Information Security, Specialist

India

Bounteous

We collaborate with the world’s most ambitious brands to create transformative digital experiences. Learn more about our work and our unique co-innovation model.

View all jobs at Bounteous

Apply now Apply later

Bounteous x Accolite is a premier end-to-end digital transformation consultancy dedicated to partnering with ambitious brands to create digital solutions for today’s complex challenges and tomorrow’s opportunities. With uncompromising standards for technical and domain expertise, we deliver innovative and strategic solutions in Strategy, Analytics, Digital Engineering, Cloud, Data & AI, Experience Design, and Marketing.
Our Co-Innovation methodology is a unique engagement model designed to align interests and accelerate value creation. Our clients worldwide benefit from the skills and expertise of over 4,000+ expert team members across the Americas, APAC, and EMEA. By partnering with leading technology providers, we craft transformative digital experiences that enhance customer engagement and drive business success.

Information Security Responsibilities

  • Promote and enforce awareness of key information security practices, including acceptable use of information assets, malware protection, and password security protocols
  • Identify, assess, and report security risks, focusing on how these risks impact the confidentiality, integrity, and availability of information assets
  • Understand and evaluate how data is stored, processed, or transmitted, ensuring compliance with data privacy and protection standards (GDPR, CCPA, etc.)
  • Ensure data protection measures are integrated throughout the information lifecycle to safeguard sensitive information

POSITION OVERVIEW

  • Information Security, Specialist will work closely with Associate Director, Info Sec. and IT team.
  • He/she will be responsible for maintaining the Information Security Management System, Vulnerability Management, Risk Management, and reporting using various monitoring systems. 
  • He/she shall also participate in facilitating audits, overall governance & compliance measures that involve collaboration with relevant stakeholders.

RESPONSIBILITIES 

  • Ensure that the processes of Information Security Management System, Data Privacy & Protection measures are established, implemented, and maintained.  
  • Participate in short- and long-term planning. Monitor compliance with Information Security standards, Data Privacy & Protection requirements.  
  • Measure effectiveness of Information Security controls and make corrections/improvisations if required.  
  • Coordinates and prioritizes information security initiatives.   
  • Works with information security forum and management to accomplish information security & Data Privacy goals.  
  • Assist in the completion of Supplier/Customer Security questionnaires.  
  • Plan and conduct internal audits. Facilitate external audits like ISO, SOC etc.  
  • Reviews instances of noncompliance and works effectively and tactfully to correct deficiencies.  
  • Work with IT & various functions to address identified vulnerabilities and track it to closure.  
  • Participate in risk management exercise for all business and corporate functions.  
  • Conduct effective analysis of information security violations, security incidents and computer crimes.   
  • Support business continuity and disaster recovery planning.  
  • Support building and maintaining company’s incident response playbooks for various incident scenarios.   
  • Verify the security of third-party vendors and collaborating with them to meet security requirements.  
  • Liaison with External Agencies on matters relating to the information security & Data Privacy  

REQUIRED SKILLS

  • Strong knowledge in Information Technology  
  • 3-5 years of experience information security, IT audits, information security auditor, and/or previous role as an information security officer  
  • Good communication skills, both verbal and written  
  • Ability to manage multiple tasks and change priorities.  
  • Ability to work collaboratively in a team.  
  • Willingness and ability to explore and learn new areas.

PREFERRED SKILLS 

  • Exposure to Information Security standards such as ISO27001:2013/ISO27001:2022  
  • Any Information Security specific certification like CISSP, CISM, CEH etc.  
  • Proficient in the use of MS Office product suite (365) 
We invite you to stay connected with us by subscribing to our monthly job openings alert here.
Research shows that women and other underrepresented groups apply only if they meet 100% of the criteria of a job posting. If you have passion and intelligence, and possess a technical knack (even if you’re missing some of the above), we encourage you to apply.
Bounteous x Accolite is focused on promoting an inclusive environment and is proud to be an equal opportunity employer. We celebrate the different viewpoints and experiences our diverse group of team members bring to Bounteous x Accolite. Bounteous x Accolite does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, physical or mental disability, national origin, veteran status, or any other status protected under federal, state, or local law.
In addition, you have the opportunity to participate in several Team Member Networks, sometimes referred to as employee resource groups (ERGs), that host space with individuals with shared identities, interests, and passions. Our Team Member Networks celebrate communities of color, life as a working parent or caregiver, the 2SLGBTQIA+ community, wellbeing, and more. Regardless of your respective identity, there are various avenues we involve team members in the Bounteous x Accolite community.
Bounteous x Accolite is willing to sponsor eligible candidates for employment visas.
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  3  1  0

Tags: Analytics Audits CCPA CEH CISM CISSP Cloud Compliance GDPR Governance Incident response ISO 27001 Malware Monitoring Privacy Risk management SOC Strategy Vulnerabilities Vulnerability management

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.