The Lead – Information Security will be responsible for managing VFS Global’s end‑to‑end cybersecurity posture across platforms, ensuring that security controls, governance practices, and risk frameworks are embedded across all digital and government‑facing solutions. Additionally, the role involves driving major modernization initiatives from SOC and cloud security to AppSec and data protection while securing both legacy systems and newly deployed global platforms.
Define and maintain enterprise-wide cybersecurity strategy, policies, standards, and frameworks, ensuring alignment with ISO 27001, NIST CSF, GDPR, and client/government requirements.
Lead governance forums, security steering committees, and enterprise cyber transformation initiatives.
Integrate cyber‑risk considerations into business strategy and technology roadmaps while evaluating emerging technologies (AI, automation, cloud-native tools) to enhance resilience.
Drive annual security uplift programs, monitor maturity through dashboards, KRIs, and scorecards, and conduct enterprise-wide risk assessments with defined mitigation strategies.
Own the technology risk framework and collaborate with platform, IT, and business teams to close high-risk items within SLAs, ensuring real-time risk visibility via centralized dashboards.
Define and maintain enterprise-wide cybersecurity strategy, policies, standards, and frameworks, ensuring alignment with ISO 27001, NIST CSF, GDPR, and client/government requirements.
Lead governance forums, security steering committees, and enterprise cyber transformation initiatives.
Integrate cyber‑risk considerations into business strategy and technology roadmaps while evaluating emerging technologies (AI, automation, cloud-native tools) to enhance resilience.
Drive annual security uplift programs, monitor maturity through dashboards, KRIs, and scorecards, and conduct enterprise-wide risk assessments with defined mitigation strategies.
Own the technology risk framework and collaborate with platform, IT, and business teams to close high-risk items within SLAs, ensuring real-time risk visibility via centralized dashboards.
Provide senior oversight for SOC operations including SIEM, SOAR, EDR/XDR, incident response, and threat hunting.
Ensure timely detection, containment, and remediation of security incidents.
Lead threat intelligence ingestion, dark web monitoring, and proactive hunting activities.
Oversee forensic investigations, ensuring documentation, RCA, and audit readiness.
Guide modernization of SOC capabilities via POCs, tooling evaluations, and efficiency initiatives.
Review and approve solution architectures, design reviews, and integration patterns.
Ensure implementation of security controls across infrastructure, applications, cloud, and endpoints.
Lead vulnerability management, penetration testing, red teaming, and remediation governance.
Drive secure SDLC adoption and ensure security checkpoints across CI/CD pipelines.
Identity, Application Security & Leadership
Oversee RBAC, access reviews, PAM, JIT/JEA, and ensure strong Lead identity and access security, including RBAC, PAM, JIT/JEA, MFA/Conditional Access, and automated identity governance with strong threat‑protection measures.
Drive secure SDLC and AppSec practices by embedding security into development teams and integrating SAST/DAST/IAST tools within CI/CD pipelines; oversee threat modeling, code reviews, and developer training.
Manage attack surface reduction, red teaming, bug bounty programs, and remediation of misconfigurations to strengthen overall security posture.
Engage senior stakeholders and mentor cross‑functional cybersecurity teams while championing global security awareness and culture uplift.
Team Management & Succession Planning
Manage and develop staff, including performance management, training, and career development.
Create and maintain a robust talent pipeline to ensure succession planning (1:2 ratio).
Sustainability
Oversee corporate governance within the assigned region, ensuring alignment with organizational principles, policies, and regulations.
Promote judicious use of natural resources and adhere to the organizations environment, health, and safety policies, objectives, and guidelines.
Drive the organizations sustainability initiatives, working towards achieving established targets.
Anti Bribery Management Systems (ABMS)
Follow the ABMS roles and responsibilities details as prescribed on the ABMS manual.
Understanding of ethical standards and the importance of integrity in business practices.
Ability to identify and evaluate risks related to bribery in various business contexts. For more detailed explanation, follow the ABMS manual.
Education
Bachelor’s degree in engineering/technology, CISSP/CISM required or preferred.
Experience
14–15+ years of experience leading enterprise security programs across global, multi-site environments.
Deep expertise across GRC, SecOps, IAM, Application Security, Cloud Security, Risk Management, and Threat Intelligence
Searching, interviewing and hiring are all part of the professional life. The TALENTMATE Portal idea is to fill and help professionals doing one of them by bringing together the requisites under One Roof. Whether you're hunting for your Next Job Opportunity or Looking for Potential Employers, we're here to lend you a Helping Hand.
Disclaimer: talentmate.com is only a platform to bring jobseekers & employers together.
Applicants
are
advised to research the bonafides of the prospective employer independently. We do NOT
endorse any
requests for money payments and strictly advice against sharing personal or bank related
information. We
also recommend you visit Security Advice for more information. If you suspect any fraud
or
malpractice,
email us at abuse@talentmate.com.
You have successfully saved for this job. Please check
saved
jobs
list
Applied
You have successfully applied for this job. Please check
applied
jobs list
Do you want to share the
link?
Please click any of the below options to share the job
details.
Report this job
Success
Successfully updated
Success
Successfully updated
Thank you
Reported Successfully.
Copied
This job link has been copied to clipboard!
Apply Job
Upload your Profile Picture
Accepted Formats: jpg, png
Upto 2MB in size
Your application for General Manager - Information Security
has been successfully submitted!
To increase your chances of getting shortlisted, we recommend completing your profile.
Employers prioritize candidates with full profiles, and a completed profile could set you apart in the
selection process.
Why complete your profile?
Higher Visibility: Complete profiles are more likely to be viewed by employers.
Better Match: Showcase your skills and experience to improve your fit.
Stand Out: Highlight your full potential to make a stronger impression.
Complete your profile now to give your application the best chance!