IT Manager

AI overview

Oversee the IT infrastructure and ensure compliance with cybersecurity protocols while managing operations and supporting a multi-location staff.

About 2070Health

W Health has set up India’s first healthcare focused Venture Studio called  2070Health - an innovation platform that builds transformative healthcare companies from scratch by discovering disruptive opportunities in whitespaces. Distinct from the accelerator approach, our venture studio is closely involved in idea generation, day-to-day operations, and strategic decisions of growing the new business. Companies incubated in the last 24 months include Elevate NowNivaan Care, Reveal Healthtech , BabyMD and Everhope Oncology.

Role Overview

The IT Manager will be responsible for managing and securing the entire IT infrastructure of the organization, ensuring compliance with the Cybersecurity & Cyber Resilience Framework (CSCRF), and supporting employees across multiple office locations. This role covers IT operations, cybersecurity designing, implementation, asset management, networking, hardware/software lifecycle, vendor management, patching, backup, endpoint security, and user support.

The IT Manager will work on designing and implementation of all cybersecurity controls.

Key Responsibilities

1. IT Infrastructure & Operations

A. End-User & Hardware Management

  • Manage and support laptops, desktops, printers, peripherals for ~40 staff across multiple cities.
  • Enforce device hardening and security baselines (as per OS, endpoint, and network hardening policies).
  • Ensure secure device provisioning, configuration, updates, and decommissioning.

B. Network & Connectivity Management

  • Manage office networking setups across cities (LAN, WiFi, firewalls, switches, routers).
  • Ensure WPA3, VLAN segmentation, RBAC, and secure co-working network controls.
  • Maintain VPN access, MFA enforcement, bandwidth policies, and network monitoring.

C. SaaS & Application Support

  • Administer critical SaaS tools (email, collaboration tools, cloud storage, CRM, monitoring tools).
  • Manage access provisioning, de-provisioning, privilege controls, and license renewals.

2. Cybersecurity & CSCRF Compliance

A. Designing & Implementation of Cybersecurity Controls

  • Enforce all policies:
    • Risk management
    • Asset management
    • Authentication & authorization
    • Data protection & encryption
    • Network security
    • Patch management
    • Incident response
    • VAPT & vulnerability management
    • Third-party vendor security
    • Backup & disaster recovery

B. Identity & Access Management (IAM)

  • Apply least privilege and time-bound access principles.
  • Manage MFA for all critical systems and remote access points.
  • Review access logs and dormant accounts.

C. Incident Detection & Response

  • Monitor endpoint alerts, email security, network anomalies.
  • Log, escalate, and document security incidents as per incident management SOP.
  • Support forensic investigations, RCA, and SEBI reporting requirements.

D. Patch Management & Updates

  • Monitor OEM advisories, deploy updates as per severity timelines:
    • Critical: 7 days
    • High: 15 days
    • Medium/Low: 30 days
  • Maintain patch logs, testing records, and change control approvals.

E. Vulnerability Management

  • Coordinate VAPT activities with CERT-In empanelled auditors.
  • Track remediation progress and ensure revalidation. 

3. Asset Management & Documentation

A. IT Inventory Ownership

  • Maintain a detailed asset register for all hardware, software, and cloud resources.
  • Track asset lifecycle from purchase to disposal.
  • Validate annual inventories and reconcile with physical assets.

B. Software Compliance

  • Maintain SBOMs for critical systems (as mandated in policy).
  • Ensure only licensed and approved software is installed.
  • Prevent unauthorized devices or applications.

 

4. Data Protection, Backup & DR

  • Implement daily/weekly backups for critical data and server images.
  • Manage off-site/cloud backup storage.
  • Test restore procedures periodically to meet RPO/RTO targets.
  • Ensure encryption at rest and in transit for all sensitive data.

 

5. Vendor & Third-Party Management

  • Ensure all IT vendors adhere to cybersecurity requirements.
  • Manage NDAs, MSAs, SLAs, and third-party audit documentation.
  • Validate controls from co-working space providers (network segregation, CCTV access, etc.).
  • Perform quarterly vendor security reviews.

 

6. Support & Employee Training

  • Provide L1/L2 support for IT issues, outages, and hardware failures.
  • Conduct employee cybersecurity awareness training (phishing, data handling, passwords).

Ensure HODs and teams are aligned with acceptable use policy.

Requirements

Technical Skills

  • Strong knowledge of Windows/macOS administration
  • Office 365/Google Workspace administration
  • Endpoint security tools (AV/EDR)
  • VLAN, firewalls, VPNs, WiFi protocols, network segmentation
  • Backup/disaster recovery systems
  • Hands-on patching, asset management, logging, MFA
  • Experience with VAPT coordination & vulnerability remediation
  • Familiarity with SEBI cybersecurity requirements (preferred)

Experience

  • 4–8 years in IT administration or IT infrastructure roles
  • Multi-location IT operations experience
  • Experience working in regulated industries (preferred)

 Behavioral Competencies

  • High ownership and accountability
  • Strong documentation discipline
  • Ability to work independently across distributed teams
  • Proactive problem-solving and risk identification
  • Confidentiality and ethics benchmark
Get hired quicker

Be the first to apply. Receive an email whenever similar jobs are posted.

Ace your job interview

Understand the required skills and qualifications, anticipate the questions you may be asked, and study well-prepared answers using our sample responses.

IT Manager Q&A's
Report this job
Apply for this job