6 Talkmetakeme Software Solutions Jobs
6-8 years
₹ 22.5 - 25L/yr
Pune
1 vacancy
Third Party Risk Management (TPRM) Specialist
Talkmetakeme Software Solutions
posted 21hr ago
Key skills for the job
Job Title: Cyber Third-Party Risk Management (TPRM) Specialist
Working Location: Pune
Work Experience: 5 to 8 Years
CTC Budget: 25 LPA
Job Level / Grade: Middle Level
POSITION SUMMARY
We are seeking an experienced and skilled Cyber TPRM Specialist to join our Cyber Security team. The successful candidate will be responsible for conducting comprehensive risk assessments of our third-party vendors and partners, focusing on their cybersecurity posture and potential risks to our organization. Additionally, this role will involve mentoring junior cyber risk analysts, fostering their professional growth, and enhancing the overall capabilities of the team. The Specialist will work closely with the TPRM Lead in Australia.
The activity will include:
The individual must possess:
• Ability to travel for on-site assessments (up to 20% of the time)
The position will work closely with senior management and other company teams to ensure the risks are identified, tracked, and remediated.
This role requires initiative to take ownership of issues, and work with other support parties both internal and external to company.
The role requires a close working relationship with other team managers for continual improvement of processes, procedures, and services, as well as working with company counterparts for all regional security initiatives.
This role will be responsible for ensuring the successful execution of Supply Chain security risk governance program for company.
KEY RESPONSIBILITIES AND RESULTS
Key Result Areas
Required KPIs
Measurement Method
Planning
Execution
Reporting
Communication and Teamwork
MAJOR CHALLENGES / TYPICAL PROBLEMS ENCOUNTERED
List the principal challenges or problems faced by the role in achieving the results of the position.
Also, describe the extent to which originality or creativity is required in solving the problems faced.
Specify unique problems associated with the position because of job complexity, economic and environmental aspects or growth potential.
For existing role, please indicate additional challenges and problems in bold.
1.
Identifying accurate Vendor information / key stakeholders in a large organization
2.
Ability to manage various procedural issues with Internal stakeholders as well as TPSP (such as scheduling issues, Vendor contractual clauses, escalations, etc.)
2.
Communicating the potential impact of a technical risk as a financial or business risk to stakeholders / management
4.
The ability to communicate technical security issues to senior management (SLT/ELT) in a clear and concise manner
5.
Stay abreast of information security issues and regulatory changes affecting the telecommunications industry.
SECTION D: DECISION MAKING AUTHORITY
Provide key information (both from a Problem Solving and Accountability Perspective) with appropriate examples to help define the scope and impact of the job and the extent to which the job has authority to manage resources and make decisions. (To also consider the approval limits of the role, procedural decision making, authority and empowerment.)
For existing role, please indicate additional decision-making authority in bold.
Decisions made under own authority
Decisions referred to higher authority
Assessment management
Deviations
Project Management
Deviations
KEY INTERNAL / EXTERNAL CONTACTS
Contact Purpose
Reporting Manager
• Day-to-day interaction with line manager on all assigned responsibilities, escalations, and for all administrative matter
Team peers
• Knowledge sharing/transfer, team collaboration, problem resolution and brainstorming, solution development, ensuring team redundancy is in place for critical functions
Other company peers
• Collaboration with other company peers to ensure effective and timely delivery of security deliverables from an information security, governance, risk, and compliance
Security Vendors / Partners
• Work with vendor support resources where required for troubleshooting issues with tools.
• Keep abreast of latest security trends and technologies for own professional development provided by key security vendors / partners
Markets and Customers
Target markets / segments
This activity assesses the risks in the BU through TPSPs. It helps BU manage their risks better.
Impact on customers
Significant improvement of confidence and trust in company customer facing systems.
Customer type
☐ Mainly internal ☐ Mainly external ☒ Both internal and external
SECTION F: QUALIFICATIONS / EXPERIENCE / KNOWLEDGE REQUIRED
Indicate key knowledge and skills required for this role to perform the tasks to a satisfactory level. To also specify a suitable level of qualification required (i.e. basic, advanced, or professional), where applicable.
Category
Essential for this role
Good to have
Education and Qualifications
• Bachelor's degree in Information Security, Computer Science, or related field.
• Relevant certifications (e.g., CISSP, CISA, CRISC).
• Understanding of local Australian Privacy laws, data protection methods and technologies
Work Experience
• 5+ years of experience in cybersecurity, risk management, or related areas.
• Experience in Vendor Risk Management and Compliance: Proven track record in managing third-party cybersecurity risks, conducting comprehensive vendor audits, and ensuring compliance with industry standards.
• Leadership Experience: Experience in leading cybersecurity projects, managing teams, or overseeing vendor relationships and ensuring their alignment with the organization’s security policies.
• Experience in Cyber Risk, Business Risk Management, Operational Risk, Internal Audit, and/or controls related function preferred
Technical / Professional Skills
Please provide at least 3
• Advanced Risk Management: Expertise in risk assessment methodologies and frameworks (e.g., PCIDSS, OWASP, NIST, ISO/IEC 27001, CIS Controls, SOC 2).
Employment Type: Full Time, Permanent
Read full job description4-6 Yrs
₹ 10 - 13L/yr
Pune