Posted on: 02/01/2026
Position : Lead Cyber & Information Security (DGM Level)
Report to : Chief Information Officer
Location : Delhi
Role Summary :
The Lead Cyber & Information Security is responsible for defining, executing, and continuously maturing the enterprise cybersecurity and information risk strategy. The role oversees Security Governance (GRC), SOC Operations, Identity & Access Management, Vulnerability Management, Data Privacy, Security Architecture, Cyber Forensics, and Security Tools. This position requires a highly capable, communicative security leader who can influence stakeholders, manage vendors, lead a skilled team, and present complex risks and solutions to senior management in a clear, actionable manner.
Key Responsibilities :
1. Governance, Risk & Compliance (GRC) :
- Strengthen and maintain ISMS aligned with ISO 27001 including policy formation, reviews, controls implementation, and audit readiness.
- Lead and refine security policies, standards, procedures, and compliance processes across all locations.
- Conduct risk assessments, application security reviews, and internal/external audits with detailed reporting to leadership.
- Oversee Data Privacy governance, including classification, retention, encryption, and regulatory adherence.
- Drive enterprise BC/DR planning, testing, and continuous improvement.
2. Cyber Defense & SOC Operations :
- Build and operate a mature SOC covering monitoring, detection, investigation, threat hunting, and incident response.
- Lead IR lifecycle: containment, eradication, recovery, RCA, and reporting.
- Develop detailed IR playbooks and crisis communication processes.
- Drive IAM maturity including MFA, PAM, RBAC controls, and identity lifecycle governance.
- Coordinate red/blue team exercises and threat modeling activities across applications, SAP, cloud, and network.
3. Vulnerability Management & Secure Engineering :
- Establish and govern vulnerability management lifecycle including scanning, prioritization, remediation, and executive reporting.
- Collaborate with Infra, SAP, Digital, and Dev teams to ensure timely patching and secure configurations.
- Introduce secure development practices and automated security testing tools across SDLC.
4. Security Tools Evaluation, Implementation & Optimization :
- Evaluate, recommend, and implement modern security technologies such as SIEM, SOAR, EDR/XDR, DLP, IAM/PAM, CASB, Email/Web Security, VM, Threat Intel Platforms, etc.
- Lead vendor comparisons, PoCs, RFPs, budget planning, and implementation programs.
- Optimize tool configurations for best performance, detection coverage, and incident reduction.
5. Threat Intelligence, Dark Web Monitoring & Forensics :
- Integrate threat intelligence feeds and proactively mitigate risks.
- Conduct dark web monitoring for leaked credentials, insider threats, and brand risks.
- Lead forensic investigations, ensuring proper chain-of-custody, reporting, and coordination with Legal/HR.
6. Security Awareness, Training & Phishing Campaigns :
- Design and execute multi-level security awareness programs across the organization.
- Run periodic phishing simulation campaigns and track behavior improvement metrics.
- Develop role-based training for IT admins, developers, business teams, and leadership.
- Communicate security advisories clearly and professionally.
7. Vendor Coordination, Partner Governance & Budget Management :
- Manage relationships with OEMs, MSSPs, consulting firms, and tool vendors.
- Ensure partners adhere to SLAs, compliance norms, performance KPIs, and contractual obligations.
- Conduct vendor governance reviews, quarterly business reviews (QBRs), and assess vendor risks.
- Drive procurement alignment, negotiation, budgeting, and cost optimization for security services and tools.
8. Leadership, Team Management & Collaboration :
- Lead and mentor a multidisciplinary security team (GRC, SOC, IAM, Tools, Forensics).
- Define team roles, career paths, KPIs, and skill development plans.
- Foster a culture of accountability, collaboration, and continuous improvement.
- Work closely with IT Infra, Digital, SAP, HR, Legal, and Audit teams to embed security into all technology initiatives.
9. Security Architecture, Zero Trust & Cloud Security :
- Develop and implement a Zero Trust security roadmap including identity, segmentation, and continuous verification controls.
- Review cloud architectures (Azure/AWS) and ensure compliance with CIS, CSA, and NIST frameworks.
- Review and approve security architecture for digital, SAP, infrastructure, and third-party solutions.
10. Governance, Reporting & Senior Leadership Communication :
- Prepare and present security dashboards, KPIs, risk heatmaps, threat trends, and audit outcomes to CIO, CEO, and Management.
- Communicate incidents, risks, and recommendations clearly in executive, board-level, and cross-functional meetings.
- Maintain cyber maturity scorecards and track delivery against the annual cybersecurity roadmap.
Competencies :
- Strong communication skills ability to present complex security topics clearly to leadership and non-technical stakeholders.
- Strong vendor management capabilities contract governance, negotiation, performance evaluation, and SLA enforcement.
- Effective team management coaching, goal-setting, performance management, and fostering a high-trust culture.
- Excellent presentation & reporting skills dashboards, executive summaries, risk briefs, business cases.
- Deep knowledge of cybersecurity frameworks (ISO 27001, NIST, MITRE).
- Strong technical understanding of SOC, IAM, Zero Trust, cloud security, threat intelligence, and vulnerability management.
- Strong crisis leadership, decision-making, and prioritization during high-severity incidents.
Qualifications & Experience :
- 12- 18 years of progressive cybersecurity leadership experience.
- Proven experience in building or maturing SOC, GRC, IAM, and SecOps functions.
- Strong experience managing security partners, OEMs, system integrators, and MSSP teams.
- Preferred certifications : CISSP, CISM, CEH, ISO 27001 LA/LI
- Advantage : CCSP, CRISC, GIAC (GCIH, GCFA, GCIA), OSCP.
- Experience presenting to senior leadership, auditors, and regulators is highly desirable.
Key KPIs (Performance Indicators) :
- Reduction in critical vulnerabilities & patch compliance improvements.
- SOC effectiveness metrics (MTTA, MTTR, detection rate, false positive reduction).
- IAM & PAM maturity score improvements.
- Improvement in phishing simulation results.
- Audit compliance scores (ISO 27001, internal audit, cyber maturity assessments).
- On-time and successful implementation of security tools.
- Vendor performance outcomes and SLA adherence.
- Security roadmap milestone achievement.
Did you find something suspicious?
Posted by
Posted in
CyberSecurity
Functional Area
IT Security
Job Code
1596084