Home
Jobs

826 Access Management Jobs - Page 12

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 7.0 years

4 - 9 Lacs

Pune

Work from Office

Naukri logo

Candidates must be a CyberArk Certified Delivery Engineer (CCDE) or equivalent. The successful applicant will be an experienced CyberArk PAM consultant to take our client's project forward and support the account. Taking on and further developing/deploying of our client's Privileged Access Management solution based on CyberArk technology. Lead Consultant with demonstrable experience of CyberArk Privileged Access Management solution experience. HLD and LLD experience. Ability to work with the internal Project team and end customer to continue design and deployment activities and further enhance the PAM solution. Documentation skills. Security Policy and Governance experience and appreciation. Identity & Access Management/IDAM experience and knowledge. Design and deliver high quality security architecture and infrastructure setups and/or sub-systems to agreed deadlines. Assist customers in developing a secured privileged access management infrastructure and also to define policies to protect their applications/platforms/targets from unauthorized access Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 2+ years of industry experience with minimum 2+ years relevant experience in CyberArk privileged access solution. Experience in development and implementation, design and architecture of privileged access solution using CyberArk Must possess the technical/functional skills necessary to understand and manage consulting project engagements. Experience in end-to-end implementation lifecycle of CyberArk project Excellent hands-on knowledge on the best practices of deploying CyberArk PAS, including various components like EPV, CPM, PVWA, PSM, PSMP, OPM and PTA. Well versed with Active Directory. Experience in developing custom connectors using automation approaches like AutoIT script Preferred technical and professional experience Experience with Okta ASA, Ping, Saviynt, ForgeRock. Experience with JavaScript and one of the major JavaScript MVC frameworks (preferably Angular). Directory experience (AD, Azure AD, LDAP), SaaS deployment experience. Knowledge of enterprise web technologies, security and cutting-edge infrastructures Knowledge of Cloud architectures and complex enterprise On-Premises IT landscapes and hybrid Cloud/On-Prem architectures. Knowledge of enterprise identity lifecycle management processes and standards Proven track record in working as part of a team, meeting deadlines, tutoring/mentoring. Experience with at least one of the following development environments/languagesJ2EE, Java, JavaScript. Experience in specific industry verticals is preferred

Posted 1 week ago

Apply

8.0 - 13.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

The role supports full end to end software development cycle, from initial client engagement, through assessments and road-mapping, to longer term engagement in an advisory capacity. As an Application Security Consultants, the person should leverage the technical expertise of the security competencies, varied product and delivery capabilities Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Candidate with 8 + years of experience in IT domain with 3+ years on Delina (Thycotic) PAM implementation with Thycotic Certification (Optional). Experience in development and end to end implementation, design and architecture of privileged access solution using Delina Secret Serveries Experience in Installing and upgrading secret server, onboarding secrets, remote password changing, configuring roles & Permissions, configuring folder structure, secret templates, secret policy, launchers, session recording, account discovery, sites, event subscriptions, event pipeline policy and other operational activities for Delina Secret Server Preferred technical and professional experience Knowledge of Web Services (REST/SOAP), Directories (LDAP, AD), etc and PowerShell scripts in PAM solution REST API Automations using PowerShell Scripting (Bulk Upload Utility options, Account Onboarding PowerShell Script, User Deletion using Script PowerShell Script) Good understanding of LDAP concepts and working experience with at least few of the following directories:' Oracle Internet Directory/Oracle Virtual Directory, Sun Directory Server, Active Directory, Tivoli Directory Server

Posted 1 week ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

Candidates must be a CyberArk Certified Delivery Engineer (CCDE) or equivalent. The successful applicant will be an experienced CyberArk PAM consultant to take our client's project forward and support the account. Taking on and further developing/deploying of our client's Privileged Access Management solution based on CyberArk technology. Lead Consultant with demonstrable experience of CyberArk Privileged Access Management solution experience. HLD and LLD experience. Ability to work with the internal Project team and end customer to continue design and deployment activities and further enhance the PAM solution. Documentation skills. Security Policy and Governance experience and appreciation. Identity & Access Management/IDAM experience and knowledge. Design and deliver high quality security architecture and infrastructure setups and/or sub-systems to agreed deadlines. Assist customers in developing a secured privileged access management infrastructure and also to define policies to protect their applications/platforms/targets from unauthorized access Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 2+ years of industry experience with minimum 2+ years relevant experience in CyberArk privileged access solution. Experience in development and implementation, design and architecture of privileged access solution using CyberArk Must possess the technical/functional skills necessary to understand and manage consulting project engagements. Experience in end-to-end implementation lifecycle of CyberArk project Excellent hands-on knowledge on the best practices of deploying CyberArk PAS, including various components like EPV, CPM, PVWA, PSM, PSMP, OPM and PTA. Well versed with Active Directory. Experience in developing custom connectors using automation approaches like AutoIT script Preferred technical and professional experience Experience with Okta ASA, Ping, Saviynt, ForgeRock. Experience with JavaScript and one of the major JavaScript MVC frameworks (preferably Angular). Directory experience (AD, Azure AD, LDAP), SaaS deployment experience. Knowledge of enterprise web technologies, security and cutting-edge infrastructures Knowledge of Cloud architectures and complex enterprise On-Premises IT landscapes and hybrid Cloud/On-Prem architectures. Knowledge of enterprise identity lifecycle management processes and standards Proven track record in working as part of a team, meeting deadlines, tutoring/mentoring. Experience with at least one of the following development environments/languagesJ2EE, Java, JavaScript. Experience in specific industry verticals is preferred

Posted 1 week ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Mumbai

Work from Office

Naukri logo

The CyberArk Operation Support Team Lead is a pivotal role responsible for overseeing and managing the day-to-day operations of the CyberArk environment. This position involves leading a team of support professionals, ensuring the availability, performance, and security of CyberArk solutions, and collaborating with cross-functional teams to deliver efficient privileged access management. Key Responsibilities * Team LeadershipSupervise and mentor a team of CyberArk support professionals, fostering collaboration and skill development. * Operational ManagementOversee the operational aspects of CyberArk solutions, ensuring 24/7 availability, scalability, and optimal performance. * Incident ManagementLead the resolution of CyberArk-related incidents and problems, coordinating with technical teams and stakeholders to ensure timely and effective solutions. * Security EnhancementCollaborate with the security team to implement and enhance security controls, policies, and procedures for privileged access management. * Performance MonitoringMonitor system performance, conduct regular health checks, and proactively identify and address potential performance bottlenecks. * Patch and Upgrade ManagementPlan and execute system upgrades, patches, and enhancements, ensuring minimal disruption to ongoing operations. * DocumentationMaintain thorough documentation of configurations, processes, and procedures related to CyberArk operations. * Vendor ManagementCoordinate with CyberArk vendors for support, troubleshooting, and escalations to ensure timely issue resolution. * Continuous ImprovementDrive continuous improvement initiatives to enhance the effectiveness and efficiency of CyberArk operations. * ReportingGenerate regular reports on system performance, incident management, and operational metrics for management review. * Willing to work in 24/7 operations and project support activities Required education Bachelor's Degree Preferred education Associate's Degree/College Diploma Required technical and professional expertise Proven experience in CyberArk operations and support, with a minimum of 4+years of hands-on experience. * Professional certifications such as CyberArk Certified Trustee (CCT) or Certified Delivery Engineer (CDE). Strong knowledge of privileged access management concepts and CyberArk technologies. Experience in organizations control, monitor, and secure privileged access across their IT infrastructure. Good Exposure in endpoint Analytics capabilities to identify unusual or suspicious activities related to privileged access. Preferred technical and professional experience * Leadership skills with the ability to guide and mentor a team effectively. * Problem-solving aptitude with a proactive approach to resolving technical challenges. * Strong communication skills for effective collaboration with cross-functional teams. * Detail-oriented mindset with a commitment to maintaining high standards. * Adaptability to changing requirements and a willingness to stay updated on emerging technologies

Posted 1 week ago

Apply

8.0 - 11.0 years

27 - 42 Lacs

Bengaluru

Work from Office

Naukri logo

Job Summary We are seeking a seasoned professional to manage and enhance the operations of the Saviynt platform. The ideal candidate will bring strong technical expertise leadership capabilities and a proactive approach to platform stability process improvement and stakeholder engagement. Responsibilities Key Responsibilities Platform Monitoring & Maintenance Oversee the health and performance of the Saviynt Platform including Saviynt Connect Portal and Connectors. Monitor JML (Joiner-Mover-Leaver) processes aggregation tasks and access requests. Hands on with SOD workflows tasks rules forms custom object access reviews and updates of JML configurations access requests and certification workflows. Guide the team to implement best practices for Access Management & RBAC. Play a key role in identifying areas for implementing Automations. Enhancements & Troubleshooting Implement minor enhancements and workflow changes as needed. Coordinate with the Saviynt product team for resolution of critical issues. Documentation & Compliance Maintain up-to-date SOPs runbooks and procedural documentation. Ensure timely patching of the Saviynt platform and its components. Support DR (Disaster Recovery) testing. Integration & Performance Management Manage and resolve integration issues with systems such as Active Directory and ServiceNow and any custom integrations. Periodically tune performance parameters to ensure optimal system efficiency. Operational Oversight Share service health status report to customer on daily basis validate logs and verify backups. Provide Weekly/monthly reports on incidents changes service requests and problem tickets. Attend Weekly/monthly review calls tracking actions and work towards closure. Process & Stakeholder Engagement Identify process gaps and propose remediation aligned with product and security standards. Present changes in CAB meetings participate in major incident bridges and engage with customers for requirement gathering and escalation handling. Additional Skills Strong understanding of ITIL processes. Working knowledge of NetIQ IDM is a plus. Proficiency in Microsoft Office Suite for documentation and presentations. Excellent communication skills to liaise effectively between internal teams and customers. Basic knowledge on scripting using PowerShell AD & Exchange commands. Knowledge on Active Directory Entra AD Entra AD connect for synchronization

Posted 1 week ago

Apply

5.0 - 10.0 years

5 - 10 Lacs

Chennai, Tamil Nadu, India

On-site

Foundit logo

We are looking for a Workday Security Specialist with 5+ years of experience to join our team. This role is crucial for ensuring the integrity, confidentiality, and availability of Workday data and functionality through robust security design and governance. The ideal candidate will be a subject matter expert in Workdays security framework and compliance best practices, with the ability to support cross-functional teams and optimize system access controls across multiple Workday modules. Key Responsibilities Workday Security Configuration: Configure and maintain security roles, domain security policies, and business process security settings. RBAC Implementation: Design and manage job-based, user-based, and segment-based security roles within Workday. Compliance Audits: Perform regular security audits and ensure Workday configurations align with compliance standards such as SOX, GDPR, and HIPAA. Security Optimization: Continuously assess and enhance security frameworks to support system integrity and operational needs. Troubleshooting: Investigate and resolve security access issues, discrepancies, and related user incidents. Reporting Monitoring: Develop and maintain dashboards and reports to monitor security activity, access logs, and compliance metrics. Collaboration: Partner with HR, Finance, IT, and other Workday stakeholders to align security protocols with business processes. Access Management: Oversee provisioning, de-provisioning, and role assignments across Workday HCM, Finance, Payroll, and other modules. Change Management Support: Participate in security testing during Workday updates and support change control processes related to security. Qualifications 5+ years of Workday Security experience, with demonstrated expertise in: o Domain Security Policies Business Process Security Security Group Design (including intersection and segment security) RBAC principles Strong understanding of Workdays security architecture across functional, data, and integration layers. Experience with user lifecycle management and access controls. Proficiency in analyzing audit logs, security reports, and troubleshooting access issues. Familiarity with Workday Reporting tools; Prism Analytics experience is a plus. Working knowledge of compliance regulations including SOX, GDPR, and HIPAA. Strong analytical and problem-solving skills. Excellent communication and interpersonal skills, with the ability to work across departments and with non-technical stakeholders.

Posted 1 week ago

Apply

5.0 - 10.0 years

5 - 10 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

We are looking for a Workday Security Specialist with 5+ years of experience to join our team. This role is crucial for ensuring the integrity, confidentiality, and availability of Workday data and functionality through robust security design and governance. The ideal candidate will be a subject matter expert in Workdays security framework and compliance best practices, with the ability to support cross-functional teams and optimize system access controls across multiple Workday modules. Key Responsibilities Workday Security Configuration: Configure and maintain security roles, domain security policies, and business process security settings. RBAC Implementation: Design and manage job-based, user-based, and segment-based security roles within Workday. Compliance Audits: Perform regular security audits and ensure Workday configurations align with compliance standards such as SOX, GDPR, and HIPAA. Security Optimization: Continuously assess and enhance security frameworks to support system integrity and operational needs. Troubleshooting: Investigate and resolve security access issues, discrepancies, and related user incidents. Reporting Monitoring: Develop and maintain dashboards and reports to monitor security activity, access logs, and compliance metrics. Collaboration: Partner with HR, Finance, IT, and other Workday stakeholders to align security protocols with business processes. Access Management: Oversee provisioning, de-provisioning, and role assignments across Workday HCM, Finance, Payroll, and other modules. Change Management Support: Participate in security testing during Workday updates and support change control processes related to security. Qualifications 5+ years of Workday Security experience, with demonstrated expertise in: o Domain Security Policies Business Process Security Security Group Design (including intersection and segment security) RBAC principles Strong understanding of Workdays security architecture across functional, data, and integration layers. Experience with user lifecycle management and access controls. Proficiency in analyzing audit logs, security reports, and troubleshooting access issues. Familiarity with Workday Reporting tools; Prism Analytics experience is a plus. Working knowledge of compliance regulations including SOX, GDPR, and HIPAA. Strong analytical and problem-solving skills. Excellent communication and interpersonal skills, with the ability to work across departments and with non-technical stakeholders.

Posted 1 week ago

Apply

1.0 - 6.0 years

0 - 6 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

Detailed JD (Roles and Responsibilities) Configure and manage/Install ForgeRock OpenAM, OpenDJ, OpenIG and OpenIDM in AWS. Must have a thorough understanding and work experience for Single Sign-On, Access management, Identity Federation, Multi-factor authentication. Deep expertise in ForgeRock IAM suite. Must have a thorough understanding and work experience for technologies of IAM concepts (SSO, SAML, OpenID, OAuth). Hands-On experience with ForgeRock customization, writing scripts and developing code to fetch assertion values form multiple data sources. Experience with ForgeRock AM for implementing single sign-on (SSO) and access management solutions. Experience with ForgeRock OpenIDM (Identity management) system for On-time provisioning / deprovisioning. Should have good developer skills - JavaScript , Groovy , Java. Hands-on Experience in installing, configuring, creating Routes/handlers in ForgeRock IG. Hand-on Experience in automating ForgeRock IDM deployments using Terraform and Ansible. Strong knowledge of designing and implementing workflows, approval processes, and certification processes within IAM. Mandatory skills ForgeRock Development + Groovy Scripting

Posted 1 week ago

Apply

10.0 - 12.0 years

10 - 12 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

Management of User and Access Lifecycle; Monitoring and Health Check including Standardization, optimization, modernization and cleanup. Access request Workflows: Request Management Bug-fixing and Problem analysis - Root Cause analysis Monitoring Jobs: Errors logs using IDM Toolset Audit. Deploy changes based on JIRA tickets (Stories, Bugs, Tasks) and rollout. Maintain Service Desk knowledgebase articles through Confluence. SAP-based Identity and Access Management: Provider will provide comprehensive support for the SAP-based identity infrastructure. This involves managing user roles, access controls, and permissions within the system landscape, ensuring secure and streamlined access to all applications.

Posted 1 week ago

Apply

3.0 - 8.0 years

3 - 8 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

3+ years of hands-on functional consulting experience specializing in Oracle Fusion HCM and Oracle Learn Management Must have Expertise experience in implementing, configuring, and optimizing HCM modules such as Core HR, Absence Management and Oracle learn Management. Hands-on experience in module setup and configuration of the Core HR and Absence Management modules and Learning Management Demonstrated expertise in analyzing and translating business requirements into functional specifications, configuring Oracle systems to meet client needs and support. Must have experience in setting Learning Administrator Console and User Access Management. Effective Client Communication with daily status calls with the client. Have good experience in client handling. Experienced in creating lookups, custom value sets and mapping them to various business fields. Reduced errors and increased efficiency in using the oracle system. Demonstrated experience in setting up Security, creating Data roles & mapping relevant Security Policies to the data role. Configured learning initiatives, courses, specializations, and learning assignments based on business rules. Improved learning path design to enhance user experience and learning completion rates. Formulated user test script, test steps and test scenarios for UAT Testing of Core HR business process, Absences testing and Learning Management.

Posted 1 week ago

Apply

4.0 - 6.0 years

3 - 11 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

Workday Security Administration: Provide ongoing security and access management for HR systems in Workday . Conduct Workday Security access reviews , ensuring users have the correct access levels for their roles. Implement security configurations within Workday, working closely with HR Operations to meet business requirements. Cybersecurity & Compliance: Ensure SOX compliance and Cyber controls are effectively managed within Workday Security . Perform access control monitoring to identify and rectify security gaps. Collaborate with security teams to implement cybersecurity measures to protect HR data within Workday. Configuration & Testing: Design, test, and deliver Workday Security configuration changes based on business requirements. Provide configuration expertise for ongoing Workday projects. Manage the Workday security lifecycle , ensuring configurations are continuously optimized and aligned with evolving business needs. Collaboration and Reporting: Work closely with HR Operations , IT , and Cybersecurity teams to ensure all security processes are aligned and functioning effectively. Generate reports on security status, access reviews, and compliance to be presented to management. Required Skills and Qualifications: Technical Expertise: 4-6 years of experience in Workday Security and Access Management . Proven expertise in Workday Security configuration , access management , and security roles . In-depth knowledge of SOX compliance and cybersecurity controls within Workday. Experience with designing , testing , and delivering Workday Security configuration changes . Cybersecurity & Compliance: Strong understanding of SOX , GDPR , and other regulatory compliance requirements related to Workday . Ability to ensure security protocols are followed and monitor systems to identify access vulnerabilities. Problem Solving and Communication: Excellent troubleshooting skills for security and access issues within Workday . Strong communication skills to collaborate with cross-functional teams and ensure smooth security process flows. Mandatory Skills: Workday Security & Access Management SOX Compliance Cybersecurity Controls

Posted 1 week ago

Apply

14.0 - 16.0 years

35 - 60 Lacs

Chennai

Work from Office

Naukri logo

Job Summary IAM Architect Develop the overarching vision principles and architecture for the workload identity and access management system across all environments like Azure GCP hybrid on premises Responsibilities Define the types of workload identities e.g. Managed Identities Service Accounts SPIFFE identities their attributes and their lifecycle management processes. Design the framework and specific policies for controlling workload access to resources based on the principle of least privilege. Define and design secure methods for workloads to authenticate and communicate with each other. Design the integration points and processes for connecting the workload IAM system with Fords current IAM infrastructure e.g. Entra ID Drive the creation of the long-term workload IAM governance framework ensuring alignment with industry best practices and Fords policies. Serve as the subject matter expert on workload identity concepts technologies e.g. Entra Workload Identity SPIFFE-SPIRE and best practices. Assess and recommend appropriate workload identity features and tools available in Azure GCP and other relevant platforms. Design the system to meet relevant security and compliance requirements

Posted 1 week ago

Apply

10.0 - 12.0 years

20 - 25 Lacs

Bengaluru

Work from Office

Naukri logo

Designing technical architecture for IET DIgital utilizing current tools and platforms focused on cloud architecture, cloud build, etc., SPARQ deployment strategy in Azure (IaaS or PaaS) and AWS and applicability across the rest of the enterprise. Designing technical stack for Cordant (IET Digital Flagship Product) including tooling decisions. Enabling enterprise architecture vision and strategy, and support enterprise wide applications and business systems roadmap. Designing servers, storage, security, networks, virtualization/cloud, systems software, tools and governance to meet specified goals. Appying existing technologies, approaches, methodologies in new combinations to design new products, systems or processes. Viewed internally and externally as a specialist in the discipline Leading the definition, design and documentation of technical environments. Deploy solution architectures, conduct analysis of alternative architectures, create architectural standards. Defining processes to ensure conformance with standards, institute solution-testing criteria, and promote a clear and consistent business vision through technical architectures. Planning and delivering legacy infrastructure transformation and migration to drive next-generation business outcomes Driving for Continuous Integration and Continuous Delivery (CI/CD) based application and cloud infrastructure development. Understanding, learning and applying new automated build, test and deployment capabilities and help develop project teams towards integrating such solutions. Collaborating with internal development , external partners and QA teams to help ensure end-to-end quality Fuel your passion To be successful in this role you will: Have a Bachelors degree from an accredited university or college with minimum of 10 additional years of experience in Infrastructure Architecture. Have an Experience working with Linux operating system. Knowledge of hybrid cloud environments. Understanding of microservice design and architectural patterns Have strong expertise in DevOps and CI/CD implementation. Thorough knowledge of cloud-native development Have an Expertise with implementing Keycloak-based IAM solution that supports the integration of enterprise user directories such as LDAP and AD, and/or 3rd-party SSO provider for identity information and applications via standards-based tokens Have an Expertise with implementing Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC) policy creation and enforcement. Have Expertise with SAML 2.0, OpenID Connect and OAuth 2.0 Have an Experience with experience with load balancers such as Apache, Nginx, HAProxy. Familiarity with PKI infrastructure, Certificate authorities, OCSP, CRL, CSRs, x.509 certificate structures, pkcs12 certificate containers Have Experience with microservices architectures. Experience with Microservices architecture components, including Docker and Kubernetes Have an Experience and domain knowledge related to data processing. Experience with DevSecOps, Identity Access Management. Have an Experience with software configuration management tools such as Git/Gitlab. Experience with software development environments and CI/CD tools such as Jenkins

Posted 1 week ago

Apply

15.0 - 20.0 years

20 - 25 Lacs

Bengaluru

Work from Office

Naukri logo

Every career journey is personal. Thats why we empower you with the tools and support to create your own success story. Be challenged. Be heard. Be valued. Be you ... be here. Job Summary The Director, Cyber Security is be responsible for understanding the business model and organizational priorities, while leading, guiding and directing technical and business leaders in effort to ensure compliance to regulatory requirements, the protection of company information assets, and the continued maturation of the cyber security program. This position reports to the SVP, Chief Information Security Officer and works closely across Technology Operations, Privacy, Legal, Enterprise Risk Management, and the business. Essential Job Functions Oversee and advise on the continued development and management of the Cyber Security team s strategy and vision. Lead of a team of Cyber Security managers, along with their direct reports of various experience levels and bands. Hire and train new staff, conduct performance reviews and utilize subject matter expertise to guide and coach team members. - (35%) Demonstrate self-learning in gaining knowledge of new technical developments and ensure they are shared appropriately and applied within the department and across the organization. Identify and understand drivers for change and act as a champion and partner with other leaders to deliver those changes. - (5%) Collaborate with senior leaders on strategic and tactical information security plans for major system and application changes, ensuring standards are maintained and assets protected. Resolve conflicts and simplify complex concepts for effective communication. Serve as an enabling partner and take solution based approach. - (10%) Communicate goals and new programs effectively with other senior leaders within the organization. Produce presentations at various levels of abstraction dependent on intended audience using Microsoft Power Point, Microsoft Visio, or equivalent tools. - (10%) Lead the design and the implementation of key Technology projects and initiatives as they pertain to the organizations long-term security strategy. Identify areas of improvement where processes do not currently exist and drive the development and delivery of new processes to address these gaps. Ability to lead through ambiguity and deliver quality results. - (25%) Maintain appropriate internal processes and procedures to ensure operational effectiveness of the team. Oversee and lead the creation of and the maintenance of relevant documentation including run books, project updates, process documentation, architecture and technical requirements and presentations. Actively assist in managing departmental budget and costs. - (10%) Work with the Change Advisory Board (CAB) to identify and manage changes that will impact Information Security controls. Oversee, develop and deliver Key Performance Indicators (KPIs) through the understanding of the tools and deliverables by helping to develop, maintain and mature the associated reporting structure. - (5%) Minimum Qualifications Bachelor s Degree or equivalent experience in Computer Science or Information Technology One or more field related professional technical certifications (CISSP, CISA, CISM, Security+) or able to complete within 12 months 15+ years of progressive experience in Cyber Security including proven expertise in multiple disciplines (SOC, IAM, Cyber Engineering Architecture, Governance Regulatory Compliance, etc.) 7+ years direct leadership experience Preferred Qualifications Master s Degree in computer science or information technology Two or more field related professional technical certifications (CISSP, CISA, CISM, Security+) 15+ years of progressive experience in Cyber Security including proven expertise in multiple disciplines (SOC, IAM, Cyber Engineering Architecture, Governance Regulatory Compliance, etc.) 8+ years direct leadership experience Skills Cloud Architectures Amazon Web Services (AWS) Cybersecurity Cloud Security Identity and Access Management (IAM) NIST 800-53 NIST Cybersecurity Framework (CSF) PCI DSS Compliance Reports To : VP and above Direct Reports : 6 - 10 Work Environment Normal office environment, hybrid. Other Duties This job description is illustrative of the types of duties typically performed by this job. It is not intended to be an exhaustive listing of each and every essential function of the job. Because job content may change from time to time, the Company reserves the right to add and/or delete essential functions from this job at any time. About Bread Financial At Bread Financial, you ll have the opportunity to grow your career, give back to your community, and be part of our award-winning culture. We ve been consistently recognized as a best place to work nationally and in many markets and we re proud to promote an environment where you feel appreciated, accepted, valued, and fulfilled both personally and professionally. Bread Financial supports the overall wellness of our associates with a diverse suite of benefits and offers boundless opportunities for career development and non-traditional career progression. Bread Financial (NYSE: BFH) is a tech-forward financial services company that provides simple, personalized payment, lending, and saving solutions to millions of U.S consumers. Our payment solutions, including Bread Financial general purpose credit cards and savings products, empower our customers and their passions for a better life. Additionally, we deliver growth for some of the most recognized brands in travel entertainment, health beauty, jewelry and specialty apparel through our private label and co-brand credit cards and pay-over-time products providing choice and value to our shared customers. To learn more about Bread Financial, our global associates and our sustainability commitments, visit breadfinancial.com or follow us on Instagram and LinkedIn . All job offers are contingent upon successful completion of credit and background checks. Bread Financial is an Equal Opportunity Employer. Job Family: Information Technology Job Type: Regular

Posted 1 week ago

Apply

2.0 - 7.0 years

20 - 25 Lacs

Bengaluru

Work from Office

Naukri logo

3 The Senior IT Cybersecurity Engineer is responsible for the technical design of IT cybersecurity architectural guidelines and standards, as well as the secure implementation of IT digital technologies across platforms and product lines in Chevron. The primary responsibility is to assure IT solutions are "secure by design", and continuously improving our defenses as threats and technologies change. Key responsibilities: Responsibilities include but are not limited to: Enable digital transformation by ensuring secure-by-design principles are incorporated in the IT digital capabilities across the enterprise. Establish cybersecurity governance for IT technologies across all technology functions Lead security research proposals and proofs of concept for emerging technologies Consult as a subject matter expert on cybersecurity risk assessments for IT technologies Define cybersecurity architectures for IT solutions Serve as a subject matter expert in one or more cybersecurity domains, including, but not limited to, Network Security, Cloud Security, Endpoint Security, Application Security, Data Security, and Identity and Access Management. Required Qualifications: Minimum 2 years related work experience in cybersecurity with increasing levels of responsibility. Technical experience in one or more cybersecurity domains, including, but are not limited to, Network Security, Cloud Security, Endpoint Security, Application Security, Data Security, and Identity and Access Management. General understanding of the cyber threat landscape, including cyber-criminal and cyber-espionage threats. Previous experience administering cybersecurity technologies and/or supporting cybersecurity operations. Preferred Qualifications: Knowledge of industry-accepted cyber security frameworks such as NIST 800-53, MITRE ATTCK, and the Cyber Kill Chain. Experience in conducting and/or leading cybersecurity assessments (risk, vulnerability) and creating a detailed mitigation plan and recommendations to address gaps identified Ability to influence and motivate teams, and work with a variety of disciplines, cultures, and environments. Demonstrated ability to work effectively, and communicate effectively at all levels with operations, design, projects, vendors, peers, etc. Communicates in a clear, concise, understandable manner both orally and in writing. Chevron participates in E-Verify in certain locations as required by law.

Posted 1 week ago

Apply

3.0 - 6.0 years

11 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Designing technical architecture for IET DIgital utilizing current tools and platforms focused on cloud architecture, cloud build, etc., SPARQ deployment strategy in Azure (IaaS or PaaS) and AWS and applicability across the rest of the enterprise. Designing technical stack for Cordant (IET Digital Flagship Product) including tooling decisions. Enabling enterprise architecture vision and strategy, and support enterprise wide applications and business systems roadmap. Designing servers, storage, security, networks, virtualization/cloud, systems software, tools and governance to meet specified goals. Appying existing technologies, approaches, methodologies in new combinations to design new products, systems or processes. Viewed internally and externally as a specialist in the discipline Leading the definition, design and documentation of technical environments. Deploy solution architectures, conduct analysis of alternative architectures, create architectural standards. Defining processes to ensure conformance with standards, institute solution-testing criteria, and promote a clear and consistent business vision through technical architectures. Planning and delivering legacy infrastructure transformation and migration to drive next-generation business outcomes Driving for Continuous Integration and Continuous Delivery (CI/CD) based application and cloud infrastructure development. Understanding, learning and applying new automated build, test and deployment capabilities and help develop project teams towards integrating such solutions. Collaborating with internal development , external partners and QA teams to help ensure end-to-end quality Fuel your passion To be successful in this role you will: Have a Bachelors degree from an accredited university or college with minimum of 10 additional years of experience in Infrastructure Architecture. Have an Experience working with Linux operating system. Knowledge of hybrid cloud environments. Understanding of microservice design and architectural patterns Have strong expertise in DevOps and CI/CD implementation. Thorough knowledge of cloud-native development Have an Expertise with implementing Keycloak-based IAM solution that supports the integration of enterprise user directories such as LDAP and AD, and/or 3rd-party SSO provider for identity information and applications via standards-based tokens Have an Expertise with implementing Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC) policy creation and enforcement. Have Expertise with SAML 2.0, OpenID Connect and OAuth 2.0 Have an Experience with experience with load balancers such as Apache, Nginx, HAProxy. Familiarity with PKI infrastructure, Certificate authorities, OCSP, CRL, CSRs, x.509 certificate structures, pkcs12 certificate containers Have Experience with microservices architectures. Experience with Microservices architecture components, including Docker and Kubernetes Have an Experience and domain knowledge related to data processing. Experience with DevSecOps, Identity Access Management. Have an Experience with software configuration management tools such as Git/Gitlab. Experience with software development environments and CI/CD tools such as Jenkins

Posted 1 week ago

Apply

1.0 - 5.0 years

3 - 7 Lacs

Thane

Work from Office

Naukri logo

An Information Security Manager that based out of Mumbai, India and responsible for IAM management across India Market. Develop and implement IAM program with policies and procedures. Plan, implement, and manage identity and access management solutions. Manage user identity lifecycle including onboarding, offboarding, and account updates. Manage user access to systems, applications and data. Perform account and access review, role and authority of account. Ensure appropriate permission are granted as Business needed basic. Support internal and external audit by coordinating information requirements. Work closely with peers, Business managers, regional team, Global team, Audit and Legal counsel to understand requirements related to IAM, and to map those requirements to actions for compliance. Work with senior leadership to ensure that the program meets the needs of the business and complies with all relevant laws, regulations and Global standards. Monitor compliance with internal policies and external regulations. Manage plan to identify and prioritize findings, and their remediation. Mentor members, peers about access control and their importance. Develop and maintain training materials related to identity and access management. Interface with Liberty Mutual s larger security organization. Qualifications Bachelors Degree About Us At Liberty General Insurance , we create an inspired, collaborative environment, where people can take ownership of their work; push breakthrough ideas; and feel confident that their contributions will be valued, and their growth championed. We have an employee strength of 1200+ spread over a network of 116+ offices in 95+ cities, across 29 states. Our partner network consists of about 5000+ hospitals and more than 4000+ auto service centers. We believe and live by our values every day - Act Responsibly, Be Open, Keep it Simple, Make things better and Put People First. For learning about our key USPs, you can go visit our website. Working with Liberty also provides you an opportunity to experience One Liberty Experience . We create the One Liberty experience through Providing Global exposure to employees by including them in cross country projects that gives them opportunities to work with diverse teams within & outside India. Fosters Diversity, Equity & Inclusion (DEI) to create equitable career opportunities Flexi Working arrangements If you aspire to grow & build your capabilities to work in a global environment, Liberty is the place for you!

Posted 1 week ago

Apply

10.0 - 15.0 years

12 - 16 Lacs

Gurugram

Work from Office

Naukri logo

Job Title - Identity Access Management ( IAM Architect) Position type- Full Time Work Location- Bangalore/Delhi NCR Working style- Hybrid Required years of experience - Minimum 10+ years of relevant experience AON IS IN THE BUSINESS OF BETTER DECISIONS At Aon, we shape decisions for the better to protect and enrich the lives of people around the world. As an organization, we are united through trust as one inclusive team and we are passionate about helping our colleagues and clients succeed. GENERAL DESCRIPTION OF ROLE: The Counter Threat Engineering Team under the Global Cybersecurity Services organization is seeking a strategic-minded Identity and Access Management (IAM) Architect with deep technical knowledge of IAM technologies and concepts. This role is critical in designing, implementing, and managing IAM solutions to ensure the security and integrity of Aons systems and data. JOB RESPONSIBILITIES WHAT THE DAY WILL LOOK LIKE Work on engagements that span the entire lifecycle of a transaction, from technology and product due-diligence, IT due diligence, technology value creation, carve-outs and integrations. Lead engagements and client interactions to effectively uncover material transaction risks and improvement opportunities. Lead corporate carve-outs and integrations including defining, managing and executing separation blueprints, integration roadmaps, day-1 readiness plans, cutover plans, and integration plans. Lead business development initiatives including participating in proposal responses, pursuit meetings, and identifying opportunities to expand client relationships. Engage in practice development initiatives working with the rest of the Digital MA team to improve existing propositions, methodologies and processes. Lead project and pipeline management including tracking of leads, opportunities, commercials, contracting, and invoicing. How we support our colleagues In addition to our comprehensive benefits package, we encourage an inclusive workforce. Plus, our agile environment allows you to manage your wellbeing and work/life balance, ensuring you can be your best self at Aon. Furthermore, all colleagues enjoy two Global Wellbeing Days each year, encouraging you to take time to focus on yourself. We offer a variety of working style solutions for our colleagues as well. Our continuous learning culture inspires and equips you to learn, share and grow, helping you achieve your fullest potential. As a result, at Aon, you are more connected, more relevant, and more valued. Aon values an innovative and inclusive workplace where all colleagues feel empowered to be their authentic selves. Aon is proud to be an equal opportunity workplace. Aon provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, age, disability, veteran, marital, domestic partner status, or other legally protected status. We welcome applications from all and provide individuals with disabilities with reasonable adjustments to participate in the job application, interview process and to perform essential job functions once onboard.

Posted 1 week ago

Apply

0.0 - 5.0 years

16 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

4 Chevron invites applications for the role of Cloud Engineer - Data Hosting within our team in India. This position supports Chevron s data hosting environment by delivering modern digital data hosting capabilities in a cost competitive, reliable, and secure manner. This position will provide broad exposure to the application of technology to enable business with many opportunities for growth and professional development for the candidate. Key Responsibilities: Design, implement, and manage scalable and secure data hosting solutions on Azure. Develop and maintain data architectures, including data models, data warehouses, and data lakes. Refine data storage and extraction procedures to enhance performance and cost-effectiveness. Uphold stringent data security measures and ensure adherence to relevant industry standards and regulatory requirements. Collaborate with data scientists, analysts, and other stakeholders to understand and address their data needs. Monitor and troubleshoot data hosting environments to ensure high availability and reliability. Streamline data workflows and operations through the automation capabilities of Azure Data Factory and comparable technologies. Design, develop, and deploy modular cloud-based systems. Develop and maintain cloud solutions in accordance with best practices. Required Qualifications: Must have bachelor s degree in computer science engineering or related discipline. 0-5 years experience At least 2 years of experience in data hosting for both on-premises and azure environments. Microsoft AZ900 Certification. Proficient in utilizing Azure data services, including Azure SQL Database, Azure Data Lake Storage, and Azure Data Factory. In-depth understanding of cloud infrastructure, encompassing virtual networks, storage solutions, and compute resources within Azure. Extensive hands-on experience with Azure services such as Azure SQL Database, Azure Blob Storage, Azure Data Lake, and Azure Synapse Analytics. Well-versed in on-premises storage systems from vendors like NetApp, Dell, and others. Skilled proficiency in scripting languages like Ansible, PowerShell, Python, and Azure CLI for automation and management tasks. Comprehensive knowledge of Azure security best practices, including identity and access management, encryption, and compliance standards. Preferred Qualifications: Demonstrated proficiency in architecting, deploying, and managing secure and scalable data hosting solutions on the Azure platform. Extensive experience in developing and maintaining robust data architectures, including data models, data warehouses, and data lakes, utilizing Azure services. Expertise in optimizing data storage and retrieval processes for superior performance and cost efficiency within Azure environments. In-depth knowledge of data security protocols and compliance with industry standards and regulations, with a focus on Azure cloud compliance. Proven ability to collaborate effectively with data scientists, analysts, and other stakeholders to address their data needs using Azures capabilities. Strong track record of monitoring and troubleshooting Azure data hosting environments to ensure high availability and system reliability. Skilled in automating data workflows and processes using Azure Data Factory and other Azure-based automation tools. Experience in designing, developing, and deploying modular, cloud-based systems, with a particular emphasis on Azure solutions. Commitment to maintaining cloud solutions in alignment with Azure best practices and continuously integrating Azures latest updates and features. Possession of Azure certifications, such as the Azure Data Engineer Associate or Azure Database Administrator Associate, with a preference for candidates holding the Azure Solutions Architect Expert certification or equivalent advanced credentials. Chevron participates in E-Verify in certain locations as required by law.

Posted 1 week ago

Apply

8.0 - 13.0 years

9 - 13 Lacs

Gurugram

Work from Office

Naukri logo

Looking for experts with 8+ years experience in Privilege Access Management (PAM) solution design, implementation, and configuration Must have. Minimum 3 years of experience in Architect PAM Solution Minimum 6 years of experience in implementation configuration of PAM solution Hands-on experience in design, implementation, configuration, and integration of CyberArk/Thycotic Secret Server/BeyondTrust Hands-on experience in CyberArk/Thycotic Secret Server/BeyondTrust Hands on experience in account onboarding server onboarding with Thycotic secret Server Hands on experience in Azure AD Active Directory Good knowledge on Linux, Unix, and Windows Hands on experience in SaaS cloud Excellent communication skills in English Good to have. Hands on experience in Identity And Access Management (IAM) Hands on experience in scripting such as VB, Power shell etc.

Posted 1 week ago

Apply

5.0 - 10.0 years

18 - 20 Lacs

Pune

Work from Office

Naukri logo

Security Engineer - Triage Key Responsibilities: 1. Service Delivery Manager (SDM) - 70% The primary responsibility of the SDM is to ensure the efficient functioning of the incident response process within CERT, ensuring that attacks are detected and contained. Key duties include: Monitoring security alerts raised through various channels. Understanding incidents, assessing their criticality and priority. Creating or modifying tickets and assigning them to analysts. Tracking ticket resolution to ensure closure in compliance with SLAs. Maintaining constant communication with global CERT teams (France, Americas, India, and China) and other stakeholders (e.g., DOTI, DOMF). Consolidating and publishing statistics/figures related to incidents handled by CERT and other stakeholders. This includes: Verifying SLA compliance, especially for priority 1 incidents. Quantifying the number of incidents handled by CERT based on various analytical axes. Analyzing SLAs, proposing improvement actions, and following up on their implementation. Keeping the following documentation updated: Skills matrix for ticket orientation. Analyst access management. Decision trees for incident routing. 2. Additional Activities - 30% Depending on their expertise, the triager may be assigned occasional missions within the team, such as: Development projects. Security incident response tasks. Experience and Skills Required: 5- 10 years of experience in the IT security domain, with a background in IT development or DevOps. Proven ability to maintain confidentiality and discretion in handling sensitive information. Extensive experience with incident management and familiarity with SIEM tools. Strong collaboration skills, with the ability to work effectively in a global team environment. Behavior skills Exceptional organizational and analytical skills. Ability to work in a fast-paced environment while maintaining attention to detail. Strong communication and interpersonal skills to liaise with global teams and stakeholders. Proactive mindset with a commitment to continuous improvement in incident management processes. Availability Information: The role operates on a follow-the-sun model , requiring collaboration with the global Group CERT team. Analysts must operate 5 days from the office and be available on a rotation basis for the Weekend support from office.

Posted 1 week ago

Apply

20.0 - 25.0 years

3 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

Description About LegalZoom Were here to make legal help accessible to all. LegalZoom transformed the legal industry with the launch of our online services and groundbreaking technology in 2001. Since then, millions of customers have counted on us to officially start and run businesses, protect brands and intellectual property, and look after loved ones through wills and trusts. As the industry leader for over 20 years, innovation remains at the center of all we do. Were creative thinkers and problem solvers with a passion for building legal and tax products that make a positive impact on the world, and were always looking for exceptional people to push us further. With us, youll do work thats as rewarding as it is challenging with a team where every voice matters and diversity, equality, and inclusion are truly embraced. Together, well continue to democratize the law and make a real difference in the lives of millions. Where We work This hybrid role requires working from our Bangalore office at least 2 days a week, with flexibility to be present on additional days based on business needs. Overview We re looking for a ServiceDesk analyst to assist with internal IT infrastructure, including but not limited to access management, local and network connectivity, and workstation support. Someone can research and resolve incident tickets for our Windows infrastructure, VPN, and cloud-based tools. Must have good communication skills and compassion for every LegalZoom employee needing our assistance. You will Record, track, and document the service desk request problem-solving process, including actions taken through to the final resolution Assists staff with the installation, configuration, and ongoing usability of desktops , laptop computers, printers, peripheral equipment, and software within established standards and guidelines Configure, install, and troubleshoot Windows OS and supported applications Configure, install, and troubleshoot macOS and supported applications Configure and troubleshoot mobile devices such as smartphone-Android; iPad/iPhone, including mobile security software Ability to provide consistent, excellent customer service support to management levels and all end-users Work with infrastructure, boarding, and site ops teams as appropriate to determine and resolve end-user problems Work on incoming helpdesk tickets regularly Administer and Troubleshoot VPN Access, including multi-factor authentication Maintain and troubleshoot network printers, industrial mail scanners, and barcode devices Administer user access to Active Directory and Single Sign-On Facilitate IT help tickets to closure promptly and assist other technicians in resolving larger issues Track internal assets to ensure accurate inventory records Configure and relocate computer equipment as required Work with vendor support contacts to resolve technical problems with desktop computing equipment and software Work on recording, tracking, and documenting the service desk request problem-solving process, including actions taken through to the final resolution You have 5+ years of overall IT application and tool experience Experience in a corporate helpdesk environment Experience with Azure, Google Workspace, Microsoft 365, Slack, ServiceNow, Atlassian Tools, and Zoom preferred Experience with Windows On-premise Active Directory Experience supporting PC, MAC, and Mobile devices Experience working with cross-functional teams for On/Offboarding and Asset Management Knowledge of Anit-virus solutions, Encryption, and Mobile Device Security Experience working with external vendors to report and resolve issues

Posted 1 week ago

Apply

5.0 - 10.0 years

6 - 10 Lacs

Pune

Work from Office

Naukri logo

Security Engineer - Triage - - - - - - - - - - - - Key Responsibilities: 1. Service Delivery Manager (SDM) - 70% The primary responsibility of the SDM is to ensure the efficient functioning of the incident response process within CERT, ensuring that attacks are detected and contained. Key duties include: Monitoring security alerts raised through various channels. Understanding incidents, assessing their criticality and priority. Creating or modifying tickets and assigning them to analysts. Tracking ticket resolution to ensure closure in compliance with SLAs. Maintaining constant communication with global CERT teams (France, Americas, India, and China) and other stakeholders (e.g., DOTI, DOMF). Consolidating and publishing statistics/figures related to incidents handled by CERT and other stakeholders. This includes: Verifying SLA compliance, especially for priority 1 incidents. Quantifying the number of incidents handled by CERT based on various analytical axes. Analyzing SLAs, proposing improvement actions, and following up on their implementation. Keeping the following documentation updated: Skills matrix for ticket orientation. Analyst access management. Decision trees for incident routing. 2. Additional Activities - 30% Depending on their expertise, the triager may be assigned occasional missions within the team, such as: Development projects. Security incident response tasks. Experience and Skills Required: 5- 10 years of experience in the IT security domain, with a background in IT development or DevOps. Proven ability to maintain confidentiality and discretion in handling sensitive information. Extensive experience with incident management and familiarity with SIEM tools. Strong collaboration skills, with the ability to work effectively in a global team environment. Behavior skills Exceptional organizational and analytical skills. Ability to work in a fast-paced environment while maintaining attention to detail. Strong communication and interpersonal skills to liaise with global teams and stakeholders. Proactive mindset with a commitment to continuous improvement in incident management processes. Availability Information: The role operates on a follow-the-sun model , requiring collaboration with the global Group CERT team. Analysts must operate 5 days from the office and be available on a rotation basis for the Weekend support from office.

Posted 1 week ago

Apply

5.0 - 10.0 years

22 - 27 Lacs

Bengaluru

Work from Office

Naukri logo

1 The Lead IT Cybersecurity Engineer is responsible for the technical design of IT cybersecurity architectural guidelines and standards, as well as the secure implementation of IT digital technologies across platforms and product lines in Chevron. The primary responsibility is to assure IT solutions are "secure by design", with a high focus on delivering secure digital capabilities and retiring legacy technology when possible. Key Responsibilities: Responsibilities include but are not limited to: Enable digital transformation by ensuring secure-by-design principles are incorporated in the IT digital capabilities across the enterprise Establish cybersecurity governance for IT technologies across all technology functions Lead security research proposals and proofs of concept for emerging technologies Consult as a subject matter expert on cybersecurity risk assessments for IT technologies Define cybersecurity architectures for IT solutions Serve as a subject matter expert in one or more cybersecurity domains, including, but not limited to, Network Security, Cloud Security, Endpoint Security, Application Security, Data Security, and Identity and Access Management Required Qualifications: Minimum 5 years related work experience in cybersecurity with increasing levels of responsibility Technical experience in one or more cybersecurity domains, including, but are not limited to, Network Security, Cloud Security, Endpoint Security, Application Security, Data Security, and Identity and Access Management General understanding of the cyber threat landscape, including cyber-criminal and cyber-espionage threats Previous experience administering cybersecurity technologies and/or supporting cybersecurity operations Preferred Education: Bachelor s degree or master s degree in Cybersecurity, Information Technology, Information Systems, or Computer Science Certifications in IT Cybersecurity are highly preferred (e.g., GISP, GREM, ISSEP, OSCP or other similar certification) Certifications in SAFe Scaled Agile or related scrum/agile project management framework is desirable Preferred Qualifications: Knowledge of industry-accepted cyber security frameworks such as NIST 800-53, MITRE ATTCK, and the Cyber Kill Chain Experience in conducting and/or leading cybersecurity assessments (risk, vulnerability) and creating a detailed mitigation plan and recommendations to address gaps identified Ability to influence and motivate teams, and work with a variety of disciplines, cultures, and environments Demonstrated ability to work effectively, and communicate effectively at all levels with operations, design, projects, vendors, peers, etc Communicates in a clear, concise, understandable manner both orally and in writing Chevron participates in E-Verify in certain locations as required by law.

Posted 1 week ago

Apply

5.0 - 6.0 years

20 - 25 Lacs

Bengaluru

Work from Office

Naukri logo

Visa is seeking a Controls Monitoring & Testing Analyst within its Technology Risk Management program to review and assess Cybersecurity and Technology risks. The candidate will perform Risk Assessments, Design Effectiveness Assessments, and Operational Effectiveness Testing for key technology threat vectors such as security configuration management, firewall configuration, application, user access management, and availability & reliability. Responsibilities include managing stakeholder engagement plans, participating in process walkthroughs, tracking/reporting deliverables, and producing high-quality work papers for all lines of defense and risk stakeholders. Additionally, the candidate will interpret data from source systems to perform statistical sampling and aggregate assessment across various risk management levers, collaborate with technology partners, and distill information into management and executive-level reporting. Key Responsibilities: Technology & Cybersecurity Controls Testing: Perform independent technology and cybersecurity controls testing. Document testing results in detailed workpapers. Prepare management reports based on testing outcomes. Communicate findings with stakeholders. Automation for Continuous Monitoring: Develop automation for continuous controls monitoring/auditing for technology and cybersecurity. Monitor the results of automated controls, perform investigation and follow-ups as needed. Risk & Control Self-Assessment (RCSA): Execute RCSA Risk Business Partner (RBP) controls quality review and sample-based testing. Conduct Key Risk Indicator (KRI) testing. Training, Metrics Alignment & Reporting: Develop and track risk management training. Align metrics with reporting dashboards. Develop reporting and stakeholder communication. Bachelor s degree with 5 years of work experience in cyber, risk controls, or equivalent. Experience with technology and cyber processes and functions (e.g., Vulnerability, Availability & Reliability Risk, Cyber Defense, Third Par

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies