HamburgerMenu
hirist

Job Description

Position : Lead Cyber & Information Security (DGM Level)


Report to : Chief Information Officer


Location : Delhi


Role Summary :


The Lead Cyber & Information Security is responsible for defining, executing, and continuously maturing the enterprise cybersecurity and information risk strategy. The role oversees Security Governance (GRC), SOC Operations, Identity & Access Management, Vulnerability Management, Data Privacy, Security Architecture, Cyber Forensics, and Security Tools. This position requires a highly capable, communicative security leader who can influence stakeholders, manage vendors, lead a skilled team, and present complex risks and solutions to senior management in a clear, actionable manner.


Key Responsibilities :


1. Governance, Risk & Compliance (GRC) :


- Strengthen and maintain ISMS aligned with ISO 27001 including policy formation, reviews, controls implementation, and audit readiness.


- Lead and refine security policies, standards, procedures, and compliance processes across all locations.


- Conduct risk assessments, application security reviews, and internal/external audits with detailed reporting to leadership.


- Oversee Data Privacy governance, including classification, retention, encryption, and regulatory adherence.


- Drive enterprise BC/DR planning, testing, and continuous improvement.


2. Cyber Defense & SOC Operations :


- Build and operate a mature SOC covering monitoring, detection, investigation, threat hunting, and incident response.


- Lead IR lifecycle: containment, eradication, recovery, RCA, and reporting.


- Develop detailed IR playbooks and crisis communication processes.


- Drive IAM maturity including MFA, PAM, RBAC controls, and identity lifecycle governance.


- Coordinate red/blue team exercises and threat modeling activities across applications, SAP, cloud, and network.


3. Vulnerability Management & Secure Engineering :


- Establish and govern vulnerability management lifecycle including scanning, prioritization, remediation, and executive reporting.


- Collaborate with Infra, SAP, Digital, and Dev teams to ensure timely patching and secure configurations.


- Introduce secure development practices and automated security testing tools across SDLC.


4. Security Tools Evaluation, Implementation & Optimization :


- Evaluate, recommend, and implement modern security technologies such as SIEM, SOAR, EDR/XDR, DLP, IAM/PAM, CASB, Email/Web Security, VM, Threat Intel Platforms, etc.


- Lead vendor comparisons, PoCs, RFPs, budget planning, and implementation programs.


- Optimize tool configurations for best performance, detection coverage, and incident reduction.


5. Threat Intelligence, Dark Web Monitoring & Forensics :


- Integrate threat intelligence feeds and proactively mitigate risks.


- Conduct dark web monitoring for leaked credentials, insider threats, and brand risks.


- Lead forensic investigations, ensuring proper chain-of-custody, reporting, and coordination with Legal/HR.


6. Security Awareness, Training & Phishing Campaigns :


- Design and execute multi-level security awareness programs across the organization.


- Run periodic phishing simulation campaigns and track behavior improvement metrics.


- Develop role-based training for IT admins, developers, business teams, and leadership.


- Communicate security advisories clearly and professionally.


7. Vendor Coordination, Partner Governance & Budget Management :


- Manage relationships with OEMs, MSSPs, consulting firms, and tool vendors.


- Ensure partners adhere to SLAs, compliance norms, performance KPIs, and contractual obligations.


- Conduct vendor governance reviews, quarterly business reviews (QBRs), and assess vendor risks.


- Drive procurement alignment, negotiation, budgeting, and cost optimization for security services and tools.


8. Leadership, Team Management & Collaboration :


- Lead and mentor a multidisciplinary security team (GRC, SOC, IAM, Tools, Forensics).


- Define team roles, career paths, KPIs, and skill development plans.


- Foster a culture of accountability, collaboration, and continuous improvement.


- Work closely with IT Infra, Digital, SAP, HR, Legal, and Audit teams to embed security into all technology initiatives.


9. Security Architecture, Zero Trust & Cloud Security :


- Develop and implement a Zero Trust security roadmap including identity, segmentation, and continuous verification controls.


- Review cloud architectures (Azure/AWS) and ensure compliance with CIS, CSA, and NIST frameworks.


- Review and approve security architecture for digital, SAP, infrastructure, and third-party solutions.


10. Governance, Reporting & Senior Leadership Communication :


- Prepare and present security dashboards, KPIs, risk heatmaps, threat trends, and audit outcomes to CIO, CEO, and Management.


- Communicate incidents, risks, and recommendations clearly in executive, board-level, and cross-functional meetings.


- Maintain cyber maturity scorecards and track delivery against the annual cybersecurity roadmap.


Competencies :


- Strong communication skills ability to present complex security topics clearly to leadership and non-technical stakeholders.


- Strong vendor management capabilities contract governance, negotiation, performance evaluation, and SLA enforcement.


- Effective team management coaching, goal-setting, performance management, and fostering a high-trust culture.


- Excellent presentation & reporting skills dashboards, executive summaries, risk briefs, business cases.


- Deep knowledge of cybersecurity frameworks (ISO 27001, NIST, MITRE).


- Strong technical understanding of SOC, IAM, Zero Trust, cloud security, threat intelligence, and vulnerability management.


- Strong crisis leadership, decision-making, and prioritization during high-severity incidents.


Qualifications & Experience :


- 12- 18 years of progressive cybersecurity leadership experience.


- Proven experience in building or maturing SOC, GRC, IAM, and SecOps functions.


- Strong experience managing security partners, OEMs, system integrators, and MSSP teams.


- Preferred certifications : CISSP, CISM, CEH, ISO 27001 LA/LI


- Advantage : CCSP, CRISC, GIAC (GCIH, GCFA, GCIA), OSCP.


- Experience presenting to senior leadership, auditors, and regulators is highly desirable.


Key KPIs (Performance Indicators) :


- Reduction in critical vulnerabilities & patch compliance improvements.


- SOC effectiveness metrics (MTTA, MTTR, detection rate, false positive reduction).


- IAM & PAM maturity score improvements.


- Improvement in phishing simulation results.


- Audit compliance scores (ISO 27001, internal audit, cyber maturity assessments).


- On-time and successful implementation of security tools.


- Vendor performance outcomes and SLA adherence.


- Security roadmap milestone achievement.


info-icon

Did you find something suspicious?

Similar jobs that you might be interested in