Job Views:  
130
Applications:  43
Recruiter Actions:  31

Posted in

IT & Systems

Job Code

1413318

Vertical Head - IS Audit - Life Insurance Firm

15 - 23 Years.Thane/Maharashtra
Posted 4 months ago
Posted 4 months ago

Vertical Head - IS Audit- Leading Life Insurance Firm


- The purpose of this role is to develop and manage execution of the Information System Audits (IS Audits) including Information Technology (IT) Infrastructure, Information Security and IT Applications Audits covering the key Information System areas (such as Cyber Security, Applications Security, Data Security, Cloud Security, Vulnerability Assessment & Penetration Testing, Network Security, Data Privacy, Data Centre, Logical and Physical Access Management, IT Infrastructure management, Database & Operating System management, Incident management, Change management, Email management and process review, End point security, IT Disaster Recovery, IT Business Process Continuity Review, IT Helpdesk management, IT Project management and Emerging Digital & Technology Risk) within.

- The primary function of the role will be to develop and manage execution of the IS Audits Strategy and Plan for proactively conducting the Information Systems, IT Infrastructure, Information Security and IT Applications assessments across factoring the wide spread nature of business, large scale of operations, level of digitalisation and use of technology, complexity & diversity of the various applications across the lines of business of and organization strategy, culture and digital maturity

- Develop processes for effective IS Audits coverage of Information System & Security risks identification, mitigation and management in ensuring that the audit coverage is aligned with internal policies, standards, procedures; professional auditing standards as well as various applicable laws and regulations, regulatory circulars / guidelines across various regulators

- Develop strategies for identification and assessment of Information System & Security risks across factoring the diverse lines of business of , scale of operations and complexities of the business and current maturity level of controls

- Develop IS Audits plan based on risk assessment and the legal, regulatory framework; Ensure use of advanced integrated auditing concepts and extensive use of technology and data analysis for achievement of the audit objectives

- Set up and develop specialised team for conducting IS Audits and the assessment of complex and specialised reviews covering key IT Infrastructure, IT Applications and Information System & Security areas (such as Cyber Security, Applications Security, Data Security, Cloud Security, Vulnerability Assessment & Penetration testing, Network Security, Data Privacy, Data Centre, Logical and Physical Access Management, IT infrastructure management, Database & Operating System management, Incident management, Change Management, Email management and process review, End point Security, IT Disaster Recovery, IT Business Process Continuity Review, IT Helpdesk management, IT Project management and Emerging Digital & Technology Risk) across the various lines of business within

- Plan and conduct Information System & Security risk audits testing ~3000+ controls covering the various IT applications, IT infrastructure, Information systems and IT/Information Security processes including cyber security, cloud security, network security, data security, logical and physical access management, adherence to data privacy guidelines, emerging digital & technology

Development of Audit Strategy and Plan:

- Develop the IS Audits strategy encompassing Information Technology (IT) Infrastructure, Information Security and IT Applications Audits covering the key Information System areas (such as Cyber Security, Applications Security, Data Security, Cloud Security, Vulnerability Assessment & Penetration Testing, Network Security, Data Privacy, Data Centre, Logical and Physical Access Management, IT Infrastructure management, Database & Operating System management, Incident management, Change management, Email management and process review, End point security, IT Disaster Recovery, IT Business Process Continuity Review, IT Helpdesk management, IT Project management and Emerging Digital & Technology Risk) within

- Develop strategies for identification and assessment of Information System & Security risks across factoring the diverse lines of business of , scale of operations and complexities of the business and current maturity level of controls

- Develop IS Audits plan based on risk assessment and the legal, regulatory framework; Ensure use of advanced integrated auditing concepts and extensive use of technology and data analysis for achievement of the audit objectives

- Set up and develop specialised team for conducting IS Audits and assessment of complex and specialised reviews covering key IT Infrastructure, IT Applications and Information System & Security areas (such as Cyber Security, Applications Security, Data Security, Cloud Security, Vulnerability Assessment & Penetration testing, Network Security, Data Privacy, Data Centre, Logical and Physical Access Management, IT infrastructure management, Database & Operating System management, Incident management, Change Management, Email management and process review, End point Security, IT Disaster Recovery, IT Business Process Continuity Review, IT Helpdesk management, IT Project management and Emerging Digital & Technology Risk) across the various lines of business within

Execution of Audit Strategy and Plan:

- Conduct IT application reviews (covering ~1500+ application controls across all lines of business in ) in line with the nature and complexity of the business; Review the major Information System applications for each line of business within ; Perform application vulnerability assessment and recommend systemic improvements for mitigating the Information system & security risk and enhancing the maturity level of the controls

- Conduct IT Process review (covering ~1500+ controls across all lines of business in ) in line with the nature and complexity of the business; Review the major Information Technology processes for each line of business within the group; Identify the area vulnerable to risk and assess the controls in place for mitigating the Information technology risk; Recommend systemic improvements for mitigating the Information technology risk and enhancing the maturity level of the controls

- Conduct Cyber Security/ Cloud Security/ Network Security/ Information Security Audits (~10+) at ; Recommend improvement areas for enhancing the efficiency of controls toward cyber security

- Conduct Data Security review (~200+ major customer data sensitive applications / processes); Assess the process relating to user access and data leakage prevention measures at each data lifecycle stage of data sourcing, data capture, data transfer, data storage, data processing and data deletion

- Conduct review of data centres and third party vendors/ business partners/ channel partners having customer sensitive data with regards to controls in place at the third party vendors/ business partners/ channel partners in line with the defined SLAs; Assess the data privacy and data leakage risk management framework with regards to processes and controls for assessment of outsourced activities and monitoring and manging of outsourcing risk with regards to data security.

- Conduct user access review and access to information on need-to-know basis based on the role and nature of activities to be performed, nature and complexity of the business, scale and size of the business; Review the process of access to information and monitoring of data leakage prevention across employees; Review the processes to prevent potential data leakage which may result in detailed inquiry and strict action from Cyber Crime department / other regulators

- Conduct specialised reviews through use of extensive data analysis and advanced forensic techniques on Cyber Security, Cloud Security, emerging digital technology and other aspects relating to Information Security

- Effective management and execution of the audit plan for proactive identification and remediation of Information System & Security risk relating to various business products, processes and units

- Provide effective recommendations for improvements to the organization policies, processes and practices based on leading industry practices and emerging risks

Continuous Monitoring:

- Develop strategies for identification of triggers / risk hotspots and conduct unplanned reviews / investigations based on various triggers/ hot spots, directives received from regulators, board committees and senior management

- Keep abreast of the emerging audit trends and drive key audit initiatives for efficient and effective achievement of the audit objectives

- Implement an effective continuous monitoring framework for ongoing monitoring of risk relating to various business products, processes and units; Identify and develop ~5000+ automated test for ongoing monitoring of Information System & Security risk across

Didn’t find the job appropriate? Report this Job

Job Views:  
130
Applications:  43
Recruiter Actions:  31

Posted in

IT & Systems

Job Code

1413318

UPSKILL YOURSELF

My Learning Centre

Explore CoursesArrow
Apply on the go!

Download the iimjobs app to
apply for jobs anywhere, anytime

apple

Download on

App Store

playStore

Get it on

Google Play

appPromoQr

Scan to Download