Try another search here
Not your type of job? Try your own search. Ok, got it

Want to receive similar jobs about "Senior Information Security India Manager" by email?

Create an email notification

FiltersFilter search results

  • City
    • (112)
    • (71)
    • (45)
    • (44)
    • (43)
    • View more »
    • (37)
    • (31)
    • (28)
    • (27)
    • (25)
    • (25)
    • (25)
    • (25)
    • (24)
    • (24)
    • (23)
    • (21)
    • (20)
    • (19)
    • (19)
    • (19)
    • (17)
    • (16)
    • (15)
    • (14)
  • State
    • (311)
    • (221)
    • (170)
    • (136)
    • (113)
    • View more »
    • (37)
    • (27)
    • (18)
    • (16)
    • (9)
    • (7)
    • (4)
    • (2)
    • (1)
    • (1)
    • (1)
  • Category
    • (268)
    • (183)
    • (106)
    • (95)
    • (91)
    • View more »
    • (69)
    • (61)
    • (58)
    • (33)
    • (31)
    • (29)
    • (28)
    • (27)
    • (26)
    • (23)
    • (22)
    • (18)
    • (15)
    • (11)
    • (11)
    • (9)
    • (8)
    • (7)
    • (6)
    • (5)
    • (4)
    • (3)
    • (2)
    • (2)
    • (2)
    • (1)
    • (1)
    • (1)
    • (1)
  • Minimum Level of Studies
    • (1074)
    • (1071)
    • (84)
    • (82)
    • (82)
    • View more »
    • (82)
    • (82)
    • (82)
    • (82)
    • (82)
    • (82)
    • (82)
    • (82)
    • (82)
    • (82)
    • (82)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
    • (11)
  • Working Shift
    • (1072)
    • (1)
    • (1)
  • Posting period
    • (409)
    • (448)
    • (667)
    • (806)
    • (1060)

1074 jobs found for Senior Information Security India Manager

Sort by:
  • Effectively Maintain and Build relationships across Business groups Lead in a dispersed organization Develop Security Metrics Monitor and report Security metric results to senior Management Develop and Manage Security Communication Plan

  • recommendations/fixes • Analyze/Replicate reported vulnerabilities and develop proof of concept, if needed • Manage escalations, and help prepare for security breaches and outages • Monitor and research cyber threats having an impact on business/customers • Prioritize security risks of networks, systems, applications

  • will ensure information assets are adequately protected by identifying, managing and mitigating the risks presented by internal/external Security Threats. The Post- holder will be the process owner of all ongoing activities related to the confidentiality, integrity, security and availability of information

  • standards like ISO 27001:2013. Security certifications like CEH, ECSA, CISSP, CISA, CISM, etc. Any one of these certifications is mandatory. Strong conceptual understanding of Information Security, Desktop Computing, Patch Management, Vulnerability Management, Microsoft Applications, Database design. Key

  • Provide technology vision and leadership in the development and implementation of Digital ecosystem Roadmap in distributed environment. Responsible for IT collaboration, IT strategy, change management and enterprise information systems Implementation. To chart the IT initiatives towards Strong expertise in designing/developing IT systems along with excellent infrastructure knowledge. Solid ...

  • is mandatory. Experience with Security Event and Information Management, Data Management, Data Loss Prevention, Vulnerability tools Strong conceptual understanding of Information Security, Desktop Computing, Patch Management, Vulnerability Management, Microsoft Applications, Database design. Experience

  • is mandatory. Experience with Security Event and Information Management, Data Management, Data Loss Prevention, Vulnerability tools Strong conceptual understanding of Information Security, Desktop Computing, Patch Management, Vulnerability Management, Microsoft Applications, Database design. Experience

  • is mandatory. Experience with Security Event and Information Management, Data Management, Data Loss Prevention, Vulnerability tools Strong conceptual understanding of Information Security, Desktop Computing, Patch Management, Vulnerability Management, Microsoft Applications, Database design. Experience

  • is mandatory. Experience with Security Event and Information Management, Data Management, Data Loss Prevention, Vulnerability tools Strong conceptual understanding of Information Security, Desktop Computing, Patch Management, Vulnerability Management, Microsoft Applications, Database design. Experience

  • is mandatory. Experience with Security Event and Information Management, Data Management, Data Loss Prevention, Vulnerability tools Strong conceptual understanding of Information Security, Desktop Computing, Patch Management, Vulnerability Management, Microsoft Applications, Database design. Experience

  • is mandatory. Experience with Security Event and Information Management, Data Management, Data Loss Prevention, Vulnerability tools Strong conceptual understanding of Information Security, Desktop Computing, Patch Management, Vulnerability Management, Microsoft Applications, Database design. Experience

  • and the current threat environment Understanding of common attacks (e.g. brute force, SYN flood, session hijack, smurf etc.) and their SIEM signatures Experience in security monitoring, Incident Response (IR), security tools configuration and security remediation Must have excellent troubleshooting

  • and the current threat environment Understanding of common attacks (e.g. brute force, SYN flood, session hijack, smurf etc.) and their SIEM signatures Experience in security monitoring, Incident Response (IR), security tools configuration and security remediation Must have excellent troubleshooting

  • and the current threat environment Understanding of common attacks (e.g. brute force, SYN flood, session hijack, smurf etc.) and their SIEM signatures Experience in security monitoring, Incident Response (IR), security tools configuration and security remediation Must have excellent troubleshooting

  • and the current threat environment Understanding of common attacks (e.g. brute force, SYN flood, session hijack, smurf etc.) and their SIEM signatures Experience in security monitoring, Incident Response (IR), security tools configuration and security remediation Must have excellent troubleshooting

  • and the current threat environment Understanding of common attacks (e.g. brute force, SYN flood, session hijack, smurf etc.) and their SIEM signatures Experience in security monitoring, Incident Response (IR), security tools configuration and security remediation Must have excellent troubleshooting

  • and the current threat environment Understanding of common attacks (e.g. brute force, SYN flood, session hijack, smurf etc.) and their SIEM signatures Experience in security monitoring, Incident Response (IR), security tools configuration and security remediation Must have excellent troubleshooting

  • and the current threat environment Understanding of common attacks (e.g. brute force, SYN flood, session hijack, smurf etc.) and their SIEM signatures Experience in security monitoring, Incident Response (IR), security tools configuration and security remediation Must have excellent troubleshooting

Want to receive similar jobs about "Senior Information Security India Manager" by email?

Create an email notification
Go to Top