Home
Jobs
Companies
Resume

208 Cyberark Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 - 15.0 years

18 - 22 Lacs

Bengaluru

Work from Office

Naukri logo

Date 22 May 2025 Location: Bangalore, KA, IN Company Alstom Req ID:482643 Job Title:IAM Architect OVERALL PURPOSE OF THE ROLE Take on a new challenge and apply your comprehensive IAM knowledge in a new cutting-edge field. Youll work alongside innovative, supportive, and solution-driven teammates. You'll spearhead the development and governance of identity and access management, ensuring alignment with our IAM security policy. Day-to-day, youll work closely with teams across the business (HR, Sourcing, Master Data managers, IS&T, business representatives), design IAM mechanisms and tools, and lead the functional and technical roadmap. Organisation structure (job belongs to..) Digital Services Reports directly to: Identity & Access Lead Architect Roles and Responsibility The IAM Architect has under his responsibility Collaborating on the definition of IAM standards Validating architecture against Security Policy Enhancing the global IAM architecture Supporting security aspects of IT projects related to IAM Perform Technical review and Impact assessment for all changes and new requirement. Update the design document and maintain Support level 5 expertise for IAM platforms and topics Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction. Contribute & validate new security solutions like B2B Operations and B2B SSO in IAM. PAM architecture & domain expertise Collaborate and support for troubleshooting and manage issues related to identities, authentication/authorization and access permissions. Able to analyse risks and to design an appropriate IAM security pattern (provisioning, habitation workflow, authentication, master data authorities, segregation of duty, Privileged Access Management, federation) Youll specifically take care of coordinating with stakeholders on IAM Architecture topics, managing identity lifecycle processes, and working with external/internal resources to support the Alstom IAM program. Recommend solutions for complex operational problems & implement industry best practices The IAM Architect would contribute actively to the security aspects related to IAM in Alstoms IT projects ISSCQ produce all Information System Security and Compliance Questionnaire at the initial phase of all projects Risk analysis perform risk analysis and identify mitigation plan when relevant Security Acceptance make the right decision considering the residual risk and the asset value Experience We value passion and attitude over experience. Thats why we dont expect you to have every single skill. Instead, weve listed some that we think will help you succeed and grow in this role Bachelors/Masters degree in Engineering/Technology or related field Overall 10+years of work experience, 4-5 years of experience in IAM architecture/security activities, with an IT Security background Expertise in IAM concepts and architecture Knowledge of ISO 27002 and ISO 27005 standards Professional industry standard certifications like CISSP, CISA, CEH, GIAC, CISM, etc. will be an added advantage Experience on IAM solutions within Saviynt AAG, Microsoft Azure or other IAG solution Experience on PAM (Privilege Access Management) solutions (eg Cyberark, BeyondTrust) Subject-matter expertise across all IAM topics as it relates to both cloud and on-premises enterprise technology, and the relationship between the architectures. Professional & concise communication (written & verbal) Technical Competencies Experience on operations IAM solutionsLevel 3 Experience on IAM solutions withinSaviynt AAG, Microsoft Azure or other IAG solutionLevel 3 Very Good understanding of Identity & access governance, Multi-Factor authentication and Privileged Access ManagementLevel 4 Good understanding on technologies related to Identity and access management, such as e.g. API ,AD,LDAP,SQL Level 4 Intimately familiar with IAM functional process and design (SOD, Workflow approval, MFA,..) Level 4 Good understanding on functional concept of Identity and access management (workflows, SOD, recertification access, provisioning, auto-correlation access, )Level 4 Very good understanding on security IAM principals and design (e.g network, ) Level 4 2-3 years of IAM Saviynt software experience is appreciated:Level 2 Behavioural Attributes Ability to work global with functional as well as technical teams in a dynamic environment Eye for details, structured and process oriented Demonstrated drive for continuous learning, results-orientation, and teamwork Influence stakeholders for improving and sustaining performance Demonstrate a positive mindset, high levels of character and integrity, and a keen awareness of continuous improvement Advise and collaborate with others to develop strong, positive working relationships across all levels of the organization to drive success of projects and efforts Offer creative, innovative, data-based solutions by focusing on forward progress and creativity, even when working through complex, often competing needs. You dont need to be a train enthusiast to thrive with us. We guarantee that when you step onto one of our trains with your friends or family, youll be proud. If youre up for the challenge, wed love to hear from you! Important to note As a global business, were an equal-opportunity employer that celebrates diversity across the 63 countries we operate in. Were committed to creating an inclusive workplace for everyone.

Posted -1 days ago

Apply

4.0 - 6.0 years

8 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Date 2 Jun 2025 Location: Bangalore, KA, IN Company Alstom Req ID:481603 We create smart innovations to meet the mobility challenges oftoday and tomorrow. We design and manufacture a complete range of transportation systems, from high-speed trains to electric busesand driverless trains, as well asinfrastructure, signalling and digital mobility solutions. Joining us meansjoininga truly global community ofmore than38 900 people dedicated to solving real-world mobility challenges and achieving international projects with sustainable local impact. OVERALL PURPOSE OF THE ROLE: The primary responsibility of the specialist security Operationsis to ensure security risks are identified and managed within acceptable limits. The Security specialist will work closely with Design Authority, Solution Architects, IS Design,IS&T operations and Business teams to manage security of the organization RESPONSIBILITIES: To analyse and update critical and non critical log sources and their health status check for redundant log sources and take necessary steps working with right stake holders daily health check and monitoring of SOC infra Co-relationship, framework management for SOC use cases responsible for analytics and data crunching or data analysis and represenation of outcome for leadeship to make next decisions KPI definition, revision and imprvement for SOC infra, health and use cases TECHNICAL COMPETENCIES & EXPERIENCE To be considered for this role, candidate need to demonstrate the following skills experience and attributes: Bachelors/Masters degree in Engineering/Technology or related field Minimum 4-6 years of relevant IT experience Professional industry standard certifications like CISSP, CEH, GIAC, CISM, ISO 27002 etc. will be an added advantage Experience with various IT / Security technologies including, Active Directory, DNS, Messaging, Firewalls/ VPN Gateways, IPS, Proxy, WAF, PKI, IAM,etc. Good understanding of tools like CyberArk, PingIdentity, Sailpoint, Qualys, Veracode Proficient handson experience and understanding of various security tools and technologies. Experience in an operational role working directly with internal and external customers, trouble ticketing systems, and incident management Solid understanding of ITIL process framework Must understand and have worked in an operational environment such as a NOC or SOC for 2 4 years Demonstrated leadership experience in the area of Security Operations Proven planning, prioritization, and organizational skills Demonstrated drive for continuous learning, results orientation, and teamwork Ability to drive change through innovation & process improvement Ability to manage projects and drive action items with customers and crossfunctional peers Proven crisis management skills Professional & concise communication (written & verbal) Ability and flexibility to adapt to change, including shifting and competing priorities Demonstrated ability to be a big picture thinker, strategist, and long term planner Strong analytical skills with demonstrated problem solving ability Project management skills with a proven ability to design workable solutions will be an added advantage Exposure to ISO 27002 and ISO 27005 An agile, inclusive and responsiblecultureis the foundation of ourcompanywhere diverse people are offered excellent opportunities to grow, learn and advanceintheir careers.We are committed toencouragingour employeesto reach their full potential,while valuing and respecting them as individuals.

Posted -1 days ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred Experience: Experience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures

Posted 19 hours ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Kochi

Work from Office

Naukri logo

SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred Experience: Experience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures Preferred technical and professional experience SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis

Posted 19 hours ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

Senior SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Senior SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred Experience: Experience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures

Posted 20 hours ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Candidates must be a CyberArk Certified Delivery Engineer (CCDE) or equivalent. The successful applicant will be an experienced CyberArk PAM consultant to take our client's project forward and support the account. Taking on and further developing/deploying of our client's Privileged Access Management solution based on CyberArk technology. Lead Consultant with demonstrable experience of CyberArk Privileged Access Management solution experience. HLD and LLD experience. Ability to work with the internal Project team and end customer to continue design and deployment activities and further enhance the PAM solution. Documentation skills. Security Policy and Governance experience and appreciation. Identity & Access Management/IDAM experience and knowledge. Design and deliver high quality security architecture and infrastructure setups and/or sub-systems to agreed deadlines. Assist customers in developing a secured privileged access management infrastructure and also to define policies to protect their applications/platforms/targets from unauthorized access Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 2+ years of industry experience with minimum 2+ years relevant experience in CyberArk privileged access solution. Experience in development and implementation, design and architecture of privileged access solution using CyberArk Must possess the technical/functional skills necessary to understand and manage consulting project engagements. Experience in end-to-end implementation lifecycle of CyberArk project Excellent hands-on knowledge on the best practices of deploying CyberArk PAS, including various components like EPV, CPM, PVWA, PSM, PSMP, OPM and PTA. Well versed with Active Directory. Experience in developing custom connectors using automation approaches like AutoIT script Preferred technical and professional experience Experience with Okta ASA, Ping, Saviynt, ForgeRock. Experience with JavaScript and one of the major JavaScript MVC frameworks (preferably Angular). Directory experience (AD, Azure AD, LDAP), SaaS deployment experience. Knowledge of enterprise web technologies, security and cutting-edge infrastructures Knowledge of Cloud architectures and complex enterprise On-Premises IT landscapes and hybrid Cloud/On-Prem architectures. Knowledge of enterprise identity lifecycle management processes and standards Proven track record in working as part of a team, meeting deadlines, tutoring/mentoring. Experience with at least one of the following development environments/languagesJ2EE, Java, JavaScript. Experience in specific industry verticals is preferred

Posted 23 hours ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

Pune

Work from Office

Naukri logo

Candidates must be a CyberArk Certified Delivery Engineer (CCDE) or equivalent. The successful applicant will be an experienced CyberArk PAM consultant to take our client's project forward and support the account. Taking on and further developing/deploying of our client's Privileged Access Management solution based on CyberArk technology. Lead Consultant with demonstrable experience of CyberArk Privileged Access Management solution experience. HLD and LLD experience. Ability to work with the internal Project team and end customer to continue design and deployment activities and further enhance the PAM solution. Documentation skills. Security Policy and Governance experience and appreciation. Identity & Access Management/IDAM experience and knowledge. Design and deliver high quality security architecture and infrastructure setups and/or sub-systems to agreed deadlines. Assist customers in developing a secured privileged access management infrastructure and also to define policies to protect their applications/platforms/targets from unauthorized access Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 2+ years of industry experience with minimum 2+ years relevant experience in CyberArk privileged access solution. Experience in development and implementation, design and architecture of privileged access solution using CyberArk Must possess the technical/functional skills necessary to understand and manage consulting project engagements. Experience in end-to-end implementation lifecycle of CyberArk project Excellent hands-on knowledge on the best practices of deploying CyberArk PAS, including various components like EPV, CPM, PVWA, PSM, PSMP, OPM and PTA. Well versed with Active Directory. Experience in developing custom connectors using automation approaches like AutoIT script Preferred technical and professional experience Experience with Okta ASA, Ping, Saviynt, ForgeRock. Experience with JavaScript and one of the major JavaScript MVC frameworks (preferably Angular). Directory experience (AD, Azure AD, LDAP), SaaS deployment experience. Knowledge of enterprise web technologies, security and cutting-edge infrastructures Knowledge of Cloud architectures and complex enterprise On-Premises IT landscapes and hybrid Cloud/On-Prem architectures. Knowledge of enterprise identity lifecycle management processes and standards Proven track record in working as part of a team, meeting deadlines, tutoring/mentoring. Experience with at least one of the following development environments/languagesJ2EE, Java, JavaScript. Experience in specific industry verticals is preferred

Posted 23 hours ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

Candidates must be a CyberArk Certified Delivery Engineer (CCDE) or equivalent. The successful applicant will be an experienced CyberArk PAM consultant to take our client's project forward and support the account. Taking on and further developing/deploying of our client's Privileged Access Management solution based on CyberArk technology. Lead Consultant with demonstrable experience of CyberArk Privileged Access Management solution experience. HLD and LLD experience. Ability to work with the internal Project team and end customer to continue design and deployment activities and further enhance the PAM solution. Documentation skills. Security Policy and Governance experience and appreciation. Identity & Access Management/IDAM experience and knowledge. Design and deliver high quality security architecture and infrastructure setups and/or sub-systems to agreed deadlines. Assist customers in developing a secured privileged access management infrastructure and also to define policies to protect their applications/platforms/targets from unauthorized access Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 2+ years of industry experience with minimum 2+ years relevant experience in CyberArk privileged access solution. Experience in development and implementation, design and architecture of privileged access solution using CyberArk Must possess the technical/functional skills necessary to understand and manage consulting project engagements. Experience in end-to-end implementation lifecycle of CyberArk project Excellent hands-on knowledge on the best practices of deploying CyberArk PAS, including various components like EPV, CPM, PVWA, PSM, PSMP, OPM and PTA. Well versed with Active Directory. Experience in developing custom connectors using automation approaches like AutoIT script Preferred technical and professional experience Experience with Okta ASA, Ping, Saviynt, ForgeRock. Experience with JavaScript and one of the major JavaScript MVC frameworks (preferably Angular). Directory experience (AD, Azure AD, LDAP), SaaS deployment experience. Knowledge of enterprise web technologies, security and cutting-edge infrastructures Knowledge of Cloud architectures and complex enterprise On-Premises IT landscapes and hybrid Cloud/On-Prem architectures. Knowledge of enterprise identity lifecycle management processes and standards Proven track record in working as part of a team, meeting deadlines, tutoring/mentoring. Experience with at least one of the following development environments/languagesJ2EE, Java, JavaScript. Experience in specific industry verticals is preferred

Posted 23 hours ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Mumbai

Work from Office

Naukri logo

The CyberArk Operation Support Team Lead is a pivotal role responsible for overseeing and managing the day-to-day operations of the CyberArk environment. This position involves leading a team of support professionals, ensuring the availability, performance, and security of CyberArk solutions, and collaborating with cross-functional teams to deliver efficient privileged access management. Key Responsibilities * Team LeadershipSupervise and mentor a team of CyberArk support professionals, fostering collaboration and skill development. * Operational ManagementOversee the operational aspects of CyberArk solutions, ensuring 24/7 availability, scalability, and optimal performance. * Incident ManagementLead the resolution of CyberArk-related incidents and problems, coordinating with technical teams and stakeholders to ensure timely and effective solutions. * Security EnhancementCollaborate with the security team to implement and enhance security controls, policies, and procedures for privileged access management. * Performance MonitoringMonitor system performance, conduct regular health checks, and proactively identify and address potential performance bottlenecks. * Patch and Upgrade ManagementPlan and execute system upgrades, patches, and enhancements, ensuring minimal disruption to ongoing operations. * DocumentationMaintain thorough documentation of configurations, processes, and procedures related to CyberArk operations. * Vendor ManagementCoordinate with CyberArk vendors for support, troubleshooting, and escalations to ensure timely issue resolution. * Continuous ImprovementDrive continuous improvement initiatives to enhance the effectiveness and efficiency of CyberArk operations. * ReportingGenerate regular reports on system performance, incident management, and operational metrics for management review. * Willing to work in 24/7 operations and project support activities Required education Bachelor's Degree Preferred education Associate's Degree/College Diploma Required technical and professional expertise Proven experience in CyberArk operations and support, with a minimum of 4+years of hands-on experience. * Professional certifications such as CyberArk Certified Trustee (CCT) or Certified Delivery Engineer (CDE). Strong knowledge of privileged access management concepts and CyberArk technologies. Experience in organizations control, monitor, and secure privileged access across their IT infrastructure. Good Exposure in endpoint Analytics capabilities to identify unusual or suspicious activities related to privileged access. Preferred technical and professional experience * Leadership skills with the ability to guide and mentor a team effectively. * Problem-solving aptitude with a proactive approach to resolving technical challenges. * Strong communication skills for effective collaboration with cross-functional teams. * Detail-oriented mindset with a commitment to maintaining high standards. * Adaptability to changing requirements and a willingness to stay updated on emerging technologies

Posted 23 hours ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Noida

Work from Office

Naukri logo

RM Cost Management Specialist - Supply planning and Cost Control specialist has to work on wide spectrum in Global Services Delivery Support on supply planning, purchase orders, good receipts, cost analysis and financial reporting with various stakeholders. Are you passionate about solving problems You should have exposure on MBA / bachelors degree Good understanding of the Finance or Accountingstandards Excellent communication skills 5+ years of experience in handling cost management activities. It would be nice if you also had CPM Certification End to End Costing Lifecyle Negotiation skills Presentation skills As part of our team, you will Working with a team of Cost and progress professionals Ensure understanding of business problems Define / develop / deploy solutions under cost & progress Domain. Monitor and continuously enhance efficiency

Posted 3 days ago

Apply

8.0 - 12.0 years

15 - 20 Lacs

Gurugram

Work from Office

Naukri logo

Looking for experts with 8+ years experience in Privilege Access Management (PAM) solution design, implementation, and configuration Must have. Minimum 3 years of experience in Architect PAM Solution Minimum 6 years of experience in implementation & configuration of PAM solution Hands-on experience in design, implementation, configuration, and integration of CyberArk/Thycotic Secret Server/BeyondTrust Hands-on experience in CyberArk/Thycotic Secret Server/BeyondTrust Hands on experience in account onboarding & server onboarding with Thycotic secret Server Hands on experience in Azure AD & Active Directory Good knowledge on Linux, Unix, and Windows Hands on experience in SaaS & cloud Excellent communication skills in English Good to have. Hands on experience in Identity And Access Management (IAM) Hands on experience in scripting such as VB, Power shell etc.

Posted 4 days ago

Apply

5.0 - 10.0 years

4 - 8 Lacs

Kolkata

Work from Office

Naukri logo

Project Role : Security Advisor Project Role Description : Lead the effort and teams to enable development and implementation of proprietary and innovative security solutions. Assess, manage and ensure compliance to risk reducing behaviors and processes. Must have skills : Identity Access Management (IAM), ControlM Administration, CyberArk Privileged Access Management, Google Cloud Platform Administration, Unix, Python, Shell Scripting, Data Lake, MYSQL, Java, JavaSc Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : A Bachelors or Masters Degree in Technology or similar streams as fulltime education is required Summary :As a Security Advisor, you will lead the effort and teams to enable the development and implementation of proprietary and innovative security solutions. Your typical day will involve assessing and managing security risks, ensuring compliance with established processes, and collaborating with various teams to enhance security measures. You will play a crucial role in guiding the organization towards adopting best practices in security management, while also fostering a culture of risk awareness and proactive security measures across the organization. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills in security practices.- Monitor and evaluate the effectiveness of security solutions and recommend improvements. Professional & Technical Skills: - Must To Have Skills: Proficiency in Identity Access Management (IAM), CyberArk Privileged Access Management, Google Cloud Platform Administration, ControlM Administration.- Good To Have Skills: Experience with security compliance frameworks such as ISO 27001 or NIST.- Strong understanding of risk assessment methodologies and security best practices.- Experience in implementing security policies and procedures.- Familiarity with incident response and management processes. Additional Information:- The candidate should have minimum 7.5 years of experience in Identity Access Management (IAM).- This position is based at our Kolkata office.- A Bachelors or Masters Degree in Technology or similar streams as fulltime education is required. Qualification A Bachelors or Masters Degree in Technology or similar streams as fulltime education is required

Posted 4 days ago

Apply

15.0 - 20.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : SAP Security Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will design, build, and configure applications to meet business process and application requirements. A typical day involves collaborating with various teams to understand their needs, developing solutions that align with business objectives, and ensuring that applications are optimized for performance and usability. You will also engage in problem-solving activities, providing support and guidance to your team members while continuously seeking opportunities for improvement in application functionality and user experience. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate knowledge sharing sessions to enhance team capabilities.- Monitor application performance and implement necessary enhancements. Professional & Technical Skills: - Must To Have Skills: Proficiency in SAP Security.- Good To Have Skills: Experience with SAP GRC.- Strong understanding of user access management and role-based access control.- Experience in configuring and managing SAP security roles and authorizations.- Familiarity with compliance and audit requirements related to SAP security. Qualification 15 years full time education

Posted 4 days ago

Apply

15.0 - 20.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : SAP Security Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will design, build, and configure applications to meet business process and application requirements. A typical day involves collaborating with various teams to understand their needs, developing solutions that align with business objectives, and ensuring that applications are optimized for performance and usability. You will also engage in problem-solving activities, providing support and guidance to your team members while continuously seeking opportunities for improvement in application functionality and user experience. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate knowledge sharing sessions to enhance team capabilities.- Monitor application performance and implement necessary enhancements. Professional & Technical Skills: - Must To Have Skills: Proficiency in SAP Security.- Good To Have Skills: Experience with SAP GRC.- Strong understanding of user access management and role-based access control.- Experience in configuring and managing SAP security roles and authorizations.- Familiarity with compliance and audit requirements related to SAP security. Qualification 15 years full time education

Posted 4 days ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

Chennai

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and facilitating the transition to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud security challenges. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular assessments of cloud security measures to identify potential vulnerabilities and recommend improvements.- Collaborate with cross-functional teams to ensure alignment of security practices with business objectives. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Strong understanding of cloud security principles and best practices.- Experience with identity and access management solutions.- Familiarity with compliance frameworks such as ISO 27001, NIST, or GDPR.- Ability to analyze security incidents and develop effective response strategies. Additional Information:- The candidate should have minimum 3 years of experience in CyberArk Privileged Access Management.- This position is based at our Chennai office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 4 days ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

Hyderabad

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Develop and implement security architecture solutions.- Conduct security assessments and define security requirements.- Collaborate with cross-functional teams to ensure security measures are integrated.- Stay updated on the latest security trends and technologies.- Provide guidance and support to junior security professionals. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Strong understanding of security architecture principles.- Experience in implementing cloud security controls.- Knowledge of security compliance standards and regulations.- Hands-on experience with security tools and technologies. Additional Information:- The candidate should have a minimum of 3 years of experience in CyberArk Privileged Access Management.- This position is based at our Hyderabad office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 4 days ago

Apply

3.0 - 8.0 years

11 - 16 Lacs

Pune, Chennai, Hinjewadi

Work from Office

Naukri logo

job requisition idJR1026907 Job Summary Synechron is seeking a dedicated and skilled Infrastructure Support Engineer to join our team. This role is vital in ensuring the stability, security, and efficiency of our platform infrastructure. The successful candidate will provide expert-level support for various middleware and application deployment environments, contribute to smooth release processes, and handle critical infra support tasks. Your work will directly impact the operational excellence of our technology services, enabling seamless business operations and supporting innovation initiatives. Software Required Skills: Weblogic Server (10.x or later) WebSphere Application Server (8.x or later) Oracle HTTP Server (OHS) Apache HTTP Server (AHS) Middleware ServicesEMS, MQ, Solace, NDM, SFTP CyberArk (for secure access management) Autosys (for job scheduling and automation) ServiceNow (for incident and change management) Unix/Linux command-line proficiency Preferred Skills: Experience with cloud platforms (e.g., AWS, Azure) Additional scripting or automation tools (e.g., Shell, Python) Version control systems (e.g., Git) Overall Responsibilities Implement, monitor, and maintain platform infrastructure components, ensuring high availability and security. Support application deployment, configuration, and troubleshooting across middleware and server environments. Collaborate with Production Support and Release teams to complete infrastructure releases efficiently. Handle infra-related issues promptly, providing quick resolution to minimize downtime. Manage secure access controls via CyberArk and automate processes using Autosys. Follow ITSM best practices, including change management processes within ServiceNow. Document infrastructure procedures, configurations, and incident resolutions. Contribute to continuous improvement initiatives for infrastructure stability and performance. Performance Outcomes: Maintain optimal platform uptime and security standards. Ensure timely resolution of infra issues. Seamless coordination with support and development teams during releases. Adherence to change management and security policies. Technical Skills (By Category) Infrastructure & Middleware: Weblogic, WebSphere, OHS, AHS (Essential) EMS, MQ, Solace, NDM, SFTP (Primarily Solace experience required) Unix/Linux commands and scripting (Essential) CyberArk for secure access management (Essential) Autosys for job scheduling and automation (Essential) Cloud & Development Tools: Familiarity with cloud services (Preferred) Basic scripting skills (Shell, Python) (Preferred) Security & Service Management: Knowledge of change management processes (Essential) Experience with ITSM tools, especially ServiceNow (Essential) Experience Minimum of 3 years experience in infrastructure support and software deployment. At least 2.5 years' direct experience specifically working with platform infrastructure in a production environment. Proven track record with middleware services, application deployment, and incident resolution. Prior experience working on infra releases, change management, and automation scripting. Alternative Pathways: Candidates with equivalent extensive experience in infrastructure support, middleware administration, or related roles are encouraged to apply. Day-to-Day Activities Monitor and troubleshoot middleware and server environments. Deploy updates, patches, and configuration changes according to release schedules. Collaborate daily with support teams to address ongoing infra issues. Participate in change and incident management processes via ServiceNow. Automate routine tasks using Autosys and scripting. Attend regular team meetings, review infra health metrics, and plan capacity upgrades. Prepare documentation for configurations, procedures, and incident resolution. Qualifications Bachelors degree in Computer Science, Information Technology, or a related field; equivalent experience considered. Certifications such as Weblogic/WebSphere Administration, CyberArk Security, or Autosys are preferred. Training in ITIL or similar frameworks is advantageous. Commitment to ongoing professional development, staying current with infrastructure technologies. Professional Competencies Strong analytical thinking and problem-solving skills. Effective communicationboth verbal and written. Ability to work collaboratively within teams and across departments. Adaptability in a dynamic environment with evolving technologies. Skill in prioritization and time management to handle multiple tasks efficiently. Demonstrated capacity for innovation and continuous improvement.

Posted 5 days ago

Apply

4.0 - 7.0 years

10 - 20 Lacs

Hyderabad, Pune, Bengaluru

Work from Office

Naukri logo

IAM Developer - Con - BLR / Pune / Hyd - J49109 Roles & responsibilities Create IAM reference architectures for existing, new and emerging IAM technologies. Create solutions to address complex, global IAM problems. Design and develop IAM solutions for one or more of the following scenarios Identity governance and administration User provisioning and deprovisioning Modern access management options single sign-on (SSO), federated identities multi-factor authentication (MFA) privileged account management Participate in Identity and Access Management enterprise governance processes and drive global IAM standards. Develop effective and scalable IAM architecture solutions to meet project requirements. Create and maintain information Security policies and standards with industry best practices Review and management of technical security roadmaps related to cloud security and IAM within a cloud security context. Develop solutions and recommendations for issues caused by process challenges, emerging threats and technology changes. Mandatory technical skills: Candidate in this role would be a part of the IAM/Cloud consultant group. As part of this group, the candidate should have Need strong Java development experience. 4 to 8 years of experience in any one of the following IAM/Cloud tools (SailPoint, Saviynt,CyberArk). In-depth understanding of Identity lifecycle management, governance, provisioning workflows, SOD and cloud access governance. Intimately familiar with authentication and authorization protocols such as SAML, SPML, XACML, SCIM, OpenID and OAuth.

Posted 6 days ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Role: Candidate must be competent enough to perform the below tasks: 1. Cyberark configuration, responsible for creating, maintaining and monitor Cyberark policies, configurations and on boarding process. 2. Responsible for Server, application integrations, manage vault Failover failback procedures 3. Coordinate with stakeholders in troubleshooting issues and complete the new requirements. 4. Work with other support groups to resolve issues related to CyberArk infrastructure 5. Cyberark application patch deployment and application stabilization. 6. Work on defining access control, user entitlements, Manager application/ server credentials, user access policy management etc. 7. Perform privileged access reviews, compliance reporting, access control procedures and other associated tacks with Privilege user management. 8. Configurational changes, creating, maintaining and monitor the policies and on-boarding process. 9. Perform backup activities as per required schedules and the Banks policies 10. Perform health-check of servers and applications and to ensure easy restoration in case of any failures 11. Proactive monitoring & maintaining of appliances to ensure uptime according to SLA 12. Troubleshooting performance related issues in Banks internal network 13. Customization and automation of various reports 14. Identify problem areas & plan corrective action before services get affected 15. Create knowledge base and KEDB (Known error data-base) for internal users 16. Periodic Updates and Patch Management for deployed hardware and servers 17. Responsible for application integrations, manage Vault Failover-Failback procedures 18. Coordination with OEM in troubleshooting issues and complete the new requirements 19. Work with other support groups to resolve issues related to CyberArk infrastructure 20. Change in network architecture and associated configuration change management when required 21. Change-Management and Policies creation as per industry standard and Banks Policy requirement 22. Configuration changes on deployed applications as per Cyber Security Policy and ensure best Cyber Security Practices to keep systems away from vulnerabilities 23. Working in 24x7 environment Technical expertise 1. Candidate must have strong knowledge of PAM CyberArk tool/ CyberArk PAS vault, DR, CPM, PSM, PVWA. 2. Candidate must have Windows and Linux server administration. 3. Experience with websites, web applications, databases. 4. Understanding of LDAP based identity stores like Windows Active Directory. 5. Understanding of virtualization tolls like VMWare or Hyper-V. Total Experience in Cyber Security: 5 Years Experience in Cyberark PIM administration: Min 3 Years Academics: BE/ BTECH in Computers/ IT/ Electronics or ME/ MTECH in Computers/ IT/ Electronics or Post-Graduation in Computers/ IT/ Electronics Mandatory Certifications: CEH or CompTIA Security + or CISA or CISM or CISSP and CyberArk Defender Privilege Access Management (PAM) Certification.

Posted 1 week ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver / No. / Performance Parameter / Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk.

Posted 1 week ago

Apply

4.0 - 7.0 years

5 - 10 Lacs

Pune

Work from Office

Naukri logo

At Capgemini Invent, we believe difference drives change. As inventive transformation consultants, we blend our strategic, creative and scientific capabilities,collaborating closely with clients to deliver cutting-edge solutions. Join us to drive transformation tailored to our client's challenges of today and tomorrow.Informed and validated by science and data. Superpowered by creativity and design. All underpinned by technology created with purpose. Your Role Drive and ensure business, IT and Security teams are compliant to applicable IAM policy, IAM .standards and instructions. Work closely with IAM team ( Run and Project) to design and deploy monitoring and control systems based on IAM policy and instructions. Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction. Develop and maintain measurable IAM security metrics; ensure metrics provide actionable insights to the applicable stakeholders. Maintain IAM policy & instruction awareness of business, technical, architecture, infrastructure, and end user support Develop and maintain measurable KPIs to showcase IAM governance performance Analyse internal and external threats and recommend remediation actions based on IAM capability. Perform IAM audit / gap assessments of internal systems and processes and provide recommendations to mitigate the same Your Profile Deliverables PAM Audit compliance Dashboard, reporting Analysis, Identity Health Check & governance What you will love about working here We recognize the significance of flexible work arrangements to provide support. Be it remote work, or flexible work hours, you will get an environment to maintain healthy work life balance. At the heart of our mission is your career growth. Our array of career growth programs and diverse professions are crafted to support you in exploring a world of opportunities. Equip yourself with valuable certifications in the latest technologies such as Generative AI.

Posted 1 week ago

Apply

2.0 - 7.0 years

13 - 17 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for an experienced CyberArk PAM Specialist to design, implement, and support CyberArk Privileged Access Management (PAM) solution. Roles and Responsibilities:1. Define, design, and implement CyberArk Privilege Cloud (SaaS).2. Install and configure cloud connectors.3. Configure MFA, SAML, LDAP, SIEM integration4. Troubleshoot and resolve CyberArk related technical issues.5. Work closely with application teams to onboard different types to systems to CyberArk6. Generate custom CPM,PSM plugins if required7. Support application onboarding, including access policies, group assignments, and role management.8. Communicate effectively with business teams, external clients, and solution providers.9. Document technical designs, solutions, and implementation plans.10. Work independently and take ownership of technical deliverables. Professional & Technical Skills: 1. Strong experience in CyberArk P-cloud, Conjur Secrets Management, CyberArk PAM (Vault, CPM, PVWA, AAM)2. Solid understanding of security standards and protocols including SSO, MFA, SAML, OAuth, OIDC, LDAP, RADIUS, and Kerberos.3. Proficient in CyberArk and related technologies. Experience in system administration, scripting (UNIX, Linux scripting), Rest API, LDAP directories, Active Directory4. Experience in providing guidance in CyberArk strategy; must have PAM deep-dive experience.5. Strong understanding of PAM Architecture, deployment methodologies and best practices.6. Effective at presenting information to different audiences at the correct level of detail (e.g., from engineering teams to executive management).7. Be a product and domain expert in PAM domain experienced in conducting environment assessments and health checks in line with best practices.8. Strong troubleshooting and problem-solving skills.9. Experience in EPM is desirable but not mandatory10. Excellent verbal and written communication skills.11. Ability to work independently on technical tasks and client engagements.12. Candidate must be an independent self-starter able to perform all deployment activities with oversight and as a member of a project team.13. Candidate must have Defender Certification. Nice to have CyberArk CDE14. Good to Have Skills Thycotic (Delinea), Beyond Trust, HashiCorp Vault Additional Information:1. 4+ years experience related to designing, deploying, and configuring PAM solutions, or 2+ years direct PAM consulting experience.2. Candidate must have completed 16 years of full-time education.3. This position is open to all Accenture locations." Qualification 15 years full time education

Posted 1 week ago

Apply

5.0 - 12.0 years

9 - 13 Lacs

Mumbai

Work from Office

Naukri logo

Here you will collaborate with multi-national teams, ameliorate to a bazillion of innovative projects that deliver the most creative and cutting-edge solutions, and have an opportunity to continuously learn and grow, capable of taking on more significant responsibilities and leadership roles. This can be invaluable in understanding and serving clients from different regions, making the company truly expand its presence in new markets, bringing a profound positive repercussion to the business. Now we are looking for an Identity and Access Management (IAM) Lead , you will be a part of our Global Delivery team. Job Overview: Were looking for anexperienced IAM Lead to architect and manage a comprehensive Identity andAccess Management program across the enterprise. Youll collaborate withcross-functional teams to enforce least privilege, drive zero-trust principles,and ensure compliance with international standards and regulations . Your Impact on the Mission: Design and implement an enterprise-wide IAM strategy, policies,and governance framework. Administer user identities, access rights, andprivileged accounts across systems, applications, and cloud environments. Define and monitor access review cycles, segregationof duties (SoD), and role-based access controls (RBAC). Conduct IAM-related risk assessments and leadinternal/external audits of identity and access systems. Monitor and ensure compliance with GDPR, NIS2, DORA,and customer-specific IAM requirements. Investigate identity-related incidents, misuses, andaccess anomalies; recommend and drive corrective actions. Work closely with HR, IT, and business stakeholders tomaintain accurate identity lifecycle processes (Joiner/Mover/Leaver). What Youll Bring to The Table About You: 5+ years of experience in IAM, with 2+ years in a leadership orarchitect-level role. Strong understanding of IAM principles:authentication, authorization, identity lifecycle, directory services. Hands-on experience with IAM technologies such asAzure AD, Okta, SailPoint, CyberArk, or similar. Familiarity with Zero Trust architecture and multi-factorauthentication (MFA) design. Preferred Qualifications : Certifications like CISSP, GIAC-GIAM, IDPro or Azure Security Engineer Associate. Experience implementing or auditing against standardssuch as ISO/IEC 27001, NIST, DORA, or CIS Controls. Exposure to IAM integrations with cloud platforms(Azure, AWS), SaaS systems, and hybrid environments.

Posted 1 week ago

Apply

4.0 - 9.0 years

15 - 30 Lacs

Hyderabad, Bengaluru

Work from Office

Naukri logo

Role & responsibilities 1. Strong experience in Cyber ark 2, Experience in PAM 3. Experience in Implementation

Posted 1 week ago

Apply

3.0 - 6.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Primary Skills: Support during the investigation of suspected cyber security events Analysis and respond to the service request and incident related to securitytools (Carbon Black,Armis, EDR,etc) and related policies Deep knowledge of TCP/IP suite and ICS protocols. Endpoint Detection Response (Carbon Black, CrowdStrike) Hands on Experience in Cyberark Responsibilities: Supports Carbon Black Endpoint Detection and Response (EDR) applications and ensures cyber security service availability for the endpoints. Daily monitoring EDR AV logs Monitor EDR dashboard for compliance, threats and further troubleshootingwherever required. Basic level of fine tune policies. Raise case and follow up with Vendor support for any issue. Maintain security Run Books and SOPs. Ticket handling Generate regular reports and updates on security incident trends. Monitoring Incidents/Outages Carbon Blac. Primary Skills: Support during the investigation of suspected cyber security events Analysis and respond to the service request and incident related to security tools (Carbon Black, Armis, EDR, etc) and related policies Deep knowledge of TCP/IP suite and ICS protocols. Endpoint Detection Response (Carbon Black, CrowdStrike) Hands on Experience in Cyberark. Responsibilities: Supports Carbon Black Endpoint Detection and Response (EDR) applications and ensures cyber security service availability for the endpoints. Daily monitoring EDR AV logs Monitor EDR dashboard for compliance, threats and further troubleshooting wherever required. Basic level of fine tune policies. Raise case and follow up with Vendor support for any issue. Maintain security Run Books and SOPs. Ticket handling Generate regular reports and updates on security incident trends. Monitoring Incidents/Outages

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies