Cutshort logo
Shopalyst Technologies logo
Compliance Analyst / Sr. Compliance Analyst
Compliance Analyst / Sr. Compliance Analyst
Shopalyst Technologies's logo

Compliance Analyst / Sr. Compliance Analyst

Hiring Manager's profile picture
Posted by Hiring Manager
2 - 5 yrs
Best in industry
Thiruvananthapuram, Kerala
Skills
SOC2
ISO 27001
GDPR
PCI DSS

About Shopalyst: 

Shopalyst offers a Discovery Commerce platform for digital marketers. Combining data, AI and deep integrations with digital media and e-commerce platforms, Shopalyst connects people with products they love. More than 500 marquee brands leverage our SaaS platform for data driven marketing and sales in 30 countries across Asia, Europe and Americas. We have offices in Fremont CA, Bangalore, and Trivandrum. Our company is backed by Kalaari Capital. 


  Key responsibilities

  • Ensure compliance with all applicable regulatory requirements, including SOC2, ISO 27001, PCI DSS, GDPR rules and guidelines.
  • Develop and implement compliance policies, procedures, and programs.
  • Conduct regular compliance reviews and audits to identify areas of improvement.
  • Collaborate with other departments to ensure effective implementation of compliance measures.
  • Work with external vendors to ensure compliance adherence
  • Maintain up-to date compliance records and provide them to Sales, Marketing, Internal and External Customers on a need-to-know basis
  • Provide training and education on compliance matters to staff and stakeholders.
  • Monitor market trends and regulatory developments to stay informed of potential risks or issues.


Requirements

Job Requirements

  • Strong knowledge of audit and regulatory compliance to ensure the security, privacy, and reliability of SaaS services in a global market.
  • Familiarity with ISO 27001, PCI DSS, GDPR rules and guidelines.
  • Ability to work collaboratively with cross-functional teams.
  • Strong analytical skills and attention to detail.
  • Bachelor's degree in a related field preferred but not required.
  • Experience in Leading Software Project Teams desired but not mandatory.


Additional Notes : 

At Shopalyst, we are creating a global workplace that enables everyone to find their true potential, purpose, and passion irrespective of their background, gender, race, sexual orientation, religion and ethnicity. We are committed to providing equal opportunity for all and believe that diversity in the workplace creates a more vibrant, richer work environment that advances the goals of our employees, communities and the business. 


Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About Shopalyst Technologies

Founded :
2014
Type
Size
Stage :
Profitable
About

Shopalyst offers a Discovery Commerce platform for digital marketers. Combining data, AI and deep integrations with digital media and e-commerce platforms, Shopalyst connects people with products they love. More than 500 marquee brands leverage our SaaS platform for data driven marketing and sales in 30 countries across Asia, Europe and Americas.


For us, work is more than accomplishing milestones. We believe in building lasting relationships with employees that lay the foundation for our success stories. Our aim is to build a global workplace where everyone feels inspired to find their true potential and passion. Sounds interesting? Go ahead and check our openings. If you think you have the desired skills and experience to leave a mark, let us talk.

Read more
Company video
Shopalyst Technologies's video section
Photos
Company featured pictures
Company featured pictures
Company featured pictures
Company featured pictures
Company featured pictures
Company featured pictures
Company featured pictures
Company featured pictures
Connect with the team
Profile picture
Sreekanth Nayar
Profile picture
Sarath S
Profile picture
Sreejith Narayanan
Profile picture
Kiran Nair
Profile picture
Kishor Gandham
Profile picture
subramanian swaminathan
Profile picture
Abhishek Tripathi
Profile picture
Sajeesh P J
Profile picture
Najad Latheef
Profile picture
Hiring Manager
Company social profiles
bloglinkedintwitterfacebook

Similar jobs

Delivery Solutions
at Delivery Solutions
1 video
4 recruiters
Pranali Salvi
Posted by Pranali Salvi
Remote only
10 - 15 yrs
₹30L - ₹40L / yr
Audit
Implementation
Information security
SOC2
HIPAA
+6 more

Job Title: Technical Architect Security

Location: Work From Home

Department: Security 

Reports to: Associate Director - Technology

Job Type: Full-Time

Website: https://deliverysolutions.co/


Delivery Solutions is a Retail eCommerce OXM Platform that provides retailers with out-of-the-box solutions to power Same-Day Delivery, Curbside, In-Store Pickup, Shipping, and post-purchase experiences. We are trusted with some of the biggest names in multiple verticals of retail like Sephora, AT&T, Footlocker, Michael's, Office Depot, GameStop, Total Wine, Sally Beauty, Abercrombie & Fitch Co. Belk, Loblaw, Vineyard Vines etc.


Our SAAS-based solution is highly flexible and interacts seamlessly with E-commerce properties, OMS, WMS, and POS systems for a highly scalable experience and a delighted customer base.

Delivery Solutions is a wholly-owned subsidiary of UPS | We are a certified Great Places To Work Company


Job Overview: As a Technical Architect of security, you will be responsible for leading and managing our Information Security Operations team. You will safeguard our organization's information assets by developing, implementing, and maintaining security processes and protocols. Ensure compliance with relevant laws, regulations, and industry standards (e.g., ISO, SOC2, HIPAA, GDPR) i.e. monitor changes in compliance regulations, adjust policies and procedures as necessary, and oversee the development and implementation of privacy policies and procedures to protect personal data. This role demands a blend of technical expertise and leadership skills to ensure the security and integrity of our systems, networks, and data.


Key Responsibilities:

Technical Responsibilities:

Policy Development and Enforcement

  • Develop, implement, and enforce comprehensive security and privacy policies.
  • Regularly review and update policies to reflect evolving threats and regulatory requirements.
  • Audit adherence to these policies across the organization

Security Operations Centre:

  • Oversee the daily operations of the information security team, ensuring that all security policies, procedures, and protocols are effectively implemented and maintained.
  • Lead the development and implementation of security measures, including firewalls, intrusion detection systems, and encryption protocols.

Incident Response:

  • Manage and respond to security incidents, providing timely and effective resolution.
  • Conduct thorough investigations of security breaches and take appropriate corrective actions.

Vulnerability Management:

  • Conduct regular security assessments and vulnerability scans to identify potential threats.
  • Recommend remediation strategies to address identified vulnerabilities.

Compliance and Audits:

  • Develop policies based on industry best practices and implement the policies defined.
  • Ensure compliance with relevant laws, regulations, and industry standards (e.g., ISO, SOC2, HIPAA, GDPR).
  • Coordinate and support internal and external security audits.

Privacy:

  • Be updated on the privacy laws where the company and customers operate
  • Ensure the company’s processing activities comply with privacy laws


Functional Responsibilities:

Strategic Planning and Development:

  • Collaborate with senior management to develop and implement the overall information security strategy.
  • Identify and prioritize security initiatives and projects based on risk assessment and business impact.

Team Leadership and Development:

  • Resource management, planning and execution, and stakeholder communication.
  • Planning execution of various projects in the domain of security and privacy
  • Lead, mentor, and develop a team of security professionals, fostering a culture of continuous improvement and professional growth.
  • Conduct performance evaluations and provide constructive feedback to team members.

Cross-Department Collaboration:

  • Work closely with IT, legal, marketing, and other departments to ensure cohesive security practices across the organization.
  • Serve as a key advisor to the Associate Directors and other executives on security and privacy matters.
  • Coordination and provide updates to Delivery Solutions' parent organization on security initiatives.

Risk Management:

  • Identify, assess, and mitigate information security risks.
  • Develop and maintain a risk management program that aligns with the organization’s objectives.

Security Awareness and Training:

  • Develop and deliver security awareness training programs to educate employees on security best practices and emerging threats.
  • Promote a security-conscious culture throughout the organization.


Qualifications:

  • Education: Bachelor’s degree in Computer Science, Information Security, or a related field. Master’s degree or professional certifications (CISSP, CISM, etc.) preferred.
  • Experience: Minimum of 7-10 years of experience in information security, governance, and audit processes, with at least 3-5 years in a management or leadership role. Have worked as an auditor for ISO / SOC2 and other frameworks
  • Technical Skills: Experience in setting up a framework and conducting privacy and security audits.Conducting training and awareness, proficiency in security technologies and tools (e.g., SIEM, IDS/IPS, firewalls, endpoint protection), strong understanding of network security, cryptography, and risk management frameworks.
  • Functional Skills: Strong leadership and team management skills, excellent communication and interpersonal abilities, experience in strategic planning and project management.
  • Personal Attributes: Strong analytical and problem-solving skills, high ethical standards, ability to work under pressure and manage multiple priorities.
Read more
Emids Technologies
at Emids Technologies
2 candid answers
Darshan K
Posted by Darshan K
Bengaluru (Bangalore)
7 - 14 yrs
Best in industry
Information security
Implementation
Risk Management
Cyber Security
ISO 27001:2013
+7 more

Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.

Base location: - Bengaluru - Must

Requirements: -

  1. Mandatory - ISO 27001:2013 lead implementor certified
  2. Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)
  3. Good to have – CISA, CISM, Risk management certification, Privacy certifications.
  4. Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.
  5. This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.
  6. Good documentation skills.
  7. Develop, implement, maintain, review and continually improve Information Security policies.
  8. Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.
  9. Manage and maintain a risk register / risk database along with risk treatment plans.
  10. Good understanding of physical and environmental security.
  11. Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.
  12. Provide training to the employees on Privacy & Information Security Management System on regular intervals.
  13. The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.
  14. Mandatory: Good verbal and written communication skills. Eye for details.
  15. Good presentation skills.
  16. Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.
Read more
Rezo.AI
Aishwarya Srivastava
Posted by Aishwarya Srivastava
Noida
6 - 10 yrs
₹5L - ₹15L / yr
IT security
Data security
ISO 27001
ISO/IEC 27001:2005
Firewall
+2 more

About Us 

Rezo.ai is an AI-Powered Contact Centre that enables enterprises to enhance customer experience and boost revenue by automating and analyzing customer agent interactions across multiple channels including voice, email, chat/WhatsApp, and social, at the required scale, whilst training agents with minimal costs 


How do we do it 

Rezo’s AI-Powered contact center leverages ground-breaking technologies in AI, ML, ASR, NLP, RPA, and predictive intelligence to transform customer experience and reduce costs by automating, analyzing social media, whilst coaching them.


Overview

Providing leadership in the information security space, helping ensure ISO and GDPR certification, and establishing, maintaining, and enforcing our security policies. Working closely with our business and technology teams to ensure awareness and adherence to the policies and procedures established.

To ensure that the security solutions being designed and delivered are aligned with the enterprise security architecture, supporting the transition of the security architecture from its current to its planned future state.

To lead and provide strategic oversight to ensure and assure the beneficial and cost-effective security change across key accounts, through the evaluation of business strategies and requirements providing advice, guidance and assurance.


Role & Responsibility

  • Provide security advice and guidance to business and delivery teams ensuring solutions are consistent with the enterprise security roadmap whilst balancing business values and security risk.
  • Recommend changes to IT systems to bring them into compliance with security policy, standards, blueprints and roadmaps.
  • Influence stakeholders to adopt architecturally sound approaches to the management of risk.
  • Advise on the translation of business requirements into secure IT solutions and migration roadmaps.
  • Preparation and documentation of standard security operating procedures and protocols
  • Recommend technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
  • Advise on alternate solutions and countermeasures to mitigate identified information risks.
  • Provide assurance that identified solutions or countermeasures mitigate identified information risks.
  • Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement
  • Implements security improvements by assessing the current situation; evaluating trends; anticipating requirements.
  • Keeps users and businesses informed by preparing performance reports; communicating system status, and owning security incidents when they arise.

 

Technical Skills Required

  • Proven experience in the design, implementation and operation of scaled IT security services and capabilities, ideally within a large government organization or complex large-scale multi-supplier organization.
  • Strong technical aptitude and exposure to ISO 27001 or similar-based security policies and standards.
  • Excellent communication skills, with the ability to articulate complex technical issues into business-focused terms and communicate with Stakeholders.
  • Knowledge of GDPR, its business implications and the merits of various technical approaches
  • Expertise in IT security risk in a business context
  • Exposure to web application security and penetration testing.
  • Exposure to securing the software development life cycle and to project management disciplines.
  • Excellent organizational and technical documentation skills.
  • Strong understanding of Information Security including threats, attacks, and vulnerability management.
  • Deep understanding of secure development practices, with practical experience of cyber security, privacy protection, cloud security, identity management, situations awareness, protective monitoring, security operations, risk management and reporting.
Read more
Ongrid
at Ongrid
3 recruiters
Pushpendra Singh
Posted by Pushpendra Singh
Gurugram
6 - 15 yrs
₹10L - ₹15L / yr
Information security
Cyber Security
ISO/IEC 27000-series
GDPR
Role and Responsibilities:-

- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
- Routinely performing threat analysis, system checks, and security tests
- Defining and updating information security criteria and validation procedures
- Effectively discuss to understand safety and security and fix the problems along with different stakeholders
- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
- Operate vulnerability scanning and compliance tools to identify system weaknesses
- Represent IT Security matters at technical and business forums.

Desired candidate profile :

- Relevant experience in the information security field
- Relevant experience working with ISO Policies, and GDPR guidelines.
- Strong knowledge of network architecture and security concepts related to routing
- Exceptional attention to detail
- Excellent analytical and problem-solving skills
- Great team player and able to work efficiently with minimal supervision
- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.
- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Read more
ShawMan Software
at ShawMan Software
1 recruiter
Soumya Das
Posted by Soumya Das
Navi Mumbai, Mumbai
5 - 8 yrs
₹4.5L - ₹6L / yr
iso 27001
ISO/IEC 27001:2005
Virtualization
Fortinet
IT infrastructure
+4 more
Assist the Head IT in managing IT infrastructure of the organization and the role entails - 

Excellent understanding of ISO 270001 processes, IT systems infrastructure and best practices.

Working experience in emerging technologies like MS Azure, O365, SharePoint Online, Virtualization. 

Strong hands on experience on Fortinet, Cyberoam Firewall, Vlans, Active Directory & Domain Controller migrations.

Should have prior experience in Server, Network, OS Hardening/fine tuning of Security parameters/Infrastructure audits.

Excellent working knowledge of computer systems, security, network and systems administration, databases, NMS tool, data storage systems, CCTV and phone systems.

Able to configure Group Policies and Printer Management Able to connect machine to the Domain Controller Able to Install through Domain Controller.

Ability to Install and Configure Symantec/ Kaspersky Endpoint Security, Antivirus in Network and Standalone Environment.

Excellent communication and documentation skills.

Worked on SAN & NAS.

Read more
MindTickle
at MindTickle
1 video
11 recruiters
Namrata Priya
Posted by Namrata Priya
Pune
5 - 14 yrs
₹10L - ₹35L / yr
Data security
Information security
Privacy
data privacy
GDPR
+2 more

Job Brief:

 

You'll be joining Mindtickle’s InfoSec and Compliance team, which is responsible for various functions related to Security, Privacy, and Compliance around Mindtickle's rapidly growing cloud platform. You'll play a crucial role in all our compliance & information security initiatives, including but not limited to those arising from regulations (e.g., GDPR, CCPA, UK DPA 2018, FINRA), audit requirements (e.g., SOC 2, HIPAA), and customer/ prospects requests (typically large enterprises).

 

As Data Privacy & Compliance Manager, you will champion the highest data privacy standards and drive forward compliance across all of Mindtickle. Crucial to this role will be an expert knowledge of international data protection laws and a proactive and pragmatic approach towards data privacy and compliance. 

 

Key Responsibilities:

  • Act as the single point of contact for all privacy-related topics, including communication with customers and prospects, including RFPs, emails, or privacy calls

  • Closely working with the internal legal team and external legal counsel to support the review of third parties/customer data processing addendums (DPAs), standard contractual clauses, contracts, and other data protection agreements

  • Maintain the data protection terms agreed with customers in a contract management software

  • Perform due diligence of new third parties and periodic risk review of existing third parties, including processes around sub-processors

  • Support in other industry compliance projects such as ADA, Section 508, WCAG, FINRA, 21 CFR Part 11, etc.

  • Lead the assessment of new legislation or other regulatory changes (GDPR, CCPA, UK DPA 2018, LGPD, PIPEDA, Swiss FDAP) and make recommendations as necessary to ensure that risks are mitigated as well as ongoing compliance

  • To work flexibly and collaboratively across all teams in the organization while driving privacy & compliance-related projects, including sales, customer success, product, and engineering

  • Own internal and external privacy audit projects, including planning, scoping, need analysis, ongoing project management, and communications with all relevant stakeholders

  • Onboard privacy solutions, design, build and deploy data privacy programs on the solutions to ensure compliance with privacy requirements

  • Maintain Records of Processing Activities (ROPA) and ensure Privacy By Design for new features/changes in the platform

  • Undertake all other reasonable and related tasks associated with this role

Desired Qualification:

  • 5-10 years of experience in data privacy and compliance, with exposure to cloud software platforms

  • Extensive experience in data protection and knowledge of relevant legislation, including GDPR, Standard Contractual Clauses, Transfer Impact Assessment, CCPA, UK DPA 2018, LGPD, PIPEDA, Swiss FDAP, etc.

  • Certifications such as CIPP/E, CIPP/US, CIPM, CIPT, etc., are preferred

  • Specialist knowledge in a relevant area, e.g., data security and individual rights requests

  • Excellent communication, interpersonal, project management, and issue resolution skills

  • Excellent analytical skills, organizational skills, ingenuity, and the ability to work as part of a team

  • Experience in managing privacy audits and risk management processes

  • Demonstrated ability to learn quickly, take the initiative, and drive complex projects

 

Read more
IT services provider based out of the US
IT services provider based out of the US
Agency job
via Jobdost by Mamatha A
Bengaluru (Bangalore)
3 - 5 yrs
₹12L - ₹16L / yr
IT security
IT security audit
Information security
Security audit
ITGC
+13 more

Job description- Information Security(Financial)

Roles and Responsibilities

HTC Global Security Delivery Centre will provide a professional opportunity to work in a dynamic environment where you will have the ability to develop process and Cyber security based skills

 

Work profile of individual

  • As part of the companyC Global cyber security consulting team, individual’s primary role would be to be a part of ISO 27k projects IT audits, ITGC audits, SSAE, SOC audits, IT Process Audit, Systems Audit, Gap assessment TPRM, GDPR, Infosec, GRC , ISMS, Cyber Security, SOX ITGC on customer engagements
  • Will address all aspects of security like physical, logical, data, access etc and review Information Security policy and suggest / recommend necessary changes to the same on customer engagements
  • Will be an active participant in internal / third party system security reviews and audits on customer engagements.
  • Will perform internal audits on all aspects of IT and ensure compliance with the prescribed security norms on customer engagements and will be responsible for tracking the open audit findings and closure of the same
  • Will be able to manage document tracking and updating - policies, processes, procedures, templates etc.
  • Will assist in developing proposals by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise.
  • Will demonstrate ability to clearly and concisely communicate the privacy implications of technology and implementation.

 

Team work

  • Individual would be responsible for contributing to a strong team environment and promoting a positive working relationship with their colleagues.
  • Individual would predominately work with off-shore engagement teams and relevant HTC Territory teams on presale and cyber security delivery.
  • Communication, written and verbal, with these teams would be expected.
  • Team members would be required to apply learning from trainings and on the job experience to work requests and support continuous process improvement.
  • Team members would be required to handle multiple tasks at the same time.
  • Detailed focus when performing work and good project management skills when managing workload and maintaining timelines will be necessary.

Desired Candidate Profile

  • Bachelors
  • Certifications (ISO 27001/ ISO 31000/ or equivalent and other relevant qualification/certification
  • Experience : 3-5 years

 

Knowledge Required:

  • Strong knowledge of information security concepts, risk and controls concepts. Strong understanding of security principals: audit, policies, guidelines, and compliance.
  • Understanding of infrastructure (data centre, network end user computing) security / cloud security / managed security services / security operations centre / compliance risk management and ITGC controls
  • Sound knowledge of Internal financial Controls and Compliance. Must be able to recommend controls around people, process, and technology.
  • Sound knowledge of General Leger / Balance Sheet / Journal Entry / Budgeting / Financial fraud
  • Sound knowledge on business controls and process controls. Good experience with control assessment, check the effectiveness of the implemented controls and recommend mitigation / improvements.
  • Experience with the Microsoft Office suite of products (i.e. Word, Excel, PowerPoint, Visio, etc.),
  • Strong verbal and written communication skills Knowledge / experience in fields of ITGC audits, Internal Audit, External Audit / Statutory Audit projects
  • Candidates should exhibit good client service skill collateral's with a strong focus on building relationships.

 

Additional Responsibilities:

 

  • Ability to develop value-creating strategies and models that enable clients to innovate, drive growth and increase their business profitability
  • Good knowledge on software configuration management systems and license Management systems
  • Awareness of latest technologies and Industry trends
  • Logical thinking and problem solving skills along with an ability to collaborate
  • Understanding of the financial processes for various types of projects and the various pricing models available
  • Ability to assess the current processes, identify improvement areas and suggest the technology solutions
  • One or two industry domain knowledge
  • Client Interfacing skills
  • Project and Team management
Read more
Rapidly growing fintech SaaS firm that propels business grow
Rapidly growing fintech SaaS firm that propels business grow
Agency job
via Jobdost by Mamatha A
Bangalore
5 - 10 yrs
₹15L - ₹30L / yr
Information security
ISO/IEC 27001:2005
HIPAA
Systems Development Life Cycle (SDLC)
Physical security
+7 more

What are we looking for?

An enthusiastic individual with the following skills. Please do not hesitate to apply if you do not match all of it. We are open to promising candidates who are passionate about their work and are team players.

Key Responsibilities & expectations from the candidate 

  • Must have strong experience in Information Security Management system(ISMS), creation of policy, procedures and implementation.
  • Operates as a key contributor to the RFP, Third-Party Risk assessment, cloud security assessment etc.
  • Lead the strategic and tactical development of information security framework, risk management and new compliance initiatives
  • Subject matter expertise in ISO 27001, SOC2, CCPA, CPRA, GDPR, PCI DSS and HIPAA.
  • Must have a strong experience in the documentation process and reviewing MSA, SCC, SLA & DPA.
  • Good knowledge of BCP/DR, Incident response, VA/PT and Audit methodologies of various compliance frameworks.
  • Good knowledge of Access management, Network, Application Security, Encryption, Backup, Physical Security, ISMS Training & Awareness etc..
  • Ability to deal with the customers and vendors on Security and privacy matters.
  • Knowledge of Core IT processes, SDLC, network infrastructure will be useful.

Personal Attributes

  • Good written, oral, and interpersonal communication skills.
  • Ability to conduct research into IT security issues
  • Ability to present ideas in business-friendly and user-friendly language.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Highly self-motivated and hardworking.

Qualification and certification 

  • Bachelor’s/master's degree in Security, Computer Science, Management Information Systems, Engineering or related field.
  • Should be at least ISO 27001 lead auditor or lead implementer. 
  • 3+ years of related work experience in information security governance, risk and compliance (GRC) or relevant compliance roles in the SaaS industry.

What can you look for?

A wholesome opportunity in a fast-paced environment that will enable you to juggle between concepts, yet maintain the quality of content, interact, and share your ideas and have loads of learning while at work. Work with a team of highly talented young professionals and enjoy the benefits of being here.

We are

It is a rapidly growing fintech SaaS firm that propels business growth while focusing on human motivation. Backed by Giift and Apis Partners Growth Fund II, Company offers a suite of three products - Plum, Empuls, and Compass. Company  works with more than 2000 clients across 10+ countries and over 2.5 million users. Headquartered in Bengaluru, Company  is a 300+ strong team with four global offices in San Francisco, Dublin, Singapore, New Delhi.

Way forward

We look forward to connecting with you. As you may take time to review this opportunity, we will wait for a reasonable time of around 3-5 days before we screen the collected applications and start lining up job discussions with the hiring manager. We however assure you that we will attempt to maintain a reasonable time window for successfully closing this requirement. The candidates will be kept informed and updated on the feedback and application status.

 
Read more
Open Finanacial Technologies
Bengaluru (Bangalore)
4 - 8 yrs
₹12L - ₹18L / yr
Information security
ISO/IEC 27001:2005
PCI DSS
ISO 27001
CISO

What you’ll be doing:
  • Establish, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program
  • Work directly with the business units to facilitate risk assessment and risk management processes
  • Develop and enhance an information security management framework
  • Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services
  • Provide leadership to the enterprise's information security organization
  • Partner with business stakeholders across the company to raise awareness of risk management concerns
  • Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems
  • Conduct regular internal audits in compliance with applicable legal and contractual requirements, ISO 27001 and PCI DSS requirements and companies internal requirements
  • Conduct regular Management reviews and update the management on information security aspects. The MRMs shall also focus on drawing Management attentions to the key areas for required management actions.
  • CISO is also responsible to ensure customer audits as well as re-certification and surveillance audits and successful.
  • Coordinate with relevant stakeholders to address the NC closures.
  • CISO shall ensure the information incidents are responded and resolved on time to ensure compliance with legal and contractual requirements.

What you’ll bring along:

  • Degree in business administration or a technology-related field required.
  • Professional security management certification
  • Minimum of 5 years of experience in a combination of risk management, information security and IT jobs
  • Knowledge of common information security management frameworks, such as ISO/IEC 27001, and PCI DSS.
  • Excellent written and verbal communication skills and high level of personal integrity
  • Innovative thinking and leadership with an ability to lead and motivate cross-functional, interdisciplinary teams
  • Experience with contract and vendor negotiations and management including managed services.
  • Specific experience in Agile (scaled) software development or other best in class development practices.
  • Experience with Cloud computing/Elastic computing across virtualized environments.
Read more
Why apply to jobs via Cutshort
people_solving_puzzle
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
people_verifying_people
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
ai_chip
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
21,01,133
Matches delivered
37,12,187
Network size
15,000
Companies hiring
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos