NB : "We are recruiting for a scheduled commercial bank"
Job Title : Chief Manager (Compliance / IS Assessment)
Experience : Minimum 10-12 years in BFSI
Employment Type : Full-Time
Location : Thrissur
Key Responsibilities :
- Develop, recommend, and implement policies, standards, procedures, and controls to ensure the confidentiality, integrity, and availability of information technology systems across onpremises and cloud environments.
- Identify, track, and manage audit gaps by collaborating with internal teams to remediate or close findings, negotiate remediation timelines, and monitor / report progress.
- Interpret audit results, provide risk-based recommendations to management, and oversee the implementation of corrective measures.
- Develop and refine information security policies, checklists, guidelines, and procedures aligned with industry best practices and tailored to the organization's security needs.
- Identify and document security issues, analyse potential risks, propose remediation strategies, and ensure alignment with business and regulatory requirements.
- Basic Qualifications :
- BTech / MCA in Computer Science, Information Systems, Accounting, or a related field;
equivalent professionalexperience may be considered.
Extensive experience in managing IT audits, assessments, remediation processes, and regulatory compliance programs.Strong knowledge of industry security frameworks, including SSAE 18 (SOC 1 & SOC 2), HIPAA, HITRUST, CSA, CCM, ISO 27001, NIST, and other compliance standards. Preferred Qualifications :Industry-recognized certifications such as CISA, CISSP, CISM, CPA, ISO 27001 LA or equivalent.Familiarity with data privacy laws, cloud security standards, and regulatory compliance requirements.Experience with IT security technologies, including network security, application security, database security, access management, and cloud security.Strong consulting skills, including client service orientation, conflict resolution, and project management.Comprehensive understanding of cloud technologies and security controls