4,025 Security Analysts jobs in India

Vulnerability assessment

NMS Consultant

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

permanent
Tool Proficiency:Demonstrate expertise in security tools, including:• Wallix Bastion• Microsoft PKI• Qualys Vulnerability Scanner• Qualys Cloud AgentHaving knowledge on below tools will be preferable.• Imperva• Trellix Endpoint• Safe Net• Crowd StrikeOperating System Knowledge:• Maintain a good understanding of Linux OS and its security features.Problem Solving & Feedback:• Provide valuable feedback on security tools and processes.• Analyze and solve complex cybersecurity issues.• Suggest and implement improvements to enhance security posture.Scripting & Automation:• Develop scripts for process automation and system integration.• Collaborate on creating efficient workflows to streamline operations.Development Skills:• Possess a solid understanding of Python development for automation and security tasks.• Utilize development tools, such as Git and VSCode, for version control and code management.Key Performance Indicators: • Should have knowledge on Onboarding process of bulk Servers & Users in PAM• Should understand Public Key Infrastructure (PKI), Certification Authorities (CA), Hardware Security Modules (HSM), Registration Authorities (RA), Root CA, Certificate Revocation Lists (CRL), OSCP (Online certificate status protocol).• Monitoring CRL publishing dates.• Troubleshooting Certificate related errors like -Certificate Trust, certificate validity, incorrect Certificate Purpose, incorrect hashing algorithm, enrolment issues etc.• Should have strong troubleshooting Skills on any issues related to PAM (Wallix Bastion)• Proven experience with cybersecurity tools and practices.• Strong analytical and problem-solving skills.• Excellent communication and collaboration skills.• Exposure to SOPs creation related to different processes and incident investigation analysis.• Open to work in shifts 24*7.• Open to work on multiple technologies
This advertiser has chosen not to accept applicants from your region.

Vulnerability Assessment Consultant-2

Bengaluru, Karnataka JLL

Posted today

Job Viewed

Tap Again To Close

Job Description

JLL supports the Whole You, personally and professionally.
Vulnerability Assessment Consultant-2
JLL Technologies, Bangalore
**What this job involves**:
JLLTechAmbitions
The Information Security Consultant will support planning, execution, and reporting of operational and system IT internal controls and risk management within the company. This role will act as a point of contact for Cybersecurity Governance, Risk, and Compliance. The role will work closely with the Technology functional teams and internal business lines in the day-to-day operational delivery of the overall Cybersecurity Compliance program.
Teaming with the Cybersecurity Compliance Manager, the Information Security Consultant will:
Monitor changes in business processes, information systems, management and operations, and accordingly maintain an assessment to risk.
Build and maintain productive relationships with process owners.
Through effective leadership, ensure audits of control effectiveness and design and other projects are completed in an efficient manner, and within established deadlines.
Through the effective review of department work, ensure that the assessments of internal control structure related to processes audited are supported through sufficient and adequately documented evidence.
Continually evaluate the efficiency and effectiveness of the internal controls and department functions, and identify areas of improvement.
Assist with internal investigations.
Promote good practice of Information Security Compliance to staff and associated contractors.
Provide direct and specific guidance to the department internal control process owners’ as appropriate for each process owner of the department and the work being performed.
Perform risk assessments related to controls in scope for work being performed.

**Responsibilities**:
Maintain awareness of current issues and significant changes within the business environment and business processes.
Periodically determine the need for revisions to control processes.
Demonstrate effective interaction with all levels of management and business partners.
Review specific control risk assessments to ensure efficiency and effectiveness in addressing key risks associated with the respective auditable entity or entities.
Review risk questionnaire submissions to identify key risks associated with the respective vendor /service and work with stakeholders to mitigate and advise.
Ensure that appropriate communication has been made in advance with compliance and internal process & service owners regarding the timing and logistics of each audit and review.
Anticipate problems and obstacles to the timely and efficient completion of audits and compliance reviews. Recommend solutions to anticipated and incurred problems and obstacles impeding the timely completion of such audit and reviews.
Through an understanding of internal controls, standards and applicable policies, procedures, and country regulations, review evidence to ensure the assessment of the effectiveness and efficiency of internal controls is adequate and sufficiently supported and documented, and the departmental and professional standards are adequately upheld.
Ensure issues and exceptions are fully identified and properly defined, and recommendations are adequately formulated to address the root cause of identified issues in a beneficial manner.
Ensure issues and recommendations are adequately and effectively communicated to owners on a proactive basis during the course of each audit or review.
Review final process owners’ responses for adequacy and completeness.
Ensure appropriate and timely follow-up audit work is performed to properly update the status of outstanding reported issues, and adequate communication is provided to management on a proactive basis.
Use the firm’s various methods of internal communication to direct colleagues and the wider organization to current, new policies and essential compliance information.
Experience & Education
Experience in evaluating third parties for the presence of fundamental information security controls.
College diploma or university degree in the field of computer science, information systems, or computer engineering
Exposure to any GRC technologies to perform risk management.
Good understanding of compliance standards/framework like ISO 27001/27002, NIST, SOC1, SSAE16/SOC2, CIS.
Minimum of 4 years IT experience; or equivalent combination of education and experience
Minimum of 4 years' experience of contributing to the success of a range of midsize-to-large multi-country initiatives.
Experience in designing and managing compliance and risk management controls and processes in day to day IT operations and projects.
Experience working in the corporate sectors (financial services, telecommunications or utilities)
Experience working in real estate services industry
Technical Skills & Competencies
High level of written and oral English communication skills.
High level of analytical, conceptual, and prob
This advertiser has chosen not to accept applicants from your region.

Pentester - Vulnerability Assessment & Penetration Testing (VAPT)

Hyderabad, Andhra Pradesh ProArch

Posted today

Job Viewed

Tap Again To Close

Job Description

We are hiring a hands-on Penetration Tester to lead and execute end-to-end security assessments across Web, Infrastructure, and Cloud environments. As the technical backbone of our lean and growing VAPT practice, you’ll work closely with the Security Lead and directly engage with clients to deliver meaningful, high-impact security outcomes.

Key Responsibilities:

  • Perform manual and automated penetration testing across:
    • Web Applications (based on OWASP Top 10)
    • Infrastructure (external/internal IPs, firewall review, patch audits)
    • Cloud Environments (basic Azure/AWS – IAM, Storage, Networking)
  • Identify, exploit, and report on vulnerabilities such as SSRF, RCE, IDOR, LFI, and S3 bucket exposures
  • Use tools such as Burp Suite , Nmap , SQLMap , Nikto , Nessus/OpenVAS
  • Write high-quality, detailed technical reports with:
    • Screenshots for PoCs
    • Remediation guidance
    • Risk severity scoring (preferably CVSSv3 )
  • Collaborate with clients to explain findings and provide actionable recommendations
  • Contribute to toolchain improvements and lightweight automation (Python/Bash preferred)

Requirements

  • 3–6+ years of hands-on experience in at least 2 of the following areas :
    • Web Application Penetration Testing (OWASP Top 10)
    • Infrastructure VAPT (internal/external, firewall, patch validation)
    • Basic Cloud VAPT (AWS or Azure: IAM, Storage, Networking)
  • Proficiency in:
    • Manual testing techniques , fuzzing, and exploitation
    • Burp Suite (Community or Pro)
    • Tools like Nmap, SQLMap, Nikto, Nessus/OpenVAS
  • Strong understanding of common vulnerabilities and exploitation techniques

Preferred Certifications

  • CEH , eJPT , OSCP (or strong portfolio/proof of hands-on skill)
  • AZ-500 or AWS Security Specialty (for cloud security exposure)

Good to Have

  • Familiarity with scripting for automation (Python, Bash)
  • Exposure to CVSSv3 for vulnerability scoring
  • Experience with Dradis , Excel-based reporting , or similar tools
This advertiser has chosen not to accept applicants from your region.

Senior Consultant - VAPT (Vulnerability Assessment & Penetration Testing)

Pune, Maharashtra Apt Resources

Posted today

Job Viewed

Tap Again To Close

Job Description

Apt Resources is hiring for our client, a leading cybersecurity services firm, seeking an experienced Senior Consultant – VAPT to join their expert team. The ideal candidate will have deep expertise in infrastructure and application security assessments, penetration testing, and a solid understanding of modern security threats and countermeasures.

Key Responsibilities: Infrastructure VA/PT:
  • Conduct black-box and grey-box vulnerability assessments and penetration tests on system/network/cloud environments.
  • Map network infrastructure, discover ports/services, and audit OS, network, and security configurations.
  • Use tools like NMap, Nessus, Metasploit, Kali Linux for exploiting vulnerabilities.
  • Stay current with CVEs and threat intelligence relevant to supported technologies.
  • Prepare and present detailed findings and mitigation plans to clients.
  • Deliver cloud infrastructure security assessments and configuration audits.
  • Create and deliver comprehensive, client-specific technical reports.
Application VA/PT:
  • Perform vulnerability assessments of Web, Mobile, and Thick-client applications based on OWASP standards.
  • Combine automated scanning with manual testing techniques to detect flaws.
Social Engineering:
  • Conduct phishing and spear-phishing simulations to assess end-user security awareness.

Requirements

Qualifications:
  • Bachelor's degree in Computer Science, IT, or a related field.
  • 8–10 years of hands-on experience in VAPT.
  • CEH certification is required.
  • OSCP or CREST certifications are a plus.
  • Experience working in an MSSP (Managed Security Services Provider) environment is preferred.
  • Strong understanding of Windows, Unix/Linux systems, firewalls, VPNs, and security infrastructure.
Technical Skills:
  • Expertise in tools like NMap, Metasploit, Kali Linux, Nessus, NetCat, HPing, Qualys, and RetinaCS.
  • Strong understanding of CVE databases, exploit development, and countermeasures.
  • Familiarity with scripting languages such as C++, C#, Perl, HTML, Shell, etc.
  • Knowledge of firewalls, IPS, DNS security, VLAN, web filtering, and VPNs.
  • Experience with cloud security assessment across major platforms (AWS, Azure, GCP).
Additional Requirements:
  • Strong communication, presentation, and documentation skills.
  • Ability to work independently and lead security assessments across client environments.
  • Willingness to travel overseas for project deployments.
  • Exposure to RFP response preparation, solution architecture, and client-facing presentations.

Benefits

Salary: Up to INR 18 LPA

This advertiser has chosen not to accept applicants from your region.

EOI - Security Operations Center (SOC) Consultants/Analysts Invited (AU Citizens)

Prayagraj, Uttar Pradesh Accenture

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description

Who are we?

Accenture is a global professional services company with leading capabilities in digital, cloud and security. Find out more about us at ***. 

Accenture Security

Our cybersecurity business is rapidly growing, and we are hiring mid-level security professionals within a range of disciplines to support our goal and mission of doing our part to secure the most critical systems and organizations for our way of life to thrive in Australia. 

Security is expanding for the new financial year 2025.  We are looking for the below skills to expand our practice. We are looking for mid - Senior level experience candidates.

Description

Take your career to the next level, by joining our passionate Security team and work on challenging projects that have immediate business impact.

About Accenture Managed Detection & Response with Sovereign delivery capability

Organizations around the world rely on Accenture’s MDR to build and maintain resilient incident management programs. We offer both global reach and local presence, with the scale to support even the largest enterprises and government agencies.

Every week, Accenture’s SOC:

  • · Analyze over 125 billion log entries
  • · Identify over 62,000 potential security events
  • · Escalate over 11,000 validated security incidents

Work as part of a world class customer focused team, protecting customers from threats through analysis of log data, providing clear, detailed and timely alerts that can be acted on. The Security Analysis team delivers real time security monitoring and alerting, analysing logs from over 450 supported device types, while adhering to strict service-level agreements. We are the front line in protecting our customers.

Responsibilities

  • · Investigate attacks against customer networks.
  • · Monitor and analyze log data, network traffic and/or alerts generated by a variety of security technologies in real-time; escalate and explain validated security incidents to customers.
  • · Write up security incident reports detailing the threat, its characteristics, and possible remediation activities.
  • · Research new threats and ensure appropriate detection capabilities are in place to identify and respond to these threats.
  • · Routinely review security incidents and other customer deliverables for adherence to the established procedures and guidelines. Document, rectify, and provide feedback to other analysts as necessary.
  • · Ensure the quality and timeliness of the security incident detection and classification service.
  • · Ensure standards and procedures are adhered to within defined SLA’s.
  • · Articulate security issues to customers, both verbally and written.
  • · Identify opportunities for process improvement.
  • · Manage and track customer issues and requests.
  • · Support other teams as needed.
  • · Train Associate Security Analysts and Security Analysts.
  • · Support SOC tour as required.
  • · Train Associate Security Analysts and Security Analysts.
  • · Support SOC tour as required.
  • · Build automated response process using the soar tool
  • · Create playbook to guide incident handling.

Qualification

Qualifications

  • · Excellent customer service and interpersonal skills.
  • · Passion for cyber security, learning, and knowledge sharing.
  • · Experience in an operational environment, with customer-facing responsibilities.
  • · Previous experience in an information/cyber security role – ideally focused on intrusion detection/security monitoring and analysis.
  • · An excellent understanding of the cyber security threat landscape, including detailed technical knowledge about the most prevalent vulnerabilities, threats, attack methods, and infection vectors.
  • · An excellent understanding of computer networking, including a detailed understanding of TCP/IP and other core Internet protocols.
  • · An excellent understanding of computer and network security.
  • · Excellent technical and troubleshooting skills with the ability to be dynamic and adapt in order to solve complex technical issues with customers and partners.
  • · The ability to communicate clearly at all levels, demonstrating strong verbal and written communication skills.
  • · Experience retrieving information and generating reports using KQL for Sentinel, UDM search query for Google Secops or SPL for Splunk.
  • · Experience using python to automate basic analysis tasks.
  • · Experience with any SIEM products such as: Microsoft Sentinel (highly preferred), Google SecOps and Splunk.
  • · Experience with one or more of the following EDR products would be preferred: Crowdstrike, Microsoft Defender, Carbon Black.
  • · One or more of the following certifications would be desirable: SANS GCIA, SANS GCFA, SANS GCFE, OSCP.

Benefits of working at Accenture:

·     18 weeks paid parental leave

·     Long & short-term career break opportunities

·     Structured career development program

·     Local and international career opportunities.

·     Certified as a Family Inclusive Workplace™

·     Flexible Work Arrangements - centered around Accenture’s Truly Human ethos and our commitment to supporting the health and wellbeing of our people.

·     We are proud to be in the top 3 of last year’s Diversity & Inclusion Index!

We are a WORK180 Endorsed Employer, to see our benefits and policies click here

All our consulting professionals receive comprehensive training covering business acumen, technical and professional skills development. You’ll also have opportunities to hone your functional skills and expertise in an area of specialization. We offer a variety of formal and informal training programs at every level to help you acquire and build specialized skills faster. Learning takes place both on the job and through formal training conducted online, in the classroom, or in collaboration with teammates. The sheer variety of work we do, and the experience it offers, provide an unbeatable platform from which to build a career. 

Accenture is a an EEO and Affirmative Action Employee of Females/Minorities/Veterans/Individuals with Disabilities. 

Equal Employment Opportunity Statement for Australia:

At Accenture, we recognise that our people are multi-dimensional, and we create a work environment where all people feel like they can bring their authentic selves to work, every day.   

Our unwavering commitment to inclusion and diversity unleashes innovation and creates a culture where everyone feels they have equal opportunity. Our range of progressive policies support flexibility in ‘where’, ‘when’ and ‘how’ our people work to ensure that Accenture is an organisation where you can strive for more, achieve great things and maintain the balance and wellbeing you need. 

We encourage applications from all people, and we are committed to removing barriers to the recruitment process and employee lifecycle. All employment decisions shall be made without regard to age, disability status, ethnicity, gender, gender identity or expression, religion or sexual orientation and we do not tolerate discrimination. If you require adjustments to the recruitment process or have a preferred communication method, please email *** and cite the relevant Job Number, or contact us on +61 ***.   

To ensure our workplace is inclusive and diverse we are setting bold goals and taking comprehensive action. To achieve these goals, we collect information that allows us to track the effectiveness of our Inclusion and Diversity programs. Learn how Accenture protects your personal data and know your rights in relation to your personal data. Read more about our Privacy Statement.

#LI_GM

Locations

Ballarat

Melbourne

Additional Information

Equal Employment Opportunity Statement for Australia

At Accenture, we recognise that our people are multi-dimensional, and we create a work environment where all people feel like they can bring their authentic selves to work, every day.

Our unwavering commitment to inclusion and diversity unleashes innovation and creates a culture where everyone feels they have equal opportunity. Our range of progressive policies support flexibility in ‘where’, ‘when’ and ‘how’ our people work to ensure that Accenture is an organisation where you can strive for more, achieve great things and maintain the balance and wellbeing you need.

We encourage applications from all people, and we are committed to removing barriers to the recruitment process and employee lifecycle. All employment decisions shall be made without regard to age, disability status, ethnicity, gender, gender identity or expression, religion or sexual orientation and we do not tolerate discrimination. If you require adjustments to the recruitment process or have a preferred communication method, please email *** and  cite the relevant Job Number, or contact us on +61 ***.

To ensure our workplace is inclusive and diverse we are setting bold goals and taking comprehensive action. To achieve these goals, we collect information that allows us to track the effectiveness of our Inclusion and Diversity programs. Learn how Accenture protects your personal data and know your rights in relation to your personal data. Read more about our Privacy Statement.

About Accenture

We work with one shared purpose: to deliver on the promise of technology and human ingenuity. Every day, more than 775,000 of us help our stakeholders continuously reinvent. Together, we drive positive change and deliver value to our clients, partners, shareholders, communities, and each other.

We believe that delivering value requires innovation, and innovation thrives in an inclusive and diverse environment. We actively foster a workplace free from bias, where everyone feels a sense of belonging and is respected and empowered to do their best work.

At Accenture, we see well-being holistically, supporting our people’s physical, mental, and financial health. We also provide opportunities to keep skills relevant through certifications, learning, and diverse work experiences. We’re proud to be consistently recognized as one of the World’s Best Workplaces™.

Join Accenture to work at the heart of change. Visit us at ***.

This advertiser has chosen not to accept applicants from your region.

Senior Information Security Analyst - Information Security

751001 Bhubaneswar, Orissa ₹1150000 Annually WhatJobs

Posted 11 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Company: WhatJobs

Location: Bhubaneswar, Odisha, IN

Our client, a leading financial services firm, is seeking a highly competent Senior Information Security Analyst to join their dedicated security operations center in **Bhubaneswar, Odisha**. This is a critical on-site role, vital for maintaining the integrity and security of sensitive data.

The Senior Information Security Analyst will be responsible for identifying, assessing, and mitigating information security risks across the organization's IT infrastructure. The ideal candidate will possess extensive knowledge of cybersecurity principles, threat intelligence, vulnerability management, incident response, and security frameworks.

Key Responsibilities:
  • Monitor and analyze security alerts from various security tools (SIEM, IDS/IPS, EDR).
  • Investigate security incidents, conduct forensic analysis, and implement containment and eradication strategies.
  • Perform vulnerability assessments and penetration testing on systems and applications.
  • Develop and implement security policies, standards, and procedures.
  • Manage and maintain security infrastructure, including firewalls, intrusion detection systems, and antivirus solutions.
  • Conduct risk assessments and develop mitigation plans to address identified vulnerabilities.
  • Stay current with emerging threats, vulnerabilities, and security technologies.
  • Develop and deliver security awareness training to employees.
  • Participate in security audits and ensure compliance with regulatory requirements.
  • Collaborate with IT teams to implement security best practices in system design and deployment.
  • Develop and refine incident response plans and playbooks.
  • Contribute to the continuous improvement of the organization's security posture.

Qualifications:
  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • Minimum of 6 years of experience in information security, cybersecurity operations, or risk management.
  • In-depth knowledge of cybersecurity principles, threats, and attack vectors.
  • Hands-on experience with SIEM tools (e.g., Splunk, LogRhythm), IDS/IPS, and endpoint security solutions.
  • Experience with vulnerability scanning tools (e.g., Nessus, Qualys) and penetration testing methodologies.
  • Familiarity with security frameworks (e.g., NIST, ISO 27001) and compliance requirements.
  • Strong analytical and problem-solving skills with meticulous attention to detail.
  • Excellent communication and interpersonal skills, with the ability to work effectively in a team.
  • Relevant certifications such as CISSP, CISM, CEH, or GSEC are highly desirable.
  • Ability to work under pressure and respond effectively to security incidents.

This is a critical role in protecting our client's digital assets in **Bhubaneswar**. If you are a dedicated security professional committed to safeguarding information, we encourage you to apply.
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Chennai, Tamil Nadu Lexitas

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

About the company

Lexitas is a high growth company. The Company is built on a belief that having strong personal relationships with our clients, and providing reliable, accurate and professional services, is the driving force of our success.

Lexitas offers an array of services including local and national court reporting, medical record retrieval, process service, registered agent services and legal talent outsourcing. Our reach is truly national as well as international.

Lexitas is a MNC Company that has set up a subsidiary in Chennai, India – Lexitas India Pvt. Ltd. This Indian company will be the Lexitas Global Capability Center, helping build a world class IT development team, and over time serve as a Shared Services hub for several of the corporate functions.


For More Information -


This is a Full-Time Job located in Chennai, India.


Summary:

This position supports information security, privacy, risk and compliance programs and activities under the direction of the VP of Information Security or designated Information Security Manager. The position assists in developing and maintaining a comprehensive security program for Lexitas. Providing functional and technical support is important to maintain security posture and protection of electronically and physically stored information assets across our systems. Tasks include supporting design, implementation, configuration, documentation, and maintenance to mitigate risk to the business and its computing resources and assets, as well as collaborating with applicable providers, managing and monitoring tools, and facilitating applicable processes and procedures.


Key Roles and Responsibilities :

  • Supports IT security, privacy, risk and compliance systems, processes, supporting activities, with the ability to lead activities and programs.
  • Monitors computer networks and associated tools and provider services for security, privacy, risk and compliance issues
  • Supports the project management, tracking, and documentation of Information, Privacy, Risk, and Compliance programs, processes, and activities
  • Investigate security breaches and cybersecurity incidents.
  • Documents security breaches and assesses impact.
  • Performs and/or supports security tests, risk assessments, and audits to uncover network, application, and process vulnerabilities and provides guidance and training to ensure violations do not persist.
  • Tracks and facilitates the mitigation of vulnerabilities to maintain a high security standard.
  • Supports best practices for IT security, privacy and compliance.
  • Performs and supports 3rd party vulnerability management and penetration testing.
  • Research security enhancements and makes recommendations to management.
  • Stays current on information technology trends and security standards.
  • Prepares reports that detail security, privacy, and compliance risk assessment findings.
  • Supports Security Operations Center functions including monitoring and supporting Incident Response activities.
  • Supports all related IT Security, Privacy, Risk and Compliance policies and provides guidance to the business.
  • Other Information Security, Privacy, Risk, and Compliance duties as required.


Skills and Abilities:

  • Experience with computer network and application vulnerability management and penetration testing, and techniques.
  • Solid understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
  • Ability to identify and mitigate network and application vulnerabilities.
  • Good understanding of patch management
  • Proficient with various OS
  • Excellent written and verbal communication skills
  • Knowledge of firewalls, antivirus, and intrusion detection system concepts
  • Ability to support and document areas of Information Security, Privacy, Risk, and compliance processes and programs.
  • Ability to support incident response process.
  • Experience directing 3rd Party providers in the areas of Information Security, Privacy, Risk and Compliance
  • Support information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
  • Preferred KSA’s:
  • Strong working knowledge and experience with primary Information Security, Privacy, Risk, and compliance standards and frameworks such as NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.
  • Experience administering information security software and controls.
  • Experience supporting process for managing network and application security.
  • Network and system administration experience a plus.
  • Good understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices.
  • Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
  • Learns and monitors the business processes for the areas of primary support responsibility.
  • Support annual Security Baseline Audits and execution of recommendations.
  • As part of the technology team, performs “Help Desk” day-to-day tasks in support of Information Security, Privacy, Risk, and Compliance.



Education and Experience:

  • Bachelor’s degree in computer science or related field strongly preferred.
  • IAT Level-2 technical certification strongly preferred (Comp TIA Security+ or CISSP) or ability to obtain within first 90 days of hire.
  • 5+ years’ experience performing role of Information Security Analyst or SOC
  • Demonstrated experience in responding to, managing, and resolving security incidents.
  • Experience with LAN/WAN networking concepts, IP addressing and routing concepts, Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
  • Experience with Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
  • Experience working with Security Information and Even Management (SIEM) system is a plus.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security analysts Jobs in India !

Information Security Analyst

Advantmed India LLP

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

Job Description – Information Security Analyst (Compliance & Stakeholder Engagement Focus)

  • Location: Remote
  • Department: Compliance
  • Employment Type: Full-Time
  • Reports To: Manager / Sr Manager - Compliance Team


About Us

We are a HITRUST-certified Business Associate (BA) operating in the healthcare space, committed to securing sensitive health data and ensuring full compliance with HIPAA Security, Privacy, and Breach Notification Rules. Our Information Security & Compliance team plays a critical role in protecting data, building trust with clients, and supporting regulatory adherence across the organization.

Job Summary

This role is ideal for a people-oriented, proactive communicator who enjoys collaborating with diverse teams, coordinating training and onboarding sessions, and being the bridge between compliance, IT, and business stakeholders. While a foundational understanding of information security and compliance is expected, strong communication, facilitation, and stakeholder engagement skills are the true keys to success in this position.


Fresh graduates with an interest in cybersecurity, compliance, and stakeholder coordination are encouraged to apply. Full training, mentorship, and hands-on project involvement will be provided.

Key Responsibilities

  • Facilitate security awareness and compliance training sessions during employee onboarding and ongoing engagements.
  • Act as a point of contact for internal teams and external clients regarding compliance-related queries.
  • Help coordinate meetings, compliance walkthroughs, and documentation reviews across IT, HR, Legal, and client teams.
  • Assist in client assessments, RFPs, RFIs , and security questionnaires by working closely with SMEs.
  • Collaborate with IT and operations to ensure Change Management and Access Control practices are followed and well-documented.
  • Support the incident response process, including maintaining logs and facilitating communication between teams.
  • Help manage internal documentation: policies, procedures, training materials, and reports.
  • Track changes in industry regulations and communicate implications to relevant stakeholders in a clear, understandable manner.
  • Participate in internal and external audits by organizing evidence, facilitating interviews, and ensuring preparedness.


Required Qualifications

  • Bachelor’s degree in Information Security, Computer Science, IT, Engineering, or a related field.
  • Strong interest in compliance, data privacy, communication, and cross-functional collaboration.
  • Excellent verbal and written communication skills; ability to convey technical concepts to non-technical audiences.
  • Comfortable conducting presentations, hosting sessions, and coordinating with multiple stakeholders.
  • Detail-oriented with a proactive, organized approach to work.
  • Willingness to work the 4:00 PM – 1:30 AM IST shift to support U.S.-based clients.


Preferred Qualifications

  • Familiarity with HIPAA, HITRUST, ISO 27001, or NIST frameworks.
  • Exposure to GRC tools, IT controls, or compliance documentation (preferred, not mandatory).
  • 27001:2022 Lead Auditor certification is a plus, but not required .


Why Join Us?

  • Be the communication hub for a fast-paced, compliance-driven team working in the healthcare sector.
  • Gain real-world experience in HITRUST, HIPAA, and global cybersecurity frameworks.
  • Collaborate with IT, Legal, HR, and client teams on meaningful projects that protect sensitive data.

Work in a supportive, learning-focused environment with clear career growth opportunities in compliance, training, and stakeholder engagement

This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Chennai, Tamil Nadu Lexitas

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

About the company

Lexitas is a high growth company. The Company is built on a belief that having strong personal relationships with our clients, and providing reliable, accurate and professional services, is the driving force of our success.

Lexitas offers an array of services including local and national court reporting, medical record retrieval, process service, registered agent services and legal talent outsourcing. Our reach is truly national as well as international.

Lexitas is a MNC Company that has set up a subsidiary in Chennai, India – Lexitas India Pvt. Ltd. This Indian company will be the Lexitas Global Capability Center, helping build a world class IT development team, and over time serve as a Shared Services hub for several of the corporate functions.

For More Information -

This is a Full-Time Job located in Chennai, India.

Summary:

This position supports information security, privacy, risk and compliance programs and activities under the direction of the VP of Information Security or designated Information Security Manager. The position assists in developing and maintaining a comprehensive security program for Lexitas. Providing functional and technical support is important to maintain security posture and protection of electronically and physically stored information assets across our systems. Tasks include supporting design, implementation, configuration, documentation, and maintenance to mitigate risk to the business and its computing resources and assets, as well as collaborating with applicable providers, managing and monitoring tools, and facilitating applicable processes and procedures.

Key Roles and Responsibilities:

  • Supports IT security, privacy, risk and compliance systems, processes, supporting activities, with the ability to lead activities and programs.
  • Monitors computer networks and associated tools and provider services for security, privacy, risk and compliance issues
  • Supports the project management, tracking, and documentation of Information, Privacy, Risk, and Compliance programs, processes, and activities
  • Investigate security breaches and cybersecurity incidents.
  • Documents security breaches and assesses impact.
  • Performs and/or supports security tests, risk assessments, and audits to uncover network, application, and process vulnerabilities and provides guidance and training to ensure violations do not persist.
  • Tracks and facilitates the mitigation of vulnerabilities to maintain a high security standard.
  • Supports best practices for IT security, privacy and compliance.
  • Performs and supports 3rd party vulnerability management and penetration testing.
  • Research security enhancements and makes recommendations to management.
  • Stays current on information technology trends and security standards.
  • Prepares reports that detail security, privacy, and compliance risk assessment findings.
  • Supports Security Operations Center functions including monitoring and supporting Incident Response activities.
  • Supports all related IT Security, Privacy, Risk and Compliance policies and provides guidance to the business.
  • Other Information Security, Privacy, Risk, and Compliance duties as required.

Skills and Abilities:

  • Experience with computer network and application vulnerability management and penetration testing, and techniques.
  • Solid understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
  • Ability to identify and mitigate network and application vulnerabilities.
  • Good understanding of patch management
  • Proficient with various OS
  • Excellent written and verbal communication skills
  • Knowledge of firewalls, antivirus, and intrusion detection system concepts
  • Ability to support and document areas of Information Security, Privacy, Risk, and compliance processes and programs.
  • Ability to support incident response process.
  • Experience directing 3rd Party providers in the areas of Information Security, Privacy, Risk and Compliance
  • Support information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
  • Preferred KSA’s:
  • Strong working knowledge and experience with primary Information Security, Privacy, Risk, and compliance standards and frameworks such as NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.
  • Experience administering information security software and controls.
  • Experience supporting process for managing network and application security.
  • Network and system administration experience a plus.
  • Good understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices.
  • Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
  • Learns and monitors the business processes for the areas of primary support responsibility.
  • Support annual Security Baseline Audits and execution of recommendations.
  • As part of the technology team, performs “Help Desk” day-to-day tasks in support of Information Security, Privacy, Risk, and Compliance.

Education and Experience:

  • Bachelor’s degree in computer science or related field strongly preferred.
  • IAT Level-2 technical certification strongly preferred (Comp TIA Security+ or CISSP) or ability to obtain within first 90 days of hire.
  • 5+ years’ experience performing role of Information Security Analyst or SOC
  • Demonstrated experience in responding to, managing, and resolving security incidents.
  • Experience with LAN/WAN networking concepts, IP addressing and routing concepts, Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
  • Experience with Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
  • Experience working with Security Information and Even Management (SIEM) system is a plus.
This advertiser has chosen not to accept applicants from your region.

Information security analyst

Vellore, Tamil Nadu Advantmed India LLP

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description – Information Security Analyst (Compliance & Stakeholder Engagement Focus)Location: RemoteDepartment: ComplianceEmployment Type: Full-TimeReports To: Manager / Sr Manager - Compliance TeamAbout UsWe are a HITRUST-certified Business Associate (BA) operating in the healthcare space, committed to securing sensitive health data and ensuring full compliance with HIPAA Security, Privacy, and Breach Notification Rules. Our Information Security & Compliance team plays a critical role in protecting data, building trust with clients, and supporting regulatory adherence across the organization.Job SummaryThis role is ideal for a people-oriented, proactive communicator who enjoys collaborating with diverse teams, coordinating training and onboarding sessions, and being the bridge between compliance, IT, and business stakeholders. While a foundational understanding of information security and compliance is expected, strong communication, facilitation, and stakeholder engagement skills are the true keys to success in this position.Fresh graduates with an interest in cybersecurity, compliance, and stakeholder coordination are encouraged to apply. Full training, mentorship, and hands-on project involvement will be provided.Key ResponsibilitiesFacilitate security awareness and compliance training sessions during employee onboarding and ongoing engagements.Act as a point of contact for internal teams and external clients regarding compliance-related queries.Help coordinate meetings, compliance walkthroughs, and documentation reviews across IT, HR, Legal, and client teams.Assist in client assessments, RFPs, RFIs, and security questionnaires by working closely with SMEs.Collaborate with IT and operations to ensure Change Management and Access Control practices are followed and well-documented.Support the incident response process, including maintaining logs and facilitating communication between teams.Help manage internal documentation: policies, procedures, training materials, and reports.Track changes in industry regulations and communicate implications to relevant stakeholders in a clear, understandable manner.Participate in internal and external audits by organizing evidence, facilitating interviews, and ensuring preparedness.Required QualificationsBachelor’s degree in Information Security, Computer Science, IT, Engineering, or a related field.Strong interest in compliance, data privacy, communication, and cross-functional collaboration.Excellent verbal and written communication skills; ability to convey technical concepts to non-technical audiences.Comfortable conducting presentations, hosting sessions, and coordinating with multiple stakeholders.Detail-oriented with a proactive, organized approach to work.Willingness to work the 4:00 PM – 1:30 AM IST shift to support U. S.-based clients.Preferred QualificationsFamiliarity with HIPAA, HITRUST, ISO 27001, or NIST frameworks.Exposure to GRC tools, IT controls, or compliance documentation (preferred, not mandatory).27001:2022 Lead Auditor certification is a plus, but not required.Why Join Us?Be the communication hub for a fast-paced, compliance-driven team working in the healthcare sector.Gain real-world experience in HITRUST, HIPAA, and global cybersecurity frameworks.Collaborate with IT, Legal, HR, and client teams on meaningful projects that protect sensitive data.Work in a supportive, learning-focused environment with clear career growth opportunities in compliance, training, and stakeholder engagement

This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Analysts Jobs