The Information Security Manager will be responsible for developing, implementing, and maintaining the organization’s information security strategy, risk framework, policies, and controls. This role requires deep expertise in cyber operations, audit management, risk evaluation, and compliance with security standards such as ISO 27001, SOC 2, and NIST. The individual will work closely with senior leadership, IT, HR, Compliance, Delivery teams, and external auditors to ensure FCI remains secure, compliant, and resilient across all its systems, processes, and customer engagements.
Key Roles & Responsibilities (Not Limited To)
1. Information Security Governance & Policy Management:
Define, develop, implement, and continuously improve information security policies, standards, procedures, and guidelines.
Own and maintain the Information Security Management System (ISMS) aligned with ISO 27001.
Establish governance frameworks to ensure consistent security implementation across:
Corporate IT
Product engineering
Cloud infrastructure
Manufacturing/plant environments (IT/OT)
Ensure alignment with ISO 27001, SOC 2, PCI DSS, GDPR, and client-specific security requirements.
Act as the primary point of contact for information security governance across business units.
2. Risk Management, Compliance & Audit Ownership:
Conduct periodic enterprise risk assessments, threat modeling, and vulnerability assessments across IT, cloud, product, and plant systems.
Maintain and continuously update:
Risk registers
Asset inventories
Control matrices
Compliance dashboards
Lead and independently manage:
ISO 27001 certification and surveillance audits
SOC 2 Type I & II audits
PCI DSS compliance assessments
Client and partner security audits
Coordinate audit schedules, evidence collection, documentation, and stakeholder interactions.
Track, manage, and ensure timely closure of non-conformities (NCs), observations, and CAPAs.
Ensure continuous compliance with regulatory, contractual, and customer-driven security obligations.
3. Security Operations, Monitoring & Tooling:
Oversee day-to-day security operations including:
SIEM monitoring
Log management
Threat detection and alerting
Collaborate with IT and infrastructure teams to strengthen:
Network security
Endpoint security
Identity and access management (IAM)
Cloud security posture
Evaluate, implement, and manage security tools such as:
Firewalls, IDS/IPS
EDR/antivirus solutions
DLP solutions
IAM, MFA, PAM
Vulnerability management tools
Define and monitor security KPIs and metrics for management reporting.
4. Incident Response, BCP & Disaster Recovery:
Develop, maintain, and test Incident Response Plans (IRP).
Lead investigation, containment, remediation, and root-cause analysis of:
Security incidents
Data breaches
Vulnerability exploitations
Coordinate incident response with internal teams, vendors, and external stakeholders when required.
Own and enhance Business Continuity Plans (BCP) and Disaster Recovery (DR) frameworks.
Conduct periodic BCP/DR drills, tabletop exercises, and cyber incident simulations.
Ensure readiness for ransomware, data breach, and operational disruption scenarios.
5. Product, Application & Secure SDLC:
Work closely with product engineering and development teams to embed security-by-design principles.
Define and enforce Secure SDLC practices, including:
Secure coding standards
Code reviews
Vulnerability scanning
Penetration testing coordination
Oversee application security for internally developed and third-party products.
Manage vulnerability remediation lifecycle for product platforms.
Support customer security questionnaires, product security documentation, and assurance artifacts.
6. Cloud Security & Certifications:
Lead security initiatives for cloud-hosted products and platforms (AWS / Azure/etc)
Drive cloud security compliance and certifications such as:
ISO 27001 for cloud scope
SOC 2 for SaaS platforms
Cloud-specific best practices (CIS Benchmarks)
Implement and monitor:
Cloud IAM and least-privilege access
Secure configuration baselines
Cloud logging and monitoring
Data protection and encryption controls
Partner with DevOps teams to integrate security into CI/CD pipelines
7. Internal Systems, Access & Data Protection:
Ensure secure configuration and access control for internal enterprise systems including:
Zoho, JIRA
Office 365 Suite
Other SaaS and internal applications
Conduct periodic:
User access reviews
Privileged access reviews
Segregation of duties (SoD) checks
Ensure strong data classification, handling, retention, and protection controls.
Support privacy and data protection requirements related to customer and employee data
8. Plant / OT Security (Where Applicable):
Collaborate with plant and operations teams to assess and improve OT / industrial system security.
Ensure basic cybersecurity controls for plant networks, devices, and access.
Conduct risk assessments for IT–OT integration points.
Align plant security controls with overall organizational security governance.
9. Training, Awareness & Security Culture:
Design and conduct periodic information security awareness programs for employees.
Develop training materials covering:
Phishing and social engineering prevention
Password and access hygiene
Data protection and privacy
Secure development practices
Run simulated phishing exercises and track improvement metrics.
Foster a strong, organization-wide security-first culture
10. Strategy, Roadmap & Continuous Improvement:
Define and own the information security roadmap aligned with business and product strategy.
Track emerging cyber threats, vulnerabilities, regulatory updates, and industry trends.
Recommend and implement continuous improvements to security posture.
Lead evaluation and rollout of new security tools, technologies, and frameworks.
Provide regular security posture updates to senior management.
Requirements
Desired Qualifications & Experience:
Education:
Bachelor’s degree in Computer Science, Information Security, Engineering, or a related discipline.
Master’s degree preferred
Experience:
6–10 years of hands-on experience in:
Information security
Cybersecurity operations
Risk, compliance, and audit management
Strong experience working in product/SaaS organizations.
Experience handling client data and customer-driven security requirements.
Prior exposure to manufacturing/plant or OT environments is a plus
Certifications (Preferred):
CISSP / CISM
ISO 27001 Lead Implementer or Lead Auditor
Cloud security certifications (AWS Security Specialty, Azure Security Engineer, etc.) – good to have
CEH (Certified Ethical Hacker)/ CompTIA Security+ ( good to have)
Technical & Functional Expertise:
Information security governance and ISMS
ISO 27001, SOC 2, PCI DSS frameworks
Risk assessment and mitigation
Security audits and compliance operations
Application, network, endpoint, and cloud security
Incident response and BCP/DR
Secure SDLC and product security
Soft Skills:
Strong communication and documentation skills
Ability to work cross-functionally with IT, product, engineering, and business teams
Proven ability to independently manage audits and external stakeholders
Strong analytical, problem-solving, and decision-making skills
Benefits
The company offers a range of employee benefits including:
Cashless medical insurance for employees, spouses, and children
Accidental insurance coverage
Life insurance coverage
Retirement benefits including Provident Fund (PF) and Gratuity
Searching, interviewing and hiring are all part of the professional life. The TALENTMATE Portal idea is to fill and help professionals doing one of them by bringing together the requisites under One Roof. Whether you're hunting for your Next Job Opportunity or Looking for Potential Employers, we're here to lend you a Helping Hand.
Disclaimer: talentmate.com is only a platform to bring jobseekers & employers together.
Applicants
are
advised to research the bonafides of the prospective employer independently. We do NOT
endorse any
requests for money payments and strictly advice against sharing personal or bank related
information. We
also recommend you visit Security Advice for more information. If you suspect any fraud
or
malpractice,
email us at abuse@talentmate.com.
You have successfully saved for this job. Please check
saved
jobs
list
Applied
You have successfully applied for this job. Please check
applied
jobs list
Do you want to share the
link?
Please click any of the below options to share the job
details.
Report this job
Success
Successfully updated
Success
Successfully updated
Thank you
Reported Successfully.
Copied
This job link has been copied to clipboard!
Apply Job
Upload your Profile Picture
Accepted Formats: jpg, png
Upto 2MB in size
Your application for Information Security Manager
has been successfully submitted!
To increase your chances of getting shortlisted, we recommend completing your profile.
Employers prioritize candidates with full profiles, and a completed profile could set you apart in the
selection process.
Why complete your profile?
Higher Visibility: Complete profiles are more likely to be viewed by employers.
Better Match: Showcase your skills and experience to improve your fit.
Stand Out: Highlight your full potential to make a stronger impression.
Complete your profile now to give your application the best chance!