Posted on: 07/12/2025
Overview of Role :
The DGM - Technology will lead the technology infrastructure, software development, operations, and information security function, ensuring robust, secure, and scalable systems that support business objectives. This role requires a strategic leader with strong hands-on technical expertise in software development and infrastructure management who can troubleshoot complex issues, guide technical and development teams, manage critical infrastructure, and oversee the organization's information security posture to protect against cyber threats and ensure regulatory compliance.
Principal Responsibilities and Accountabilities :
- Technical Leadership & Troubleshooting :
- Provide expert-level troubleshooting for infrastructure, applications, and software development.
- Guide teams in incident resolution and preventive measures implementation.
- Establish best practices for system architecture, SDLC, performance, and security.
- Lead root cause analysis and corrective actions for major incidents.
- Drive innovation and emerging technology adoption aligned with business goals.
- Review code quality, architecture, and manage technical debt.
- Software Development Management:
- Oversee complete SDLC from planning through deployment.
- Ensure technical feasibility, timeline adherence, and quality delivery.
- Define and enforce coding standards, design patterns, and best practices.
- Conduct code reviews and guide architectural decisions.
- Manage full-stack development initiatives (front-end and backend).
- Ensure database integrity, replication, backups, and maintenance.
Operations Management :
- Oversee server infrastructure planning, deployment, and maintenance.
- Design, implement, and test DR and Business Continuity plans.
- Coordinate backup strategies, failover procedures, and RTO/RPO compliance.
- Manage cloud and hybrid infrastructure environments.
- Implement ITIL practices (Change, Incident, Problem, and Capacity Management).
- Information Security Management:
- Ensure information security policies, procedures, and strategies are being followed.
- Monitor operations, infrastructure, and applications for threats and vulnerabilities.
- Manage security tools including firewalls, IDS/IPS, SIEM, and endpoint protection.
- Conduct regular security risk and vulnerability assessments.
- Oversee penetration testing and vulnerability remediation.
- Implement IAM controls with role-based access management.
- Ensure data protection through encryption, access controls, and DLP measures.
- Guide secure coding practices and application security testing.
Compliance & Governance :
- Ensure compliance with ISO 9001, ISO 27001, GDPR, and industry-specific regulations.
- Monitor policy compliance across the organization.
- Facilitate security audits and certification readiness.
- Collaborate with legal and compliance teams on regulatory requirements.
- Maintain documentation of security controls and compliance evidence.
- Security Incident Response:
- Establish and maintain incident response plans for breaches and cyber threats.
- Lead security incident response coordination across teams.
- Conduct post-incident reviews and implement corrective actions.
- Manage and remediate security threats and network issues.
Team Management & Development :
- Lead, mentor, and develop high-performing technology and security teams.
- Conduct performance reviews and provide constructive feedback.
- Foster continuous learning, technical excellence, and security awareness.
- Build team capabilities through training and knowledge sharing.
- Coordinate organization-wide security awareness programs.
Strategic Planning :
- Develop technology and security roadmaps aligned with business objectives.
- Evaluate and recommend new technologies, frameworks, and platforms.
- Manage infrastructure capacity planning and scalability.
- Drive automation and operational efficiency improvements.
- Lead security projects including network upgrades and encryption initiatives.
- Align development efforts with organizational goals.
Vendor & Stakeholder Management :
- Manage relationships with technology vendors and security service providers.
- Evaluate and monitor third-party vendor security practices.
- Ensure vendor contracts include appropriate security clauses.
- Negotiate contracts and SLAs for optimal value delivery.
- Collaborate with cross-functional teams (Product, QA, Project, Business, Management).
Risk Management :
- Conduct risk assessments to identify threats to information assets.
- Implement risk mitigation strategies and controls.
- Monitor and report security metrics and KPIs.
- Maintain risk register and track remediation activities.
- Collaborate across departments to reduce cybersecurity risk.
Competencies :
- Fluency in English.
- Excellent written and verbal communication skills.
- Excellent teamwork skills.
- Excellent attention to detail, quality and control.
- Proven ability to influence cross-functional teams without formal authority.
Did you find something suspicious?
Posted by
Posted in
DevOps / SRE
Functional Area
IT Infrastructure Services
Job Code
1586240
Interview Questions for you
View All