HamburgerMenu
hirist

CC&L Financial Group - Senior Analyst - IT Network & Security

CONNOR CLARK LUNN INDIA PRIVATE LIMITED
Gurgaon/Gurugram
6 - 8 Years

Posted on: 19/01/2026

Job Description

What You Will Do :

- Responsible for performing two core functions for the enterpriseThe first is the day-to-day operations of the in-place security solutions while the second is the identification, investigation, and resolution of security breaches detected by those systems.

- Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments.

- Maintaining, managing and troubleshooting issues related to Network devices (Switches, Firewall, SDWan, Access Point, ISPs etc).

- Is expected to be fully aware of the enterprises security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals.

- Participate in the planning and design of enterprise security architecture, under the direction of the IT Security Manager, where appropriate.

- Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate.

- Participate in the planning and design of an enterprise business continuity plan and disaster recovery plan, under the direction of the IT Security Manager, where appropriate.

- Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors.

- Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.

- Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprises security documents specifically.

- Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e. , security tools) or not (e.g. , workstations, servers, network devices).

- Maintain operational configurations of all in-place security solutions as per the established baselines.

- Monitor all in-place security solutions for efficient and appropriate operations.

- Review logs and reports of all in-place devices, whether they be under direct control (i.e. , security tools) or not (e.g. , workstations, servers, network devices).

- Interpret the implications of that activity and devise plans for appropriate resolution.

- Participate in investigations into problematic activity.

- Participate in the design and execution of vulnerability assessments, penetration tests, and security audits.

- Provide on-call support for end users for all in-place security solutions.

- Smooth Functioning of NOC and SOC, which includes monitoring, documentation and remediation of identified issues and threats.

What You Bring :

- 6+ years of previous experience in IT Security.

- CompTIA Security+.

- GIAC Information Security Fundamentals.

- Microsoft Certified in any of the following : AZ-500, SC-200, SC-300, SC-400, and SC-100.

- Experience with Azure security tools and best practices.

- Experience with scripts and reporting (PowerShell, Sentinel, Power BI, SSRS).

- Experience with design, implementation, and support of Microsoft products (Endpoint Manager [SCCM + Intune], Microsoft 365 Copilot, Entra suite, Purview and Defender XDR and Azure).

- Experience with design, implementation, and support of SASE products (Secure Access Service Edge products like Palo-Alto Networks, Aruba, Netskope).

- Experience with virtualization (VMware and Hyper-V).

- Preferred certification with Microsoft & Palo Alto Networks.

- Education Degree or diploma in computer science field, or Information Management, or Information Technology field.

- Proven analytical and problem-solving abilities.

- Ability to effectively prioritize and execute tasks in a high-pressure environment.

- Good written, oral, and interpersonal communication skills.

- Ability to conduct research into IT security issues and products as required.

- Ability to present ideas in business-friendly and user-friendly language.

- Highly self-motivated and directed.

- Keen attention to detail.

- Team-oriented and skilled in working within a collaborative environment.


info-icon

Did you find something suspicious?

Similar jobs that you might be interested in