Manager – IT
Job description
Responsibilities
Oversight of Technology Risks by Board of Directors and Senior Management.
BCM preparedness and alignment of policies and framework with Regulators guidelines to be reported to Board of Directors.
Monitoring Outsourced Activities.
Data Centre Protection and Controls.
Monitoring & Reviewing the Activities of DC by Asst, Manager and Reviewed by IT Manager.
Technology Risk Management Framework.
TRM Framework is to be developed and IT Risk is to be managed.- Responsibility of IT Head and Senior Management
User Access Control
Maintaining strict and need based user access to systems, applications and networks.- Responsibility of Asst managers and reviewed by IT manager
Managing IT Audit
Audit to be performed covering critical area of IT and managed periodically.-In house monthly concurrent audit. External audit once a year or as directed by MAS.
Operational Infrastructure Security Management
Data Loss prevention (DLP) Mechanism to be implemented.- Responsibility of IT Asst managers and reviewed by IT manager
Systems Reliability, Availability and Recoverability
BCM and DRP must be in place.- Responsibility of IT Asst manager and reviewed by IT manager.
IT Service Management.
Application of Change Management and Incident management- Responsibility of IT Asst. manager and reviewed by IT Manager.
Online Financial Services and Customer Protection and Education
Internet facing systems are to be secured- Responsibility of IT Asst Manager and reviewed by IT Manager
Compliance with guidelines of MAS / MOM / RBI / HO as and when applicable.
Further, Manager IT is responsible for establishing and implementing the overall information technology strategy, overseeing the day-to-day information technology operations, and managing the information technology risks of the financial institution
Manager IT is responsible for the information security strategy and programme of the financial institution, including but not limited to information security policies and procedures to safeguard information assets, information security controls and the management of information security breaches.