1. Review security processes and identify control gaps within processes
of operational and business activities
2. Conduct gap assessment against policies, standards and compliance
standards and provide resolution for implementation
3. Develop templates, forms and supporting documentation for the
implementation of information security programs across Jio
4. Perform risk assessment to identify security gaps and non-compliances
5. Develop and drive third party security management programs
1. Security strategy
2. ISMS Implementation and risk assessment