2,675 Infosec Analyst jobs in India
Infosec Analyst
Posted 5 days ago
Job Viewed
Job Description
About Leegality:
We're India's very first Document Infrastructure Platform. Our mission? To completely transform how businesses handle paperwork, contracts, and getting digital consent.
We make critical paperwork flows faster, way more innovative, and completely compliant for Indian businesses. Over 2,000 companies, from huge players like HDFC and SBI Cards to super fast-growing ones like Razorpay and Cars24, trust us with their document workflows.
Beyond our core platform, we've launched "Deal Collaboration" (making contract negotiation a breeze) and "ConsentIn" (for easy, DPDP-compliant consent collection).
Basically, we're building the go-to execution layer for all modern paperwork. If that sounds exciting, come join us!
Curious about our impact? Check out our customer success stories here:
Our Culture:
At Leegality, we're all about trust, owning our work, transparency, and having a blast while building something meaningful.
These aren't just buzzwords; our team proved it by giving us an amazing 97 on the eNPS survey for FY (that's the highest among over 175 startups!).
We're always working to help our team grow and stay motivated. We offer cool perks like flexible hours, hybrid work, and bi-annual appraisals to make sure everyone has an awesome work environment.
If our culture vibes with you, keep reading the job description below and hit that apply button!
Location: Hybrid
Role Brief
- As Information Security Analyst you will be responsible for managing third party risk management, assisting the Infosec team in implementing ISMS related activities and protecting systems and assets from external and internal threats.
Leegality is an ISO 27001 certified Company.
- At Leegality you will -
- Facilitate assurance-related requirements.
- Have wider-than-usual exposure to regulatory compliance.
- Implement best-in-class security practices.
- Have the opportunity to advance security domain knowledge at a rapid pace.
- Directly report to Information Management and advance your leadership skills
Key Responsibilities:
- Understanding the Leegality product and its features.
- End-to-end ownership of responding to client security assessment questionnaires and Information Security Assurance Requests.
- Keeping the track of security evidence and updating them periodically.
- Collaborate with relevant teams to plan and develop work program timelines, risk assessments and other planning documents
- Performing vendor risk management. Evaluating the security of a product or service provider prior onboarding.
- Assisting Infosec team in maintenance of ISMS.
- Ensure technology and information risks are effectively identified, assessed, controlled, managed, reported, and timely closure of Assurance action
- Assist in deploying proper information systems, resources, and controls to maximize efficiencies and minimize risk
- Demonstrate and apply a thorough understanding of complex information systems, strong project management skills, and use of current technology and tools to enhance the effectiveness of deliverables and services
- Build strong relationships with all stakeholders to drive continuous improvement on Technology Risk/Project governance processes
- Ensure business continuity, disaster recovery and stress testing controls are defined, documented, and conducted regularly
- Assist InfoSec team in managing the organization's Operational Risk Assurance & Controls Testing Plan.
- Assist InfoSec Manager in day-to-day compliance activities to maintain the company’s ISO 27001:2022, ISO 27017, ISO 27018, ISO 22301 certification and SOC 2 Type 2 Compliancy.
- Communication skills to develop clear protocols, inform management about potential risk issues, and relay information about policy changes effectively
Desired Skills and Experience:
- Minimum 2 to 3 years of experience in core Information Security domain, preferably in the BFSI or B2B IT sectors
- Certifications like ISO 27001 LA, CISA, CISSP will be an added advantage
- Hands-on experience with multiple External & Client InfoSec Audits.
Our Hiring Process:
- You will be shortlisted based on your profile
- On being shortlisted, you would be contacted for the interview process.
- We further have 2 rounds of interviews.
- Your final CTC would be decided on the basis of your skills, experience and final assessment.
Apply directly through our career page:
For more information about us please visit our:
Our Company and Culture:
Our Website:
Our LinkedIn Page:
Senior Vulnerability Assessment and Penetration Testing
Posted 5 days ago
Job Viewed
Job Description
Responsibilities
- Client Engagement & Leadership
- Act as a trusted security advisor for multiple high-value clients.
- Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
- Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
- Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
- Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
- Advanced Threat Modelling & Risk Assessment
- Design and maintain threat models tailored to client applications, networks, and cloud environments.
- Perform risk assessments focusing on business impact and likelihood of exploitation.
- Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
- Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
- Penetration Testing & Red Team Operations
- Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
- Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
- Design and develop custom exploits and testing tools to replicate specific attacker techniques.
- Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
- Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
- Comprehensive Reporting & Documentation
- Produce clear and technically thorough vulnerability assessment and penetration testing reports.
- Create executive-level summaries focused on business impact and compliance risks.
- Maintain structured and up-to-date testing methodologies and playbooks.
- Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
- Technical & Programming Expertise
- Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
- Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
- Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
- Capable of custom tool development and advanced exploit research to target unique client environments.
- Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
- In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
- Social Engineering & OSINT Expertise
- Design and execute social engineering and phishing simulations tailored to client environments.
- Perform physical security assessments through tactics like tailgating and badge cloning.
- Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
- Provide training and awareness recommendations based on assessment outcomes.
- Professional Attributes & Mindset
- Strong analytical, problem-solving, and creative thinking skills.
- Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
- Methodical and detail-oriented approach to testing with the ability to think like an attacker.
- Strong communication and presentation skills, able to engage both technical teams and business leadership.
- Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.
Qualifications
- 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
- Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
- Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
- Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
- In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
- Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
- Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
- Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
- Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
- Excellent communication and stakeholder management skills, able to lead client-facing engagements.
- Relevant certifications are a strong plus (e.g., OSCP, CREST, CISSP, CEH, GIAC GPEN).
Preferred Qualifications:
- Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
- Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
- Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
- Prior consulting experience in a service delivery or customer-facing environment.
- Experience with threat intelligence platforms and indicators of compromise (IoCs).
Cloud and containers base Vulnerability Assessment & Scanning
Posted 25 days ago
Job Viewed
Job Description
This is a remote position.
Job Title: Cloud & Containers – Vulnerability Assessment & Scanning
Job Type: Freelance
Location: Remote
Experience: 10+ Years
Mode: Online
Role Overview:We are looking for a highly experienced Freelance Trainer with strong expertise in Cloud Security and Container Security to deliver professional training on Vulnerability Assessment and Scanning. The trainer will design and deliver sessions, share real-world scenarios, and provide hands-on lab guidance to participants.
Key Responsibilities:Deliver online training on Cloud & Container Vulnerability Assessment & Scanning .
Provide hands-on labs, case studies, and practical demonstrations.
Train participants on industry best practices, compliance, and remediation strategies.
Guide learners in integrating vulnerability scanning into DevSecOps pipelines .
Ensure sessions cover both conceptual understanding and practical skills .
Required Skills & Expertise:Strong knowledge of Cloud Platforms : AWS, Azure, GCP.
Hands-on with Containers & Orchestration : Docker, Kubernetes, OpenShift.
Expertise in Vulnerability Scanning Tools: Qualys, Tenable, Prisma Cloud, Aqua, Twistlock, Trivy, Clair .
Deep understanding of Security Standards : CIS Benchmarks, NIST, OWASP Top 10, CVE/CVSS.
Experience with DevSecOps (CI/CD pipeline integration, IaC scanning).
10+ years of experience in Cloud Security, Container Security, or Vulnerability Management .
Information Security Analyst
Posted 2 days ago
Job Viewed
Job Description
As a bank with a brain and a soul, Citi creates economic value that is systemically responsible and in our clients' best interests. As a financial institution that touches every region of the world and every sector that shapes your daily life, our **Foundational Services** teams are charged with a mission that rivals any large tech company. Our technology solutions are the foundations of everything we do. We keep the bank safe and provide the technical tools our workers need to be successful. We design our digital architecture and ensure our platforms provide a first-class customer experience. Our operations teams manage risk, resources, and program management. We focus on enterprise resiliency and business continuity. We develop, coordinate, and execute strategic operational plans. Essentially, Foundational Services re-engineers client and partner processes to deliver excellence through secure, reliable, and controlled services.
Trust is part of our DNA at Citi. As such, we take safeguarding our customer data very seriously. The Cloud Technology Services (CTS) is made up of deeply dedicated and talented colleagues who work together to ensure the safety of Citi's and our clients' assets and information. We manage information security as an end-to-end program - one with a clear mandate and accountability. Our mission is to continually execute and enhance a global security program that is fully anchored to modern control and security frameworks, fully aligned with the technology of the firm, threat-focused and data-driven, and deeply integrated across all Citi businesses globally.
Being talent-driven, we are focused on attracting, developing, and retaining diverse and inclusive talent with a high technical skill level. As a member of our team we will provide you with career development opportunities at all stages of your career. Our employees model a passion for protecting Citi and our clients and believe in treating others with dignity and respect.
This is an opportunity to work with Global Secrets Management Platforms team which is part of Citi's Cloud Technology Services. We are responsible for secrets management on-prem and the cloud for several hundred applications across the firm.
Our commitment to diversity includes a workforce that represents the clients we serve globally from all walks of life, backgrounds, and origins. We foster an environment where the best people want to work. We value and demand respect for others, promote individuals based on merit, and ensure opportunities for personal development are widely available to all. Ideal candidates are innovators with well-rounded backgrounds who bring their authentic selves to work and complement our culture of delivering results with pride. If you are a problem solver who seeks passion in your work, come join us. We'll enable growth and progress together.
**Information Security Analyst - PAM specialist**
We are opening our doors for talented individuals who are passionate about Cyber Security, want to be part of innovation by implementing and driving cutting edge technologies within a world class organization.
If you have a background in technology and interested to learn and grow with a world class Cyber Security team, then Citi is a place for you to be.
**Responsibilities:**
+ Provide BAU support for secrets management applications like CyberArk, HashiCorp Vault.
+ Collaborate with various internal and external stakeholders/support teams as required to support the application and business needs.
+ Work with client applications to provide integration/onboarding guidance.
+ Identify security vulnerabilities in the system and implement necessary solutions to remediate the vulnerabilities.
+ Strong Automation experience - Identify manual processes that can be smartly automated.
+ Ensure security best practice is followed and provide solutions to improve existing infrastructure processes in the company.
+ Be involved in the design and subsequent implementation of software and service infrastructure.
+ Provide on-call support in rotation as required.
+ Gather requirements and provide walkthroughs to businesses on usage of various SDKs and API services available for integration with Secrets/Identity and Access Management applications.
**Qualifications:**
+ 5+ Years' experience
+ Bachelor's in Engineering Degree (Computer Science or Equivalent)
+ Any trainings/certifications in Cybersecurity will be considered a plus
**Critical Competencies:**
+ CyberArk, HashiCorp Vault experience will be a big plus.
+ Basic experience working with one or more of these scripting languages - Python, Unix Shell, Perl, Go & PowerShell scripting.
+ Experience with one or more server operating system like Linux, Windows.
+ Experience/basic understanding of CHEF, Ansible, Terraform, CI/CD.
+ Experience with one or more cloud providers such as AWS, GCP, AZURE.
+ Understanding of containers and associated technologies like Kubernetes/OpenShift.
+ Excellent written and verbal communication skills
+ Ability to work across all levels of the organization.
+ Must have good analytical skills.
+ Strong customer and quality-focus.
+ Sound problem resolution, judgment, and decision-making skills .
+ Ability to work well individually and as part of a team.
**About Citi**
Citi, the leading global bank, has approximately 200 million customer accounts and does business in more than 160 countries and jurisdictions. Citi provides consumers, corporations, governments, and institutions with a broad range of financial products and services, including consumer banking and credit, corporate and investment banking, securities brokerage, transaction services, and wealth management.
Additional information may be found at | Twitter: @Citi ( | YouTube: | Blog: | Facebook: | LinkedIn: .
---
**Job Family Group:**
Technology
---
**Job Family:**
Information Security
---
**Time Type:**
Full time
---
**Most Relevant Skills**
Please see the requirements listed above.
---
**Other Relevant Skills**
For complementary skills, please see above and/or contact the recruiter.
---
_Citi is an equal opportunity employer, and qualified candidates will receive consideration without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other characteristic protected by law._
_If you are a person with a disability and need a reasonable accommodation to use our search tools and/or apply for a career opportunity review_ _Accessibility at Citi ( _._
_View Citi's_ _EEO Policy Statement ( _and the_ _Know Your Rights ( _poster._
Citi is an equal opportunity and affirmative action employer.
Minority/Female/Veteran/Individuals with Disabilities/Sexual Orientation/Gender Identity.
Information Security Analyst
Posted 4 days ago
Job Viewed
Job Description
Join Verdantas – A Top #ENR 81 Firm,
We at Verdantas are seeking a highly motivated and detail-oriented Information Security Analyst, to protect our company’s critical systems and sensitive data. You will be an integral part of our security team, responsible for implementing, maintaining, and monitoring our security posture. The ideal candidate will have a strong technical background, a proactive mindset, and a passion for staying ahead of the latest security trends and threats.
Key Responsibilities
Security Operations & Monitoring:
- Monitor security alerts from SIEM, IDS/IPS, firewalls, and other security tools to identify and investigate potential security incidents.
- Perform vulnerability scans and assessments, prioritizing and tracking remediation efforts.
- Manage and configure security tools, including EDR/XDR, antivirus, and email security gateways.
- Conduct log analysis and forensic investigations to determine the root cause of security events.
Incident Response:
- Serve as a key member of the incident response team.
- Respond to and mitigate security incidents in a timely and effective manner.
- Document incidents and develop runbooks for future reference.
Security Architecture & Engineering:
- Design, implement, and maintain security controls and technologies to protect cloud (e.g., AWS, Azure, GCP) and on-premises infrastructure.
- Implement and manage identity and access management (IAM) policies and practices.
- Harden systems, networks, and applications based on industry best practices (e.g., CIS Benchmarks).
- Assist in the development and enforcement of security policies, standards, and procedures.
Governance, Risk, and Compliance (GRC):
- Participate in risk assessments and audits (e.g., SOC 2, ISO 27001, PCI-DSS, HIPAA).
- Assist in third-party security risk assessments.
- Promote security awareness across the organization through training and communication.
Required Qualifications & Skills
- Bachelor’s degree in computer science, Information Security, or a related field, or equivalent experience.
- (8+) years of experience in an information security role.
- Hands-on experience with core security technologies (SIEM, EDR, Firewalls, IDS/IPS, DLP).
- Strong understanding of networking protocols (TCP/IP, DNS, HTTP/S) and network security.
- Knowledge of operating systems (Windows, Linux, macOS) and their security aspects.
- Familiarity with cloud security principles (AWS, Azure, or GCP).
- Understanding of common attack vectors, malware, and threat actor tactics (e.g., MITRE ATT&CK framework).
- Excellent problem-solving and analytical skills.
- Strong written and verbal communication skills.
Preferred Qualifications & Skills
- Relevant industry certifications such as:
- Entry-Level: Security+, GIAC GSEC
- Mid-Level: CISSP, CISM, CEH, CompTIA CySA+
- Cloud-Specific: CCSP, AWS Certified Security - Specialty, Azure Security Engineer Associate
- Experience with scripting languages (e.g., Python, PowerShell, Bash) for automation.
- Knowledge of application security (SAST, DAST) and secure SDLC practices.
- Experience with penetration testing or red teaming tools and methodologies.
- Prior experience in a regulated industry (finance, healthcare, etc.)
Information Security Analyst
Posted 5 days ago
Job Viewed
Job Description
Hi All,
Good afternoon!
We are urgently hiring for the role of Information Security Analyst with 7 to 12 years of experience with below required skills :
- Global Security operations center
- SIEM tools
- Splunk
- Incident Management
Interested candidates please apply on :
Information Security Analyst
Posted 5 days ago
Job Viewed
Job Description
About the company
Lexitas is a high growth company. The Company is built on a belief that having strong personal relationships with our clients, and providing reliable, accurate and professional services, is the driving force of our success.
Lexitas offers an array of services including local and national court reporting, medical record retrieval, process service, registered agent services and legal talent outsourcing. Our reach is truly national as well as international.
Lexitas is a MNC Company that has set up a subsidiary in Chennai, India – Lexitas India Pvt. Ltd. This Indian company will be the Lexitas Global Capability Center, helping build a world class IT development team, and over time serve as a Shared Services hub for several of the corporate functions.
For More Information -
This is a Full-Time Job located in Chennai, India.
Summary:
This position supports information security, privacy, risk and compliance programs and activities under the direction of the VP of Information Security or designated Information Security Manager. The position assists in developing and maintaining a comprehensive security program for Lexitas. Providing functional and technical support is important to maintain security posture and protection of electronically and physically stored information assets across our systems. Tasks include supporting design, implementation, configuration, documentation, and maintenance to mitigate risk to the business and its computing resources and assets, as well as collaborating with applicable providers, managing and monitoring tools, and facilitating applicable processes and procedures.
Key Roles and Responsibilities :
- Supports IT security, privacy, risk and compliance systems, processes, supporting activities, with the ability to lead activities and programs.
- Monitors computer networks and associated tools and provider services for security, privacy, risk and compliance issues
- Supports the project management, tracking, and documentation of Information, Privacy, Risk, and Compliance programs, processes, and activities
- Investigate security breaches and cybersecurity incidents.
- Documents security breaches and assesses impact.
- Performs and/or supports security tests, risk assessments, and audits to uncover network, application, and process vulnerabilities and provides guidance and training to ensure violations do not persist.
- Tracks and facilitates the mitigation of vulnerabilities to maintain a high security standard.
- Supports best practices for IT security, privacy and compliance.
- Performs and supports 3rd party vulnerability management and penetration testing.
- Research security enhancements and makes recommendations to management.
- Stays current on information technology trends and security standards.
- Prepares reports that detail security, privacy, and compliance risk assessment findings.
- Supports Security Operations Center functions including monitoring and supporting Incident Response activities.
- Supports all related IT Security, Privacy, Risk and Compliance policies and provides guidance to the business.
- Other Information Security, Privacy, Risk, and Compliance duties as required.
Skills and Abilities:
- Experience with computer network and application vulnerability management and penetration testing, and techniques.
- Solid understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
- Ability to identify and mitigate network and application vulnerabilities.
- Good understanding of patch management
- Proficient with various OS
- Excellent written and verbal communication skills
- Knowledge of firewalls, antivirus, and intrusion detection system concepts
- Ability to support and document areas of Information Security, Privacy, Risk, and compliance processes and programs.
- Ability to support incident response process.
- Experience directing 3rd Party providers in the areas of Information Security, Privacy, Risk and Compliance
- Support information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
- Preferred KSA’s:
- Strong working knowledge and experience with primary Information Security, Privacy, Risk, and compliance standards and frameworks such as NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.
- Experience administering information security software and controls.
- Experience supporting process for managing network and application security.
- Network and system administration experience a plus.
- Good understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices.
- Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
- Learns and monitors the business processes for the areas of primary support responsibility.
- Support annual Security Baseline Audits and execution of recommendations.
- As part of the technology team, performs “Help Desk” day-to-day tasks in support of Information Security, Privacy, Risk, and Compliance.
Education and Experience:
- Bachelor’s degree in computer science or related field strongly preferred.
- IAT Level-2 technical certification strongly preferred (Comp TIA Security+ or CISSP) or ability to obtain within first 90 days of hire.
- 5+ years’ experience performing role of Information Security Analyst or SOC
- Demonstrated experience in responding to, managing, and resolving security incidents.
- Experience with LAN/WAN networking concepts, IP addressing and routing concepts, Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience with Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience working with Security Information and Even Management (SIEM) system is a plus.
Be The First To Know
About the latest Infosec analyst Jobs in India !
Information Security Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events from various sources, including SIEM, firewalls, IDS/IPS, and endpoint security solutions.
- Investigate security incidents, perform root cause analysis, and recommend appropriate remediation actions.
- Conduct regular vulnerability assessments and penetration testing to identify system weaknesses.
- Develop and implement security policies, procedures, and guidelines to ensure compliance with industry standards and regulations.
- Assist in the design and implementation of security controls and technologies to protect against cyber threats.
- Provide security awareness training to employees and educate them on best practices for data protection.
- Manage and maintain security infrastructure, including firewalls, antivirus software, and encryption tools.
- Respond to and manage security breaches, coordinating incident response efforts and post-incident analysis.
- Stay current with the latest cybersecurity threats, vulnerabilities, and trends.
- Review and analyze security logs to detect suspicious activities and potential intrusions.
- Collaborate with IT teams to ensure that security considerations are integrated into all system designs and implementations.
- Develop and maintain documentation related to security configurations, policies, and procedures.
- Participate in security audits and compliance reviews.
- Assess the security posture of third-party vendors and partners.
- Contribute to the continuous improvement of the organization's overall security program.
- Assist in developing business continuity and disaster recovery plans.
Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Proven experience in information security, cybersecurity operations, or a related role.
- In-depth knowledge of security principles, network protocols, and common attack vectors.
- Experience with SIEM tools, vulnerability scanning software, and endpoint detection and response (EDR) solutions.
- Familiarity with security frameworks such as NIST, ISO 27001, and GDPR.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong understanding of incident response procedures and best practices.
- Relevant certifications such as CompTIA Security+, CISSP, CISM, or CEH are highly desirable.
- Ability to work effectively both independently and as part of a collaborative team.
- Excellent communication and interpersonal skills, with the ability to explain technical security concepts to non-technical stakeholders.
- The hybrid nature of this role requires regular attendance at our Thane, Maharashtra, IN office for team collaboration and critical infrastructure management, with the flexibility for remote work days.
Information Security Analyst
Posted today
Job Viewed
Job Description
Key responsibilities include conducting regular security assessments, penetration testing, and vulnerability scanning. You will analyze security alerts, logs, and network traffic to detect and investigate suspicious activities. Developing and implementing security policies, procedures, and controls to ensure compliance with industry standards and regulations will be a core function. The Information Security Analyst will also play a key role in incident response, including containment, eradication, and recovery efforts. Educating employees on security awareness and best practices will be an important aspect of the role. Staying current with emerging security threats, technologies, and trends is essential for effectively mitigating risks. Collaboration with IT teams to implement security solutions and maintain a robust security posture is paramount. This role offers a challenging and rewarding opportunity to protect an organization's digital assets and contribute to a secure operating environment.
Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 3 years of experience in information security or cybersecurity.
- Strong understanding of network security, firewalls, intrusion detection/prevention systems, and endpoint security.
- Experience with security assessment tools and methodologies.
- Knowledge of relevant security standards and compliance frameworks (e.g., ISO 27001, NIST).
- Excellent analytical, problem-solving, and communication skills.
- Ability to work effectively in an office-based security operations center.
Information Security Analyst
Posted today
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and events from various sources, including SIEM systems, IDS/IPS, firewalls, and endpoint security solutions.
- Investigate and analyze security incidents to determine root causes, scope of impact, and required remediation steps.
- Respond to security incidents in a timely and effective manner, following established incident response plans.
- Conduct vulnerability assessments and penetration testing to identify and prioritize security weaknesses.
- Implement and manage security controls and technologies to protect networks, systems, and data.
- Develop, update, and enforce information security policies, standards, and procedures.
- Perform regular security audits and compliance checks to ensure adherence to regulatory requirements (e.g., ISO 27001, GDPR).
- Educate and train employees on security best practices and awareness programs.
- Stay up-to-date with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
- Collaborate with IT teams to integrate security measures into system design and deployment.
- Assist in the development and maintenance of disaster recovery and business continuity plans.
Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- 2-4 years of experience in information security operations, incident response, or vulnerability management.
- Strong understanding of networking protocols, security principles, and common attack vectors.
- Hands-on experience with security tools such as SIEM, firewalls, antivirus, IDS/IPS, and vulnerability scanners.
- Knowledge of security frameworks and compliance standards.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills, with the ability to articulate technical concepts to non-technical audiences.
- Relevant certifications such as CompTIA Security+, CEH, or CISSP are highly desirable.
- This hybrid role requires the successful candidate to be based in or near Vijayawada, Andhra Pradesh, IN , and to attend the office for a designated number of days per week for collaborative work and team meetings, while also enjoying the flexibility of remote work.