Job Information

TIAA Senior Technical Support in Pune, India


TIAA GBS India was established in 2016 with a mission to tap into a vast pool of talent, reduce risk by insourcing key platforms and processes, as well as contribute to innovation with a focus on enhancing our technology stack.TIAA GBS India is focused on building a scalable and sustainable organization , with a focus on technology , operations and expanding into the shared services business space.

Working closely with our U.S. colleagues and other partners, our goal is to reduce risk, improve the efficiency of our technology and processes and develop innovative ideas to increase throughput and productivity.

IT User Support Analyst II

Responds and resolves cyber security incidents. Acts as a triage specialist to incidents. Escalates trouble tickets to Tier 2 Analyst(s) as needed.

Key Responsibilities and DutiesEssential Functions

  • Monitors the operation of systems and networks to ensure business continuity. Reviews the latest alerts to determine relevancy and urgency.

  • Scans to identify security vulnerabilities and potential risks; takes effective measures to prevent and reduce cyber security incidents.

  • Analyzes potential risks, vulnerabilities, malware, etc.; as needed.

  • Contributes to security audit on a regular basis to ensure compliance with cyber security policies and standards. Manages and configures security monitoring tools (netflows, IDS, correlation rules, etc.).

QualificationsRequiredMinimum Experience

  • 0-2 years

FINRA Registrations

  • No Securities Registration Required

Physical Requirements

  • Physical Requirements: Sedentary Work

Skills and Competencies

  • Information Capture: Describes key benefits, drawbacks and rationale for documenting relevant information. Identifies information capture needs in own area. Explains organizational methods for documenting, identifying and recording information. Provides examples of the risks associated with failing to record relevant information.

  • Flexibility and Adaptability: Accepts new or radical ideas with an open mind; avoids snap reactions. Identifies and considers alternative approaches to situations or problems. Demonstrates willingness to listen to other opinions. Adjusts to new or changing assignments, processes, and people. Provides examples of shifting from task to task.

  • Problem Solving: Develops alternative techniques for assessing accuracy and relevance of information. Helps to analyze risks and benefits of alternative approaches and obtain decision on resolution. Identifies and documents specific problems and resolution alternatives. Examines a specific problem and understands the perspective of each involved stakeholder. Uses fact-finding techniques and diagnostic tools to identify problems.

  • Effective Communications: Delivers helpful feedback that focuses on behaviors without offending the recipient. Makes oral presentations and writes reports needed for own work. Looks for and considers non-verbal cues from individuals and groups. Listens to feedback without defensiveness and uses it for own communication effectiveness. Avoids technical jargon when inappropriate.

  • Accuracy and Attention to Detail: Processes limited amounts of detailed information with good accuracy. Accurately gauges the impact and cost of errors, omissions, and oversights. Learns from mistakes and applies lessons learned. Utilizes specific approaches and tools for checking and cross-checking outputs. Develops and uses checklists to insure that information goes out error-free.

  • Analytical Thinking: Names specific tools or techniques that can be used to support the analytical thinking process. Gives examples of how analytical thinking has been used to resolve problems. Describes specific software applications or products used for business analytics. Helps others research and learn more about business analytics tools and applications.

  • Taking Ownership: Provides examples of various ownership behaviors. Discusses examples and impacts where lack of ownership contributed to problems. Describes the importance and relationship of 'taking ownership' to job performance. Pursues personal development to enhance one's proficiency with taking ownership.

  • Tolerance for Ambiguity and Stress: Accommodates different levels of ability to respond to change. Responds to changes in others' roles and responsibilities. Adapts easily to changing work demands. Diagnoses unresolved issues that result from change programs. Maintains reasonable boundaries between work and personal life.

  • Data Networks: Differentiates between wired and wireless data networks. Explains key protocols and standards for data transmission. Identifies the key concepts and features of data networks. Describes major facilities, software and hardware used in data networks.

  • Network Architecture: Cites the application of various techniques and tools for network architecture. Explains the basic concepts associated with network architecture. Describes industry standards, policies or rules related to network architecture. Identifies the major activities involved in network architecture.

  • Information Technology (IT) Security Policies: Outlines the objectives and scopes of IT security policies. Identifies current initiatives and key elements related to organizational IT security policies. Describes expected benefits of effective organizational IT security policies, standards and procedures. Explains the importance of defining and following IT security policies, standards and procedures.

  • Information Security Technologies: Installs, upgrades or maintains firewall technology or anti-virus software. Explains computer forensics, authentication mechanisms and digital certificates. Participates in evaluating information security features against business requirements. Utilizes a specific hardware or software security technology to control risks. Collects and documents information about new information security tools.

  • Network and Internet Security: Lists commonly used tools and technologies for monitoring the network's Internet and security force. Describes common network and Internet security threats and violations. Describes key features of installed network and Internet security systems. Documents the differences among intranet and Internet security issues.

  • Mobile Security: Documents the information and resources related to notable mobile malicious programs. Describes the goals and objectives of mobile security management. Identifies common mobile attacks based on communication and vulnerabilities in applications. Lists tools and technologies used in monitoring, preventing and managing mobile threats.

  • Information Assurance: Identifies common information assurance tools in the market place. Describes the steps or procedures involved in general information assurance. Defines basic terms, functions and components of information assurance. Cites uses of information assurance within the organization.

  • Cybersecurity Risk Management: Assesses the value of organizational assets. Produces and interprets common cyber risk assessment and management reports. Analyzes and documents cyber security threats specific to your organization. Applies the methods and processes used in tracking and prioritizing vulnerabilities in organizational cyber environment. Responds to cyber security incidents following established security protocols.

  • Vulnerabilities Assessment: Differentiates vulnerabilities assessment from penetration testing. Describes the concepts and objectives of vulnerabilities assessment. Lists the commonly used Vulnerability Assessment Systems and explains their functionality. Explains the processes and procedures of vulnerabilities assessment of cybersecurity.

  • Security Information and Event Management (SIEM): Assists in deploying SIEM applications upon all kinds of digital devices. Responds to Internet incident following defined processes. Composes standard reports on cyber security compliance utilizing dashboard function. Configures and calibrates identity and access management applications. Performs real-time monitoring tasks on organizational network.

Company OverviewSince 1918, it has been TIAA’s mission to serve, our ability to perform and the values we embrace that make us a different kind of financial services organization. We’re dedicated to serving the financial needs of those in the academic, medical, cultural, governmental and research fields, and committed to helping make lifetime financial well-being possible for them. By building a culture that allows all employees to contribute their unique talents and skills, we’re able to provide our customers with fresh ideas and distinct perspectives to help them achieve their goals. We believe a diverse and inclusive workforce is one of our greatest strengths and a key measure of our success*. For more information about TIAA, visit our website.

Equal Employment Opportunity EEO statement text

We are an Equal Opportunity/Affirmative Action Employer. We consider all qualified applicants for employment regardless of age, race, color, national origin, sex, religion, veteran status, disability, sexual orientation, gender identity, or any other protected status.

TIAA offers support for those who need assistance with our online application process to provide an equal employment opportunity to all job seekers, including individuals with disabilities.

If you are a U.S. applicant and desire a reasonable accommodation to complete a job application please use one of the below options to contact our accessibility support team:

Phone: (800) 842-2755


For residents of California, please click here ( to access the TIAA CA Applicant Privacy Notice.

For residents of the EU / UK, please click here ( to access the EU / UK Pre-employment Notice.

For all other residents, click here ( to access the Applicant Privacy Notice.

TIAA started out over 100 years ago to help ensure teachers could retire with dignity. Today, many people who work at not-for-profits rely on our wide range of financial products and services to support and strengthen their financial well-being.