We are looking for a strategic and analytical Tech Business Analyst with a strong background in Cybersecurity to join our team in Pune. With over 5 years of experience, you will act as the vital bridge between our technical security teams and broader business stakeholders, translating complex security needs into actionable requirements.
The ideal candidate possesses a unique blend of business process expertise and a deep understanding of the IT security landscape, specifically in vulnerability management and compliance.
Role Overview :
Position : Tech Business Analyst (Cybersecurity)
Experience : 5+ Years
Location : Pune, India
Domain : Information Security / Risk & Compliance
Key Responsibilities :
- Requirements Management : Lead the discovery, elicitation, and documentation of business and technical requirements for security projects.
- Process Analysis : Map out "As-Is" security workflows and design "To-Be" processes to improve operational efficiency and security posture.
- Vulnerability & Compliance : Support the Vulnerability Management lifecycle by analyzing scan results, prioritizing remediation efforts, and ensuring alignment with global compliance standards (e.g., ISO 27001, NIST, or SOC2).
- Data Interpretation : Utilize Advanced Excel to analyze large security datasets, identify trends in threats or compliance gaps, and present findings through meaningful visualizations.
- Technical Documentation : Create high-quality project artifacts, including Functional Requirement Specifications (FRS), Business Requirement Documents (BRD), User Stories, and Process Flow Diagrams.
- Stakeholder Management : Facilitate communication between IT, Security Operations, Audit, and Business leaders to ensure project goals are met and security risks are understood.
Mandatory Skills & Qualifications :
- Core Business Analysis : 5+ years of experience in requirements engineering, stakeholder interviewing, and workshop facilitation.
- Cybersecurity Domain Knowledge : Proven understanding of IT Security principles, including identity management, network security, and risk assessment frameworks.
- Data Proficiency : Expert-level skills in Microsoft Excel (Pivot Tables, VLOOKUPs, Data Modeling) for interpreting security metrics and reporting.
- Documentation Excellence : Ability to translate highly technical security concepts into clear, concise documentation for non-technical audiences.
- Collaboration : Strong interpersonal skills with a proven track record of managing stakeholders across different geographies and technical levels.
Preferred Technical Competencies :
- Experience with Agile methodologies and tools like Jira or Confluence.
- Familiarity with GRC (Governance, Risk, and Compliance) tools.
- Professional certifications such as CBAP (Certified Business Analysis Professional) or CompTIA Security+.