October 15, 2025

Senior Security Analyst

Information Technology Edwards India Pune

Your future job

Our solutions are a key part of most industries - electronics, medical research, renewable energy, food production, infrastructure and many more. Working with us means working with the latest technologies and groundbreaking, sustainable innovations.

Join us on our journey for a better tomorrow.

Mission/Purpose of the Job
Security Operations Lead plays a crucial role in maintaining a Vacuum Technique Business Area's cybersecurity posture, Security Operations Lead will be involved in and/or leading multiple streams including but not limited to; Security Operations, Mergers & Acquisitions integration, Risk and Vulnerability Management

Main Responsibilities

Leadership and Mentorship:

  • Lead by example a team of Security analysts, providing direction, support, and coaching to ensure the team meets performance objectives.
  • Develop and maintain an effective security team through hiring, training, and career development initiatives.
  • Represent Security Operations and the wider Information Security function in the global technology team. Be a central point of contact for day-to-day activities and relationships with key stakeholders for Security Operations activities:Security Operations, Mergers & Acquisitions integration, risk management and Vulnerability Management.
  • Establish metrics and monitoring to report the effectiveness and efficiency of the Security Operations function.
  • Identify and implement new ways to automate and improve Security across the business.
  • Working collaboratively with other IT/ Group Security, Information Security, Architecture, Business and PMO teams within Vacuum Technique and the wider Atlas Copco Group.

Security Operations:

Overseas Security Operations including reviewing and making the activities efficient and aligned with industry

standards: 

  •  Incident Response: Review, action Incidents, Requests within SLA
  • Generic account approvals: Thorough investigation on request and process review within SLA
  • Admin access requests: Thorough investigation on request and process review within SLA 
  • Third-Party Apps Assessment and Approval: Security questionnaire for assessment based on type of apps and use within SLA following SOPs
  • Process reviews and documentation: Review existing process and update. Create new SOPs for all Security Operations activities
  • Security and firewall changes assessment: Change approval process review and security assessment within SLA following SOPs
  • Reporting related to Security Tasks: Producing and Deliver the project reports every 2 weeks
  • Customer Assessment: Audit and assessment by Customer and share the required evidence within SLA following SOPs
  • SecOps -Group Security - Working with Group Security on Ad-Hoc tasks
  • OT Security Baselining to be completed on demand

Vulnerability Management:

Overseas Vulnerability Management including reviewing and making the activities efficient and aligned with industry

standards: 

  • Pentest Scoping: Liaising with the product owner and Order Apps Pentest following SOP and within SLA
  • Follow-Ups: Follow-up to achieve the milestone: until vulnerabilities are mitigated / remediated
  • Reporting: Testing and Remediation: Review test reports for Remediation following SOP and within SLA
  • Exception Process: Liaising with the product owner to understand the application details and exceptions following SOP and within SLA

Collaboration and Stakeholder Management:

  • Work closely with Group IT operations, infrastructure teams, and external vendors to ensure seamless integration of security measures.
  • Collaborate with business units to understand and implement security requirements tailored to the organization’s needs.

Documentation and Reporting:

  • Document security procedures, best practices, and lessons learned for internal and regulatory purposes.
  • Prepare detailed security reports and presentations for senior management on risk assessments, incident response, and system status.

Mergers & Acquisitions integration, risk management:

Oversees Mergers & Acquisitions including reviewing and making the activities efficient and aligned with industry

standards: 

  • Due Diligence (DD): Kickstart the M&A process by performing DD as per Group Security template following SOP and within SLA
  • Testing: Manage the scoping of Security testing following SOP and within SLA
  • Risk Identification and Remediation: Follow up on Risk Identified during DD and Pentest following SOP and within SLA
  • ATP Rollout: Identify the asset and perform the ATP installation on assets in scope following SOP and within SLA
  • Liaising with IT infra. Team: Work with IT Infra. Team and help in a secure way of implementation/integration
  • Application Review: Review the applications and provide recommendations/alternatives following SOP and within SLA
  • M&A regular Reporting: Provide the M&A information as per the group security requirements to all stakeholders. Ensure all trackers ‘Risks Registers, M&A, Application/Software Assessments, Customer Assessments are always up to date.

Experience:

At least 8-10 years of experience working in Security Operations, with hands-on experience in

  • Security Testing: Ability to simulate cyberattacks to identify and exploit vulnerabilities in systems and networks
  • Vulnerability Assessment: Proficiency in using tools to scan and identify vulnerabilities in various systems and applications
  • Risk Assessment and Management: Skills to evaluate the potential impact of vulnerabilities and prioritize remediation efforts based on risk
  • Threat Intelligence: Understanding of current threat landscapes and the ability to analyse threat data to anticipate and mitigate potential attacks
  • Patch Management: Knowledge of applying patches and updates to software and systems to fix vulnerabilities
  • Configuration Management: Ensuring systems are securely configured and maintaining these configurations over time
  • Compliance and Regulatory Knowledge: Understanding of legal and regulatory requirements related to cybersecurity (NIST, CRA, CMMC, ISO 27001, CISM) and ensuring systems comply with these standards

Education:

  • Bachelor’s degree in Information Technology, Computer Science, or a related field.
  • Relevant certifications such as ISO 27001, CISM are highly desirable.

Personal Attributes:

  • Strong attention to detail and a methodical approach to security management.
  • Excellent communication skills, with the ability to work collaboratively with both technical and non-technical stakeholders.
  • Ability to manage multiple priorities and work in a fast-paced environment.
  • Strong analytical skills and a proactive approach to security risk management.
Functional area: Information Technology
País: India
Ciudad: Pune
On-site/remote: Hybrid
Marca: Edwards
Company Name: Edwards India Private Ltd
Date of Posting: October 15, 2025
Last day to apply: October 31, 2025