Location : Bangalore
Employment Type : Full-Time
Experience Required : 10+ Years
Position Overview :
We are seeking an experienced Information Security Lead to oversee our Managed Security Services operations, with a focus on SOC leadership, risk & compliance, vulnerability management, and incident response. The role demands both strategic vision and operational expertise to strengthen the organizations cybersecurity posture, ensure regulatory compliance, and safeguard against evolving Responsibilities :
Vulnerability & Risk Management :
- Direct vulnerability scanning, prioritization, and remediation efforts.
- Ensure proactive identification and mitigation of threats across IT and OT environments.
Incident Response & Threat Management :
Lead investigation, containment, and recovery for major security incidents.Perform Root Cause Analysis (RCA) and implement preventive measures.Oversee vulnerability assessments, patch management, and remediation tracking.Maintain and regularly test Incident Response and Business Continuity plans.Risk, Compliance & Governance :
Lead enterprise-wide Risk & Compliance initiatives in alignment with NIST, GDPR, HIPAA, PCI-DSS and other industry frameworks.Conduct security gap assessments, internal audits, and compliance evaluations.Define and enforce security policies, standards, and procedures.SOC Operations Leadership :
Manage 24 / 7 SOC operations across L1, L2, and L3 analysts.Oversee threat detection, analysis, incident escalation, and response.Optimize SOC processes, playbooks, and automation using SIEM / SOAR platforms.Collaborate with threat intelligence teams for contextual incident enrichment.Reporting & Stakeholder Communication :
Deliver executive-level dashboards, reports, and security metrics.Present SOC performance, incident trends, and threat landscape insights to leadership.Manage relationships with technology partners and MSSP Skills & Experience :10+ years in Information Security with 5+ years in SOC leadership or security operations management.Hands-on expertise with SIEM / SOAR platforms such as Splunk, ArcSight (OpenText), Cortex XSIAM, IBM QRadar, Microsoft Sentinel.Proficiency in threat hunting, malware analysis, endpoint protection (EDR / XDR), WAF, DLP, Nessus, and Burp Suite.Strong knowledge of security architecture, intrusion detection / prevention, and advanced persistent threat (APT) response.In-depth understanding of regulatory compliance and audit Certifications :CEH, OSCP, or equivalent SOC technology certifications (IBM, OpenText, Palo Alto).Certified SOC Analyst or equivalent SOC-focused credentials.ITIL certification (advantageous for service delivery alignment).(ref : hirist.tech)