To articulate and communicate the gist of Compliance & Information Security mission and objectives across the organization, while providing all businesses with the direction and information that allows them to understand priorities while managing and overseeing every aspect of technical security measures throughout the organization. 

This role will be actively involved in strategic planning and monitoring of risk-taking actions of the senior management, both as a strategic partner to the business units advising them on risk issues and on the best ways to identify and manage these issues as well as a risk controller setting parameters for risk activities and reviewing compliance with these parameters in order to ensure that the business does not incur any undue risk without adequate return.

Job Responsibilities: 

  • Ensure control weaknesses in processes, operations and systems are timely identified and necessary corrective actions are taken.
  • Protects the integrity across the organization by ensuring that it operates in accordance with legal and regulatory requirements both in terms of technology & processes, abides by the Code of Corporate Governance, and promotes compliance in the manner in which business is conducted.
  • Ensure the organization is strengthened structurally by introducing innovative systems and tools so that dependence on individuals is lessened and business foundations are placed on sound system footings.
  • From a technological risk point of view; supervising system integration, ensuring appropriate security control processes are in place, ensuring appropriate authorization privileges & authentication measures, logical and physical access controls, adequate infrastructure security to maintain appropriate boundaries and restrictions of both internal and external user activities and data integrity of transactions, records and information.
  • Planning for incident management and response, performing tests, exercises, and drills of all response plans.
  • Perform problem management, root cause analysis, and post mortem reviews following the occurrence of an incident
  • Ensure that security requirements are adequately addressed throughout the development and acquisition lifecycles for all information assets
  • Perform security reviews, certification (if necessary) and accreditation prior to or post to the release of new applications, systems, or information asset to the production
  • Define, assess, and maintain controls necessary to protect information Assets in accordance with security requirements, including secure configurations & changes to them, for networks, hardware, and systems.
  • Define, assess, and maintain controls necessary to protect networks, hardware, systems, and mobile devices in accordance with security requirements, including intrusion prevention and detection controls.
  • Define, assess, and maintain controls necessary to protect the network and Internet perimeters in accordance with security requirements, including firewalls, and VPNs.
  • Review and advise that the security plans, infrastructure, redundancies, ownership, assigned roles, access points, and integrations internally, updated, and periodically tested.
  • Track and maintain all reports and actions needed to achieve compliance against security policies, regulations, and audits.
  • Review and advise the organization-wide backup of sensitive information, security of backup, and restoration arrangements.
  • Connect organizational requirements with security goals.
  • Prepare financial forecasts and budgets for security operations.
  • Keep an eye on security vulnerabilities and threats. Assist in carrying out security & forensic investigations and recommended courses of action.
  • Implement and maintain security policies and procedures, including periodic reviews.
  • Provide regular feedback to the senior management on compliance health of all businesses, also highlighting key risk issues/areas with remedial actions.
  • Ensure operating losses are kept within the risk appetite of the organization.

What are we looking for?

  • Masters or at least Bachelors in Computer Sciences/IT/Information Security.
  • 08 to 10 years of Information Security & Compliance experience in a reputable organization.
  • Accepting challenges & entrepreneurship skills and demonstrated business acumen in leading technology risk management & compliance strategies with rich functional exposure in formulating and implementing strategies, aimed at facilitating business expansion and growth.
  • Ability to work in a team environment, with a positive attitude and willingness to help others
  • Able to work under pressure and time constraints
  • Very strong written and verbal English communication skills

Benefits:

  • Very strong medical insurance
  • Provident Fund
  • Communication Allowance
  • Auto-Finance 
  • Paid time off

Job Details

Total Positions:
1 Post
Job Shift:
First Shift (Day)
Job Type:
Department:
Finance
Job Location:
Gender:
No Preference
Minimum Education:
Masters
Degree Title:
Masters or at least Bachelors in Computer Sciences/IT/Information Security
Career Level:
Experienced Professional
Experience:
8 Years - 10 Years (Information Security/Compliance Experience at a Reputed Organization)
Apply Before:
Jun 21, 2021
Posting Date:
Jun 08, 2021

ROZEE.PK

Recruitment / Employment Firms · 101-200 employees - Lahore

Rozee is Pakistan's # 1 online job site which connects talent with opportunity. Rozee provides services to job seekers and employers by providing them one platform for job searching and hiring, respectively. As Pakistan’s largest online recruitment platform, it is used by over 100,000 employers and 9.5 million professionals. Since its inception, Rozee’s platform has facilitated over 1 million job placements and has the largest database of searchable CV’s in Pakistan.

What is your Competitive Advantage?

Get quick competitive analysis and professional insights about yourself
Talk to our expert team of counsellors to improve your CV!
Try Rozee Premium
I found a job on Rozee!