It Manager

Year    Delhi, India

Job Description

About 2070Health
W Health has set up India's first healthcare focused Venture Studio called - an innovation platform that builds transformative healthcare companies from scratch by discovering disruptive opportunities in whitespaces. Distinct from the accelerator approach, our venture studio is closely involved in idea generation, day-to-day operations, and strategic decisions of growing the new business. Companies incubated in the last 24 months include , , , and .
Role Overview
The IT Manager will be responsible for managing and securing the entire IT infrastructure of the organization, ensuring compliance with the Cybersecurity & Cyber Resilience Framework (CSCRF), and supporting employees across multiple office locations. This role covers IT operations, cybersecurity designing, implementation, asset management, networking, hardware/software lifecycle, vendor management, patching, backup, endpoint security, and user support.
The IT Manager will work on designing and implementation of all cybersecurity controls.
Key Responsibilities
1. IT Infrastructure & Operations
A. End-User & Hardware Management

  • Manage and support laptops, desktops, printers, peripherals for ~40 staff across multiple cities.
  • Enforce device hardening and security baselines (as per OS, endpoint, and network hardening policies).
  • Ensure secure device provisioning, configuration, updates, and decommissioning.
B. Network & Connectivity Management
  • Manage office networking setups across cities (LAN, WiFi, firewalls, switches, routers).
  • Ensure WPA3, VLAN segmentation, RBAC, and secure co-working network controls.
  • Maintain VPN access, MFA enforcement, bandwidth policies, and network monitoring.
C. SaaS & Application Support
  • Administer critical SaaS tools (email, collaboration tools, cloud storage, CRM, monitoring tools).
  • Manage access provisioning, de-provisioning, privilege controls, and license renewals.
2. Cybersecurity & CSCRF Compliance
A. Designing & Implementation of Cybersecurity Controls
  • Enforce all policies:
  • Risk management
  • Asset management
  • Authentication & authorization
  • Data protection & encryption
  • Network security
  • Patch management
  • Incident response
  • VAPT & vulnerability management
  • Third-party vendor security
  • Backup & disaster recovery
B. Identity & Access Management (IAM)
  • Apply least privilege and time-bound access principles.
  • Manage MFA for all critical systems and remote access points.
  • Review access logs and dormant accounts.
C. Incident Detection & Response
  • Monitor endpoint alerts, email security, network anomalies.
  • Log, escalate, and document security incidents as per incident management SOP.
  • Support forensic investigations, RCA, and SEBI reporting requirements.
D. Patch Management & Updates
  • Monitor OEM advisories, deploy updates as per severity timelines:
  • Critical: 7 days
  • High: 15 days
  • Medium/Low: 30 days
  • Maintain patch logs, testing records, and change control approvals.
E. Vulnerability Management
  • Coordinate VAPT activities with CERT-In empanelled auditors.
  • Track remediation progress and ensure revalidation.
3. Asset Management & Documentation
A. IT Inventory Ownership
  • Maintain a detailed asset register for all hardware, software, and cloud resources.
  • Track asset lifecycle from purchase to disposal.
  • Validate annual inventories and reconcile with physical assets.
B. Software Compliance
  • Maintain SBOMs for critical systems (as mandated in policy).
  • Ensure only licensed and approved software is installed.
  • Prevent unauthorized devices or applications.
4. Data Protection, Backup & DR
  • Implement daily/weekly backups for critical data and server images.
  • Manage off-site/cloud backup storage.
  • Test restore procedures periodically to meet RPO/RTO targets.
  • Ensure encryption at rest and in transit for all sensitive data.
5. Vendor & Third-Party Management
  • Ensure all IT vendors adhere to cybersecurity requirements.
  • Manage NDAs, MSAs, SLAs, and third-party audit documentation.
  • Validate controls from co-working space providers (network segregation, CCTV access, etc.).
  • Perform quarterly vendor security reviews.
6. Support & Employee Training
  • Provide L1/L2 support for IT issues, outages, and hardware failures.
  • Conduct employee cybersecurity awareness training (phishing, data handling, passwords).
Ensure HODs and teams are aligned with acceptable use policy.
Requirements
Technical Skills
  • Strong knowledge of Windows/macOS administration
  • Office 365/Google Workspace administration
  • Endpoint security tools (AV/EDR)
  • VLAN, firewalls, VPNs, WiFi protocols, network segmentation
  • Backup/disaster recovery systems
  • Hands-on patching, asset management, logging, MFA
  • Experience with VAPT coordination & vulnerability remediation
  • Familiarity with SEBI cybersecurity requirements (preferred)
Experience
  • 4-8 years in IT administration or IT infrastructure roles
  • Multi-location IT operations experience
  • Experience working in regulated industries (preferred)
Behavioral Competencies
  • High ownership and accountability
  • Strong documentation discipline
  • Ability to work independently across distributed teams
  • Proactive problem-solving and risk identification
  • Confidentiality and ethics benchmark

Skills Required

IT
Beware of fraud agents! do not pay money to get a job

MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Job Detail

  • Job Id
    JD4790091
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Permanent
  • Job Location
    Delhi, India
  • Education
    Not mentioned
  • Experience
    Year