Information security officer
BangaloreGain
...SOC 2 (Type II) control environment, including evidence collection, remediation, and auditor interaction. Translate security requirements into pragmatic, scalable controls • Endpoint & access security Own MDM strategy and implementation across laptops, mobile devices, and access [...]
Category Education, Training, & Library / Sector IT, Information Technology and Telecommunications