Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5 - 10 years
6 - 16 Lacs
Pune
Work from Office
We are seeking a highly skilled and experienced Saviynt Architect to join our Enterprise Security department. The ideal candidate will have 5 to 10 years of experience in designing and implementing Saviynt solutions for enterprise-level organizations. As a Saviynt Architect, you will play a critical role in ensuring the security and compliance of our systems and applications. Roles and Responsibilities: Design and implement Saviynt solutions to meet the security and compliance requirements of our organization. Configure the REST connector with different platform applications. Hands-on experience on JAVA with respect to IGA. Good to have experience who worked on heavy Saviynt instance of 1L+ users. Configure the child applications and direct integrations. Good to have knowledge on SAP, ABAP connect, SCIM connector and SAP cloud application provisioning. Must hands on experience on Success factor, SAP HANA connector and JDBC connector. Must hands-on experience on Saviynt features like Custom action, Technical and user update rules, endpoints, analytics, SODs, Certifications, Service Accounts, custom integrations, connections, roles, RBAC, DB structure and SSO etc. Collaborate with cross-functional teams to gather requirements and define the scope of Saviynt projects. Develop and maintain technical documentation, including architecture diagrams, design specifications, and implementation plans. Configure and customize Saviynt modules to align with our organization's security policies and procedures. Conduct regular audits and assessments to identify vulnerabilities and recommend remediation actions. Provide technical guidance and support to the Saviynt implementation team, ensuring successful deployment and integration of Saviynt solutions. Stay up to date with the latest industry trends and best practices in Saviynt architecture and enterprise security. Qualifications: Bachelors degree in computer science, Information Technology, or a related field. 5 to 10 years of experience in the Enterprise Security domain, with a focus on Saviynt architecture and implementation. Strong knowledge of Saviynt modules, including Identity Governance and Administration (IGA), Access Request and Certification, and Access Analytics. Experience in designing and implementing Saviynt solutions for large-scale organizations. Proficient in programming languages such as Java, Python, or PowerShell. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams. Our Offer: A position in an established, high-growth company headquartered in Germany with flat hierarchies and efficient decision-making. High degree of personal responsibility and a large scope for independent decision-making. Many opportunities and support for personal and professional development.
Posted 1 month ago
1 - 5 years
6 - 11 Lacs
Pune
Work from Office
Siemens Digital Industries Software is a leading provider of solutions for the design, simulation, and manufacture of products across many different industries. Formula 1 cars, skyscrapers, ships, space exploration vehicles, and many of the objects we see in our daily lives are being conceived and manufactured using our Product Lifecycle Management (PLM) software. Key Responsibilities: You will be part of our development team that works on business applications. As a Senior Java developer team member, you must contribute to the designing and development of an IAM (Identity & Access Management) based micro-services. Implement software programming for products (both internal and external) with focus on surpassing customer expectations, on achieving high quality and on-time delivery. Responsible for ensuring the overall functional quality of the released product on all required platforms and mechanism. Ability to understand complex products, solutions, and problems. Promotes innovation through the ability to introduce new technology/knowledge into multiple areas of a product and to our people. Able to solve the most complex of technical problems. Works without supervision on the most complex projects with complete latitude for independent judgment and technical expertise. Advanced knowledge of the field. Assist with less experienced peers. About The Role : We are looking for a Senior Developer with extensive experience in Identity and Access Management (IAM) solutions majorly with Java/ Spring Boot background. The ideal candidate will have a deep understanding of SAML, OIDC, and OAuth 2.0 protocols, as well as expertise in Single Sign-On (SSO) and Single Logout (SLO) mechanisms. Experience with enterprise IAM solutions such as Microsoft Entra, Auth0, and Okta is essential. Technical mandatory requirement: Develop the microservices in Java/ Spring boot for IAM domain. Should have strong hands-on coding experience in Java, Spring boot based applications. Design, develop, and implement IAM services using SAML, OIDC, SCIM1.1 SCIM2.0 and OAuth 2.0 protocols. Good Experience of designing and implementing high performance and scalable APIs. Configure and manage SSO and SLO functionalities across various applications and platforms. Good understanding of Standard RFC "˜s that define the Authorization Best Practices. Integration experience on enterprise IAM solutions like Microsoft Entra, Auth0, and Okta. Collaborate with cross-functional teams to ensure seamless integration of IAM solutions. Troubleshoot and resolve IAM-related issues and provide technical support. Stay updated with the latest trends and best practices in IAM and security protocols. Conduct security assessments and audits to ensure compliance with industry standards. Implement and manage Policy-Based Access Control (PBAC), Role-Based Access Control (RBAC), Multi-tenancy, and Attribute-Based Access Control (ABAC). Work with AWS and Azure environments. Good hands-on experience on EKS and Docker Technology. Good to havePython, Golang We are Siemens A collection of over 377,000 minds building the future, one day at a time in over 200 countries. We're dedicated to equality, and we welcome applications that reflect the diversity of the communities we work in. All employment decisions at Siemens are based on qualifications, merit, and business need. Bring your curiosity and creativity and help us shape tomorrow! We offer a comprehensive reward package which includes a competitive basic salary, bonus scheme, generous holiday allowance, pension, and private healthcare. Siemens Software. "˜Transform the every day"™ and "˜Accelerate transformation."™ #LI-PLM #LI-Hybrid, #SWSaaS
Posted 1 month ago
2 - 6 years
12 - 16 Lacs
Pune
Work from Office
Hello eager tech expert! To create a better future, you need to think outside the box. That"™s why we at Siemens need innovators who aren"™t afraid to push boundaries to join our diverse team of tech gurus. Got what it takes? Then help us create lasting, positive impact! Siemens Corporate Technology "India Tech Hub" is at the forefront of driving digital transformation and enabling the integration of artificial intelligence into the fabric of industrial solutions. As a pivotal innovation center, the Tech Hub is dedicated to harnessing the power of AI to revolutionize the future of work. With a focus on customer-centric solutions, Siemens India Tech Hub is a beacon for exploring industrial AI use cases, ensuring that Siemens remains a global leader in the digital era. You"™ll break new ground by To provide solution expertise in End User Computing (EUC), specializing in Identity and AccessManagement (IAM), Intune Administration & MDM Expertise. Intune Administration & MDM ExpertisePossesses advanced skills in Autopilot deployment, managing and troubleshooting MDM-related issues, and enforcing compliance and security policies. Software Packaging & DeploymentPowerShell scripting, App-V, InstallShield, and AdminStudio for application packaging and deployment. Identity & Access ManagementDefine and govern Azure Active Directory (AAD), Group Policy (GPO), and Microsoft Entra ID, ensuring secure access control and user identity management. Browser Management & PoliciesConfigure and Manage browser policies via Intune to optimize security and performance. Automation & ReportingProvide data reporting using power BI and automation using Power Automate to streamlet processes & enhance team efficiency. A proactive professional with a robust problem-solving mindset, exceptional communication skills, and a dedication to optimizing IT operations and end-user support. You"™re excited to build on your existing expertise, including Bachelor"™s degree in computer science, Information Technology, or a related field. At least 7 years of experience in End User Computing (EUC), Identity and Access Management (IAM), Intune Administration & MDM. Experience with Power BI, Power Automate and other M365 tools. Excellent analytical, problem-solving, and communication skills. Ability to work independently and as part of a team. Experience in ITIL process definition and implementation. Knowledge of Agile methodologies and experience working in a Scrum team. Strong understanding of M365 tooling architecture. Create a better #TomorrowWithUs! We value your unique identity and perspective and are fully committed to providing equitable opportunities and building a workplace that reflects the diversity of society. Come bring your authentic self and create a better tomorrow with us. Protecting the environment, conserving our natural resources, fostering the health and performance of our people as well as safeguarding their working conditions are core to our social and business commitment at Siemens. This role is based in Pune. You"™ll also get to visit other locations in India and beyond, so you"™ll need to go where this journey takes you. In return, you"™ll get the chance to work with international team and working on global topics.
Posted 1 month ago
6 - 10 years
15 - 25 Lacs
Bengaluru
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all – at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science – taking information that has been gathered and looking for areas to have that “Ah Ha” moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity – governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience Experience: Minimum of 4-6 years of relevant experience in CyberArk administration and cybersecurity practices, with proven hands-on experience in Privileged Access Management (PAM) using PSM/PSMP. CyberArk Privilege Cloud Management : Proven experience managing CyberArk SaaS Privilege Cloud and its associated components infrastructure. Tenant Management and Cloud Connectors: Strong understanding of Tenant Management, Secure Tunnel, and Cloud Connectors within CyberArk. CyberArk Onboarding : Experience managing CyberArk onboarding activities, including onboarding accounts via RESTAPI, manual onboarding, and bulk onboarding processes. Platform and Safe Creation: Ability to create new safes, accounts, and platforms in CyberArk and link new platforms to the CyberArk environment. Privileged Account Management: Securely managing and monitoring privileged account access to target hosts using Privileged Session Manager (PSM) and Privileged Session Manager Proxy (PSMP). LDAP & AD Federation : Strong knowledge of LDAP and AD Federation. Familiarity with secure integrations with external services such as LDAP/S and RADIUS. CyberArk PAS Components Knowledge: Familiarity with various CyberArk PAS components, including: Privilege Access Suite (PAS) Secure Password Vault and Safes Password Vault Web Access (PVWA) Central Policy Manager (CPM) Privileged Session Manager (PSM & PSMP) Application Identity Manager (AIM), Central Policy (CP), and Central Credential Provider (CCP). Password Management & Compliance: Experience managing privileged account passwords, including verification, change, and reconciliation, ensuring compliance with organizational policies. Session Management: Understanding of user sessions directed through PSM and PSMP for monitoring and auditing. Policy and Reporting: Experience in creating/modifying master policies, and generating reports on safes and user activity. Health Checks & Monitoring: Performing health checks on CyberArk infrastructure and monitoring various components to ensure system integrity and uptime. Troubleshooting & Configuration: Ability to troubleshoot configuration and connectivity issues related to PAM services and components, including network connectivity issues and load balancing. Server Administration: Proficient in Linux Red Hat 7/8, Windows Server 2016/2019/2022 administration. Database and Directory Services: Knowledge of managing database targets, LDAP, AD, and IAM systems. PowerShell & Python Knowledge: Basic knowledge of PowerShell and Python scripting for automation and system integration is a strong advantage. Networking Concepts: Understanding of networking concepts, including firewalls, routing, and load balancing. Disaster Recovery & Failover: Solid knowledge of CyberArk disaster recovery, failover, and failback mechanisms to ensure availability and business continuity. Vault Data Backup: Experience in Vault Data Backup processes for ensuring critical data is securely backed up and protected. Change Management: Proven experience in managing change processes, including preparing and executing delivery plans during Change Advisory Board (CAB) reviews. Incident Handling: Responsible for managing complex and escalated incidents and requests with a focus on resolving issues efficiently. KPI Compliance: Ensuring adherence to KPI metrics for incident and service request resolution, including timely communication and escalation procedures. Stakeholder Communication: Providing input and updates to stakeholders involved in critical incidents, particularly during outages or system failures. Preferred Technical and Professional Experience CyberArk Certifications: Certification as CyberArk Defender, Sentry, or CPC-PAM would be a plus. Troubleshooting Expertise: Advanced troubleshooting skills for identifying and resolving configuration, connectivity, and system performance issues related to PAM services. Report Generation: Experience using CyberArk’s PAS Reporter and Telemetry tools to generate and analyze operational reports. Team Collaboration: Ability to work as a key team player, participating in regular team reviews and contributing to continuous improvement. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 1 month ago
1 - 3 years
5 - 8 Lacs
Bengaluru
Work from Office
As a Zendesk Identity Access Management (IAM) Engineer you will be responsible for designing, configuration, testing, implementation, and maintaining systems and solutions that control access to the organizations resources, sensitive information, and data. The primary goal of this role is to ensure that only authorized individuals have access to these resources, while preventing unauthorized users from gaining entry. What you get to do every day as an IAM Engineer Day to day management and monitoring of Identity management tools and Public Cloud tooling (e.g., MFA, Security Token, OAUTH, AWS, Okta, Atlassian, and BigFix) and maintains appropriate configurations and access policies. Direct experience administering IAM related SaaS applications. Review and lead the gathering of business, functional and technical requirements for establishing an Okta Identity platform. Review updates and new features of Okta and make recommendations for implementation to the environment. Defines and enforces business process strategy, entitlement and access management Manages app integration requests including SSO and User Lifecycle Management Manages IDM environment including all related processes, Access Groups, Service accounts, Sandbox access, API configuration. Proactively identify & resolve IAM lifecycle management related issues Work with stakeholders and other team members to clarify business requirements, remove roadblocks and gain alignment while adhering to internal governance processes while. Works with business partners to gather information and requirements. Defines Scope, and works to identify potential issues / limitations capabilities, recommends solutions and drives work to completion Maintains and reviews existing processes. Works to continuously update and improve end to end processes. Maintains and reviews IAM documentation ensuring all documentation is kept up to date with current Zendesk IAM policies and procedures. Translates requests from Business partners into Jira Stories and Epics What you bring to the role: 1-3 years experience in an IT Operations role or educational equivalent; ideally in CS/IS or holds Bachelors degree. Strong understanding of day to day management of Okta for group and user management, app provisioning tasks, app intake and deprecation, etc. Working knowledge of all main areas of the Okta product including Identity Engine, Universal Directory, and Adaptive MFA. Working knowledge of Cloud Authentication and Access management Services. Possess a solid understanding of identity management and security policy concepts, protocols, and best practices Direct experience administering IAM related SaaS applications. Hands-on experience integrating applications with Okta SSO (SAML, OIDC, SWA, Etc.) Able to effectively present SSO concepts to stakeholders with various levels of technical understanding Working knowledge of Okta Workflows and high level programming concepts is a plus. Works well across geographies/timezones as a member of a global organization. Availability during normal business hours with flexibility based on business requirements, must be able to travel 10% of the time Value & Organizational Skills Excellent verbal and written communication skills Passion for continuous learning and professional growth. Able to make difficult and quick decisions daily with limited supervision and often with competing priorities and varying degrees of urgency. Possess a passion for continuous learning and professional growth. Recognizes and adjusts communication style to account for a diverse global workplace. Highly developed negotiation, facilitation and consensus building skills. Preferred Okta Certified Administrator or higher Zendesk endeavors to make reasonable accommodations for applicants with disabilities and disabled veterans pursuant to applicable federal and state law.
Posted 1 month ago
5 - 7 years
15 - 25 Lacs
Hyderabad, India
Work from Office
Position - SailPoint or Saviynt SME Exp - 5-7 Yrs Location - Hyderabad SME for SailPoint IdentityIQ, ISC and/or Saviynt platforms. Lead the design, implementation, and support of identity governance solutions Perform Role Based Access Controls RBAC
Posted 1 month ago
3 - 6 years
5 - 8 Lacs
Pune
Work from Office
The Security and Controls Associate will handle Access Management, Security and Controls for ERP, AX 2012 and other Apps like TM1, HFM, Trintech, Tagetik, Banking portals. Work closely with Ongoing Projects for EUT / UAT. What will you be doing? Managing Access Management including system controls in Tagetik Application. This should cover the following modules - Reconciliation (similar to Trintech or Blackline) Financial Controls (similar to Trintech or Blackline) Financial Reporting (similar to HFM and TM1) Month end close (similar to Trintech or Blackline). Closely work with the team for Access Controls review and submission process. Responding to Auditors basis audit samples with clear documentation Involved in UAT process across all applications. Creation of Process SOPs and other relevant documentation. Collaborate closely with business collaborators to identify SOD conflicts and vital remedies. What will you need to be Successful? B.com Degree or equivalent in Accounting, Finance, Business Management or other business-related field required Strong business insight and honesty with the ability to interact effectively with colleagues in all functions and levels Ability to work in a high-performing team environment Established proficiency in carrying out large scale strategies and global projects while meeting and/or exceeding customers expectations. Proficiency in English - Good verbal and written communication skills. You. Unlimited We believe in crafting the greatest good for society. Our strongest investments are in our people and the patients we serve. Inclusion, Diversity and Equity - committed to welcoming, celebrating, and growing Diversity. Learn more about it on our website: https://www.smith-nephew.com/ . Other reasons why you will love it here! Your future: Major medical coverage + Policy exclusions and Insurance non-medical limit. Education Assistance. Work / Life balance: Flexible Personal / Vacation time off, Privilege leave, Floater leave, etc. Your Wellbeing: Parents / Parents-in-law s insurance coverage also available. Flexibility: Hybrid work model (for most professional roles). Extra Perks: Free Cab Transport facility for all employees, one-time meal provided to all employees as per shifts, Night Shift Allowances.
Posted 1 month ago
6 - 11 years
8 - 13 Lacs
Hyderabad, Chennai
Work from Office
About us* Global Business Services is recognized for flawless execution, sound risk management, operational resiliency, operational excellence, and innovation. The Global Information Security (GIS) is responsible for protecting Bank information systems, confidential and proprietary data, and customer information. Cyber Security Technology (CST) is a globally distributed team responsible for cyber security innovation and architecture, engineering, solutions and capabilities development, cyber resiliency, access management engineering, data strategy, deployment maintenance, technical project management and information technology security control support. Teammates in this role deliver moderately complex tools and systems that mitigate the risk of malicious cyber-attacks. Job Description* Individuals in this role contribute to the protection of system boundaries, keeping computer systems and network devices hardened against attacks and secure sensitive data. It is important that those in this role actively create and nurture partnerships with peer teams and identify opportunities for cross-team collaboration. Individuals in this role operate within a structured environment with some oversight but are eager to take initiative and tackle complex problems within one or more security engineering domains. This role may mentor one or more junior team members Primary Level of Engagement: Works as a senior contributing member of an initiative, under supervision of an engineering lead. Primary Interactions: Direct Manager Engineering Lead Project Manager GIS Peers IT Stakeholders Internal GIS Customers Responsibilities* Identify, define, document, and implement security system requirements for AWS and Azure utilizing Wiz. Develop and execute test plans and produce quantitative results. Leverage broad knowledge of information security technologies, techniques, processes, and prepare to grow that knowledge within one or more security engineering domains. Drive complex technical information security projects to ensure on-time delivery. Identify and raise risks or potential vulnerabilities at all stages of the security- engineering process. Think outside the box to develop multiple solutions to complex problems. Work closely with a diverse set of stakeholders with varying priorities to debate and negotiate paths forward. Contribute to existing test suites (integration, regression, and performance), analyze test reports, identify any test issues/errors, and triage the underlying cause. Document and communicate required information for deployment, maintenance, support, and business functionality. Identify gaps in information security standards adherence and work with appropriate partners to develop plans to close gaps. Requirements* Education* :Bachelors Degree in Computer Science, or related technical discipline Certifications If Any: NA Experience Range* Minimum 6 years of related experience Foundational skills* Broad knowledge of information cloud security technologies, techniques and processes and excitement to grow that knowledge within one or more security-engineering domains. Experience with Wiz is a mandatory. Coding experience in Hashicorp Terraform AWS OPA, SCP, SecurityHub, Config, EventBridge, SSM, Azure Policy Experience with policy as code, CSPM, cloud/SaaS security management is helpful. Ability to communicate (verbal and written) across all levels of the organization, from technical experts to senior executives. Comfortable working with distributed team members using video conferencing, instant messaging, telephone calls, etc. Strong attention to detail, confident enough to raise questions and identify issues. Enjoys trouble shooting and puzzle solving. Desired skills Microsoft Defender a plus. Knowledge on Continuous Integration & Deployment tools DevSecOps Experience at a financial institution is a plus. Work Timings* 12.30 PM to 9.30 PM Job Location* Chennai / Hyderabad
Posted 1 month ago
12 - 14 years
30 - 37 Lacs
Pune
Work from Office
About The Role : Job Title - Technology Analyst Java Engineer Corporate TitleAVP Location Pune Role Description Technology Management is responsible for improving the technological aspects of operations to reduce infrastructure costs, improve functional performance and help deliver Divisional business goals. To achieve this, organization needs to be engineering focused. Looking for technologists who demonstrate a passion to build the right thing in the right way. Work includesPartnering with key internal stakeholders to translate bank strategy into objectives and plans for implementation supporting the delivery of world class technology solutions Take care of computer operations and production support, systems and database administration, network operations, and client service Ensuring systems performance and service level requirements are met Transferring business requirements into technical solutions or into Release Management What we'll offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy: Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Part of a global team, forging strong relationships with geographically diverse teams / colleagues and business to formulate and execute technology strategy. Focus of the individual must be on ensuring that we remain an engineering focused organization. We are looking for technologists who demonstrate a passion to think out of the box. Work with application platform supporting a wide variety of Alternatives funds and businesses globally. Work with technical specialists to develop in house solutions and support existing applications. Coordinate application life cycle, including access management, security, disaster recovery, day-to-day support, and business workflow management. Perform data analysis, identify data quality issues, and develop strategies for data cleansing and transformation. Design innovative, sustainable solutions which are congruent with the strategic direction of the Bank. Challenge the status quo and influences key stakeholders to ensure industry best practice is adhered to within their area of expertise. Ensure knowledge articles and documentation are up to date. Be responsible for IT Governance in line with company policies and regulations. Your skills and experience 12-14 + years of Hand on experience with Java & Spring Boot Experience with software development lifecycle (e.g. Agile, Waterfall) Expertise with relational databases like Oracle / MSSQL Excellent understanding of Microservice architectures and experience with REST API Experience with any of the public cloud like GCP / Azure / AWS Experience with application migration from On-Prem / Private cloud to Public cloud will be a plus Experience in a business aligned IT department of a financial institution Effective learning, problem-solving, decision-making capability Exposure to and inclination towards developing knowledge on AI / ML and Generative AI to identify, analyze and implement potential use cases. Strong verbal and written communication skills Self-starter, proactive and excellent team player with ability to work well under pressure in a fast-paced environment and always with professionalism. Ability to be open minded, learn new technologies on the job, share information, transfer knowledge. Enterprise technology knowledge and experience (e.g., application/data migration, architecture, infrastructure, data transfer methods (SFTP), application and database technologies) Experience with vendor hosted SaaS solutions and Identity and Access Management (IAM) will be a plus. Good understanding of risk frameworks, control environments and application governance. Skills and Experience That Will Help You Excel Bachelor of Science degree from an accredited college or university with a concentration in Computer Science or Software Engineering (or equivalent) Familiarity with Finance and specifically Asset Management industry, Alternative investments Positive attitude and a team player Proactive and ability to work independently Open to learn, adapt and solution with new technologies Defines and implements best practices, solutions and standards related to their area of expertise. How we'll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm
Posted 1 month ago
2 - 6 years
7 - 11 Lacs
Mumbai
Work from Office
About The Role : Job TitleInformation Security Analyst, AS LocationMumbai, India Role Description CRO DCO Resilience team Manages and Governs various risk types for Chief Risk Office (CRO) including but not limited to Information Security, Data Protection, Records Management, Business Continuity, Vendor / Third Party Risk Management (TPRM) The Resilience team in India is a part of CRO's Divisional Control Office (DCO) responsible for Governance on various risk types Information Security Analyst will be responsible for ensuring governance on information security and other risk types for various CRO Functions Information Security Analyst will support CRO DCOs efforts to identify, analyse and report the non-financial risks of the CRO Function, thereby ensuring that Group and Functional standards are consistently applied. The candidate is required to demonstrate very good understanding of risk management activities, paired with strong stakeholder management and Microsoft office skills. The role will have full exposure to all areas within CRO and requires working closely with a variety of stakeholders. The role has considerable scope for professional development across the Risk Management domain What we'll offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities As the Information Security & Technology Analyst your responsibilities will include (but not be limited to): Assume ISO ownership for assigned Risk applications Ensure execution of Information Security risk assessments and compliance evaluation Ensure implementation of controls for identified Information Security and Technology risks for designated business applications and functions Ensure implementation and maintenance of Identity and Access Management processes, as well as execution of periodical recertification of User Access Rights Ensure annual validation of key application documentation, including KOP and User access matrix for each assigned application and activities Provide timely updates to the DBISO and/or Risk Chief BISO regarding afore mentioned tasks Ensure accuracy of application entries regarding Information Security in the Group inventory of applications (NAR) Engage and create a positive network across external teams like Technology, respective functions, Chief BISOs, Risk type managers etc. Treatment of escalation questions regarding problems as well as assessments of potential violations of regulatory or internal guidelines regarding Information Security Cooperation in improving existing processes and workflows as well as independent implementation of new processes Regular attendance at scheduled meetings and telephone conferences, e.g., presentations of work results to senior decision-makers/workgroups, processing of meetings and telephone conferences (preparation of agendas, if needed, keeping the minutes) Management of urgent activities at short notice Management of enquiries from auditors and regulators Your skills and experience Core understanding of non-financial risk. Good understanding of risk management activities and internal control frameworks. Strong analytical skills to interpret and analyse data. The ability to successfully navigate a complex organisation, build strong relationships and work collaboratively with diverse stakeholders across the bank Very good Microsoft Office skills, particularly Excel and PowerPoint A sound knowledge of Information Security would be preferred along with Information Security Certifications / skills How we'll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs
Posted 1 month ago
5 - 10 years
8 - 13 Lacs
Pune
Work from Office
About The Role : Job TitleSenior Engineer, AVP LocationPune, India Role Description We are seeking a Data Security Engineer to design, implement and manage security measures that protect sensitive data across our organization. This role focusses on the execution and delivery of Data Security solutions, focusing on configuration, engineering, and integration within a complex enterprise environment. While the role operates within Cybersecurity the person will collaborate with IT, Risk Management, and Business Units on a case-by-case basis, delving Data Loss prevention solutions. The ideal candidate understands and manages the existing tool stack within a complex environment, navigates through technical integration challenges and supports the transition from legacy solutions to new solutions within the pillar and across different areas of the bank. This role will work on specific tools like Symantec DLP, Zscaler but require the flexibility to evaluate and integrate new solutions like PaloAlto, Fortinet, Microsoft Purview and capabilities in existing cloud security solutions like Azure/GCP. What we'll offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Policy Development and ImplementationDesign and implement data loss prevention policies, standards, and procedures to protect sensitive data from unauthorized access and disclosure. Risk AssessmentConduct regular assessments of our implementation to identify vulnerabilities and potential threats to the organization's data. Develop strategies to mitigate identified risks. DLP SolutionsEvaluate, deploy, and manage DLP solutions and technologies. Ensure that these tools are effectively integrated and configured to protect sensitive data across the organization. Monitoring and AnalysisMonitor data movement and usage to detect and respond to potential data breaches or policy violations. Analyse incidents to identify root causes and develop corrective actions. CollaborationWork with IT, legal, and business teams to ensure that DLP measures align with organizational goals and regulatory requirements. Provide guidance and support to stakeholders on data protection issues. Design and Implement data security frameworks, including encryption, tokenization and anonymization techniques within a hybrid environment Implement cloud-native security controls (e.g., CASB, CSPM, DSPM ) to protect data in SaaS, IaaS, and PaaS environments. Implement Digital Rights Management, encryption and tokenization strategies and solutions to protect data in hybrid environments and prevent unauthorized access and disclosure. Deploy and manage data discovery & classification tools to identify sensitive data across structured and unstructured sources. Implement automated classification and labeling strategies for compliance and risk reduction. Your skills and experience Technical Expertise 5+ years of hands-on experience in Data Security, Information Protection, or Cloud Security. Strong expertise in delivering Data Security platforms (Symantec, Netskope, Zscaler, PaloAlto, Fortinet, etc.). Knowledge of Cloud Service Provisioning and experience with Cloud Security (AWS, Azure, GCP) and SaaS data protection solutions. Experience with Cloud Security (CASB), SaaS Security Posture Management (SSPM), Data Security Posture Management (DSPM). Proficiency in network security, endpoint protection, and identity & access management (IAM). Scripting knowledge (Python, PowerShell, APIs) for security automation are a plus. Hands-on experience with AI/ML and data security related remediations are a plus. Soft Skills & Collaboration Strong problem-solving and analytical skills to assess security threats and data exposure risks. Ability to work cross-functionally with Security, IT, and Risk teams. Effective written and verbal communication skills, especially when documenting security configurations and investigations. Professional certifications such as CISSP, CISM, CCSP, GIAC (GCIH, GCFA), or CEH. How we'll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs
Posted 1 month ago
8 - 13 years
20 - 25 Lacs
Bengaluru
Work from Office
You ll have up to 35 reports under your scope of responsibility. You will be required to deliver technical work (as a senior technical architect) on Industries projects at 25% utilization and balance that with leading your team of Technical Consultants, Architects and Managers. You ll be responsible for hiring, training, and mentoring our Technical Consultants so they can implement successfully in turning the program design of our Solution Architects and Technical Architects into highest-quality solutions that meets the customers needs. Serve as a trusted advisor to the client, guiding customers and colleagues in rationalizing and deploying emerging technologies that drive increased business value Identify and lead internal critical initiatives to grow the Industries consulting practice; serving as an active contributor to the community s overall knowledge base and expertise Work closely on projects with Delivery Managers, Solution Architects, and directly with clients to architect technology solutions to meet client needs Lead Enterprise Architecture and Governance for an enterprise-level customer engagement. Serve as a trusted advisor to the client driving conversations with their Enterprise Architects and business stakeholders that shape the architectural vision, and establish a program architectural roadmap. Lead functional and technical workshops. Demonstrate leadership skills in designing, delivering, testing, and deploying. Lead a project team of developers focused on driving optimized solutions for our Industries clients leveraging Salesforce Service Cloud, Sales Cloud, and Experience Cloud Ensure the success of these teams while securing the highest CSAT and business outcomes Manage customer expectations; negotiate solutions to complex problems with both the customer and third-party stakeholders Establish trust with the customer s leadership, promoting and/or implementing best practices with SFI and Salesforce Highlight and manage risk areas in the solution in a proactive manner, and commit to seeing an issue through to completion Minimum Requirements: 18+ years of experience leading Salesforce technical consulting projects and handling individual contributors. 8+ years of people management experience Domain Experience in Telecommunication/Media Strong application design skills combined with strong data, integration, and security architecture skills Expertise in one or multiples of Industry Cloud, Sales/Service/Experience Cloud, and Vlocity OmniStudio Integration Architecture (Must have) Platform Security (Must have) Identity and Access Management / Integration Security Sharing and Visibility (Must have) Data Architecture and Management (Must have) Architectural Design Patterns Apex Design Patterns (Must Have) Salesforce/Apex, Triggers, Lightning Flows, Lightning, LWC, and experience with modern web and mobile technologies (HTML, CSS, JavaScript, Web Components, others) Proficiency in English Preferred Requirements: Salesforce Certification Preferred (Admin, Developer, Sales, and Service Clouds, Application Architect) OmniStudio Developer/Consultant Thorough individual with the ability to rapidly learn and take advantage of new concepts, business models, and technologies Strong communication skills, both written and verbal. Able to effectively develop materials that are appropriate for the audience A great listener with the ability to communicate with people in diverse roles Proven ability to analyze, design, and optimize business processes via technology and integration Resourceful and innovative thinker who can work through and solve problems Adept at navigating/mediating conflict and fostering healthy dialogue Strong interpersonal skills - nurture effective working relationships with others Exceptional analytical skills - experience overseeing and managing business metrics, productivity, and outcomes
Posted 1 month ago
2 - 4 years
8 - 12 Lacs
Gurugram
Work from Office
Company: MMC Corporate Description: We are seeking a talented individual to join our GIS team at MMC Corporate This role will be based in Gurgaon. This is a hybrid role that has a requirement of working at least three days a week in the office. Global Cyber Defense - Security Operations Center What can you expect? We are looking for someone to join and grow in our Security Operations Center (SOC) in a technical analyst role on various daytime business hours shifts. As an Analyst, you will be responsible for analyzing security event data, assessing the potential impact of events, and creating recommendations to defend against emerging threats. You will follow security events through the triage and response lifecycle and document all processes in a centralized knowledgebase. In this role, you will participate in ongoing security incidents and continuous SOC initiatives, such as new content development and enrichment. Additionally, you will collaborate across multiple teams on various efforts to continue to strengthen the security posture of Marsh & McLennan Companies. What is in it for you? Be able to work with a global team with a company with a strong brand and strong results to match. Be part of an organization with a culture of internal mobility, collaboration, valued partnership from the business and drive for innovation in data & analytics, including the latest AI technology Grow your career with direct exposure to Senior Technologists, Business Leaders, and Employee Resource Groups which provide access relevant volunteer and mentoring opportunities and interactions with counterparts in industry groups and client organizations. Competitive pay (salary and bonus potential), Full benefits package - starting day one (medical, dental, vision, STD/LTD, life insurance, RSP (Retirement Savings Plan or TFSA (tax free savings account.) Entitled to vacation, floating holidays, time off to give back to your community, sick days, and national holidays. We will count on you to : Analyzing network traffic, endpoint security events, and other various log sources to identify threats, assess potential impact, and recommend mitigations Supporting other security functions and teams to ensure the holistic implementation of security controls, technologies, practices, and programs Contributing to the development and improvement of response processes, documentation, tool configurations, and detection logic Assisting in additional Security Operation Center initiatives, including playbook development and documentation, new rule creation, and tool evaluations Maintaining an operational knowledge of global threat trends, known threat actors, common tactics, techniques, and procedures (TTPs), and emerging security technologies Collaborating on Security Operation Center team training opportunities and other cross training opportunities Operating as a subject matter expert on various security topics across multiple domains Supporting 24x7 operations by assisting in ongoing incidents during non-standard hours What you need to have? Undergraduate degree in Computer Science (CS), Computer Information Systems (CIS), other related degrees, or equivalent experience 2+ years of information security experience and/or 2-4 years of experience in security analysis in a non-security focused role Excellent critical thinking skills, with proven analytical expertise and the ability to learn adaptively Demonstrated effective verbal, written and interpersonal communication skills with the ability to communicate security concepts to both technical and non-technical audiences Demonstrated experience with security technologies and alerts, such as intrusion prevention and detection systems, web proxies, SIEM, SOAR, EDR, firewalls, web application scanner, vulnerability scanners, forensics tools, open-source tools, or other security technologies Knowledge in one or more of the following domains: Network Operations and Architecture, Operating Systems, Identity and Access Management, Programming, Cloud Computing, Databases, or Cryptography What makes you stand out Ability to operate independently in a dynamic, evolving environment with multiple inputs and tasks simultaneously Knowledge of common attacks, current threats, threat actors, and industry trends Familiarity with common security frameworks and models, such as MITRE ATT&CK, Lockheed Martin Cyber Kill Chain, The Diamond Model of Intrusion Analysis and NIST Cybersecurity Framework Professional or technical certifications, such as Security+, GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), or other related certifications Why join our team: We help you be your best through professional development opportunities, interesting work and supportive leaders. We foster a vibrant and inclusive culture where you can work with talented colleagues to create new solutions and have impact for colleagues, clients and communities. Our scale enables us to provide a range of career opportunities, as well as benefits and rewards to enhance your well-being.
Posted 1 month ago
1 - 3 years
4 - 6 Lacs
Noida
Work from Office
Job Description. Education B. Tech, BSC IT, BCA or any Technology bachelors or masters Degree Experience: 1-3 years Roles & Responsibilities: Required to work on Access Request Management fulfilment operations and tickets within defined SLAs. Required to perform UAA (User Access Administration) audit activities. Manage On/Off Boarding tasks. Required to perform Application role- based access, Prov/De Provisioning tasks. Required to manage access of inhouse applications such as Account Creation, Modification and Deactivation Required to provision accounts in Enterprise directory services (Active Directory) Required to perform tasks in O365 User provisioning. Basic administration of MS Azure Active Directory Required to perform Multi Factor Authentication (MFA) admin tasks. Required to generate Status Reports, Dashboards and Quality Metrics Candidate will be required to interact with Client, vendors and other business functions. Should be ready to work in rotational shift and support over Indian Holidays and Weekends Should be open for 24*7 Support including Night shifts / US business hours. Skills: Understanding of Identity and Access Management (IAM) concepts Analytical and Troubleshooting skills. Well versed with creating and analyzing excel data for UAA related tasks. Word/Excel/PowerPoint knowledge Basic SQL and Database Query processing knowledge and skills Basic understanding of MS Active Directory and Azure services Experience with Role Based Access Controls Understanding of MFA and related administration skills Communication and Presentation skills Preferred skill PowerShell scripting knowledge if any Preferred Certifications ITIL, Agile, SQL, MS Active Directory, Healthcare IT
Posted 1 month ago
3 - 6 years
7 - 11 Lacs
Noida
Work from Office
- Required to work on Access Request Management fulfilment operations and tickets within defined SLAs - Required to perform UAA (User Access Administration) audit activities - Manage On/Off Boarding tasks - Required to perform Application role- based access, Prov/De Provisioning tasks - Required to manage access of inhouse applications such as Account Creation, Modification and Deactivation - Required to provision accounts in Enterprise directory services (Active Directory) - Required to perform tasks in O365 User provisioning - Basic administration of MS Azure Active Directory - Required to perform Multi Factor Authentication (MFA) admin tasks - Required to generate Status Reports, Dashboards and Quality Metrics - Candidate will be required to interact with Client, vendors and other business functions - Should be ready to work in rotational shift and support over Indian Holidays and Weekends - Should be open for 24*7 Support including Night shifts US business hours Skills: - Understanding of Identity and Access Management (IAM) concepts - Analytical and Troubleshooting skills - Well versed with creating and analyzing excel data for UAA related tasks - Word/Excel/PowerPoint knowledge - Basic SQL and Database Query processing knowledge and skills - Basic understanding of MS Active Directory and Azure services - Experience with Role Based Access Controls - Understanding of MFA and related administration skills - Communication and Presentation skills Preferred skill - PowerShell scripting knowledge if any Preferred Certifications - ITIL, Agile, SQL, MS Active Directory, Healthcare IT Education - B. Tech, BSC IT, BCA or any Technology Bachelor or Masters Degree
Posted 1 month ago
3 - 8 years
5 - 10 Lacs
Hyderabad
Work from Office
Technical Skill sets : SAP GRC 4+ years of experience of working in SAP security and GRC Access control Application Management Services. Good Team player with a positive attitude and good written and verbal communication skills. Mentor team members Technical expertise in GRC access control components Access Request Management, Access Risk Analysis, Business Role Management and Emergency Access Management concepts Expertise in troubleshooting and resolving complex SAP security and GRC Access control issues Willingness to work in shifts Analyze and Implement security OSS notes Good understanding of Incident, Change and Problem management concepts Technical expertise in SAP ECC, S/4 HANA, Portal, BI, BOBJ, HR, ARIBA, FIORI based security concepts Understanding of SAP business process, implementation methodologies and project life cycle Experienced in the segregation of duties and GRC rule set concepts Work with internal/external audit and SOX compliance teams to maintain compliant systems Prepare documentation in various security processes, procedures & auditing Maintain strong customer focus by building strong relationships with Business teams, scheduling and conducting key business meetings Must Have Skills: SAP Security SAP GRC Basic SAP BASIS Specific knowledge and tools
Posted 1 month ago
2 - 4 years
13 - 17 Lacs
Gurugram
Work from Office
Company: MMC Corporate Description: We are seeking a talented individual to join our GIS team at MMC Corporate This role will be based in Gurgaon. This is a hybrid role that has a requirement of working at least three days a week in the office. Global Cyber Defense - Security Operations Center What can you expect? We are looking for someone to join and grow in our Security Operations Center (SOC) in a technical analyst role on various daytime business hours shifts. As an Analyst, you will be responsible for analyzing security event data, assessing the potential impact of events, and creating recommendations to defend against emerging threats. You will follow security events through the triage and response lifecycle and document all processes in a centralized knowledgebase. In this role, you will participate in ongoing security incidents and continuous SOC initiatives, such as new content development and enrichment. Additionally, you will collaborate across multiple teams on various efforts to continue to strengthen the security posture of Marsh & McLennan Companies. What is in it for you? Be able to work with a global team with a company with a strong brand and strong results to match. Be part of an organization with a culture of internal mobility, collaboration, valued partnership from the business and drive for innovation in data & analytics, including the latest AI technology Grow your career with direct exposure to Senior Technologists, Business Leaders, and Employee Resource Groups which provide access relevant volunteer and mentoring opportunities and interactions with counterparts in industry groups and client organizations. Competitive pay (salary and bonus potential), Full benefits package - starting day one (medical, dental, vision, STD/LTD, life insurance, RSP (Retirement Savings Plan or TFSA (tax free savings account.) Entitled to vacation, floating holidays, time off to give back to your community, sick days, and national holidays. We will count on you to : Analyzing network traffic, endpoint security events, and other various log sources to identify threats, assess potential impact, and recommend mitigations Supporting other security functions and teams to ensure the holistic implementation of security controls, technologies, practices, and programs Contributing to the development and improvement of response processes, documentation, tool configurations, and detection logic Assisting in additional Security Operation Center initiatives, including playbook development and documentation, new rule creation, and tool evaluations Maintaining an operational knowledge of global threat trends, known threat actors, common tactics, techniques, and procedures (TTPs), and emerging security technologies Collaborating on Security Operation Center team training opportunities and other cross training opportunities Operating as a subject matter expert on various security topics across multiple domains Supporting 24x7 operations by assisting in ongoing incidents during non-standard hours What you need to have? Undergraduate degree in Computer Science (CS), Computer Information Systems (CIS), other related degrees, or equivalent experience 2+ years of information security experience and/or 2-4 years of experience in security analysis in a non-security focused role Excellent critical thinking skills, with proven analytical expertise and the ability to learn adaptively Demonstrated effective verbal, written and interpersonal communication skills with the ability to communicate security concepts to both technical and non-technical audiences Demonstrated experience with security technologies and alerts, such as intrusion prevention and detection systems, web proxies, SIEM, SOAR, EDR, firewalls, web application scanner, vulnerability scanners, forensics tools, open-source tools, or other security technologies Knowledge in one or more of the following domains: Network Operations and Architecture, Operating Systems, Identity and Access Management, Programming, Cloud Computing, Databases, or Cryptography What makes you stand out Ability to operate independently in a dynamic, evolving environment with multiple inputs and tasks simultaneously Knowledge of common attacks, current threats, threat actors, and industry trends Familiarity with common security frameworks and models, such as MITRE ATT&CK, Lockheed Martin Cyber Kill Chain, The Diamond Model of Intrusion Analysis and NIST Cybersecurity Framework Professional or technical certifications, such as Security+, GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), or other related certifications Why join our team: We help you be your best through professional development opportunities, interesting work and supportive leaders. We foster a vibrant and inclusive culture where you can work with talented colleagues to create new solutions and have impact for colleagues, clients and communities. Our scale enables us to provide a range of career opportunities, as well as benefits and rewards to enhance your well-being. Marsh McLennan (NYSE: MMC) is the world s leading professional services firm in the areas of risk, strategy and people. The Company s more than 85,000 colleagues advise clients in over 130 countries. With annual revenue of $23 billion, Marsh McLennan helps clients navigate an increasingly dynamic and complex environment through four market-leading businesses. Marsh provides data-driven risk advisory services and insurance solutions to commercial and consumer clients. Guy Carpenter develops advanced risk, reinsurance and capital strategies that help clients grow profitably and pursue emerging opportunities. Mercer delivers advice and technology-driven solutions that help organizations redefine the world of work, reshape retirement and investment outcomes, and unlock health and well being for a changing workforce. Oliver Wyman serves as a critical strategic, economic and brand advisor to private sector and governmental clients. For more information, visit marshmclennan.com , or follow us on LinkedIn and X . Marsh McLennan is committed to hybrid work, which includes the flexibility of working remotely and the collaboration, connections and professional development benefits of working together in the office. All Marsh McLennan colleagues are expected to be in their local office or working onsite with clients at least three days per week. Office-based teams will identify at least one anchor day per week on which their full team will be together in person Marsh McLennan (NYSE: MMC) is a global leader in risk, strategy and people, advising clients in 130 countries across four businesses: Marsh, Guy Carpenter, Mercer and Oliver Wyman . With annual revenue of $24 billion and more than 90,000 colleagues, Marsh McLennan helps build the confidence to thrive through the power of perspective. For more information, visit marshmclennan.com , or follow on LinkedIn and X.
Posted 1 month ago
5 - 10 years
7 - 12 Lacs
Hyderabad
Work from Office
About this role: Wells Fargo is seeking an Audit Manager. Audit is a provider of independent, objective assurance services delivered through a highly competent and diverse team. As a business partner, Audit helps the company accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control, and governance processes. About Enterprise Technology Audit Group: The Enterprise Technology Audit Group (ETAG) conducts and coordinates audits of information technology and information security, primarily focused on the Wells Fargo Technology (WFT) organization, the Independent Risk Management (IRM) Technology, and the Third Party and information Risk Oversight (TPIRO) group. ETAG is broken out into the following sub-teams : Chief Information Office (CIO) - CSBB Technology, Consumer & Small Business Banking, Consumer Lending Technology, Digital & Innovation Technology, Enterprise Functions Technology, Financial Crimes & Enterprise Data Technology, WIM Technology Chief Technology Office (CTO) - Cloud Platforms, CIO Development, Change Enablement, Middleware Information Security - Access Management, NIST Assessment, Cybersecurity Defense Monitoring, Information Protection, Third Party Risk Infrastructure & Technology Recovery - Technology Continuity & Resiliency, Technology Infrastructure Technology Governance - IT Governance, Risk Management, Compliance Strategy & Digital, & Innovation Group (SDI) - Corporate Strategic Planning, Digital Platform, Innovation Group In this role, you will: Lead execution of the integrated audit process Participate in audits in accordance with Wells Fargo Audit Services policy Demonstrate depth and breadth of knowledge and understanding across multiple businesses or develop knowledge in a critical subject matter area Demonstrate comprehensive knowledge and understanding of the financial, operational, technical, and regulatory environment across multiple businesses or develop excellent subject matter knowledge in critical areas of the business Write opinions reflecting relevant facts that lead to logical conclusions Escalate significant risks and loss exposures to appropriate levels of management Ensure documentation and reporting are ready for review by managers and more experienced managers Demonstrate credible challenge Evaluate and provide appropriate solutions for complex problems Lead multiple concurrent projects that are generally moderate to large in size and moderate to high in complexity Identify and assess key risks and controls and develop effective test plans for engagements as assigned with limited guidance Present audit results in an objective and unbiased manner Exhibit appropriate judgment regarding issue notification, issue draft findings to client management, and draft final audit reports Develop and maintain excellent business relationships within Internal Audit and with teams companywide Required Qualifications: 5+ years of Audit, Risk experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Qualifications : 5+ years of work experience in Technology Governance, Risk Management and Compliance (GRC) or IT Security with at least 5 years in Technology Audit. A professional with auditing, security, or accounting designation e.g., CISA, CISSP, CPA, CA, CIA, CCNA, CISM, CRSIC or to have substantially completed the requirements for such a designation while actively pursuing the completion of such a designation. Background of Technology Audit within international financial service organizations. Lead execution of the integrated audit process Participate in audits in accordance with Wells Fargo Internal Audit policy Demonstrate depth and breadth of knowledge and understanding across multiple businesses or develop knowledge in a critical subject matter area Demonstrate comprehensive knowledge and understanding of the financial, operational, technical, and regulatory environment across multiple businesses or develop excellent subject matter knowledge in critical areas of the business Write opinions reflecting relevant facts that lead to logical conclusions Escalate significant risks and loss exposures to appropriate levels of management Ensure documentation and reporting are ready for review by managers and more experienced managers Demonstrate credible challenge Evaluate and provide appropriate solutions for complex problems Lead multiple concurrent projects that are generally moderate to large in size and moderate to high in complexity Identify and assess key risks and controls and develop effective test plans for engagements as assigned with limited guidance Present audit results in an objective and unbiased manner Exhibit appropriate judgment regarding issue notification, issue draft findings to client management, and draft final audit reports Develop and maintain excellent business relationships within Internal Audit and with teams companywide Job Expectations: Experience in general Information Technology control reviews as well as application control reviews. Strong knowledge of and experience in medium to large-scale application reviews and system development projects, and ability to perform reviews on various platforms (e.g., Unix, Windows, iSeries, z/OS, SQL DB, Oracle DB, network devices, middleware, cloud). Good understanding of technology processes (e.g. change management, security operations, technology operations, business resiliency, etc.), application and infrastructure controls. Good knowledge of system development methodologies, information security controls, access management, technology governance and risk management. Knowledge of information security management frameworks (e.g. COBIT, ISO 2700x, ITIL, NIST Cybersecurity Framework, SANS Top 20 Critical Security Controls, Vulnerability and Penetration testing). Solid knowledge and understanding of audit methodologies and tools that support audit processes. Knowledge of IT and Cloud management and control frameworks Experience with Issue Validation and Remediation Excellent verbal, written, and interpersonal communication skills. Strong organizational, multitasking, and prioritizing skills. Ability to work independently and as part of a team, be flexible. Ability to execute in a fast-paced demanding environment while balancing multiple priorities. Problem solving attitude. Good analytical skills with high attention to detail. Ability to work with minimal supervision and exercise independent judgment consistent with department guidelines.
Posted 1 month ago
5 - 9 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals. Must have skills : ForgeRock Identity Management Good to have skills : Identity Access Management (IAM) Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the security architecture, ensuring that it meets the business requirements and performance goals. You will play a crucial role in safeguarding our organization's systems and data. Roles & Responsibilities: Expected to be an SME, collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Ensure the security architecture aligns with business requirements and performance goals. Design and implement security solutions to protect the organization's systems and data. Conduct risk assessments and vulnerability testing to identify potential security threats. Develop and maintain security policies, standards, and procedures. Stay up-to-date with the latest security trends and technologies. Train and educate employees on security best practices. Collaborate with cross-functional teams to integrate security measures into the development lifecycle. Investigate and respond to security incidents and breaches. Perform security audits and assessments to ensure compliance with industry regulations. Provide guidance and support to junior security professionals. Professional & Technical Skills: Must To Have Skills:Proficiency in ForgeRock Access Management. Good To Have Skills:Experience with Identity Access Management (IAM). Strong understanding of security architecture principles and best practices. In-depth knowledge of authentication and authorization protocols. Experience with security technologies such as firewalls, intrusion detection systems, and encryption. Familiarity with security frameworks and standards such as ISO 27001 and NIST. Ability to conduct security risk assessments and develop mitigation strategies. Excellent problem-solving and analytical skills. Strong communication and collaboration abilities. Additional Information: The candidate should have a minimum of 5 years of experience in ForgeRock Access Management. This position is based at our Bengaluru office. A 15 years full time education is required. Qualifications 15 years full time education
Posted 1 month ago
5 - 10 years
7 - 12 Lacs
Noida
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities: Expected to be an SME Collaborate and manage the team to perform Responsible for team decisions Engage with multiple teams and contribute on key decisions Provide solutions to problems for their immediate team and across multiple teams Lead security assessments and provide recommendations Develop security architecture standards and guidelines Conduct security reviews and audits Professional & Technical Skills: Must To Have Skills:Proficiency in SailPoint IdentityNow Strong understanding of cloud security principles Experience with security architecture design Knowledge of identity and access management Hands-on experience with security tools and technologies Ability to communicate complex security concepts to non-technical stakeholders Additional Information: The candidate should have a minimum of 5 years of experience in SailPoint IdentityNow This position is based at our Noida office A 15 years full time education is required Qualifications 15 years full time education
Posted 1 month ago
10 - 15 years
30 - 45 Lacs
Mumbai, Gurugram, Bengaluru
Work from Office
The Cloud Security Advisor Join our team of Cloud Security professionals to re-imagine technology delivery, business models and revenue streams Practice: Technology Strategy & Advisory, Capability Network I Areas of Work: Cloud Security Advisor | Level: Manager | Location: Bangalore/Mumbai/Gurgaon/Pune | Years of Exp: 10 to 15 years Explore an Exciting Career at Accenture Are you passionate about Tech-driven transformation and problem solving? Do you want to design, build and implement strategies to enhance business architecture performance? Are you passionate about being part of an inclusive, diverse and collaborative culture? Then, this is the right place for you! Welcome to a host of exciting global opportunities in Accenture Technology Strategy & Advisory.. The Practice- A Brief Sketch: The team helps clients achieve growth and efficiency through innovative R&D transformation, aimed at redefining business models using agile methodologies. As part of this high performing team, you will work closely with an ecosystem of partners to help accelerate resilience in the public cloud for fast, frictionless, scalable, proactive and cost effective cloud security. You will work on the following key areas: Business Problem Analysis :Identify and assess current state security capabilities and risk mitigation posture for our clients Technology-driven journey intersection :Define target state security capabilities and design security roadmap that includes cutting edge trends within Applications, APIs, and data Security Transformation: Apply best in class solutions to mitigate known risks and pre-empt unknown threats to safeguard data, networks, people and assets. High Performance Growth and Innovation :Assisting our clients to build the required capabilities for growth and innovation to sustain high performance. Bring your best skills forward to excel at the role: Develop technology solutions and value adding propositions to drive C-suite/senior leadership level discussions Demonstrate good analytical skills coupled with knowledge in cloud security to conduct analysis of present and anticipated threats; define policies, processes, and technology to address gaps Capitalize on in-depth understanding of security guiding principles, design recommendations and architecture, identity, and access management concepts Lead proof of concept and/or pilot implementations and define the plan to scale implementations across multiple technology domains Maximize subject matter expertise on security-led projects and play a key role in pitches where data-based RFP responses are discussed Contribute in presenting security strategy to clients, develop client's maturity in the use of data within various domains Demonstrate ability to work creatively and analytically in a problem-solving environment. Use knowledge of key value drivers of a business , how they impact the scope and approach of the engagement. Read about us. Qualifications Your experience counts! MBA from a tier 1 institute Your prior experience in one or more of the following is important Experience in developing security guiding principles and logical security architecture for Applications, Data, and Infrastructure EA layers. Cloud Security principles and data protection regulations such as GDPR Security Frameworks:Working knowledge of frameworks and standards including ISO 27001, ISO 27002, PCI DSS, SOX, HIPAA Proficient access management concepts as well understanding of tools for PAM / IAM Practical industry expertise across Financial Services, Retail, Consumer Goods, Telecommunications, Life Sciences, Transportation, Hospitality, Automotive / Industrial, Mining and Resources. Certifications:TOGAF/CISSP/CISA/CISM certified preferred Whats in it for you? An opportunity to work on with key G2000 clients Potential to with leaders in strategy, industry experts, enterprise function practitioners and, business intelligence professionals to shape and recommend innovative solutions that leverage emerging technologies. Ability to embed into everythingfrom how you service your clients to how you operate as a responsible professional. Personalized training modules to develop your to grow your skills, industry knowledge and capabilities Opportunity to thrive in a that is committed to accelerate equality for all. Engage in boundaryless collaboration across the entire organization.
Posted 1 month ago
5 - 10 years
7 - 12 Lacs
Gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Okta Identity Management Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Your typical day will involve designing and implementing security solutions, collaborating with cross-functional teams, and ensuring the integrity and confidentiality of data in the cloud environment. Roles & Responsibilities: Expected to be an SME, collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Design and implement security solutions to protect cloud environments. Collaborate with cross-functional teams to ensure the integrity and confidentiality of data. Manage and oversee the implementation of cloud security controls. Transition to cloud security-managed operations. Stay up-to-date with the latest security trends and technologies. Ensure compliance with industry standards and regulations. Conduct risk assessments and develop mitigation strategies. Provide guidance and support to junior security professionals. Professional & Technical Skills: Excellent working knowledge of current security standards and protocols, including but not limited to SSO, MFA, SAML, OAuth, OIDC, LDAP, RADIUS, and Kerberos Good understanding of REST API's and JSON and should be able to help application team on integration. Configuration of SSO for SaaS and on-premise applications using Okta "cloud based IAM Solution" Experience in Directory Integration such as Active Directory, LDAP with Okta Good hands on experience on Okta "Cloud based IAM solution" Good understanding of access management, federated identity, 2-factor solutions and sign-on, application policy Good understanding on configuring Groups, Assignment and application workflow Provide Architect Operational support for OKTA systems and responsible for overall maintenance and configuration standards of the tools 4 Assist with the implementation of new OKTA processes and procedures Must have executed at least 2 projects on Okta. Integration Design competency on Okta. Develop functional and technical solution specifications Excellent troubleshooting skills with Okta Experience with Okta hooks , Okta sign-in Widget. Good understanding of Cloud based Access & Identity Management products. Strong Java and web-services development experience Ability to lead the team in solution and troubleshooting Development background in J2EE/Java/Java Script Good communication skillsGood to Have Preferred development background in Java. Understanding of cloud platform services Knowledge of Open ID Connect Policy, SAML, SOAP, WS-Security, OAuth, Kerberos. Knowledge or Experience on any other IDM technology Okta Developer/Consultant Certification Educational Qualification:BE or MCA or MSc with Good Computer Science Background with good academic record Qualifications 15 years full time education
Posted 1 month ago
12 - 17 years
14 - 19 Lacs
Gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NA Minimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities: Expected to be an SME Collaborate and manage the team to perform Responsible for team decisions Engage with multiple teams and contribute on key decisions Expected to provide solutions to problems that apply across multiple teams Develop and implement security solutions for cloud environments Conduct security assessments and audits to identify vulnerabilities Stay updated on the latest security trends and technologies Professional & Technical Skills: Must To Have Skills:Proficiency in SailPoint IdentityNow Strong understanding of cloud security principles Experience with security architecture design Knowledge of identity and access management Hands-on experience with security tools and technologies Familiarity with regulatory compliance standards Additional Information: The candidate should have a minimum of 12 years of experience in SailPoint IdentityNow This position is based at our Gurugram office A 15 years full time education is required Qualifications 15 years full time education
Posted 1 month ago
3 - 8 years
5 - 10 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : BE or MCA or MSc with Good Computer Science Background with good academic record. Summary :As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your role will involve documenting the implementation of cloud security controls and transitioning to cloud security-managed operations. You will play a crucial role in safeguarding the organization's data and infrastructure in the cloud environment. Must Have Skills:SailPoint IdentityIQGood To Have Skills:Identity and Access Management Key Responsibilities:Configuration, customization, and design SailPoint. Experience in virtual appliance (VA) concepts, Identity Profiles, cloud rules, transformation rule, migration, and deployments. Ability to Setup, Troubleshoot Configure SailPoint integration with different systems. Able to quickly onboard application and migrating users. Ability to build java bean shell, workflow, JML, custom rules. Liaison with teams on delivery, helping them on issue technical issue, bugs fixing and enhancements. Technical Experience:Should have the ability to understand customer requirements. knowledge on Integrating various platforms with SailPoint, such as Active Directory, HR apps, SAP Systems, Workday, AD, Azure O365, JDBC and Other cloud applications. Implementation knowledge on Access request customization. Hands on experience in Customization of Quicklink, User LCM, Certification, Custom workflows, forms, Rules, SailPoint IIQ API/ REST API etc. Implementation experience in Certification, Custom reports Auditing. Strong JAVA/J2EE Development Knowledge Professional Attributes:Quick learner, team player and self-starter. Willing to learn new technologies cross skilling, Upskilling Good Communication presentation. Good Articulation and presentation skills Educational Qualification:BE or MCA or MSc with Good Computer Science Background with good academic record. Qualifications BE or MCA or MSc with Good Computer Science Background with good academic record.
Posted 1 month ago
7 - 10 years
1 - 5 Lacs
Bengaluru
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : SailPoint IdentityIQ Good to have skills : Java Minimum 7.5 year(s) of experience is required Educational Qualification : Graduate Summary :As an Application Tech Support Practitioner, you will be responsible for providing ongoing support to clients and ensuring the smooth functioning of systems or applications. Your typical day will involve using your expertise in SailPoint IdentityIQ and Java to accurately define and resolve client issues. Roles & Responsibilities: As a SailPoint Developer on the Technical Devops Team your responsibilities include: Coding and developing by applying and design/code best practices Completing specific technical Production Service Acceptance (PSA) deliverables Creating and completing work tasks in Azure DevOps (ADO) Participating in scrum refinement meetings by asking clarifying questions in order to provide accurate estimates Actively participating in all Scrum ceremonies Raising risks and issues and identifying mitigation plans Awareness of various security products, IDAM products, execution methodologies and processes Must possess the technical/functional skills necessary to understand and manage consulting as well as system integration project engagementsProfessional & Technical Skills: SailPoint Identity and Access Management (IIQ) JAVA, J2EE development with SailPoint XML Beanshell-SAML-LDAP concepts Quick Learner Must To Have Skills:Expertise in SailPoint IdentityIQ. Good To Have Skills:Proficiency in Java. Strong understanding of software/application/cloud tech support. Experience in accurately defining and resolving client issues. Exceptional communication skills for effective collaboration with cross-functional teams. Ability to stay updated with the latest advancements in SailPoint IdentityIQ and Java. Additional Information: The candidate should have a minimum of 7.5 years of experience in SailPoint IdentityIQ. The ideal candidate will possess a strong educational background in information technology operations, computer science, or a related field, along with a proven track record of delivering impactful solutions. This position is based at our Bengaluru office. Qualifications Graduate
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane