Cutshort logo
IT services provider based out of the US logo
Information Security- Financial
Information Security- Financial
IT services provider based out of the US's logo

Information Security- Financial

Agency job
3 - 5 yrs
₹12L - ₹16L / yr
Bengaluru (Bangalore)
Skills
IT security
IT security audit
Information security
Security audit
ITGC
GRC
Cyber Security
General Ledger
Fraud
Budget
SSAE
SOC Audits
GDPR
TPRM
Infosec
ISMS
cloud security
balance sheet

Job description- Information Security(Financial)

Roles and Responsibilities

HTC Global Security Delivery Centre will provide a professional opportunity to work in a dynamic environment where you will have the ability to develop process and Cyber security based skills

 

Work profile of individual

  • As part of the companyC Global cyber security consulting team, individual’s primary role would be to be a part of ISO 27k projects IT audits, ITGC audits, SSAE, SOC audits, IT Process Audit, Systems Audit, Gap assessment TPRM, GDPR, Infosec, GRC , ISMS, Cyber Security, SOX ITGC on customer engagements
  • Will address all aspects of security like physical, logical, data, access etc and review Information Security policy and suggest / recommend necessary changes to the same on customer engagements
  • Will be an active participant in internal / third party system security reviews and audits on customer engagements.
  • Will perform internal audits on all aspects of IT and ensure compliance with the prescribed security norms on customer engagements and will be responsible for tracking the open audit findings and closure of the same
  • Will be able to manage document tracking and updating - policies, processes, procedures, templates etc.
  • Will assist in developing proposals by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise.
  • Will demonstrate ability to clearly and concisely communicate the privacy implications of technology and implementation.

 

Team work

  • Individual would be responsible for contributing to a strong team environment and promoting a positive working relationship with their colleagues.
  • Individual would predominately work with off-shore engagement teams and relevant HTC Territory teams on presale and cyber security delivery.
  • Communication, written and verbal, with these teams would be expected.
  • Team members would be required to apply learning from trainings and on the job experience to work requests and support continuous process improvement.
  • Team members would be required to handle multiple tasks at the same time.
  • Detailed focus when performing work and good project management skills when managing workload and maintaining timelines will be necessary.

Desired Candidate Profile

  • Bachelors
  • Certifications (ISO 27001/ ISO 31000/ or equivalent and other relevant qualification/certification
  • Experience : 3-5 years

 

Knowledge Required:

  • Strong knowledge of information security concepts, risk and controls concepts. Strong understanding of security principals: audit, policies, guidelines, and compliance.
  • Understanding of infrastructure (data centre, network end user computing) security / cloud security / managed security services / security operations centre / compliance risk management and ITGC controls
  • Sound knowledge of Internal financial Controls and Compliance. Must be able to recommend controls around people, process, and technology.
  • Sound knowledge of General Leger / Balance Sheet / Journal Entry / Budgeting / Financial fraud
  • Sound knowledge on business controls and process controls. Good experience with control assessment, check the effectiveness of the implemented controls and recommend mitigation / improvements.
  • Experience with the Microsoft Office suite of products (i.e. Word, Excel, PowerPoint, Visio, etc.),
  • Strong verbal and written communication skills Knowledge / experience in fields of ITGC audits, Internal Audit, External Audit / Statutory Audit projects
  • Candidates should exhibit good client service skill collateral's with a strong focus on building relationships.

 

Additional Responsibilities:

 

  • Ability to develop value-creating strategies and models that enable clients to innovate, drive growth and increase their business profitability
  • Good knowledge on software configuration management systems and license Management systems
  • Awareness of latest technologies and Industry trends
  • Logical thinking and problem solving skills along with an ability to collaborate
  • Understanding of the financial processes for various types of projects and the various pricing models available
  • Ability to assess the current processes, identify improvement areas and suggest the technology solutions
  • One or two industry domain knowledge
  • Client Interfacing skills
  • Project and Team management
Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About IT services provider based out of the US

Founded
Type
Size
Stage
About
N/A
Company social profiles
N/A

Similar jobs

Jeeves
Gokul Dhuraisaami
Posted by Gokul Dhuraisaami
Remote only
8 - 11 yrs
Best in industry
skill iconAmazon Web Services (AWS)
WAF
Information security
devsecops
cloud security
  • Solid experience in designing, implementing, and securing cloud environments, including services such as EC2, S3, RDS, IAM, VPC, and CloudTrail.
  • Strong understanding of DevOps methodologies and experience with CI/CD pipelines and tools (e.g., Jenkins, GitHub, SonarQube).
  • In-depth knowledge of cloud security best practices, industry standards, and compliance frameworks (e.g., NIST, CIS, ISO 27001).
  • Proficiency in scripting languages such as Python, Bash, Groovy.
  • Experience with Infrastructure-as-Code (IaC) tools like AWS CloudFormation or Terraform.
  • Familiarity with security scanning and monitoring tools, such as AWS Security Hub, GuardDuty, Inspector, or third-party solutions.
  • Strong understanding of network security concepts, including firewalls, VPNs, and secure network architectures.
  • Knowledge of secure coding practices and experience with application security testing tools (e.g., SAST, DAST, fuzzing, and secure coding patterns).
  • Excellent problem-solving skills and ability to work collaboratively in a team-oriented environment.
  • Participate in incident handling and other related duties to support the information security function.
  • The ability to learn and apply new concepts quickly
  • Strong written and oral communication skills


Read more
Ahmedabad
3 - 10 yrs
₹5L - ₹15L / yr
Network Security
Cyber Security
IT security
Web application security
Torrent Power is an Indian energy and power company, having interests in power generation, transmission, distribution and manufacturing and supply of power cables.

Security (AM/Executive)

• To design the security infrastructure / policies for the organisation, implement & monitor the same
• To ensure security compliance with respect to recommendations received from government agencies like CEA, NCIIPC
• Design, review, implement & monitor IT security related controls as part of Internal
• Controls, IFC, ERM
• ISMS certification (ISO 27001) for IT systems; this will include preparation and periodic review of policies and SOPs, regular trainings and maintaining records in prescribed formats
• Conducting internal security audit and generating reports by deploying VA tools
• Periodic security/VAPT audits and implementation of the findings
• IT security related new initiatives like - Security Operations Centre (SOC), Security Information and Event Management (SIEM), cloud security, EMM-enterprise mobility management
• Creating IT Security awareness within the organisation
Read more
Chennai
10 - 15 yrs
₹15L - ₹30L / yr
Solution architecture
Cyber Security

achelor of Engineering or Technology; or any degree on par;

·  12-15 years of Experience in security and similar areas solution/product development, design, etc

·  Minimum 7-8 years of experience in an Enterprise or Cyber Security practice dedicated role

·  Experience in Enterprise deployment of security with in depth knowledge of security, implementing security solutions and working closely with global customer accounts.

·  Proficient with concepts like SOC, OWASP Top 10 etc

·  Understanding of Enterprise Cyber security models like Mitre ATTACK and roadmap modelling.

·  Excellent analytical and problem-solving skills to drive product development

·  Excellent communicator, whether writing, speaking or presenting

·  Experience gathering and analysing data to create useful metrics that support positive change

Read more
OSBIndia Private Limited
Ashwini Mamidi
Posted by Ashwini Mamidi
Hyderabad
3 - 5 yrs
₹5L - ₹9L / yr
Identity management
Access control
SailPoint
Information security
Cyber Security
+1 more

 

·        Maximum 5 years of Information Technology/Technology Operations/Information Security experience required.

·        Minimum 3 years of experience in Cybersecurity, Identity & Access Management, Role Based Access Control, and Identity Governance is mandatory.

·        Knowledge on User Life Cycle Management, Access provisioning, Access administration is must.

·        Experience with technologies such as Role-Based Active Control (RBAC) and Attribute Based Access Control (ABAC) is required.

·        Experience in User Access Re-certification activities is mandatory.

·        Working knowledge on Active Directory is must.

·        Working experience on any IAM tool (SailPoint/Okta/OneIdentity/Varonis/MIM) would be added advantage.

·        Knowledge on Identity and Access Management role/processes/tools is must.

·        Prior experience in processing IAM requests (Add/Modify/Delete) is must.

·        Experienced in Incident management & Change Management processes.

·        Knowledge of and the ability to adhere to SAS and SOX audit requirements pertaining to Identity & Access Management job requirements.

·        Experience with work-flow management tools such as ServiceNow.

·        Leveraging creative thinking and problem solving skills, individual initiative, and utilizing MS Office (Word, Excel, Access, and PowerPoint).

·        Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback.

·        Identifying and addressing business needs: building relationships with Stake Holders; developing an awareness of Firm services; communicating with the business/stake holders in an organized and knowledgeable manner; delivering clear requests for information; demonstrating flexibility in prioritizing and completing tasks; and communicating potential conflicts to a supervisor

·        Experience performing user administration tasks for various in-house and third-party applications.

·        Analyzing, prioritizing, and resolving faults to resolution. Resolve tickets according to SLAs and escalation procedures.

·        Strong analytical, problem solving and organizational skills. Be proactive, dynamic, and flexible.

·        Good Communication skills, able to articulate well with business and stakeholders.

 

·        Education Qualification : Any graduate/post graduate with Computer Science background.

 

 

Read more
CLOUDSUFI
at CLOUDSUFI
1 recruiter
Arashpreet Kaur
Posted by Arashpreet Kaur
Remote only
3 - 10 yrs
₹15L - ₹45L / yr
skill iconAmazon Web Services (AWS)
WAF
cloudtrail
Cyber Security
Cloud Security
+1 more

Role : Full-Time Individual Contributor (IC)

Reporting to : Solution Architect / Program Manager

Education : BTech/ BE / MCA / MSc Computer Science

Industry : Product Engineering Services or Enterprise Software Companies

About Us

CLOUDSUFI is a Silicon Valley-based specialist Data Engineering & Cloud Technologies player with top-tier clients, favorable revenue mix, strong financial performance, and robust management. We pride ourselves in helping in the Data Discovery, Insights and Monetization for organizations. We offer quality of work, opportunities to learn new platforms/technologies that will help young engineers put themselves ahead in their careers compared to their peers in the IT Services industry. CLOUDSUFI is a Data Science and Product Engineering company building Products/Solutions for Technology and Enterprise industries leveraging the advent of Cloud Hyper Scalers and AI/ML, NLP technologies. The organization is built to scale with strong external/ internal tech capabilities and governance standards. Started in 2019, CLOUDUSUFI is a family of 250 members working towards a common goal of making the enterprise data dance. To know more, please visit https://cloudsufi.com



ABOUT THE ROLE

InfoSec Engineers will participate in all phases of a typical DevOps pipeline: plan, code, build, test, release, and deploy. He/she will be scanning our networks, applications, and containers (images). In addition to the Vulnerability Management platform, this individual will support and/or serve as a backup for AWS WAF, Guard Duty, PagerDuty, and CloudFlair security platforms.

This Includes: ● Work independently with vendors and collaborate with colleagues ● -Experience on monitoring and operation of AWS cloud infrastructure ● -Experience with AWS automation tools Terraform ● -Analyzing, Troubleshooting and resolving issues with the cloud monitoring tools as Datadog and Cloudflare ● -The ability and skill to train other people in procedural and technical topics ● -Strong communication and collaboration skills


ABOUT YOU ● 3+ years’ experience with Tenable.io platform ● 3+ years’ experience with AWS orchestration via Terraform script ● 3+ years’ experience with CloudWatch/CloudTrail/Guard Duty ● 3+ years’ experience with AWS WAF ● 3+ years’ experience with CloudFlare ● 2+ years’ experience with DataDog ● Experience with PagerDuty ● Ability to make nuanced threat assessments ● Experience with the NIST family of Information Security-related publications including 800-37, 800-30, and 800-53 ● Significant experience with PCI, SOC2, SOX, HIPAA, or other compliance regimes Salary: Best as per Industry Standards

Read more
Statestreet HCL Services
at Statestreet HCL Services
5 recruiters
Mansi Lakhanpal
Posted by Mansi Lakhanpal
Delhi, Gurugram, Noida, Ghaziabad, Faridabad
10 - 15 yrs
₹1L - ₹19L / yr
GRC
NIST
ISO 9000
Risk Management
Security audit
+5 more

Dear Candidate,

Greetings from HCL Technologies Ltd.

 

  • Make sense of Cyber security and compliance frameworks that apply to your business or industry
    • Identify business risks, taking into account the role of your hosting service provider
    • Determine which Cyber security controls are required to mitigate your identified risks
    • Improve collaboration and communication during Cyber security Incident mitigation and response.
    • Establish the necessary framework based on NIST Framework to maintain and continually improve your information security program over time based on evolving scope and emerging risks
    • Document and track efforts for evidence collection and audit preparation

 

  • will have primary responsibility for coordinating and implementing effective Cyber Security management across the account. This role will ensure that all Supplier obligations are met regarding compliance with Security guidelines, data protection, regulations, Supplier policies, and key controls.
  • provide implementation and ongoing operation of Security management framework;
  • be responsible for coordinating activities to address the key Security risk exposures;
  • ensure Security awareness training of, and assistance in the implementation of robust Security management practices across Security operations;
  • direct the design of controls to address emerging or new Security risk and compliance requirements;
  • carry out regular and frequent assurance reviews of the design and operating effectiveness of Security controls;
  • implement, monitor and report on key Security risk indicators to identify and address emerging risks;
  • coordinate with other Service Providers and Security functions, to facilitate client’s audits and inspections;
  • manage and report on responses and actions to address Security audit points, inspection deficiencies, or control weakness identified during normal operations.
  • review outcome of cyber security risk assessment, timely implement open action items and report progress to stakeholders
  • incorporate vulnerability testing as an integral part of change management
  • Should have good knowledge of Cyber Security Framework and controls
  • CISA ,CISM or CISSP certification should be preferred.
  • Have good understanding of Security policy and process along with ITSM process.
Read more
technoforte software pvt. ltd.
Hema Chandwani
Posted by Hema Chandwani
Bengaluru (Bangalore)
5 - 8 yrs
₹9L - ₹15L / yr
Shell Scripting
Cyber Security
Endpoint protection
Web application security
Information security
+1 more

Desired Skills

To have skills:

·       Proven technical expertise in cyber security domains, i.e. endpoint security, application security testing.

·       Knowledge and experience in public cloud solutions.

·       Knowledge on network security, networking concepts and architectural implementations.

·       Knowledge on vulnerability testing and define proper remediation’s.
Experience with application, database, and infrastructure security.

·       Shell scripting experience - Shell/Bash/Python.

·       Working experience of Linux operation.

 

Desire to have skills:

·       One or more of the following cyber security certifications: CEH, CISSP, OSCP, SSCP  CCSP.

·       Excellent problem solving, and follow-up skills.

·       Ability to convey technical security concepts to non-technical audiences.

Read more
netmedscom
at netmedscom
3 recruiters
Vijay Hemnath
Posted by Vijay Hemnath
Chennai
5 - 10 yrs
₹10L - ₹30L / yr
Information security
IT security
WAF
skill iconDocker
Ethical Hacking
+16 more

We are seeking a Security Program Manager to effectively drive Privacy & Security Programs in collaboration with cross functional teams. You will partner with engineering leadership, product management and development teams to deliver more secure products.

 

Roles & Responsibilities:

  • Work with multiple stakeholders across various departments such as IT, Engineering, Business, Legal, Finance etc to implement controls defined in policies and processes.
  • Manage projects with security and audit requirements with internal and external teams and serve as a liaison among all stakeholders.
  • Managing penetration tests and security reviews for core applications and APIs.
  • Identify, create and guide on privacy and security requirements considering applicable Data Protection Laws and implement them across software modules developed at Netmeds.
  • Brainstorm with engineering teams to figure out how privacy and security controls can be applied to Netmeds tech stack.
  • Coordination with Infra Teams and Dev Teams on DB and application hardening, standardization of server images / containerization.
  • Assess vendors' security posture before onboarding them and after they qualify, review their security posture at a set frequency.
  • Manage auditors and ensure compliance for ISO 27001 and other data privacy audits.
  • Answer questions or resolve issues reported by the external security researchers & bug bounty hunters.
  • Investigate privacy breaches.
  • Educate employees on data privacy & security.
  • Prioritize security requirements based on their severity of impact and product roadmap.
  • Maintain a balance of security and business values across the organisation.

 Required Skills:

  • Web Application Security, Mobile Application Security, Web Application Firewall, DAST, SAST, Cloud Security (AWS), Docker Security, Manual Penetration Testing.
  • Good hands-on experience in handling tools such as vulnerability scanners, Burp suite, patch management, web filtering & WAF.
  • Familiar with cloud hosting technologies (ex. AWS, Azure). Understanding of IAM, RBAC, NACLs, and KMS.
  • Experience in Log Management, Security Event Correlation, SIEM.
  • Must have strong interpersonal skills and should be able to communicate complex ideas seamlessly in written and verbal communication.

 

Good to Have Skills:

  • Online Fraud Prevention.
  • Bug Bounty experience.
  • Security Operations Center (SOC) management.
  • Experience with Amazon AWS services (EC2, S3, VPC, RDS, Cloud watch).
  • Experience / Knowledge on tools like Fortify and Nessus.
  • Experience in handling logging tools on docker container images (ex. Fluentd).
Read more
Dental Insurance
Remote only
6 - 9 yrs
$0.1K - $0.1K / yr
Cyber Security
Cloud Security
IT security
devsecops
HIPAA
+3 more
  • Max rate $85/hr
  • MUST HAVE- Application security covering micro services security and Restful API from technical and business process and architecture. 

  • MUST HAVE -Application security, penetration testing, red team tool (optional), development background, Should have done Application vulnerability Assessments.

  • GOOD TO HAVE - Infrastructure experience in Azure Cloud OR Microsoft 365 product implementations will be handy , network Architecture n design mostly in Azure space

  • GOOD TO HAVE - Enterprise platform – office 365 is plus and such implementation. 

  • Experience as a Azure DevSecOps engineer is desired 

  • Ability to communicate effectively with senior management as well as highly technical engineers to articulate security positions effectively. 

Read more
Infinity Labs India
at Infinity Labs India
1 recruiter
Piyush Agarwal
Posted by Piyush Agarwal
Noida, NCR (Delhi | Gurgaon | Noida)
2 - 10 yrs
₹9L - ₹20L / yr
Cyber Security
skill iconPython
Demsito
Playbooks
  • Must have good exposure working in SOAR (Security, Orchestration, Automation, Response)
  • Strong knowledge in End user/ point security.
  • Good hands on Cyber security like SIEM, IAM, PAM.
  • Sound Knowledge into automated incident management using Demisto (or similar technology)
  • Hands on creating playbooks in Python Scripting.
Read more
Why apply to jobs via Cutshort
people_solving_puzzle
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
people_verifying_people
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
ai_chip
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
21,01,133
Matches delivered
37,12,187
Network size
15,000
Companies hiring
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos