a culture of security and reduce the likelihood of human error leading to security breaches.
- Assisting with incident response and disaster recovery efforts in the event of a security breach or cyber attack.
- Staying up-to-date on the latest security threats, vulnerabilities, and trends in the industry to provide informed and effective recommendations to clients.
Required Technical/ Functional Competencies
Network Security:
- Basic understanding of network security concepts and terminology.
- Ability to identify common network security threats and vulnerabilities.
Security Fundamentals:
- Has good knowledge of security frameworks and standards.
- Can apply security principles and best practices to protect systems, networks, and data.
Identity and Access Management (IAM):
- Good knowledge of IAM processes.
- Can implement and manage IAM systems and tools, such as identity providers and access controls.
Threat and Vulnerability Management:
- Understands the basics of threat and vulnerability management.
- Can identify common threats and vulnerabilities.
Cyber Threat Intelligence:
- Basic understanding of cyber threat intelligence concepts and terminology.
- Ability to identify common threat actors and their motivations.
Application Security:
- Good knowledge of secure coding practices and common application security controls.
- Ability to perform application security testing using tools such as SAST, DAST, and IAST.
- Able to implement security controls for web applications.
Vulnerability Assessment and Penetration Testing:
- Has good knowledge of vulnerability assessment and penetration testing.
- Able to conduct penetration testing with basic tools and techniques.
- Identify vulnerabilities that require further analysis.
Security Operations and Incident Response:
- Can monitor and manage security systems and tools and respond to security incidents effectively.
- Can document and report security incidents.
Security Governance and Risk Management:
- Understands the basics of security governance and risk management.
- Able to implement and maintain security governance framework and risk management process with some guidance.
Required Behavioral Competencies
Accountability:
- Takes responsibility for and ensures accuracy of own work, as well as the work and deadlines of the team.
Collaboration:
- Participates in team activities and reaches out to others in team to achieve common goals.
Agility:
- Demonstrates a willingness to accept and embrace differing ideas or perceptions which are beneficial to the organization.
Customer Focus:
- Displays awareness of customers stated needs and gives priority to meeting and exceeding customer expectations at or above expected quality within stipulated time.
Communication:
- Targets communications for the appropriate audience, clearly articulating and presenting his/her position or decision.
Drives Results:
- Sets realistic stretch goals for self & others to achieve and exceed defined goals/targets.
Certifications
Desirable
At YASH, you are empowered to create a career that will take you to where you want to go while working in an inclusive team environment. We leverage career-oriented skilling models and optimize our collective intelligence aided with technology for continuous learning, unlearning, and relearning at a rapid pace and scale.
Our Hyperlearning workplace is grounded upon four principles
- Flexible work arrangements, Free spirit, and emotional positivity
- Agile self-determination, trust, transparency, and open collaboration
- All Support needed for the realization of business goals,
- Stable employment with a great atmosphere and ethical corporate culture
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Agile Application security Compliance DAST Governance IAM IAST Incident response Network security Pentesting Risk analysis Risk management SAST Security assessment Threat intelligence Vulnerabilities Vulnerability management
Perks/benefits: Flex hours Transparency
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.