InfoSec L2 Security Engineer - IST Hours
Hyderabad, India
Zoetis
Zoetis is the largest global animal health company committed to nurturing the world and humankind by advancing care for animals. Learn more.POSITION SUMMARY
Zoetis, Inc. is the world's largest producer of medicine and vaccinations for pets and livestock. The Zoetis Tech & Digital (ZTD) Global Technology Risk Management Organization is a key building block of ZTD.
Join us at Zoetis India Capability Center (ZICC) in Hyderabad, where innovation meets excellence. As part of the world's leading animal healthcare company, ZICC is at the forefront of driving transformative advancements and applying technology to solve the most complex problems. Our mission is to ensure sustainable growth and maintain a competitive edge for Zoetis globally by leveraging the exceptional talent in India.
At ZICC, you'll be part of a dynamic team that partners with colleagues worldwide, embodying the true spirit of One Zoetis. Together, we ensure seamless integration and collaboration, fostering an environment where your contributions can make a real impact. Be a part of our journey to pioneer innovation and drive the future of animal healthcare.
The Information Security Strategy & Risk Management team at Zoetis ensures a secure strategy through a disciplined process of making colleagues security savvy, driving down residual risk, reducing the attack surface, all while enabling the business. This team is responsible for critical services that strengthen Zoetis' security posture, including protecting sensitive data, identifying and mitigating cyber threats, and seamlessly integrating secure assets during organizational changes. Key functions within the team include Security Operations, Vulnerability Management, Threat Intelligence, Security Awareness, Mergers & Acquisitions Security, and Operational Technology (OT) Security. Through these services, the team empowers the organization to operate securely and efficiently in a dynamic digital environment.
The Security Engineer will work closely with onshore security teams to maintain, enhance, and mature security capabilities and tooling across Information Security. This role will focus on ensuring the reliability, scalability, and effectiveness of security tools and processes, proactively identifying opportunities for improvement, and implementing solutions to strengthen the organization’s overall security posture. The Security Engineer will also contribute to expanding the scope of existing security capabilities to meet evolving business and regulatory requirements. Through strong collaboration and technical expertise, this position will play a critical role in safeguarding the organization’s systems and data.
POSITION RESPONSIBILITIES
. Percent of Time
• Partner with onshore security teams to design, implement, and maintain security tools and capabilities that support the goals of the Information Security organization.
• Enhance and optimize the performance, scalability, and reliability of security operations and vulnerability management tools.
• Identify opportunities for improvement by analyzing existing security processes, tools, and workflows, and implement innovative solutions to address gaps.
• Support the expansion and maturation of security capabilities, ensuring alignment with evolving business needs, regulatory requirements, and industry best practices.
• Collaborate across multiple Information Security functions, including Security Operations, Vulnerability Management, Threat Intelligence, and Security Awareness, to drive security initiatives.
• Monitor the effectiveness of implemented security solutions and provide recommendations for continuous improvement.
• Assist in the integration and deployment of new security tools and technologies into the organization’s environment.
• Provide technical expertise and guidance to both onshore and offshore teams to ensure solutions are implemented effectively and securely.
• Contribute to the development of documentation, playbooks, and standard operating procedures for security tools and processes.
• Stay up-to-date with the latest security trends, vulnerabilities, and technologies to proactively address emerging threats. 100%
ORGANIZATIONAL RELATIONSHIPS
• Collaborates closely with onshore security teams, including Security Operations, Vulnerability Management, Threat Intelligence, and Security Awareness.
• Works with cross-functional teams such as Infrastructure, Application Development, and Cloud Engineering to ensure seamless integration and operation of security tools.
• Partners with Identity and Access Management teams to implement and maintain secure access controls.
• Engages with external vendors and service providers to evaluate and integrate third-party security solutions.
• Coordinates with internal stakeholders to align security initiatives with business objectives and compliance requirements.
EDUCATION AND EXPERIENCE
Education:
• University Degree in Computer Science or Information Systems is required
• MS or advanced identity courses or other applicable certifications is desirable, including
o Certified Information Systems Security Professional (CISSP)
• Relevant certifications in infrastructure security and vulnerability management, such as Offensive Security Certified Professional (OSCP), GIAC Certified Vulnerability Assessor (GCVA), or Certified Ethical Hacker (CEH), are highly preferred
Experience:
• A minimum of 6+ years of relevant experience with a strong background in security operations, vulnerability management, and security engineering.
• 2+ years of experience in the pharmaceutical or other regulated industry, especially Animal Health.
• Experience working with global teams across multiple time zones.
• Demonstrated ability to work within diverse technical teams.
TECHNICAL SKILLS REQUIREMENTS• Strong knowledge of security tools and technologies, such as SIEM (e.g., Splunk, NextGen SIEM), vulnerability scanners (e.g., Nessus), and endpoint detection and response (CrowdStrike) solutions.
• Proficiency in scripting and automation using languages such as Python, PowerShell, or Bash to streamline security processes.
• Experience with cloud security tools and platforms (e.g., AWS, Azure, GCP) and securing cloud-native environments.
• Solid understanding of network security concepts, including firewalls, IDS/IPS, VPNs, and zero-trust architectures.
• Familiarity with identity and access management (IAM) solutions, such as Azure AD, Secret Server, and Sailpoint.
• Knowledge of threat detection, incident response, and vulnerability management processes and tools.
• Experience with container security and DevSecOps practices.
• Strong understanding of encryption technologies, key management, and secure coding practices.
• Ability to analyze and interpret security data to identify trends, vulnerabilities, and potential threats.
• Familiarity with regulatory requirements and compliance standards (e.g., GDPR, HIPAA, PCI DSS).
PHYSICAL POSITION REQUIREMENTS
This role will primarily work IST business hours. However, must have some flexibility to work between 1pm IST to 10pm IST as needed for project and special circumstances.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation AWS Azure Bash CEH CISSP Cloud Compliance Computer Science CrowdStrike DevSecOps EDR Encryption Firewalls GCP GDPR GIAC HIPAA IAM IDS Incident response IPS Nessus Network security Offensive security OSCP PCI DSS PowerShell Python Risk management SailPoint Scripting Security strategy SIEM Splunk Strategy Threat detection Threat intelligence VPN Vulnerabilities Vulnerability management
Perks/benefits: Career development
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.