Job Description & How to Apply Below
GRC Consultant (ISMS, BCMS, ITSM & Cyber Resilience)
Duration: 06+ Months (possible extension)
Location:
Noida, Uttar Pradesh, India
Duties and Responsibilities:
- Lead and execute the enterprise Governance, Risk, and Compliance (GRC) program aligned with ISO 27001 (ISMS), ISO 22301 (BCMS), and ISO 20000 (ITSM).
- Serve as the primary internal GRC and compliance point of contact for CLIENTS and coordinate with external auditors, consultants, and regulators.
- Drive ISMS lifecycle activities, including scope definition, risk assessment, Statement of Applicability, control implementation, and continuous monitoring.
- Establish and maintain an integrated cyber resilience and business continuity framework, ensuring alignment between security, disaster recovery, and operational continuity.
- Lead Business Impact Analysis (BIA), risk assessments, BC/DR strategy, and testing exercises to ensure recovery readiness.
- Govern and enhance IT Service Management processes in alignment with ISO 20000 and ITIL best practices, including incident, problem, change, and service-level management.
- Conduct enterprise risk assessments, maintain the risk register, and track remediation through defined KRIs, KPIs, and risk treatment plans.
- Develop, review, and maintain information security, business continuity, and ITSM policies, standards, and procedures.
- Plan and execute internal audits, control assessments, and compliance reviews across IT, cloud, OT (if applicable), and business functions.
- Coordinate external certification and surveillance audits for ISO 27001, 22301, and 20000, including evidence readiness and closure of non-conformities.
- Ensure alignment with regulatory and contractual compliance obligations, including privacy and data protection requirements where applicable.
- Deliver executive dashboards, compliance scorecards, and governance reports with metrics for IT and cybersecurity to senior leadership and risk committees.
- Facilitate security and continuity awareness programs, tabletop exercises, and stakeholder training.
- Conduct established third-party risk management and supplier assurance audits aligned with ISO and enterprise risk frameworks.
- Drive continuous improvement initiatives to enhance compliance maturity, cyber resilience, and service governance effectiveness.
- Support technology and transformation programs with risk reviews, control design, and compliance validation before production deployment.
- Participate in cyber maturity assessments (ISO maturity, NIST CSF alignment, resilience benchmarking) and drive closure of identified gaps.
- Ensure documentation, evidence repositories, and audit trails are maintained for sustained certification readiness.
- Collaborate with SOC, infrastructure, cloud, privacy, and business teams to ensure holistic risk and resilience governance.
- Manage GRC-related projects, remediation programs, and control automation initiatives to improve efficiency and assurance.
- Prepare and present Weekly Status Reports with KPIs and KRIs (Use Every Week). Sections to Include:
Progress vs roadmap, Risks & issues, Compliance posture snapshot, Metrics (KRIs/KPIs, closure %), Decisions required, Plan for next week
- Conduct extensive internal audits at the process level for ISMS, BCMS and ITSM at the process level, present the audit report and drive closure of the gaps.
- Drive BC/DR exercises, review reports, and execute improvements for the IT landscape
- Review and update all the required policies, process documents (existing/new) required for ISMS, BCMS, ITSM, aligned to the CLIENT’S environment.
- Conduct monthly assurance review for major managed services (IT Infra, IT-Apps and SOC),
- Execute/conduct monthly Quality review, Risk review and weekly VA review and drive closure.
- Conduct risk assessments for all the IT assets as per ISMS, BCMS and ITSM standards.
- Conduct BIA and identify crown jewel assets for CLIENT’S. Define security and resiliency for the crown jewels.
- Review, maintain and track the security exceptions (business need, technology limitations, or policy exceptions) monthly.
- Review all the new upcoming projects, solutions in CLIENTS from Cyber security…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×