Submitting more applications increases your chances of landing a job.
Here’s how busy the average job seeker was last month:
Opportunities viewed
Applications submitted
Keep exploring and applying to maximize your chances!
Looking for employers with a proven track record of hiring women?
Click here to explore opportunities now!You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for
Would You Be Likely to Participate?
If selected, we will contact you via email with further instructions and details about your participation.
You will receive a $7 payout for answering the survey.
Ready to shape the future of work?
At Genpact, we don’t just adapt to change—we drive it. AI and digital innovation are redefining industries, and we’re leading the charge. Genpact’s AI Gigafactory, our industry-first accelerator, is an example of how we’re scaling advanced technology solutions to help global enterprises work smarter, grow faster, and transform at scale. From large-scale models to agentic AI, our breakthrough solutions tackle companies’ most complex challenges.
If you thrive in a fast-moving, tech-driven environment, love solving real-world problems, and want to be part of a team that’s shaping the future, this is your moment.
Genpact (NYSE: G) is anadvanced technology services and solutions company that deliverslastingvalue for leading enterprisesglobally.Through ourdeep business knowledge, operational excellence, and cutting-edge solutions – we help companies across industries get ahead and stay ahead.Powered by curiosity, courage, and innovation,our teamsimplementdata, technology, and AItocreate tomorrow, today.Get to know us atgenpact.comand onLinkedIn,X,YouTube, andFacebook.
Inviting applications for the role of Senior Manager, Information & Cyber Security!
In this role, you should have exposure on GRC platform Implementation , Cyber Security Framework, BOT / AI Management Framework, Cyber Regulatory Management and TPRM platform Implementation
Responsibilities
Develop and implement security solutions: Develop and implement security solutions, including security monitoring, incident response, vulnerability management, and access control.
Conduct security assessments: Conduct security assessments for clients to identify potential security risks, vulnerabilities, and threats.
Develop security strategies: Develop security strategies for clients based on their risk profile and business requirements.
Manage security operations: Manage security operations for clients, including incident response, threat hunting, and security incident management.
Provide technical guidance: Provide technical guidance and support to clients on security-related issues.
Stay up-to-date with the latest security trends and technologies: Stay up-to-date with the latest security trends and technologies, and apply this knowledge to the development of new security solutions and strategies.
Collaborate with other teams: Collaborate with other teams, including the risk management team and the IT team, to ensure that security solutions are integrated with the client's overall business strategy.
Experience with security monitoring tools, such as SIEM, IDS/IPS, and vulnerability scanners.
Knowledge of security frameworks, such as NIST, ISO, and CIS.
Qualifications we seek in you!
Minimum Qualifications
CA / MBA / Engg / Bachelors in Information Technology
Additional qualifications like Post Graduate Diploma in Cyber Security, Certified Information Security Manager (CISM), Certified in Cyber Security (CC), Diploma in Computer Forensics, Certified Cyber Crime Investigator.
Preferred Qualifications
Experience in Cyber Security, Information Security, Data Privacy and IT Risk Management.
Carried out Cyber Security Risk Assessment , Vulnerability Management, Managing Incident Response, Data Privacy framework and Implementation, Cyber Security Operations (SIEM, IDS/IPS, WAF, DLP, PT), Threat Modelling, Creating Cyber and Information Policies and Procedures, NIST CSF framework implementation, Cyber Fraud Investigation and Technology Audit
Performed engagements or projects with the companies or clients focussed on VA/PT Analysis, SIEM, IDS/IPS monitoring, DLP, WAF implementation, NIST CSF Implementation, Threat Modelling (OWASP), Cyber Fraud Investigation
Evaluated applications, tools and networks for cyber risk management, assisted organizations to identify right security posture, designed threat models to identify existing threats for the organization, created remediation plan to mitigate cyber risk
Implemented DLP tools, EDR tools, SIEM solutions, WAF, IDS / IPS and performed Application Security Testing
Understanding of cloud security principles and experience with cloud security platforms.
Strong analytical and problem-solving skills.
You'll no longer be considered for this role and your application will be removed from the employer's inbox.