Jobs
Interviews

2 Vendor Security Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 12.0 years

40 Lacs

Chennai, Tamil Nadu, India

Remote

Roles & Responsibilities Hands-on design, development, and deployment experience with the ServiceNow platform Experience implementing and managing ServiceNow GRC (Governance, Risk, and Compliance) and IRM (Integrated Risk Management) in an enterprise production environment Strong implementation experience including solution configuration and customization for all components of the ServiceNow GRC product and Audit Management Solid knowledge of ServiceNow ITSM modules , including: Incident , Problem , Change , CMDB , Asset , and Service Catalog Ability to assess vendor security using Compliance and Risk applications Proficient in leveraging ServiceNow GRC tools to track, monitor, report, and remediate findings Strong scripting skills, proficient in JavaScript and ServiceNow JavaScript APIs Experience working with Agile teams , methodologies, and tools in a virtual/remote environment Ability to create and manage: Business Rules , Client Scripts , Script Includes , UI Policies , ACLs , Data Policies , UI Scripts Capable of troubleshooting basic configuration/script issues Proven ability to manage multiple complex tasks simultaneously Able to work both independently and collaboratively with customers and delivery teams on implementations and remote services Regularly attends and actively participates in project meetings , including: Requirements review , validation sessions , and SCRUM ceremonies Excellent communication, presentation, and writing skills Passion for advising and guiding customers to maximize product value and stay updated with latest ServiceNow features Certifications & Qualifications ITIL Foundation certification ServiceNow Certified IRM Developer ServiceNow Certified System Administrator

Posted 5 days ago

Apply

8.0 - 13.0 years

20 - 27 Lacs

Gurugram

Work from Office

Role & responsibilities Perform Security and Privacy review of existing and new business process and solution implementations. Review product architectures for IT control security design gaps and vulnerabilities and consult with product teams and cyber security to remediate or mitigate cyber risk. Identify IT application end to end security deficiencies and implement approved remedial actions. Perform Privacy Impact Assessments for new processes involving personal data. Support adoption of comprehensive application security processes, procedures, and guidelines. Undertake required tactical application security skills and awareness training as required. Implement systems and integrations to drive greater automation and remove areas of human error. Collaborate with internal and external auditors during IT audits. Regularly assess the effectiveness of IT application controls using defined metrics and indicators. Prepare regular reports on outcomes and recommend enhancements to bolster IT governance. Proactively monitor IT security controls (data validation, authorization, encryption, audit logging, etc.) for key applications (on-premises and cloud-based) to identify weaknesses and potential vulnerabilities. Analyze security alerts and application security control deficiencies, recommending and implementing corrective actions. Regularly assess the effectiveness of IT security controls using defined metrics and indicators to identify areas for improvement. Collaborate with internal and external auditors during IT audits, providing technical expertise and insights. Ensure IT security controls operate efficiently and effectively, aligned with information security policies, standards, and compliance requirements. Identify and address gaps in security control design to mitigate cyber risks. Support the adoption of comprehensive application security processes and procedures, ensuring adherence to security best practices. Collaborate with cross-functional teams (product, development, security) to ensure a secure and seamless customer experience across platforms. Prepare regular reports on security control effectiveness and recommend enhancements to strengthen IT governance. Communicate effectively with technical and non-technical audiences regarding security controls and findings. Minimum Requirements Bachelors degree required. 10+ years of Cybersecurity and Privacy experience, with a heavy background managing cybersecurity and privacy functions. Knowledge of information security and privacy management frameworks (example: ISO 27001/NIST CSF). Knowledge of Global and India Data protection laws and regulations. (example: GDPR, India DPDPA, SG PDPA etc.) Ability to communicate clearly and effectively with both technology/development and business partners. Strong relationship, team building and facilitation skills. Ability to translate technical/security issues to business users. Proven analytical and problem-solving abilities. Ability to independently influence others to achieve objectives. High level of personal integrity, and the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity. Preferred skills and experiences: Bachelors degree in computer science, information systems or equivalent. Security certifications to include: CISSP, CISM, CRISC, CISA and other technical certifications. Privacy Certifications to include: CIPM, CIPT, CIPP and other product specific certifications. MBA or Master's degree in a management, scientific, technical, or engineering field. Significant work experience with different regions/business units on risk management and leading information security initiatives.

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies