Sr Analyst, Information Security Operations

Hyderabad, India

Merative

Healthcare data and analytics products can advance your decision-making and performance. Rely on Merative for trusted technology and human expertise.

View all jobs at Merative

Apply now Apply later

Join a team dedicated to supporting the crucial mission of improving health outcomes.

At Merative,  you can apply your skills – and grow new ones – with colleagues who have deep expertise in health and technology. Merative provides data, analytics and software for the health industry. Our clients include providers, health plans, employers, life sciences companies and governments around the world. With industry-leading products and focused innovation, we help customers improve decision-making and performance so that together, we drive real progress in health. Learn more at merative.com

We are seeking an experienced and proactive Sr. Analyst, Information Security Operations to join our team and help safeguard our organization’s data, systems, and networks. This critical role involves the development, implementation, and management of security controls and measures designed to intercept and prevent internal and external attacks, safeguarding our email, data, e-commerce, and web-based systems. The ideal candidate will possess strong technical expertise in network security, vulnerability assessments, penetration testing, and incident response.
In this role, you will play a key part in identifying potential threats, performing cybersecurity audits, and responding to breaches while ensuring compliance with cybersecurity policies and best practices. The Sr. Analyst is essential for maintaining the integrity of our systems and protecting sensitive information across the organization.

Key Responsibilities:

  • Develop and Execute Security Controls: Design, implement, and manage security measures to prevent unauthorized access to systems and networks. Implement effective countermeasures to combat internal and external threats.
  • Manage Firewalls and Encryption Protocols: Maintain and configure hardware, software, network firewalls, and encryption protocols to protect critical infrastructure and data.
  • Administer Cybersecurity Policies: Administer and enforce policies controlling both physical and virtual access to systems, ensuring they align with industry standards and organizational goals.
  • Conduct Security Audits and Testing: Perform network security audits, vulnerability assessments, and system testing to identify weaknesses. Evaluate system security configurations for efficacy and compliance with cybersecurity standards.
  • Penetration Testing and Vulnerability Assessments: Conduct penetration tests and vulnerability assessments of applications, operating systems, and networks to proactively identify risks and vulnerabilities.
  • Incident Response and Breach Management: Monitor for, respond to, and mitigate cybersecurity breaches and incidents. Identify intrusions and take action to isolate, block, and remove unauthorized access.
  • Research and Threat Analysis: Conduct research on emerging cybersecurity threats, analyze root causes of incidents, and develop strategies to prevent future breaches.
  • Security Solution Implementation: Assist in the creation and implementation of security solutions that enhance system defense mechanisms, addressing both known and evolving security challenges.
  • Business Impact Communication: Communicate with management regarding the impact of security incidents, breaches, or attempted intrusions on the business. Report on the potential loss, alteration, or destruction of data or systems.
  • Collaboration: Work in collaboration with internal teams or external Professional Services and Outsourcing functions to ensure security solutions meet organizational needs.

Skills & Qualifications:

  • Experience: 2- 3+ years of experience in cybersecurity, information security operations, or a similar role within a corporate environment.
  • Technical Expertise: Strong proficiency in security protocols, firewalls, encryption, penetration testing, network security, and vulnerability management.
  • Knowledge of Security Tools: Familiarity with various security testing tools, intrusion detection systems (IDS), and security incident management platforms.
  • Incident Response: Hands-on experience in managing and responding to cybersecurity incidents, intrusions, and breaches.
  • Penetration Testing: Proven expertise in conducting penetration tests and vulnerability assessments to identify and remediate security risks.
  • Compliance & Standards: Knowledge of cybersecurity regulations and frameworks (e.g., GDPR, NIST, ISO 27001, PCI DSS) and experience in ensuring compliance.
  • Problem-Solving: Strong analytical and troubleshooting skills, with the ability to analyze security incidents and determine root causes.
  • Communication Skills: Strong ability to communicate complex security issues to non-technical stakeholders and provide actionable insights for business leadership.

Preferred Qualifications:

  • Bachelor’s degree in Information Security, Computer Science, or related field.
  • Relevant cybersecurity certifications (e.g., CISSP, CEH, CompTIA Security+, OSCP).
  • Familiarity with cloud security and hosted network environments.
  • Experience with secure development practices and collaboration with software engineering teams on cybersecurity.
  • Knowledge of securing web-based solutions and e-commerce platforms.

Work Environment & Additional Information:

  • Ability to work independently and as part of a team to achieve security objectives and improve overall security posture.
  • The role is client-focused and may involve external interactions depending on business needs.

Why Join Us?

This is an exciting opportunity for an experienced cybersecurity professional to make a significant impact on an organization’s information security infrastructure. If you’re looking to work in a fast-paced, innovative environment with opportunities to grow and develop your skills, this role is perfect for you.

We offer competitive salaries, benefits, and a collaborative team environment where your contributions will help drive our company’s security initiatives forward.

It is the policy of Merative to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, HIV status, or any other characteristic protected by federal, state or local law. In addition, Merative will provide reasonable accommodations for qualified individuals with disabilities.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  1  0

Tags: Analytics Audits CEH CISSP Cloud Compliance CompTIA Computer Science E-commerce Encryption Firewalls GDPR IDS Incident response Intrusion detection ISO 27001 Network security NIST OSCP PCI DSS Pentesting Vulnerabilities Vulnerability management

Perks/benefits: Career development Health care

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.