Prepare for Your Yaari Digital Integrated Services Interview with Real Experiences!
View interviews4 Yaari Digital Integrated Services Jobs
10-12 years
Dhani - Chief Information Security Officer (10-12 yrs)
Yaari Digital Integrated Services
posted 3+ weeks ago
Flexible timing
Key skills for the job
Job Title : Chief Information Security Officer (CISO) - Stocks
Reports to : Group CISO
Location : Gurugram
Job Summary :
We are seeking a highly experienced and technically proficient Chief Information Security Officer (CISO) to spearhead our information security strategy specifically for the stocks business unit. This critical leadership role demands a deep understanding of the brokerage and securities industry, coupled with extensive technical expertise in cybersecurity, SEBI compliance, and risk management. The CISO will be responsible for architecting, implementing, and maintaining a robust security posture that safeguards our systems, data, and client assets, ensuring confidentiality, integrity, and availability in alignment with business objectives and regulatory mandates.
Key Responsibilities :
- Architect and maintain a comprehensive technical security strategy aligned with business objectives, regulatory requirements (SEBI), and industry best practices (e.g., NIST CSF, ISO 27001).
- Define and oversee the implementation of security architectures, policies, standards, and procedures across all technology domains relevant to the stocks business.
- Translate business requirements and risk assessments into actionable technical security controls and implementation plans.
- Continuously evaluate and adapt the security strategy to address evolving threats, technologies, and regulatory changes.
- Lead the technical implementation and adherence to SEBI regulations, specifically focusing on :
- Disaster Recovery (DR) : Design, implement, and regularly test technical DR plans and infrastructure to ensure business continuity in the event of disruptions. This includes failover mechanisms, data replication strategies, and recovery time objectives (RTOs).
- Business Continuity Planning (BCP) : Contribute to the development and execution of technical aspects of the BCP, ensuring the resilience and availability of critical systems and data during unforeseen events.
- LAMA (Large Account Management and Activation) : Implement and maintain technical controls and monitoring mechanisms to ensure the security and integrity of large client accounts and their activation processes.
- Work closely with compliance teams to interpret regulatory requirements and translate them into technical security controls.
- Lead technical risk assessments and vulnerability management programs, identifying, analyzing, and prioritizing security vulnerabilities across infrastructure, applications, and data.
- Develop and implement technical risk mitigation strategies and controls, including security hardening, patching, and configuration management.
- Establish and maintain technical security metrics and reporting mechanisms to track the effectiveness of security controls and identify areas for improvement.
- Oversee threat intelligence gathering and analysis to proactively identify and address potential security threats.
Oversee Secure Technology and Infrastructure :
- Provide technical leadership in the design, implementation, and maintenance of secure technology infrastructure, including :
- Network Security : Architect and manage network security controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, and network segmentation strategies.
- System Security : Implement and enforce security hardening standards for servers, operating systems, and endpoint devices.
- Application Security : Oversee the implementation of secure coding practices, vulnerability scanning, and penetration testing for all internally developed and third-party applications.
- Cloud Security : Define and implement security controls for cloud-based services and infrastructure, ensuring compliance and data protection.
- Data Security : Implement data loss prevention (DLP) strategies, encryption technologies (at rest and in transit), and access control mechanisms to protect sensitive data.
- Identity and Access Management (IAM) : Design and implement robust IAM systems, including multi-factor authentication (MFA), role-based access control (RBAC), and privileged access management (PAM).
Lead Technical Incident Response and Management :
- Develop and maintain a comprehensive technical incident response plan, including procedures for incident detection, analysis, containment, eradication, recovery, and post-incident analysis.
- Lead and coordinate technical teams during security incidents, ensuring timely and effective response and remediation.
- Establish and maintain incident reporting and escalation processes.
- Conduct regular incident response drills and simulations to test the effectiveness of the plan and team readiness.
Drive Technical Security Awareness and Training :
- Collaborate with HR and other relevant teams to develop and implement technical aspects of the security awareness and training program for employees.
- Ensure that training content addresses relevant technical security topics, such as phishing awareness, password security, secure coding practices, and data handling procedures.
- Utilize technical tools and platforms for delivering and tracking security awareness training.
Manage Technical Vendor Security :
- Lead the technical security assessment and due diligence process for third-party vendors, ensuring they meet our information security requirements.
- Define and enforce technical security requirements in vendor contracts and service level agreements (SLAs).
- Oversee the technical monitoring of vendor security posture and performance.
- Conduct regular security audits and assessments of critical vendors.
Ensure Technical Audit and Compliance :
- Lead and support technical security audits (internal and external), providing necessary documentation and evidence of compliance.
- Oversee the implementation of technical recommendations arising from audit findings.
- Ensure that technical security practices and procedures are aligned with relevant regulatory requirements and industry standards.
- Manage and maintain technical compliance documentation.
Requirements :
- Education : Master's degree in Computer Science, Information Technology, Cybersecurity, or a closely related technical field.
- Experience : Minimum 10 years of progressive experience in information security, with at least 5 years in a leadership role managing technical security teams and initiatives.
- Brokerage Background : Deep understanding of the technology landscape and security challenges within the brokerage and securities industry, with hands-on experience in implementing and maintaining security controls in compliance with SEBI regulations.
Technical Skills :
- Deep technical expertise in a wide range of information security technologies, including but not limited to :
- Next-Generation Firewalls (NGFW)
- Intrusion Detection/Prevention Systems (IDS/IPS)
- Security Information and Event Management (SIEM) systems
- Endpoint Detection and Response (EDR) solutions
- Vulnerability scanning and penetration testing tools
- Data Loss Prevention (DLP) solutions
- Encryption technologies (at rest and in transit)
- Identity and Access Management (IAM) systems
- Cloud security platforms and services (e.g., AWS, Azure, GCP)
- Strong understanding of network protocols, security architectures, and secure network design principles.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and security analysis.
- Experience with threat intelligence platforms and methodologies.
- Solid understanding of operating systems security (Windows, Linux).
- Knowledge of application security best practices (OWASP).
Certifications : Relevant professional security certifications such as :
- Certified Information Security Manager (CISM)
- Certified Information Systems Security Professional (CISSP)
- Certified in Risk and Information Systems Control (CRISC)
- Other relevant technical certifications (e.g., SANS GIAC certifications).
Leadership Skills : Proven ability to lead, mentor, and direct a team of highly skilled technical information security professionals. Excellent communication, presentation, and interpersonal skills to effectively communicate technical concepts to both technical and non-technical audiences. Strong problem-solving and decision-making abilities.
Nice to Have :
- MBA or M.Tech : Advanced degree in Business Administration with a technology focus or a Master's degree in a technical field.
- Experience in Tech Glitches Framework : Experience in developing, implementing, and managing a framework to proactively identify, mitigate, and resolve technical glitches impacting trading platforms and critical systems. This includes implementing robust monitoring, alerting, and incident management processes specific to technical failures.
- Knowledge of Emerging Technologies : Demonstrated understanding of the security implications and opportunities presented by emerging technologies relevant to the financial services industry, such as :
- Artificial Intelligence (AI) and Machine Learning (ML) for security analytics and threat detection.
- Blockchain technology and its security considerations in financial transactions.
- Cloud computing advancements and their impact on security architectures.
- DevSecOps practices and their integration into the software development lifecycle.
Functional Areas: Software/Testing/Networking
Read full job descriptionPrepare for Your Yaari Digital Integrated Services Interview with Real Experiences!
View interviews10-12 Yrs
Cyber Security, IAM, Incident Management +3 more
10-11 Yrs
Cyber Security, Incident Management, Information Security +3 more
10-11 Yrs
ERP Systems, IT Operations Management, Audit Compliance
3-5 Yrs
Flutter, Biostatistics, Android +1 more