Enable job alerts via email!

Tata Group Hiring For Manager Audit IT Cyber Security at Jamshedpur

Tata Group

Jamshedpur

On-site

INR 6,00,000 - 12,00,000

Full time

30+ days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

Join a leading industry player as a Cyber Security Auditor, where you'll ensure the integrity and security of critical systems. This role involves assessing and enhancing the organization's cybersecurity posture, auditing cloud infrastructures, and safeguarding valuable information assets. You will work closely with senior management, providing insights and recommendations to strengthen security measures. If you have a passion for technology and a commitment to excellence, this position offers a unique opportunity to make a significant impact in a dynamic environment. Embrace the challenge and contribute to a safer digital landscape.

Qualifications

  • 3-4 years of experience in Cyber Security, Network, Cloud, and Application Security.
  • Familiarity with NIST/ISO 27001/CIS frameworks is a plus.

Responsibilities

  • Provide assurance on control adequacy and effectiveness in Cyber Security.
  • Execute audits and advisory projects per the approved audit plan.

Skills

Cyber Security
Cloud Infrastructure
Network Security
Data Privacy & Protection
Operational Technology
Risk Management
Vulnerability Assessment
Penetration Testing
IT Controls & Governance
Threat Assessment

Education

BE, B-Tech, BSc (Engineering)
ME/MTech, MBA/PGDM, MCA, MSc (Maths, Statistics or Physics)

Tools

Cybersecurity Tools
OSINT Tools
Cloud Platforms (IBM, Google, AWS, AZURE)

Job description

Job Description

a. Providing assurance to the Audit Committee (AC) of Board of Directors (BOD), the CEO & MD and the Senior Management, on control adequacy and effectiveness on Cyber Security / Cloud Infrastructure / Network/ Data Privacy & Protection / Operational Technology / IT Controls & Governance / Risk Management for uninterrupted business operations.

b. Executing audits, advisory, and other special projects in accordance with the approved audit plan. Auditor shall undertake reviews of the organization’s cybersecurity, cloud infrastructure, OT, processes and controls to protect its intellectual property, using industry standards as a guide, and provide recommendations for improvements.

Skills

  1. Reviewing and documenting the existing TSL IT security architecture to determine security posture w.r.t regulatory & contractual requirements & industry best practices.
  2. Identification and categorization of information assets based on confidentiality, integrity and availability (CIA).
  3. Identifying associated threats, vulnerabilities and the risk impacts with each of the information assets.
  4. Safeguarding the information assets such as – Software, Hardware, Network etc.
  5. Reviewing IT Systems controls, Mail Messaging System and Financial Accounting Software, Review management and Change Management control etc.
  6. Reviewing security controls at Cloud based Data Centre (DC) and DR centre(DRC).
  7. Auditing controls for Operating System and Database Security, and other controls related to backup, DR/ BCP plans, patch management and version control, license control, virus control processes etc.
  8. Application Security Audit including Vulnerability Assessment and Penetration Testing, Network Security Testing, Application Security Testing, OT Security Testing etc.
  9. Network resilience and recovery mechanism, control on social media access and data exchange through the same, control on data and information storage and access in cloud etc.
  10. Performing configuration audit for all the devices at DC and DRC as per best practices.
  11. Create security policy and guidelines document for user access management, password policy, data exchange with agencies and vulnerabilities mitigation.
  12. Testing for security audit cover cross-site scripting (XSS), cross-site reference forgery, SQL injection flaws, input validation flaws, malicious file execution, insecure direct object references, information leakage and improper error handling, broken authentication and session management, insecure communications, failure to restrict URL access, and denial of services etc.
  13. Planning & adaptation of Quality Management System (QMS) to changing conditions and maintenance of quality records. Assist Group Head in initiating necessary corrective and preventive action for maintaining the QMS of the division.
  14. Conducting audit of assigned activities for IT enabled systems as per the approved Annual Audit Plan, including any special audit/ project assigned by the respective Group Head.

Other details

Mandatory: BE, B-Tech, BSc (Engineering), ME/MTech, MBA/PGDM, MCA, MSc (Maths, Statistics or Physics).

Preferred: Exposure to information security and various standards in the form of project experience of one semester or completion of two related courses as a part of the curriculum.

Preferred: CISA / CEH / CISSP.

Desirable: Understanding of NIST / ISO 27001 / CIS framework.

Relevant experience:

Mandatory: 3 – 4 years in the area of Cyber Security (Network, Cloud, Application Security, OT), threat assessment, use of various cybersecurity / OSINT tools, cyber simulation.

Preferred: Experience with Cloud Environment (IBM, Google, AWS, AZURE), Operational Technology, Data Security, O365, Infrastructure & Application Security, Ethical Hacking, Vulnerability Management.

Preferred: Cyber audit experience.

Threshold Skill:

  1. Strong knowledge and experience in domains covering – Vulnerability assessment and penetration testing (VAPT), Risk management, Business continuity, Access and authorization, Web application security, Threat detection (SOC, NOC), Ethical Hacking, Social Engineering, Phishing simulation (email, CH, attachment).
  2. Exposure on performing vulnerability assessment and penetration testing (black box) including red teaming.
  3. Information systems industry and best practices in network, application and hardware platform security.
  4. Audit and assessment methodologies, procedures and best practices that relate to information networks, systems, and applications.

Risk Management, security program policies, processes, standards, requirements and procedures and various supporting security technologies.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.