Cutshort logo
Paramount Computer Systems logo
Technology Risk Consultant
Technology Risk Consultant
Paramount Computer Systems's logo

Technology Risk Consultant

Mustafa Alam's profile picture
Posted by Mustafa Alam
4 - 13 yrs
₹2L - ₹17L / yr (ESOP available)
Mumbai
Skills
Technology Audit
Risk assessment
Computer Networking
Network Security
Firewall administration

Policies, Systems, Processes & Procedures


  •  Review and ensure the India information security policies are aligned with group policies and practices.
  •  Review and provide recommendations to India policies, standards, guidelines/ processes concerning RBI (Reserve Bank of India) regulatory requirements
  •  Coordinate with business units to define SLA for India
  • Formulate the security strategy and roadmap for India


Information Security


  •  Identify and ensure compliance to unique security requirements for RBI (Reserve Bank of India) related to RBI cyber security framework and RBI Guidelines on Information security.
  •  Establish contacts with RBI (Reserve Bank of India) regulators to receive security updates, circulars
  •  Coordinate for the group for various regulatory security audits at the Singapore location.
  •  Monitor and track all India open issues with IT and concerned international SPOCS
  •  Assist the GSO office and BU in attaining information security compliance objectives.
  •  Identify issues that could impact the bank and escalate any serious issues/ breaches/ violations; develop/monitor action plans for its closure in liaison with local, and overseas branches, and business groups.
  •  With the support of the Head office GSO team, perform risk assessments for locally implemented IT solutions and track open issues to closure
  •  Instigate and maintain contact with RBI Regulatory Authorities, Regulatory compliance department, and ensure good & healthy working relationships.
  •  Review new regulatory legislations; promptly communicate all regulatory notices/circulars to all concerned areas, provide interpretations if necessary; develop/monitor action plans towards its implementation.
  •  Assist Head office during Regulatory Examinations; ensure implementation/regularization of observations linked to compliance while meeting the deadline(s).
  • Respond to queries that are sought by local Regulatory Authorities / Law Enforcement Agencies Head Office & Overseas branches, in a timely manner with complete and accurate information.


Job Context


  •  Security Compliance requirements at the India location.
  •  Highlight security status & concerns to management.
  •  Consult with IT and information security staff to ensure that an implementation plan is established.
  •  Actively participate and contribute to GSO initiatives
  •  Track open Audit issues on information security to closure
  •  Risk assessments for local implementations
  • Inform HO of any new 3rd party technology vendor for vendor assessment



Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About Paramount Computer Systems

Founded :
1983
Type
Size :
100-1000
Stage :
Profitable
About
Paramount, the regional leader in Cyber Security in Dubai, enables customers to protect their critical Information Assets and Infrastructure through a prudent combination of People, Process and Technology.
Read more
Company social profiles
bloglinkedintwitterfacebook

Similar jobs

Swiggy
at Swiggy
1 video
13 recruiters
Suresh Kaushik
Posted by Suresh Kaushik
Bengaluru (Bangalore)
3 - 12 yrs
₹25L - ₹60L / yr
Network Security
Penetration testing
skill iconProgramming
Security architecture
Computer Security
+2 more
Job Description Roles and Responsibilities: • Exploit security flaws and vulnerabilities with attack simulations on multiple application platforms like Android, iOS and Web. • Ability to flow from black box to grey box to white box tests. • Ability to effectively work with the engineering teams to provide technical risk. assessment of technologies in networks, applications, code reviews in the release management cycle. • Ability to perform vulnerability assessments and penetration testing, utilizing tools - commercial and open source. • Perform, review and analyze security vulnerability data to identify applicability and false-positives. • Conduct penetration testing in line with Open Web Application Security Project (OWASP) • Write technical reports that include suggested resolution for identified problem areas and perform operational risk assessment. Required Skills and Abilities: • OWASP top 10 • Security Pen Testing methodologies including automated scans and manual methods • Tools including Burp, Nexpose, NMap, Whois etc. is a plus • Good Hands-On with Linux Debian Flavors and security hardening of the same • Understanding of Web Servers and HTTP 1.0/1.1 Protocol • Troubleshooting web servers like Apache, Nginx and other reverse proxy platforms • Basic understanding of NodeJS, Python and JAVA • TCP/IP networking including IP classes, subnets, NAT • SSL Handshake and Certificates - Understanding • DNS, and DHCP, Network troubleshooting • Remote access methods • Backup and disaster recovery methodologies • Network analysis tools • Good Hands-on using Linux Debian Flavors • Experience with security issues in Cloud Technologies (AWS) is a plus • Ability to grasp new technology concepts quickly • Good documentation skills • Ability to work in a team environment and interact with people • Knowledge and understanding of basic information security principles • Should be aware of the latest Major Application Zero-day vulnerabilities • Should be able to understand security alerts and take necessary actions accordingly Education and Experience: • Bachelor’s degree in information technology related field
Read more
Why apply to jobs via Cutshort
people_solving_puzzle
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
people_verifying_people
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
ai_chip
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
21,01,133
Matches delivered
37,12,187
Network size
15,000
Companies hiring
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos