Posted By

user_img

Mayank Singh

Consultant at Spring HR

Last Login: 02 September 2020

1211

JOB VIEWS

28

APPLICATIONS

5

RECRUITER ACTIONS

Posted in

IT & Systems

Job Code

618037

Manager - Security Architecture & Solution Lead - Corporate IT Team

12 - 16 Years.Mumbai
Posted 5 years ago
Posted 5 years ago

Mandatory - B.E / B.Tech (Full Time) any Branch

1) Job Purpose

The primary purpose of this profile is to design, implement and standardize the security framework across all domestic and overseas businesses in order to improve the security posture of the group. This includes the following:

- Evaluate, design and implement security solutions across the group to mitigate risks from emerging threat vectors in the areas such as data security, remote access and mobility technologies.

- Transition of security related services during mergers and acquisitions and ensure compliance to Group security framework.

- Assess and improve the Group security and governance framework to achieve maximum compliance to global standards.

In absence of this role, there is high possibility of business disruption due to security breach. Further, this job role ensures standardization of processes, technology and uniform governance, which in turn will minimize the risk across group.

- To design robust security architecture and define technical solutions to address security threats

- To explore new technologies to achieve optimal performance and proactively monitor network for security threats

- To define standards and best practices to get edge in terms of compliance and standardization in security domain.

- To provide and drive technical assistance for new acquisitions and have a seamless merger of new entities with existing security setup adhering to our standards.

- To engage with business to design disaster recovery architecture and help them to define RPO/RTO.

Job Challenges

1. Readiness to cope up with upcoming threat landscape

2. Design cost effective solutions to improve service quality to meet growing demands

3. Adhere compliance to statutory needs and processes demanded by government institutions and stakeholders for information security

4) Principal Accountabilities Accountability Supporting Actions

Detailed JD

To evaluate and design security the existing security framework

1. Study of world class security architectures and designs in the industry

2. Assess and identify opportunities to enhance

3. Build a rational and consensus among all the solutions to enhance the security stakeholders to get a buy-in for the project framework of ABG

4. Implement the required change in architecture and measure the benefits of the deployed technology on a regular basis.

5. Publish the amended security framework for other businesses to ensure compliance

To design security solutions for internal group customers to enable them to meet their business demands in a secure and cost effective manner.

1. Understanding the business requirements and problem statement from the businesses

2. Defining the SOW and Roles and responsibilities for addressing the requirement

3. Designing the solution in conjunction with the businesses and obtaining the sign-off on the same

4. Getting the buy-in from the business for the commercials involved for the proposed solution.

5. Oversee the implementation of the proposed solution and documenting the solution.

To drive and implement group level initiatives in the areas of security to mitigate risks to businesses

1. Create awareness and presentations

2. Develop required documentation related to solution offering such as service level SLAs etc.

3. Develop project plans and project tracker

4. Develop communication plan for updating the progress to businesses

5. Develop procedures, SOPs documents

6. Get acceptance and transition the project to the operations team

Establish governance in the areas of third party access to AVBIH network

1. Design a framework for third party access

2. Evaluate tools or leverage existing tools to track third party access

3. Develop and implement policies and procedures for third party access

4. Generate reports and publish to the business

Identify technologies in different upcoming areas by engaging with different vendors

1. Co-ordinate with vendors for technology products and solutions

2. Perform product performance reviews with suppliers

3. Develop and implement solution improvement plans

4. Work to resolve problem areas within the solution design

Establish governance and Implement group way standards across businesses to mitigate critical risks to group environment

1. Perform risk assessment of IT infrastructure of de-centralized group companies

2. Provide recommendations to mitigate the gaps identified

Didn’t find the job appropriate? Report this Job

Posted By

user_img

Mayank Singh

Consultant at Spring HR

Last Login: 02 September 2020

1211

JOB VIEWS

28

APPLICATIONS

5

RECRUITER ACTIONS

Posted in

IT & Systems

Job Code

618037

UPSKILL YOURSELF

My Learning Centre

Explore CoursesArrow