×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Security Analyst

Job in 452001, Indore, Madhya Pradesh, India
Listing for: Intertec Systems
Full Time position
Listed on 2026-03-05
Job specializations:
  • IT/Tech
    Cybersecurity, Network Security
Job Description & How to Apply Below
Skills:

firewall, endpoint protection, privilege access management, Email Security, cisco, palo alto,

JOB TITLE:

Technical Analyst - Cyber Security (L2)  - Indore, India

JOB PURPOSE:

To protect the organizations IT infrastructure by actively monitoring, analyzing, and responding to security incidents and threats. The Technical Specialist - Cyber Security plays a key role in implementing cybersecurity controls, managing security tools, and ensuring compliance with industry standards and regulatory frameworks.

QUALIFICATION:

Engineering Degree (Computers / Electronics)

Certifications

CISM, CISA, CompTIA Security+ or equivalent

Cisco CCNA Security or similar, CEH

EXPERIENCE:

Minimum 5-8  years  of hands-on experience in cybersecurity operations, NOC environments, and security infrastructure management

Responsibilities (includes All Tasks)

The Technical Analyst - Cyber Security is responsible for monitoring, analyzing, and responding to security incidents using SIEM and other security tools. They play a critical role in maintaining endpoint and network security, managing access controls, supporting vulnerability and patch management, and ensuring compliance with ISO 27001 and other standards. The role includes regular system hardening, firmware updates, configuration backups, and documentation.

The engineer also assists with audit readiness, contributes to threat hunting, and collaborates with internal teams to maintain a secure IT environment.

Key Responsibilities

Perform triage and investigation of security events and escalate to infosec lead when needed.
Conduct daily health checks on firewalls, endpoints, security appliances, and SIEM systems.
Support and manage endpoint protection platforms, email security, and web filtering systems.
Participate in threat hunting activities and analyse suspicious activities or anomalies.
Coordinate and support vulnerability assessments and ensure timely patch compliance.
Maintain system hardening, secure configurations, and adhere to CIS benchmark standards.
Ensure security controls and processes align with ISO 27001, NIST, and other relevant frameworks.
Assist in preparing and participating in internal and external ISO audits.
Prepare and maintain accurate and up-to-date security process and documentation, audit logs, SOPs, and reports.
Perform regular configuration backups and firmware updates for security infrastructure.
Administer and maintain IAM, MFA, and PAM systems to ensure secure access controls.
Collaborate with infrastructure and application teams to support secure system operations.
Respond to audit findings, implement remediation steps, and ensure closure of compliance gaps.
Contribute to security awareness by documenting incidents, lessons learned, and procedures.
Participate in 24/7 on-call rotation or scheduled maintenance windows when required.

Required Skills And Experience

Strong understanding of network security technologies:
Firewalls:
Palo Alto, Fortigate, Cisco ASA/FTD
VPN technologies and Network Access Control (NAC)
Hands-on experience with security operations:
SIEM tools for monitoring, log analysis, and threat detection
Incident response and escalation handling
WAF - F5 ASM, Baracuda
Endpoint security management:
Tools such as Crowd Strike, Microsoft Defender, Sentinel One
DLP:
Forcepoint
Identity and Access Management (IAM):
Multi-Factor Authentication (MFA)
Privileged Access Management (PAM) - Cyber Ark
Vulnerability management:
Tools such as Nessus, Qualys
Patch management processes

Experience with :
Email security gateways:
Proofpoint, Mimecast, Cisco-ESA
Web proxies:
Forcepoint, Zscaler, Cisco-WSA
Security hardening and secure configuration practices:
CIS benchmarks, system hardening techniques
Proficiency in security monitoring and analysis tools:
SIEM platforms (e.g., Splunk, QRadar, Solar Winds SEM)
SOAR platforms (optional but beneficial)
Compliance and security governance:
Familiarity with ISO 27001, PCI-DSS, NIST, GDPR standards
Involvement in ISO audits, audit readiness, and compliance documentation
Assist in conducting periodic reviews of all infrastructure components
Assist in conducting vulnerability assessments and penetration testing scans, as well as coordinating…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary