Submitting more applications increases your chances of landing a job.
Here’s how busy the average job seeker was last month:
Opportunities viewed
Applications submitted
Keep exploring and applying to maximize your chances!
Looking for employers with a proven track record of hiring women?
Click here to explore opportunities now!You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for
Would You Be Likely to Participate?
If selected, we will contact you via email with further instructions and details about your participation.
You will receive a $7 payout for answering the survey.
* Architecting and designing multi-layered cybersecurity solutions.
* Technology evaluation, selection and sizing of security infrastructure.
* Discussions with OEMs and partners.
* Drive Information Security Risk Assessment and Risk Treatment in alignment with organizational policies.
* Plan, coordinate, and manage Vulnerability Assessment & Penetration Testing (VAPT) exercises.
* Facilitate and support ISO 27001 / 27002 certification and compliance activities.
* Oversee and manage application security testing across the SDLC.
* Provide regular status reporting to internal management and clients.
* Act as a key point of contact for clients and internal stakeholders on security initiatives.
* Ensure adherence to security standards, policies, and best practices across projects.
* Support continuous improvement in security posture and threat mitigation efforts.
* Strong business acumen, strategy and cross-industry thought leadership
* Awareness of Information Security risk assessment and treatment methodologies.
* Awareness of latest technologies and Industry trends
* Logical thinking and problem solving skills along with an ability to collaborate
* Understanding of the financial processes for various types of projects and the various pricing models available
* Client Interfacing skills
* Project and Team management
* In-depth knowledge of security technologies such as Security Information and Event Management (SIEM), Security Orchestration Automation and Response (SOAR), Firewall (FW), Network Intrusion Prevention System (NIPS), Web Application Firewall (WAF), Database Activity Monitoring (DAM), Secure Web Gateway (SWG), Data Leakage Prevention (DLP), Endpoint Security (EDR), Email Security.
* Experience in client facing role in security lead capacity.
* Excellent communication skills.
* Certifications: CISSP / CISM / CISA / ISO 27001 / CEH / OSCP or similar.
We are seeking an experienced Information Security and Application Security professional to manage end-to-end security operations, ISMS activities, and application security testing. The role involves leading SOC operations, coordinating VAPT exercises, ensuring compliance with ISO standards, and providing regular status updates to internal and client stakeholders.
You'll no longer be considered for this role and your application will be removed from the employer's inbox.