Management Trainee - GRC

Karachi, Sindh, Pakistan

Inbox Business Technologies

View company page

  • Governance and Policy Development
  • Compliance and Regulatory Management
  • Risk Management
  • Implement and manage controls to safeguard information assets, including data protection, access controls, incident response, and business continuity planning.
  • Conduct regular audits and risk assessments to evaluate the effectiveness of the ISMS and identify areas for improvement.
  • Collaborate with internal stakeholders, to ensure alignment of GRC and ISMS activities. Engage with external stakeholders, including auditors, regulators, and business partners, to address compliance requirements and maintain positive relationships.
  • Training & Awareness


  • Bachelor's degree in a relevant field such as Information Security, Risk Management, Professional certifications related to GRC and/or information security (e.g., CISA, CRISC, CISSP, ISO 27001 Lead Implementer) are advantageous.
  • Strong knowledge of GRC principles, frameworks, and industry best practices. Familiarity with relevant regulatory requirements (e.g., GDPR, HIPAA) and international standards (e.g., ISO 27001, 20000) Experience in conducting risk assessments, developing policies, and implementing controls.
  • Excellent communication and interpersonal skills, with the ability to influence and collaborate with stakeholders at various levels.
  • Strong analytical and problem-solving skills, with the ability to evaluate complex situations and recommend practical solutions.
  • Proficient in using GRC and ISMS tools and technologies.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Audits CISA CISSP Compliance CRISC GDPR Governance HIPAA Incident response ISMS ISO 27001 Risk assessment Risk management

Region: Asia/Pacific
Country: Pakistan
Job stats:  13  2  0
Category: Compliance Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.