Pune
17 hours ago
Threat Analyst - Risk and Vulnerability and Cybersecurity
Threats and Controls Assessment

Hands-on experience in threat and vulnerability management within large-scale or regulated environments

Skilled in analyzing complex architectures, systems, and networks to identify potential security gaps and implement effective controls

Proficient in conducting thorough threat and control assessments across internal, external, and cloud environments

Experienced in detecting threats across applications, databases, networks, and other IT infrastructure components

2. Risk and Control

Proficient in risk and control management practices

Ability to evaluate threats, controls, and vulnerabilities, and communicate findings to both technical and business stakeholders

Skilled in threat modeling and risk assessment, with the ability to define effective controls to enhance security posture

Working knowledge of risk management frameworks and security assessment methodologies

3. Technical Leadership

Proven experience working as a technical lead with ownership of process improvements

Ability to guide cross-functional teams, ensuring technical excellence and alignment with project goals

4. Stakeholder Management & Soft Skills

Experience working in international and diverse environments

Strong interpersonal skills for influencing and managing stakeholders

Ability to build strong relationships and collaborate effectively within and across teams

Excellent communication skills for coordinating with global infrastructure, application, and compliance teams

Positive attitude, strong teamwork, flexibility, and a solid understanding of emerging technologies and associated security threats

Skilled in preparing reports and presentations for senior management and delivering them to large audiences

5. Tools and Technologies

Strong experience in application design and architecture with expertise in network, host, and application security practices

Proficient in working with cloud service providers such as AWS, GCP, and Azure

Strong understanding of the Software Development Life Cycle (SDLC), with a focus on integrating security at each stage

Proven experience in driving continuous improvement and process optimization initiative

Good to Have:

Prior experience in threat handling across IT infrastructure, including applications, databases, networks, and other components

Experience leading continuous improvement initiatives and process optimization

Possession of one or more of the following certifications: CISSP, CISA, CISM, or Cloud Security Certifications

Familiarity with regulatory security requirements across multiple jurisdictions

Por favor confirme su dirección de correo electrónico: Send Email