Skip to Main Content

Job Title


Analyst


Company : Tata Consultancy Services


Location : Chennai, Tamil Nadu


Created : 2025-12-15


Job Type : Full Time


Job Description

Greetings From TCS!!Position : Security IAM EngineerExperience : 4+ yearsLocation : Walk in drive on 6-dec-25 at below locationChennai:TCS Shollianganallur Kumaran Nagar, 415/21-24, TNHB Main Rd, Chennai, Tamil Nadu 600119Job Description :- Access Policies & IAM: A clear understanding of access policies, service accounts, and how the GCP management console works. - Identity and Access Management (IAM): Strong understanding of IAM roles and policies within GCP. - Cloud Computing: Solid understanding of cloud providers, specifically Google Cloud Platform (GCP), including core services. - Security Protocols: Knowledge of security best practices for securing cloud resources and experience with Networking concepts, protocols, and services, e.g. SSL, TLS, HTTPS, TCP, UDP,VPN, Firewall. - Networking Troubleshooting: Good networking troubleshooting background (especially for VPC-SC and IAP troubleshooting). Experience in solving VPN, VPC, and public/private networking issues. - Log Analysis: Proven ability to analyze logs for security-related issues and identifying patterns. Experience with monitoring and logging tools such as Cloud Logging, Cloud Monitoring, Datadog, Prometheus stack, and Grafana for troubleshooting and performance analysis. - Operating Systems: Proficiency with Linux and Windows. - Scripting: Familiarity with basic scripting for configuration and troubleshooting. - Security Tools: Familiarity with security tools within GCP (e.g., Cloud KMS, Security Command Center). - Version Control: Hands-on experience with Git. - Basic scripting (PowerShell, Python, Shell)- Client Facing / Communication skills Mandatory – Advanced - English Proficiency Mandatory - Advanced - Customer Service and Customer Experience - Effective and clear Communication - Ability to communicate technical content/advice in a sctructured manner - Ability to effectively communicate and interact as part of a Global team - Cloud Security Best Practices - Infrastructure as code - Authentication Technologies/Protocols - Authorization Models - Cyber Security RisksRegards,Divya Jillidimudi