
Manager – SbD Consultant
Vodafone
full-time
Posted on:
Location Type: Office
Location: India
Visit company websiteExplore more
Tech Stack
About the role
- Deliver comprehensive Secure by Design and Shadow IT security assessments, ensuring compliance with internal security policies and regulatory standards.
- Conduct detailed design reviews of systems, applications, and infrastructure to identify gaps and recommend improvements.
- Drive security risk identification, assessment, mitigation planning, and closure in collaboration with stakeholders.
- Provide security design input to enable compliant delivery of products, services, and technology changes.
- Oversee the implementation and testing of security controls within project lifecycles.
- Maintain strong, collaborative relationships with internal teams and external partners.
- Lead process improvement initiatives that strengthen security posture and operational efficiency.
- Prepare detailed reports, including findings, recommendations, and action plans.
- Serve as a trusted cybersecurity advisor across business functions and technology domains.
Requirements
- Experienced cybersecurity professional with 5+ years in IT security, including hands‑on practice in security architecture review.
- Skilled in perimeter security technologies such as firewalls, VPNs, proxies, and network engineering or management.
- Proficient in cloud security fundamentals, cloud security frameworks, and associated threats and risks.
- Capable of executing end‑to‑end, control‑based security assessments and architectural reviews.
- Competent in risk identification, analysis, and risk management methodologies.
- Familiar with standards and frameworks such as ISO 27001, ISO 22301, ISO 31001, NIST 800‑53, OWASP, COBIT 5.
- Strong communicator with excellent stakeholder management and influencing skills.
- Able to structure complex problems, analyse data, and present findings clearly.
- A background in the telecommunications sector is an advantage.
- Certifications such as CCSP, CISSP, CISA, CISM, ISO 27001, or ISO 31000 are desirable.
Benefits
- 📊 Check your resume score for this job Improve your chances of getting an interview by checking your resume score before you apply. Check Resume Score
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
security assessmentssecurity architecture reviewperimeter security technologiescloud security fundamentalsrisk identificationrisk management methodologiescontrol-based security assessmentsarchitectural reviewssecurity controls implementationdesign reviews
Soft Skills
stakeholder managementcommunicationproblem structuringdata analysisinfluencing skillscollaborationprocess improvementreport preparationtrustworthinessadvisory skills
Certifications
CCSPCISSPCISACISMISO 27001ISO 31000