Exp : 12 to 15 years
Joining date: Can be flexible
Designation: “Technical Manager – Information Security”
Responsibilities
Lead and manage the successful delivery of multiple concurrent network security projects in a dynamic, fast-paced environment.
Mentor and guide a multidisciplinary team of network engineers and security professionals; conduct regular performance reviews and team development planning.
Maintain end-to-end ownership and accountability for technical deliverables, ensuring alignment with client requirements and internal standards.
Collaborate with internal teams including architects, engineers, and support staff to ensure seamless service delivery.
Serve as the primary technical contact for clients, managing expectations, resolving issues, and ensuring overall satisfaction.
Prioritize and resolve technical issues and client requests in a timely manner.
Track and report on individual and team performance metrics to drive continuous improvement.
Ensure projects and services align with industry compliance standards such as GDPR, HIPAA, SOC 2, etc.
Leverage consulting experience to offer strategic guidance to clients on network security posture and architecture.
Work closely with sales and business development teams to identify client needs and define appropriate security solutions.
Provide technical leadership during client presentations, solution demonstrations, and proposal reviews.
Develop and review proposals, scopes of work, and contractual deliverables to ensure technical accuracy and alignment with client requirements.
Required Skills
Strong Hands-on Knowledge on the following Skills
Routing, Switching and Firewall Technologies
SDN, SDWAN, SASE, Data Center Networking and Network performance tuning and Monitoring tools
Information Security Expertise: Strong understanding of core information security principles
Experience performing risk assessments, managing risk treatment plans, and ensuring adherence to compliance standards such as ISO 27001, NIST, GDPR, HIPAA, PCI DSS, and SOX.
Incident Response and Security Monitoring : Proficiency in developing, implementing, and executing incident response procedures. Hands-on experience with SIEM tools such as Splunk, IBM QRadar, or ArcSight to monitor, detect, and respond to threats.
Vulnerability Management: Ability to conduct vulnerability assessments using tools like Nessus, Qualys, or OpenVAS, and coordinate remediation efforts across teams.
Identity and Access Management: Knowledge of RBAC, least privilege, MFA, SSO, and PAM solutions such as CyberArk, BeyondTrust, or Azure AD.
Data Protection and Privacy : Familiarity with data encryption standards (e.g., AES, RSA), data classification frameworks, and Data Loss Prevention (DLP) tools.
Security Policies & Governance: Experience drafting, reviewing, and enforcing security policies, standards, and procedures. Ability to align policies with business and regulatory requirements.
Certifications : CISSP / CISM / CCSP / ISO/IEC 27001 Lead Implementer / Lead Auditor