Talent.com
VP, Information Security & Risk Management

VP, Information Security & Risk Management

Jubilant Pharmova LimitedNoida, Republic Of India, IN
7 days ago
Job description

JOB DESCRIPTION

1, PURPOSE OF THE JOB :

The purpose of the Head of Information Security role is to safeguard Jubilant Bhartia Group’s digital assets, operations, and reputation by establishing and leading a comprehensive cybersecurity strategy. The role ensures that information security is embedded into business processes, technology adoption, and regulatory compliance while enabling the Group’s digital transformation and innovation objectives. By driving governance, risk management, cyber defense, data protection, and security awareness, the Head of Information Security provides resilience against evolving threats, builds stakeholder trust, and empowers the organization to operate securely and competitively in global markets.

Job Context :

The Jubilant Bhartia Group operates across diverse industries including pharmaceuticals, life sciences, food services, and manufacturing, with a significant global footprint. In this highly digitized and regulated environment, protecting intellectual property, customer trust, critical infrastructure, and sensitive data is central to business resilience and growth.

The Head of Information Security plays a pivotal role in shaping and executing the Group’s cybersecurity vision. This role provides leadership in safeguarding IT and OT ecosystems, driving compliance with global regulations, and ensuring alignment of security programs with business strategy. With increasing cyber threats, regulatory expectations, and digital transformation initiatives, the position requires balancing robust security with business agility.

The role involves :

  • Developing a Group-wide cybersecurity strategy and governance framework.
  • Protecting enterprise systems, data, and operations from evolving threats.
  • Leading cyber defence, risk management, privacy, and compliance initiatives.
  • Driving awareness and culture change across diverse business units.
  • Acting as the primary interface with regulators, auditors, partners, and executive leadership on security matters.

Key Challenges :

The Head of Information Security faces the challenge of balancing strong cybersecurity with the Group’s growth and digital transformation goals, ensuring that controls do not hinder business agility. Securing both IT and OT environments is complex, especially as manufacturing plants, industrial systems, and supply chain ecosystems converge with enterprise IT. The role must navigate diverse global regulatory requirements such as the DPDP Act, GDPR & HIPAA, while also managing risks posed by third parties and extended vendor networks. Evolving threats like ransomware, advanced persistent attacks, and insider risks demand proactive defenses, intelligence-led operations, and rapid incident response. At the same time, building a security-first culture across varied business units and geographies, while developing and retaining skilled cybersecurity talent in a competitive market, remains a constant priority.

2, DETAILS OF THE JOB :

Designation & Job : Sr. Director - Information Security

Work Location : Noida

Reporting Manager : Group CDIO

Direct Reportees : 2

Team Size : 5

3, KEY ACCOUNTABILITIES :

Cyber Defense

  • Cloud Security - Secure workloads, applications, and data across public, private, and hybrid cloud platforms.
  • Endpoint Security - Protect laptops, desktops, mobiles, and OT devices from malware, ransomware, and unauthorized access.
  • Identity Security - Safeguard digital identities, enforce access controls, and manage privileged accounts.
  • Email / O365 Security - Defend corporate email and collaboration tools from phishing, spoofing, and business email compromise.
  • Threat Detection & Response- Monitor systems continuously, detect anomalies, and respond swiftly to security incidents.
  • Threat Intelligence & Hunting- Leverage internal and external intelligence to proactively identify and mitigate emerging threats.
  • Application Security- Embed security into the software development lifecycle and protect applications against vulnerabilities.
  • Vulnerability Management - Continuously identify, assess, and remediate vulnerabilities across IT, OT, and cloud environments.
  • Cybersecurity Strategy, Architecture & Program

  • Strategy - Define the long-term cybersecurity vision and align it with business and digital transformation goals.
  • Strategic Initiatives - Drive group-wide programs such as Zero Trust, cloud security, and OT / ICS security modernization.
  • Architecture - Establish and govern enterprise security architecture standards across IT, OT, cloud, and applications.
  • Data Security & Privacy

  • Web Security - Protect enterprise web applications and gateways against exploits, malware, and unauthorized access.
  • Engineering Incident / Request Resolution - Provide timely resolution of security-related incidents and requests raised by business or IT teams.
  • Policy Effectiveness- Ensure security policies are practical, up to date, and effectively enforced across the organization.
  • DLP Incident Response & Resolution - Monitor, investigate, and resolve data loss prevention alerts to prevent sensitive data exfiltration.
  • Data Classification - Protect sensitive business and customer data through classification, encryption, and retention controls.
  • Privacy Compliance - Ensure compliance with global privacy regulations (GDPR, DPDP Act, HIPAA, etc.).
  • Data Privacy - Implement consent management, anonymization, and data minimization practices and Conduct regular Privacy Impact Assessments (PIAs) for new initiatives.
  • Risk and Compliance

  • Governance - Establish cybersecurity governance structures, policies, and oversight aligned with business objectives.
  • Risk Management - Identify, assess, and prioritize cyber risks, integrating them with enterprise risk management frameworks.
  • Third-Party Risk Management - Evaluate and monitor security posture of vendors, partners, and supply chain entities handling sensitive data.
  • Compliance - Ensure adherence to regulatory, legal, and industry-specific security standards across geographies.
  • Audit Closure - Track, remediate, and close internal and external audit findings within agreed timelines.
  • Mitigation Task Completion - Ensure timely closure of identified risks, vulnerabilities, and incident-driven corrective actions.
  • Awareness & Training

  • Security Training & Awareness Campaigns - Develop structured programs and campaigns to build a security-first mindset across the organization.
  • Employee Engagement- Encourage active participation through gamification, contests, and recognition for secure behaviors.
  • Phishing & Social Engineering Readiness - Conduct simulations and drills to assess and improve employee resilience against phishing and manipulation.
  • Live Sessions - Deliver interactive workshops and townhalls with experts to address real-world threats and Q&A.
  • Skill Enhancement – Security Team

  • Certifications - Encourage and support attainment of industry-recognized certifications (e.G., CISSP, CISM, OSCP, CCSP, cloud security).
  • Trainings - Provide continuous learning opportunities through internal / external training programs, workshops, and knowledge-sharing sessions.
  • Tools and Technology Training - Ensure hands-on expertise in deployed security tools, platforms, and emerging technologies to strengthen operational effectiveness.
  • 4, KEY INTERFACES

  • Regulators (FDA, CERT-In)
  • Industry bodies (DSCI, ISACA, NASSCOM)
  • External auditors and assessors
  • Security vendors, MSSPs, and technology partners
  • Group CDIO and IT Business Partners
  • CEOs and Business Heads
  • IT Infrastructure & IT Applications Support
  • Risk Management, Legal & Compliance
  • Internal Audit & Finance
  • BU Leadership, Manufacturing / OT Heads
  • HR (for awareness and training)
  • 5, EDUCATION & EXPERIENCE

    Education Qualification :

    BE / B-Tech / M-Tech / MBA or MCA from a reputed university.

    Desired Certifications :

    CISSP, CISM, CISA, GIAC, CRISC, CEH, ISO 27001 LI / LA

    Experience Range : 15-20 years

    Desirable experience :

  • 15–20 years in IT / OT Security, with at least 7 years in leadership roles
  • Exposure to large, diversified conglomerates with global operation
  • Proven track record in building security strategy and incident response at scale
  • Experience of working in Pharma Industry is desirable
  • 6, SKILLS REQUIRED :

    Cybersecurity Frameworks & Standards

    Risk Management

    Cloud Security

  • Expertise in AWS & Azure security controls;
  • CSPM, CIEM, encryption,and shared responsibility models.

    Identity & Access Management (IAM)

    Network & Infrastructure Security

    Endpoint & Mobile Security

    Application Security

    Threat Detection & Response

    Data Security & Privacy

    Vulnerability Management

    Third-Party Security

    Governance, Risk, and Compliance (GRC)

    OT / ICS Security

    Forensics & Incident Handling

    Cryptography

    Emerging Technologies

    Behavioural Skills

  • Executive presence with ability to influence Board & CXO
  • Strategic mindset with business acumen
  • Strong decision-making under crisis
  • Collaborative and cross-functional leadership
  • High integrity and trustworthiness
  • Ability to inspire, mentor, and develop high-performing teams
  • Create a job alert for this search

    Information Security • Noida, Republic Of India, IN

    Related jobs
    • Promoted
    Information Security Consultant

    Information Security Consultant

    Soffit Infrastructure Services (P) LtdDelhi, India
    The Information Security Consultant will be responsible for the implementation, assessment, and management of ISO 27001 : 2022, ISO 27002, and SOC 2 standards for clients. This role involves working i...Show moreLast updated: 30+ days ago
    • Promoted
    Director Information Technology Infrastructure

    Director Information Technology Infrastructure

    Cheers InteractiveDelhi, India
    About the role : We are seeking an experienced and innovative Director-IT Infra to lead our IT Infrastructure and IT Security teams. The ideal candidate will drive the management and strategic oversi...Show moreLast updated: 26 days ago
    • Promoted
    Director of Application Security

    Director of Application Security

    HCLSoftwareDelhi, India
    HCLSW seeks a Director, Head of Product & Application Security.The successful candidate will lead the end to end Product Security portfolio within HCL Software. Maintains and strengthens the risk po...Show moreLast updated: 28 days ago
    • Promoted
    Chief Information Security Officer

    Chief Information Security Officer

    XL AdvisorsDelhi, India
    We are seeking an experienced Chief Information Security Officer (CISO) to lead and enhance the organization’s cybersecurity framework. The ideal candidate will have 15+ years of experience in IT Se...Show moreLast updated: 26 days ago
    • Promoted
    Manager- Information Security, Vulnerability and Risk Management)

    Manager- Information Security, Vulnerability and Risk Management)

    Infosys BPMDelhi, India
    Role : Manager Information Security (Release Management) Experience-8+Yrs Location-Hyderabad Mandatory Skills-.Cyber security & Security engineer, Release & Change Management, Vulnerability Manageme...Show moreLast updated: 28 days ago
    • Promoted
    Senior Manager - Information Security and System Audit

    Senior Manager - Information Security and System Audit

    sliceDelhi, India
    The individual will be responsible for executing IT security audits, ensuring adherence to ISMS and ITGC controls, and identifying potential security risks. The role involves conducting security ass...Show moreLast updated: 20 days ago
    • Promoted
    Head of Information Security

    Head of Information Security

    Pay10 IndiaDelhi, India, India
    Develop and implement the enterprise-wide information security strategy, policies, and frameworks.Provide thought leadership on emerging cyber risks, threats, and technologies.Establish an enterpri...Show moreLast updated: 26 days ago
    • Promoted
    Head of Information Security

    Head of Information Security

    HotelTrader LodgIQ (India) Pvt. Ltd.Ghaziabad, IN
    Hotel Trader is a 100% automated & cloud-based distribution management company providing the tools necessary for hotels to seamlessly connect to global demand with the click of a button.We fully em...Show moreLast updated: 30+ days ago
    • Promoted
    Senior Director Cyber Security

    Senior Director Cyber Security

    The Edge Partnership - The Edge in AsiaDelhi, India
    Our client is a leading global investment and advisory firm known for its deep expertise in private equity, real estate, and alternative asset management. The ideal professional will be responsible ...Show moreLast updated: 30+ days ago
    • Promoted
    Chief Information Security Officer

    Chief Information Security Officer

    Adani CementDelhi, India
    Cement manufacturing involves complex industrial processes and supply chains that rely heavily on digital systems.This role is vital in protecting the operational technology (OT) environments, ERP ...Show moreLast updated: 6 days ago
    • Promoted
    Information Security Manager

    Information Security Manager

    Ajanta Pharma LtdDelhi, India
    Senior Manager – Information Security.The Senior Manager – Information Security will spearhead the development and execution of a comprehensive information security strategy that supports the organ...Show moreLast updated: 6 days ago
    • Promoted
    Senior Manager Information Security

    Senior Manager Information Security

    Ocwen Financial Solutions Pvt. Ltd. - APACDelhi, India
    The Incumbent would be responsible to manage the information security governance, risk, and compliance process.Standardize GRC policies, evaluate their impacts, and implement the relevant measure.L...Show moreLast updated: 6 days ago
    • Promoted
    Information Security Manager

    Information Security Manager

    Northern Arc CapitalDelhi, India
    Review and update of the information asset register in accordance with RBI, SEBI, IRDAI, UIDAI, IT Outsourcing, Data Localization and ISO 27001 : 2013 requirements Responsible for managing, tracking,...Show moreLast updated: 6 days ago
    • Promoted
    Chief Information Security Officer

    Chief Information Security Officer

    Adani Defence and AerospaceDelhi, India
    In the Defense & Aerospace vertical, cybersecurity is not just a technical requirement—it’s a national security imperative. This role is central to protecting sensitive systems, classified data, and...Show moreLast updated: 6 days ago
    • Promoted
    Head of Information Security

    Head of Information Security

    PixisDelhi, India
    Pixis is a global AI technology company transforming how brands plan, create, and optimize marketing.Our flagship marketing operating system, Prism, sits at the core of the Pixis platform, using AI...Show moreLast updated: 30+ days ago
    • Promoted
    Enterprise Risk-SVP

    Enterprise Risk-SVP

    ConfidentialDelhi, India
    The role works proactively in identifying internal and external risks, building robust internal controls, risk.Laws and Regulations to help build out the proper controls. Also a guardian of the digi...Show moreLast updated: 6 days ago
    • Promoted
    Chief Information Security Officer (CISO)

    Chief Information Security Officer (CISO)

    Jubilant Pharmova LimitedNoida, Uttar Pradesh, India
    The purpose of the Head of Information Security role is to safeguard Jubilant Bhartia Group’s digital assets, operations, and reputation by establishing and leading a comprehensive cybersecurity st...Show moreLast updated: 6 days ago
    • Promoted
    Senior Information Security Operations Analyst

    Senior Information Security Operations Analyst

    Cognex CorporationNoida, Uttar Pradesh, India
    Job Description The Role : As a Senior Information Security Operations Analyst, you will lead the strategic development, implementation, and adoption of the overall Information Security Program.Yo...Show moreLast updated: 6 days ago