Cyber Security Architect

4 weeks ago


Delhi, India Golden Opportunities Full time

Location: PAN India

Experience: 10+ Years

Job Description:

The Cyber Security Architect specializing in Disaster Recovery (DR) and Business Continuity Planning (BCP) plays a strategic role in ensuring an organizations resilience against cyber threats and disruptions. This position involves designing, implementing, and maintaining secure systems and policies to safeguard information, applications, and infrastructure while guaranteeing that business operations can seamlessly recover from disruptive incidents.

Key Responsibilities

Disaster Recovery Strategy: Develop and maintain the organization's disaster recovery plans, ensuring immediate and efficient recovery of critical systems in the event of cyber incidents or natural disasters.

Business Continuity Planning: Assess and design business continuity frameworks, ensuring minimal disruption to operations and rapid restoration of services.

Risk Assessment: Evaluate potential threats, vulnerabilities, and risks to the organizations infrastructure and recommend mitigation strategies.

Architect Secure Systems: Design and implement secure systems and protocols to protect digital assets and sensitive information.

Compliance and Standards: Ensure adherence to regulatory standards, such as ISO 22301, NIST SP 800-34, and other frameworks related to DR/BCP and cybersecurity.

Testing and Exercises: Conduct regular tests and simulations of DR and BCP plans to identify gaps and improve recovery strategies.

Incident Response: Collaborate with incident response teams to ensure proper handling of security breaches and align recovery efforts with continuity strategies.

Vendor Management: Oversee and evaluate third-party disaster recovery services and tools to ensure alignment with organizational requirements.

Training and Awareness: Provide training and guidance to employees and stakeholders on DR and BCP roles and responsibilities.

Documentation: Maintain detailed documentation for all DR and BCP processes and procedures for audit and operational purposes.

Contact Person - Christopher

Email -



  • Delhi, Delhi, India Craw Cyber Security Pvt Ltd Full time

    Great Cyber Security and penetration Testing Training Skills Must have Knowledge about in Ethical Hacking, Penetration Testing, Web Application Security. Good Knowledge of Certified Ethical Hacker v11. Knowledge on security tools like NMAP, Nessus, Metasploit, Wireshark, Burpsuite, Owasp-zap, Netsparker etc - Kali Linux - OWASP Top 10 - Penetration...


  • Delhi, Delhi, India Craw Cyber Security Pvt Ltd Full time

    Great Cyber Security and penetration Testing Training Skills Must have Knowledge about in Ethical Hacking, Penetration Testing, Web Application Security. Good Knowledge of Certified Ethical Hacker v13. Knowledge on security tools like NMAP, Nessus, Metasploit, Wireshark, Burpsuite, Owasp-zap, Netsparker OSCP, CEH, CCNA, etc. - Kali Linux - OWASP Top 10...


  • Delhi, India Talanos Cyber Security Full time

    Department: Security Operations Centre (SOC) Job Type: Full-time, Permanent About Talanos Cybersecurity Talanos Cybersecurity is a Managed Security Service Provider (MSSP) serving clients in the UK and South Africa. We deliver 24/7 Managed Detection and Response (MDR) through our global Security Operations Centres in the UK, South Africa, and India. Our...


  • Delhi, India Utthunga Full time

    Hello Connections!We are hiring forCyber security ArchitectRole:The Cyber Security Architect will be responsible for designing, implementing, and maintaining security frameworks for Industrial Automation and Control Systems (IACS). This role ensures compliance with IEC 62443 and EU CRA regulations, protecting critical infrastructure from cyber threats.About...


  • New Delhi, India Utthunga Full time

    Hello Connections!We are hiring for Cyber security Architect Role:The Cyber Security Architect will be responsible for designing, implementing, and maintaining security frameworks for Industrial Automation and Control Systems (IACS). This role ensures compliance with IEC 62443 and EU CRA regulations, protecting critical infrastructure from cyber...


  • New Delhi, India Utthunga Full time

    Hello Connections!We are hiring forCyber security ArchitectRole:The Cyber Security Architect will be responsible for designing, implementing, and maintaining security frameworks for Industrial Automation and Control Systems (IACS). This role ensures compliance with IEC 62443 and EU CRA regulations, protecting critical infrastructure from cyber threats.About...


  • New Delhi, India Tata Consultancy Services Full time

    We are looking for Expert level technical experience with Cyber Security SkillsRequired Infrastructure Skills : Network Security Endpoint Security EDR SOC Roles and Responsibilities: Own the design and implementation phases of new and innovative Security architectures. Give direction and design Security solutions to support Technical Towers teams according...


  • Delhi, Delhi, India Anonymus Full time

    Cyber Security Expert CISO Certification for Cyber Security Minimum Experience for Cyber Security Expert 10 years in Assignments of cyber security and SOC management projects Pay: ₹18,463.52 - ₹47,187.14 per month **Experience**: - total work: 10 years (preferred) Work Location: In person


  • Delhi, India Coforge Full time

    Senior Cyber Security ExpertFunctional responsibility:Ensure all the security parameters of a network are intact at any given point in time.Analyses the security requirements of a new network or a network that requires an upgrade.Plans, implements and upgrades the security aspects.Continuously monitor the network access, perform edits and identify the system...


  • Delhi, India Coforge Full time

    Senior Cyber Security ExpertFunctional responsibility:Ensure all the security parameters of a network are intact at any given point in time.Analyses the security requirements of a new network or a network that requires an upgrade.Plans, implements and upgrades the security aspects.Continuously monitor the network access, perform edits and identify the system...