HamburgerMenu
hirist

Job Description

Description :


We are looking for a strategic and analytical Tech Business Analyst with a strong background in Cybersecurity to join our team in Pune. With over 5 years of experience, you will act as the vital bridge between our technical security teams and broader business stakeholders, translating complex security needs into actionable requirements.

The ideal candidate possesses a unique blend of business process expertise and a deep understanding of the IT security landscape, specifically in vulnerability management and compliance.

Role Overview :

Position : Tech Business Analyst (Cybersecurity)

Experience : 5+ Years

Location : Pune, India

Domain : Information Security / Risk & Compliance

Key Responsibilities :

- Requirements Management : Lead the discovery, elicitation, and documentation of business and technical requirements for security projects.

- Process Analysis : Map out "As-Is" security workflows and design "To-Be" processes to improve operational efficiency and security posture.

- Vulnerability & Compliance : Support the Vulnerability Management lifecycle by analyzing scan results, prioritizing remediation efforts, and ensuring alignment with global compliance standards (e.g., ISO 27001, NIST, or SOC2).

- Data Interpretation : Utilize Advanced Excel to analyze large security datasets, identify trends in threats or compliance gaps, and present findings through meaningful visualizations.

- Technical Documentation : Create high-quality project artifacts, including Functional Requirement Specifications (FRS), Business Requirement Documents (BRD), User Stories, and Process Flow Diagrams.

- Stakeholder Management : Facilitate communication between IT, Security Operations, Audit, and Business leaders to ensure project goals are met and security risks are understood.

Mandatory Skills & Qualifications :

- Core Business Analysis : 5+ years of experience in requirements engineering, stakeholder interviewing, and workshop facilitation.

- Cybersecurity Domain Knowledge : Proven understanding of IT Security principles, including identity management, network security, and risk assessment frameworks.

- Data Proficiency : Expert-level skills in Microsoft Excel (Pivot Tables, VLOOKUPs, Data Modeling) for interpreting security metrics and reporting.

- Documentation Excellence : Ability to translate highly technical security concepts into clear, concise documentation for non-technical audiences.

- Collaboration : Strong interpersonal skills with a proven track record of managing stakeholders across different geographies and technical levels.

Preferred Technical Competencies :

- Experience with Agile methodologies and tools like Jira or Confluence.

- Familiarity with GRC (Governance, Risk, and Compliance) tools.

- Professional certifications such as CBAP (Certified Business Analysis Professional) or CompTIA Security+.


info-icon

Did you find something suspicious?