2070 Health

IT Manager

Posted: 8 minutes ago

Job Description

About 2070HealthW Health has set up India's first healthcare focused Venture Studio called  2070Health - an innovation platform that builds transformative healthcare companies from scratch by discovering disruptive opportunities in whitespaces. Distinct from the accelerator approach, our venture studio is closely involved in idea generation, day-to-day operations, and strategic decisions of growing the new business. Companies incubated in the last 24 months include Elevate Now, Nivaan Care, Reveal Healthtech , BabyMD and Everhope Oncology.Role OverviewThe IT Manager will be responsible for managing and securing the entire IT infrastructure of the organization, ensuring compliance with the Cybersecurity & Cyber Resilience Framework (CSCRF), and supporting employees across multiple office locations. This role covers IT operations, cybersecurity designing, implementation, asset management, networking, hardware/software lifecycle, vendor management, patching, backup, endpoint security, and user support.The IT Manager will work on designing and implementation of all cybersecurity controls.Key Responsibilities IT Infrastructure & Operations End-User & Hardware ManagementManage and support laptops, desktops, printers, peripherals for :40 staff across multiple citiesEnforce device hardening and security baselines (as per OS, endpoint, and network hardening policies)Ensure secure device provisioning, configuration, updates, and decommissioning Network & Connectivity ManagementManage office networking setups across cities (LAN, WiFi, firewalls, switches, routers)Ensure WPA3, VLAN segmentation, RBAC, and secure co-working network controlsMaintain VPN access, MFA enforcement, bandwidth policies, and network monitoring SaaS & Application SupportAdminister critical SaaS tools (email, collaboration tools, cloud storage, CRM, monitoring tools)Manage access provisioning, de-provisioning, privilege controls, and license renewals Cybersecurity & CSCRF Compliance Designing & Implementation of Cybersecurity ControlsEnforce all policies:Risk managementAsset managementAuthentication & authorizationData protection & encryptionNetwork securityPatch managementIncident responseVAPT & vulnerability managementThird-party vendor securityBackup & disaster recovery Identity & Access Management (IAM)Apply least privilege and time-bound access principlesManage MFA for all critical systems and remote access pointsReview access logs and dormant accounts Incident Detection & ResponseMonitor endpoint alerts, email security, network anomaliesLog, escalate, and document security incidents as per incident management SOPSupport forensic investigations, RCA, and SEBI reporting requirements Patch Management & UpdatesMonitor OEM advisories, deploy updates as per severity timelines:Critical: 7 daysHigh: 15 daysMedium/Low: 30 daysMaintain patch logs, testing records, and change control approvals Vulnerability ManagementCoordinate VAPT activities with CERT-In empanelled auditorsTrack remediation progress and ensure revalidation. Asset Management & Documentation IT Inventory OwnershipMaintain a detailed asset register for all hardware, software, and cloud resourcesTrack asset lifecycle from purchase to disposalValidate annual inventories and reconcile with physical assets Software ComplianceMaintain SBOMs for critical systems (as mandated in policy)Ensure only licensed and approved software is installedPrevent unauthorized devices or applications Data Protection, Backup & DRImplement daily/weekly backups for critical data and server imagesManage off-site/cloud backup storageTest restore procedures periodically to meet RPO/RTO targetsEnsure encryption at rest and in transit for all sensitive data Vendor & Third-Party ManagementEnsure all IT vendors adhere to cybersecurity requirementsManage NDAs, MSAs, SLAs, and third-party audit documentationValidate controls from co-working space providers (network segregation, CCTV access, etc.)Perform quarterly vendor security reviews Support & Employee TrainingProvide L1/L2 support for IT issues, outages, and hardware failuresConduct employee cybersecurity awareness training (phishing, data handling, passwords)Ensure HODs and teams are aligned with acceptable use policy.RequirementsTechnical SkillsStrong knowledge of Windows/macOS administrationOffice 365/Google Workspace administrationEndpoint security tools (AV/EDR)VLAN, firewalls, VPNs, WiFi protocols, network segmentationBackup/disaster recovery systemsHands-on patching, asset management, logging, MFAExperience with VAPT coordination & vulnerability remediationFamiliarity with SEBI cybersecurity requirements (preferred)Experience4-8 years in IT administration or IT infrastructure rolesMulti-location IT operations experienceExperience working in regulated industries (preferred)Behavioral CompetenciesHigh ownership and accountabilityStrong documentation disciplineAbility to work independently across distributed teamsProactive problem-solving and risk identificationConfidentiality and ethics benchmark

Job Application Tips

  • Tailor your resume to highlight relevant experience for this position
  • Write a compelling cover letter that addresses the specific requirements
  • Research the company culture and values before applying
  • Prepare examples of your work that demonstrate your skills
  • Follow up on your application after a reasonable time period

You May Also Be Interested In