Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
- Information Security Operations
- Vulnerability Management
- Conduct regular vulnerability assessments of all application servers.
- Ensure timely patching and remediation of identified vulnerabilities.
- Endpoint Security
- Maintain compliance of all endpoints with Falcon CrowdStrike antivirus and EDR.
- Ensure consistent endpoint protection coverage across the organization.
- Security Incident Response
- Monitor and respond to alerts from SIEM tools in coordination with Corporate IT.
- Investigate and resolve security incidents such as malware, phishing, and breaches.
- Network Security
- Monitor and secure network traffic using firewalls, IDS/IPS.
- Configure and maintain secure LAN/WAN, Wi-Fi, and VPN access.
- Manage Wi-Fi security at plant and corporate office.
- Tool Deployment & Management
- Manage deployment and operations of security tools (EDR, DLP, encryption, etc.).
- Liaise with third-party vendors for security tools and updates.
- Policy & Procedure Management
- Deploy, maintain, and periodically review IT policies and procedures.
- Modify policies based on business requirements or corporate IT recommendations.
- Audit & Documentation
- Prepare documentation for internal and external IT audits.
- Support audit processes and provide necessary evidence and responses.
- Compliance
- Ensure compliance with applicable standards (ISO 27001, GDPR, SOC 2, etc.).
- Conduct internal compliance checks and assist external auditors.
- Risk Management
- Perform periodic IT risk assessments.
- Identify security risks and recommend mitigation strategies to IT leadership.
- User Lifecycle Management
- Handle user provisioning and de-provisioning in systems and applications.
- Implement and monitor role-based access control and MFA.
- Access Audits
- Periodically review user access rights.
- Address access anomalies and unauthorized permissions.
- Training & Awareness
- Conduct cybersecurity awareness sessions for all employees.
- Develop and distribute best practice guides and security communications.
Key Skills
Ranked by relevanceReady to apply?
Join Larsen & Toubro and take your career to the next level!
Application takes less than 5 minutes