- Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Information Security Manager Vulnerability Assessment.
Urgent! Information Security Manager - Vulnerability Assessment Job Opening In Gurugram – Now Hiring Marketwick Pvt Ltd
<p><p><b>Job Description : </b><br/><br/>Company : Glan Management Consultancy<br/><br/>Location : Gurgaon<br/><br/>Experience : 7-15 year<br/><br/>Employment Type : <br/><br/><b>Job Description : </b><br/><br/>Job Title : Manager Information Security - IT</p><p><br/>Job Purpose : </p><p><br/></p><p>Acting in a key technical management & execution capacity to provide a conduit between IT teams and key business stakeholders in your functional area of IT Security to ensure information technology needs are managed consistently, following professional IT and global standards, and delivered with a high level of quality and customer satisfaction.</p><p><br/></p><p>Reward level : Middle Management</p><p><br/></p><p>Job Location : Gurgaon<br/><br/></p><p>Experience : 10+ years</p><p><br/>Relevant Experience : 7+ years</p><p><br/>Reporting to : General Manager<br/><br/></p><p>Qualification : Bachelor degree in IT<br/><b><br/></b></p><p><p><b>Key Deliverables : </b></p><p><br/><p>- Provide support as Lead auditor towards ISMS and PIMS policies, procedures, and guidelines and perform regular review and update.<br/>- Perform deep assessment to gather evidence of continuous compliance with ISO 27001 : 2022 and ISO 27701 : 2019, DPDPA, IT Act and Cert In Regulation including audit logs, records of reviews, timely closure of open audit and risks and sharing the report with management.</p></p><br/>- Conduct regular, documented information security and privacy risk assessments identifying assets, threats, vulnerabilities, likelihood, and impact with stakeholders.<br/><br/>- Prioritize identified vulnerabilities, detailed findings, remediation recommendations, trending reports on vulnerability posture towards closure with stakeholders.<br/><br/>- Development and implementation of a comprehensive, ongoing security awareness and training program for all employees.<br/><br/>- Encourage secure behaviours among colleagues and reinforce the importance of information security and privacy in daily operations.<br/><br/>- Prepare regular report on overall information security posture, GRC maturity, and risk landscape to relevant stakeholders<br/><br/>- Ability to collect lessons learned from incidents, audits, and assessments to drive continuous improvement in ISMS/PIMS and security processes.<br/><br/><b>Key Relationships :</b></p><p><b><br/></b></p><p>- Internal IT and business customers.<br/><br/>- Global IT Vendor, market and global (HQ) colleagues, Local vendor partners<br/><br/>- Internal staff - direct reports (where applicable)</p><p><br/>- IT vendors, contractors (where applicable)<br/><br/><b>Knowledge Skills and Abilities : </b><br/><br/>- Must possess and demonstrate ISO 27001 Lead Implementer/Auditor and ISO 27701 Lead Implementer/Auditor certifications and knowledge.<br/><br/>- In depth understanding of IT Act, DPDPA, Cert In regulations, CIS Controls as well as UK DPA and ISO 31000<br/><br/>- Good to have certification on CISM (Certified Information Security Manager), CISSP (Certified Information Systems Security Professional) and Cloud Security certifications (e.g., CCSK, CCSP, vendor-specific like AWS Security Specialty)<br/><br/>- Familiarity with common vulnerability scanning tools like Qualys (features, reporting, agent-based vs.
network scans) and Cloud Security Posture Management (CSPM) tools like Wiz (cloud service provider configurations, misconfigurations, compliance checks in AWS, Azure, GCP).<br/><br/>- Understanding of various penetration testing types (e.g., network, web application, API, mobile, cloud) and methodologies<br/><br/>- Knowledge of common attack vectors and exploitation techniques like MITRE ATTACK and DEFEND framework.<br/><br/>- Basic to intermediate knowledge of common security controls and technologies (e.g., firewalls, EDR, Cloud Security, VAPT tools, SIEM, WAF, DLP, encryption).<br/><br/>- Understanding of network protocols, operating systems (Windows, Linux), and common application architectures.<br/><br/>- Knowledge of audit principles and practices (internal and external audits).<br/><br/>- Understanding of corrective action planning and non-conformity management.<br/><br/>- Understanding of third-party risk management principles and vendor due diligence processes.<br/><br/>- Excellent technical writing skills for creating clear, concise, and comprehensive security policies, standards, and procedures.<br/><br/>- Ability to analyse complex risk data and present actionable insights.<br/><br/>- Hands-on experience with Qualys for configuring scans, analysing reports, and managing vulnerabilities.<br/><br/>- Hands-on experience with Wiz CSPM for monitoring cloud environments, identifying misconfigurations, and generating compliance reports.<br/><br/>- Proficiency with GRC platforms or tools for managing policies, risks, and controls<br/><br/>- Exceptional verbal and written communication skills to articulate complex security concepts to technical and non-technical stakeholders<br/><br/>- Ability to build strong relationships and collaborate effectively with diverse teams (IT, Legal, HR, Development, Business Units).<br/><br/>- Skills in influencing behaviour and driving change across the organization to improve security posture.<br/><br/>- Strong analytical skills to diagnose security issues, identify root causes, and develop effective solutions.<br/><br/>- Ability to critically evaluate security controls and identify gaps.<br/><br/>- Contract review and negotiation skills specifically for security-related services.<br/><br/>- Ability to effectively manage vendor relationships and performance.<br/><br/>- Ability to develop and deliver engaging security training sessions and awareness campaigns.<br/><br/>- Ability to stay updated with the latest security threats, vulnerabilities, technologies, and regulatory changes.<br/><br/>- Capacity to quickly learn and adapt to new tools and methodologies.<br/><br/>- Meticulous attention to detail in policy creation, audit documentation, and vulnerability analysis.<br/><br/>- Ability to act calmly and effectively during security incidents and contribute to incident response efforts.<br/><br/><b>Key Skill : </b><br/><br/>information security manager, IT security, ISO 27001 LA, ISO 27001 LI, ISO 27001 LI/LA, ISO 27701, ISO 31000, internal auditor, DPDPA, CISM, compliance ISO 27001 : 2022<br/><br/><b>Job Type : </b> Full-time</p><br/></p> (ref:hirist.tech)
✨ Smart • Intelligent • Private • Secure
Practice for Any Interview Q&A (AI Enabled)
Predict interview Q&A (AI Supported)
Mock interview trainer (AI Supported)
Ace behavioral interviews (AI Powered)
Record interview questions (Confidential)
Master your interviews
Track your answers (Confidential)
Schedule your applications (Confidential)
Create perfect cover letters (AI Supported)
Analyze your resume (NLP Supported)
ATS compatibility check (AI Supported)
Optimize your applications (AI Supported)
O*NET Supported
O*NET Supported
O*NET Supported
O*NET Supported
O*NET Supported
European Union Recommended
Institution Recommended
Institution Recommended
Researcher Recommended
IT Savvy Recommended
Trades Recommended
O*NET Supported
Artist Recommended
Researchers Recommended
Create your account
Access your account
Create your professional profile
Preview your profile
Your saved opportunities
Reviews you've given
Companies you follow
Discover employers
O*NET Supported
Common questions answered
Help for job seekers
How matching works
Customized job suggestions
Fast application process
Manage alert settings
Understanding alerts
How we match resumes
Professional branding guide
Increase your visibility
Get verified status
Learn about our AI
How ATS ranks you
AI-powered matching
Join thousands of professionals who've advanced their careers with our platform
Unlock Your Information Security Potential: Insight & Career Growth Guide
Real-time Information Security Jobs Trends in Gurugram, India (Graphical Representation)
Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for Information Security in Gurugram, India using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 40252 jobs in India and 493 jobs in Gurugram. This comprehensive analysis highlights market share and opportunities for professionals in Information Security roles. These dynamic trends provide a better understanding of the job market landscape in these regions.
Great news! Marketwick Pvt Ltd is currently hiring and seeking a Information Security Manager Vulnerability Assessment to join their team. Feel free to download the job details.
Wait no longer! Are you also interested in exploring similar jobs? Search now: Information Security Manager Vulnerability Assessment Jobs Gurugram.
An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at Marketwick Pvt Ltd adheres to the cultural norms as outlined by Expertini.
The fundamental ethical values are:The average salary range for a Information Security Manager Vulnerability Assessment Jobs India varies, but the pay scale is rated "Standard" in Gurugram. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.
Key qualifications for Information Security Manager Vulnerability Assessment typically include Computer Occupations and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.
To improve your chances of getting hired for Information Security Manager Vulnerability Assessment, consider enhancing your skills. Check your CV/Résumé Score with our free Resume Scoring Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.
Here are some tips to help you prepare for and ace your job interview:
Before the Interview:To prepare for your Information Security Manager Vulnerability Assessment interview at Marketwick Pvt Ltd, research the company, understand the job requirements, and practice common interview questions.
Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the Marketwick Pvt Ltd's products or services and be prepared to discuss how you can contribute to their success.
By following these tips, you can increase your chances of making a positive impression and landing the job!
Setting up job alerts for Information Security Manager Vulnerability Assessment is easy with India Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!