Talent.com
Associate Analyst - Information Security

Associate Analyst - Information Security

AccopsPune (division)
1 day ago
Job description

Education : MCA / BE / BTech / ME / MTech (Preferably in Comp Sc / IT / Cybersecurity)

Experience : 3-6 years

Technical Skills Required

Mandatory :

  • Implementation, configuration and management of end-point detection and response (EDR) tools like CrowdStrike Falcon.
  • Configuration and security administration for Microsoft 365 (O365, Defender and Azure)
  • Implementation, configuration and management of SIEM tools for monitoring security parameters across IT infrastructure in the data center and cloud.
  • Experience with implementation, configuration and management of data-loss-prevention (DLP) tools
  • Foundational knowledge and understanding of incident analysis, root cause analysis and risk assessment.
  • Foundational knowledge and experience with Identity and Access Management (IAM), including Privileged Access Management (PAM) and User access reviews.

Good to have :

  • Familiarity with ISO 27001, industry standards, and product security certifications.
  • Desirable Certifications :

  • Microsoft Certified : Security, Compliance and Identity Fundamentals (SC-900)
  • Microsoft 365 Certified Security Administrator
  • Microsoft Certified Azure Security Engineer (AZ-500)
  • GIAC Security Essentials (GSEC)
  • AWS Certified Security
  • (ISC)2 Certified in Cybersecurity
  • CrowdStrike Falcon Administrator
  • Soft Skills Required

  • Analytical thinking
  • Problem solving
  • Strong communication skills (written and verbal)
  • Attention to detail
  • Proactive, self-motivated
  • Flexible / adaptable
  • Role and Responsibilities :

  • Deploy, configure, and administer enterprise security tools across infrastructure and applications.
  • Review, analyze and respond to alerts from security tools.
  • Evaluate defensive capabilities and identify opportunities to simplify and improve security coverage and efficiency of operations.
  • Stay abreast of new tools and techniques to raise the security baseline for the organization
  • Prepare weekly, monthly and quarterly reports on cyber defenses.
  • Support security certifications like ISO27001 and SOC2 for Accops.
  • Review infrastructure design and architecture for security and compliance.
  • Strengthen cloud and IT infrastructure security posture (Azure, AWS, O365) with a focus on defensive security controls.
  • Oversee identity lifecycle, authentication mechanisms, and access controls through IAM frameworks.
  • Founded in 2012, Accops is a leading provider of secure remote access and digital workspace solutions, enabling organizations to maintain control and governance while offering flexibility to work from any device. Accops offers a comprehensive Digital Workspace suite that includes Zero Trust-based Application Access Gateway, End-User Computing (EUC) Virtualization via VDI, robust Identity & Access Management (IAM) solutions such as Multi-Factor Authentication (MFA) and Single Sign-On (SSO), and thin client hardware and software solutions.

    Accops addresses modern remote work challenges by delivering secure, instant access to business applications. Its solutions protect against network threats and unauthorized access, critical in todayโ€™s work-from-anywhere environment. Unlike traditional, multi-product approaches, Accops' pre-integrated suite reduces complexity and deployment time, ensuring faster and more agile implementation.

    Headquartered in Pune, Accops has become a significant player in the End-User Computing (EUC) virtualization domain, offering a one-stop solution for organizations seeking to deploy secure remote work infrastructures. Its products, including the Nano OS for secure containerization on BYOD devices, and extensive MFA and SSO capabilities, ensure robust data protection and strong identity management.

    Part of Jio Platforms Ltd, Accops continues to innovate and enhance digital workspace solutions with a focus on security, user experience, and operational efficiency.

    ๐˜ˆ๐˜ค๐˜ค๐˜ฐ๐˜ฑ๐˜ด ๐˜ช๐˜ด ๐˜ข๐˜ฏ ๐˜ฆ๐˜ฒ๐˜ถ๐˜ข๐˜ญ ๐˜ฐ๐˜ฑ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต๐˜ถ๐˜ฏ๐˜ช๐˜ต๐˜บ ๐˜ฆ๐˜ฎ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ๐˜ฆ๐˜ณ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฎ๐˜ช๐˜ต๐˜ต๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฃ๐˜ถ๐˜ช๐˜ญ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ข ๐˜ค๐˜ถ๐˜ญ๐˜ต๐˜ถ๐˜ณ๐˜ฆ ๐˜ธ๐˜ฉ๐˜ฆ๐˜ณ๐˜ฆ ๐˜ข๐˜ญ๐˜ญ ๐˜ฆ๐˜ฎ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ๐˜ฆ๐˜ฆ๐˜ด ๐˜ข๐˜ณ๐˜ฆ ๐˜ท๐˜ข๐˜ญ๐˜ถ๐˜ฆ๐˜ฅ, ๐˜ณ๐˜ฆ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ต๐˜ฆ๐˜ฅ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฐ๐˜ฑ๐˜ช๐˜ฏ๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ค๐˜ฐ๐˜ถ๐˜ฏ๐˜ต. ๐˜ž๐˜ฆ ๐˜ฆ๐˜ฏ๐˜ค๐˜ฐ๐˜ถ๐˜ณ๐˜ข๐˜จ๐˜ฆ ๐˜ข๐˜ฑ๐˜ฑ๐˜ญ๐˜ช๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ข๐˜ญ๐˜ญ ๐˜ด๐˜ถ๐˜ช๐˜ต๐˜ข๐˜ฃ๐˜ญ๐˜บ ๐˜ฒ๐˜ถ๐˜ข๐˜ญ๐˜ช๐˜ง๐˜ช๐˜ฆ๐˜ฅ๐˜ฑ๐˜ฆ๐˜ณ๐˜ด๐˜ฐ๐˜ฏ๐˜ด ๐˜ช๐˜ณ๐˜ณ๐˜ฆ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜ฐ๐˜ง, ๐˜ฃ๐˜ถ๐˜ต ๐˜ฏ๐˜ฐ๐˜ต ๐˜ญ๐˜ช๐˜ฎ๐˜ช๐˜ต๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ, ๐˜ต๐˜ฉ๐˜ฆ๐˜ช๐˜ณ ๐˜จ๐˜ฆ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ ๐˜ฐ๐˜ณ ๐˜จ๐˜ฆ๐˜ฏ๐˜ฆ๐˜ต๐˜ช๐˜ค ๐˜ช๐˜ฏ๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ, ๐˜ด๐˜ฆ๐˜น๐˜ถ๐˜ข๐˜ญ ๐˜ฐ๐˜ณ๐˜ช๐˜ฆ๐˜ฏ๐˜ต๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ, ๐˜ฆ๐˜ต๐˜ฉ๐˜ฏ๐˜ช๐˜ค๐˜ช๐˜ต๐˜บ, ๐˜ณ๐˜ฆ๐˜ญ๐˜ช๐˜จ๐˜ช๐˜ฐ๐˜ฏ, ๐˜ด๐˜ฐ๐˜ค๐˜ช๐˜ข๐˜ญ ๐˜ด๐˜ต๐˜ข๐˜ต๐˜ถ๐˜ด, ๐˜ฎ๐˜ฆ๐˜ฅ๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ค๐˜ข๐˜ณ๐˜ฆ ๐˜ญ๐˜ฆ๐˜ข๐˜ท๐˜ฆ ๐˜ณ๐˜ฆ๐˜ฒ๐˜ถ๐˜ช๐˜ณ๐˜ฆ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ด, ๐˜ฑ๐˜ฐ๐˜ญ๐˜ช๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ข๐˜ง๐˜ง๐˜ช๐˜ญ๐˜ช๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ, ๐˜ฑ๐˜ฆ๐˜ฐ๐˜ฑ๐˜ญ๐˜ฆ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ฅ๐˜ช๐˜ด๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด, ๐˜ค๐˜ฐ๐˜ญ๐˜ฐ๐˜ณ, ๐˜ฏ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ ๐˜ฐ๐˜ณ๐˜ช๐˜จ๐˜ช๐˜ฏ, ๐˜ท๐˜ฆ๐˜ต๐˜ฆ๐˜ณ๐˜ข๐˜ฏ ๐˜ด๐˜ต๐˜ข๐˜ต๐˜ถ๐˜ด, ๐˜ฆ๐˜ต๐˜ค. ๐˜ž๐˜ฆ ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ช๐˜ฅ๐˜ฆ๐˜ณ ๐˜ข๐˜ญ๐˜ญ ๐˜ข๐˜ฑ๐˜ฑ๐˜ญ๐˜ช๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด ๐˜ฃ๐˜ข๐˜ด๐˜ฆ๐˜ฅ ๐˜ฐ๐˜ฏ ๐˜ฎ๐˜ฆ๐˜ณ๐˜ช๐˜ต ๐˜ข๐˜ฏ๐˜ฅ ๐˜ด๐˜ถ๐˜ช๐˜ต๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜บ ๐˜ต๐˜ฐ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ณ๐˜ฐ๐˜ญ๐˜ฆ.

    Create a job alert for this search

    Information Security Analyst โ€ข Pune (division)