Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8.0 - 12.0 years
20 - 25 Lacs
Hyderabad
Work from Office
Role: CyberArk Practice Lead. Industry: Cybersecurity Employment type: Full Time. Location: Hitech City, Hyderabad Notice Period: Immediate to 30 Days Job Description: Candidate who can manage the COE for PAM while it is not only for CyberArk, but it should also be a PAM leadership for products such as Thycotic, Beyond Trust & anything India products such as ARCON, IREGE. Lead the entire practice with respect to 1. Presales 2. Solution design. 3. Preparing delivery capabilities. 4. Preparing & delivering support capabilities. 5. Be responsible to delivery MSSP capabilities. Experience: Minimum: 8 years. Maximum: 12 years. Should Have: 1. 8 - 12 years of CyberArk exp. 2. Extensive CyberArk Implementation exp. 3. CyberArk sentry certified. Job Responsibilities: 1. Train entire team of freshers and Laterals. 2. Provide solution demos to prospective customers. 3. SOW preparation. 4. Solution delivery. 5. Support. 6. Manage service creations delivery.
Posted 1 week ago
8.0 - 12.0 years
0 - 0 Lacs
hyderabad, chennai, noida
On-site
PAM: Engineering Communicate to clients and key stakeholders across all aspects of both the product and the implementation at the technical and functional level appropriate for the situation. Responsible for Privileged User account administration of various Windows and UNIX, Database ,Web-Based applications , Mainframe. Integrating various platforms with CyberArk, such as different LDAP providers, Windows servers, UNIX servers, Databases, and networking Devices, Cloud based applications. Establish strong working relationships with the clients. Ownership of tasks and execution of critical activities for PAM . Skills Degree in Computing, Computer Science, Computer Engineering, Information Systems or equivalent degrees. Minimum 10+ years of IT experience experience in IT/Cyber security highly preferred. Must have hands-on experience handling PAM CyberArk and Certification is preferred. Should have knowledge in Auto IT , PowerShell , Shell and writing regex queries. Worked on developing custom connectors e.g. Auto IT , Webform , *NIX. Worked on building plugins and should have experience dealing with Prompt and process, Rest -API , Customizing the Database queries . Should be well versed with cloud concepts able to suggest solutions for DevOps onboarding in PAM Experience in AIM implementation and suggesting the solution for remediating gaps. Strong analytical, problem solving and conceptual design skills Domain knowledge in healthcare is a plus Excellent written and oral communication skills Candidate must have connector development experience.
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
As a member of the Infosys consulting team, your main responsibilities will include actively supporting the consulting team throughout various project phases. This support will encompass problem definition, effort estimation, diagnosis, solution generation, design, and deployment. You will be tasked with exploring alternative solutions based on thorough research, including literature surveys, information from public domains, vendor evaluations, etc. Additionally, you will be involved in developing proof of concepts (POCs). Another crucial aspect of your role will involve creating requirement specifications from business needs, defining to-be processes, and developing detailed functional designs based on these requirements. You will be responsible for configuring solution requirements on products, identifying and resolving any issues that arise, diagnosing the root cause of such issues, seeking clarifications, and ultimately shortlisting solution alternatives. Furthermore, you will play a key role in contributing to both unit-level and organizational initiatives. Your objective will be to deliver high-quality, value-adding solutions to customers. If you believe you possess the right skills to assist our clients in navigating their digital transformation journey, then this role is tailored for you. In addition to your primary responsibilities, you will be expected to collaborate with clients to identify business challenges and enhance client deliverables by refining, analyzing, and structuring relevant data. It is essential to stay updated on the latest technologies and trends, exercise logical thinking and problem-solving skills, and demonstrate the ability to work collaboratively. Moreover, you should be capable of evaluating current processes, pinpointing areas for improvement, and proposing appropriate technology solutions. Industry domain knowledge in one or two sectors will also be beneficial. Preferred skills for this role include expertise in various Identity and Access Management (IDAM) tools such as Cyberark, Okta, Oracle Identity Manager (OIM), Ping Federate, Sailpoint, as well as experience in technology related to Identity Management, including design, workflow, implementation, Identity/Account Provisioning and Reconciliation, and SPML.,
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
maharashtra
On-site
The Pre-Sales Engineer plays a crucial role in collaborating with the Sales team to offer technical expertise throughout the Sales Cycle. Understanding the unique technical requirements and business challenges of potential clients is a primary responsibility. Crafting solutions tailored to meet these needs and effectively communicating the value proposition of the company's products or services are key tasks. Industry exposure in Distribution, System Integrators, GSI, Retail, Service Providers, or OEMs is required. Hands-on experience with Cybersecurity Solutions like Perimeter Security (Firewall), Endpoints (AV, EDR, EPP), and IDAM (SSO, MFA, PIM/PAM) is essential. Key responsibilities include collaborating with clients to comprehend their technical needs, developing industry-specific product demonstrations and presentations, and conducting Proofs of Concept. Training Sales and Pre-Sale teams of Partners in the technical aspects of the product is also a significant part of the role. An in-depth understanding of technical concepts is necessary to deliver successful Demos and POCs and configure solutions according to clients" Network Architectures. Experience with Vendor solutions such as Cisco, Palo Alto Networks, Forcepoint, Netskope, CrowdStrike, or CyberArk, in addition to Industry-recognized certifications like CCNA, CCNP, CCIE, AWS, or Azure, is highly advantageous. Key Attributes: - Excellent communication, presentation, and interpersonal skills - Strong problem-solving abilities - Customer-oriented mindset - Effective time management, team collaboration, and multitasking skills This is a Full-time, Permanent position offering benefits such as Paid time off, and Provident Fund. The work schedule is during the Day shift, and the work location is in person.,
Posted 1 week ago
6.0 - 7.0 years
16 - 18 Lacs
Bengaluru
Work from Office
Schneider Electric India Pvt. Ltd. is looking for IAM Federation Infra Analyst to join our dynamic team and embark on a rewarding career journeyThe Senior Analyst plays a crucial role in driving data-driven decision-making processes within the organization. This position involves analyzing complex data sets, generating actionable insights, and providing strategic recommendations to support key business initiatives.Key Responsibilities:Data Analysis:Conduct in-depth analysis of large and complex datasets to extract meaningful insights.Utilize statistical and data visualization tools to present findings in a clear and concise manner.Strategic Planning:Collaborate with cross-functional teams to understand business objectives and provide analytical support for strategic initiatives.Develop and maintain models to support forecasting, budgeting, and other planning processes.Reporting and Dashboards:Design and create comprehensive reports and dashboards to track key performance indicators (KPIs) and metrics.Automate reporting processes to improve efficiency and accuracy.Trend Analysis:Identify trends and patterns in data to help anticipate opportunities and challenges.Provide insights on market trends, competitor analysis, and industry benchmarks.Decision Support:Assist senior management in making informed decisions by providing data-driven recommendations.Evaluate the impact of proposed strategies on business outcomes.Process Improvement:Identify areas for process improvement and efficiency gains based on data analysis.Collaborate with teams to implement changes and measure the impact.
Posted 2 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do: Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk Experience : 5-8 Years.
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.: Experience: 5-8 Years.
Posted 2 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.: Experience: 3-5 Years.
Posted 2 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.: Experience: 3-5 Years.
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years.
Posted 2 weeks ago
5.0 - 8.0 years
9 - 14 Lacs
Gurugram
Work from Office
Role Purpose The purpose of the role is to support process delivery by ensuring daily performance of the Production Specialists, resolve technical escalations and develop technical capability within the Production Specialists. Do Oversee and support process by reviewing daily transactions on performance parameters Review performance dashboard and the scores for the team Support the team in improving performance parameters by providing technical support and process guidance Record, track, and document all queries received, problem-solving steps taken and total successful and unsuccessful resolutions Ensure standard processes and procedures are followed to resolve all client queries Resolve client queries as per the SLAs defined in the contract Develop understanding of process/ product for the team members to facilitate better client interaction and troubleshooting Document and analyze call logs to spot most occurring trends to prevent future problems Identify red flags and escalate serious client issues to Team leader in cases of untimely resolution Ensure all product information and disclosures are given to clients before and after the call/email requests Avoids legal challenges by monitoring compliance with service agreements Handle technical escalations through effective diagnosis and troubleshooting of client queries Manage and resolve technical roadblocks/ escalations as per SLA and quality requirements If unable to resolve the issues, timely escalate the issues to TA & SES Provide product support and resolution to clients by performing a question diagnosis while guiding users through step-by-step solutions Troubleshoot all client queries in a user-friendly, courteous and professional manner Offer alternative solutions to clients (where appropriate) with the objective of retaining customers and clients business Organize ideas and effectively communicate oral messages appropriate to listeners and situations Follow up and make scheduled call backs to customers to record feedback and ensure compliance to contract SLAs Build people capability to ensure operational excellence and maintain superior customer service levels of the existing account/client Mentor and guide Production Specialists on improving technical knowledge Collate trainings to be conducted as triage to bridge the skill gaps identified through interviews with the Production Specialist Develop and conduct trainings (Triages) within products for production specialist as per target Inform client about the triages being conducted Undertake product trainings to stay current with product features, changes and updates Enroll in product specific and any other trainings per client requirements/recommendations Identify and document most common problems and recommend appropriate resolutions to the team Update job knowledge by participating in self learning opportunities and maintaining personal networks Mandatory Skills: PIM Inriver. Experience: 5-8 Years.
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years.
Posted 2 weeks ago
8.0 - 13.0 years
16 - 30 Lacs
Pune
Remote
Job Title: Product Manager, Elevated Access Management Department: Product Management Reports To: VP of Product Management --- The Role As the Product Manager for Elevated Access Management (EAM) within Pathlock Cloud, you will be instrumental in defining, building, and evolving our capabilities for securing and governing privileged access. You will shape the features that enable organizations to implement just-in-time access, session management, and granular control over critical system access. This highly cross-functional role blends deep security expertise with product strategy and hands-on execution, ensuring our EAM module is robust, scalable, and seamlessly integrated within the broader identity governance platform. --- Key Responsibilities Elevated Access Module Strategy & Roadmap Define the requirements, specifications, and product strategy for Pathlock Cloud's Elevated Access Management module, including just-in-time access, privileged session management, and credential vaulting. Partner with Engineering and Architecture to design and evolve the EAM architecture, ensuring it is secure, performant, and scalable within our multi-tenant, cloud-native platform. Ensure EAM capabilities are modular, reusable, and designed for extensibility, facilitating integration with various target systems and other Pathlock Cloud modules. Core EAM Capabilities & Workflows Lead the definition and delivery of core EAM components, such as dynamic access provisioning, approval workflows for elevation requests, session recording, and privileged command control. Serve as the product owner for EAM-specific services, including policy engines for privileged access, real-time monitoring, and granular reporting on elevated activities. Ensure new EAM features are developed with clear functional specifications, stringent security requirements, performance goals, and well-defined integration paths. Extensibility & Ecosystem Integration Create detailed product documentation and guides specifically for EAM, facilitating its adoption and integration by internal teams, partners, and customers. Act as the voice of EAM consumers, gathering feedback and requirements from security teams, IT operations, and compliance stakeholders. Compliance & Audit Support for Privileged Access Collaborate closely with security and compliance teams to ensure EAM services meet stringent regulatory and audit requirements for privileged access (e.g., SOX, GDPR, HIPAA, NIST). Drive the development of comprehensive audit logging, access tracking, and forensic capabilities specific to elevated sessions and privileged operations. Cross-functional Collaboration Work closely with Core Platform Product Managers, Connector Engineering, and Infrastructure teams to align EAM services with overall roadmap priorities and platform capabilities. Drive clarity across stakeholders by creating clear product specifications, user stories, and functional documentation for EAM features. Prioritize EAM investments based on security impact, business value, reusability, and engineering efficiency. --- Qualifications 5+ years of product management experience, with at least 2-3 years specifically in Privileged Access Management (PAM), Identity Governance and Administration (IGA), or related enterprise security SaaS products. Proven track record defining specifications and requirements for complex security products or extensible systems. Strong technical fluency; able to effectively communicate with Engineering, Architecture, and other technical stakeholders regarding security protocols and system design. Deep understanding of IAM concepts, with a specific focus on RBAC, ABAC, provisioning, governance, and privileged access principles (e.g., JIT, least privilege, session management, credential vaulting). Familiarity with cloud-native platforms (AWS, Azure, GCP), API-first design, and integration frameworks. Experience working in fast-paced, cross-functional environments. --- Preferred Experience Background with PAM/IGA/IAM platforms like CyberArk, Delinea, BeyondTrust, SailPoint, or Saviynt. Experience delivering security-focused modules or infrastructure components for SaaS platforms. Exposure to event-driven architectures or extensibility frameworks for real-time security monitoring. Passion for building robust, secure solutions that protect critical enterprise assets and enable secure innovation.
Posted 2 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years. >
Posted 2 weeks ago
10.0 - 14.0 years
18 - 22 Lacs
Mumbai, Hyderabad, Bengaluru
Work from Office
Your role Designing and delivering capabilities to fulfill business requirements Hands-on experience in Installing/Upgrading and Setting up CyberArk (EPM, CPM, PSM, PSMP, AIM, PVWA, EPV) to customizing/configuring it for given Policies and procedures Design, architecture, and migration experience on CyberArk Provisioning, creating workflows, custom connectors, policies Integrating various platforms with CyberArk, such as different LDAP providers, Windows servers, UNIX servers, Databases, and networking Devices Creation of automation scripts using PACLI and REST API Experience on customization of CyberArk Platforms Custom PSM Connectors/CPM Plugins (with AutoIT/Shell Scripting) and good knowledge on auto-detection configuration and usage of Discovery Scanning tools Experience on AIM (CP and CCP) CP agents installation/upgradation Experience on CyberArk version upgrade Experience on DR Drill activities Your profile CyberArk technical delivery/Architect and advisory work, designing and delivering capabilities to fulfill business requirements Hands-on experience in Installing/Upgrading and Setting up CyberArk (EPM, CPM, PSM, PSMP, AIM, PVWA, EPV) to customizing/configuring it for given Policies and procedures Design, architecture, and migration experience on CyberArk Provisioning, creating workflows, custom connectors, policies Integrating various platforms with CyberArk, such as different LDAP providers, Windows servers, UNIX servers, Databases, and networking Devices Creation of automation scripts using PACLI and REST API Experience on customization of CyberArk Platforms Custom PSM Connectors/CPM Plugins (with AutoIT/Shell Scripting) and good knowledge on auto-detection configuration and usage of Discovery Scanning tools Location - Bengaluru,Hyderabad,Mumbai,Pune,Chennai,Coimbatore
Posted 2 weeks ago
9.0 - 14.0 years
10 - 19 Lacs
Hyderabad, Pune, Bengaluru
Work from Office
Role & responsibilities - Assessing and troubleshooting CyberArk and other PAM solution installations - Assisting in the daily operations of CyberArk and other PAM solutions - Execution of daily tasks, support tickets, and provisioning tasks as assigned or routed via the ticketing system - Applies knowledge, skills and abilities to implement a process or procedure, timely and professionally. - Responsible for Privileged User account administration of various Windows and UNIX accounts using CyberArk components. - Integrating various platforms with CyberArk, such as different LDAP providers, Windows servers, UNIX servers, Databases and networking Devices. - Creating and Managing Safes, Platforms and Owners. - Central Policy Manager (CPM) policies management or redistribution. - Perform health check monitoring on all CyberArk severs to ensure consistent availability of the system to end-user. - Ability to document installation procedures, Standard Operating Procedures (SOP), etc. - Extensive experience with digital password vaulting solutions - Experience in programming (Perl, Python, PowerShell, Administrative scripting) a plus - Basic understanding of high-availability (HA) and failover implementations for network infrastructure and server systems - Providing an overview of CyberArk and equivalent Privileged Access Management solution capabilities - CPM Plugins and PSM connector Build and Customization skills - Communicates project status and escalates issues as needed.
Posted 2 weeks ago
15.0 - 20.0 years
3 - 7 Lacs
Bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills, applications, data, assets, and people. Your typical day will involve collaborating with various teams conducting assessments to identify vulnerabilities, and ensuring that the organization's information and infrastructure are safeguarded against potential cyber threats. You will also engage in continuous learning to stay updated on the latest security trends and technologies, contributing to a secure environment for all stakeholders. Roles & Responsibilities:- Loading policies (YAML format) to CONJUR via CLI or Rest API- Install, Configure, Setup Credential Provider (CP - agent based) for applications to fetch credentials.- Setup new applications via PVWA to fetch credentials using Central Credential Provider - CCP REST API or Credential Provider - CP- Vaulting accounts to safes via REST API- Knowledge of PowerShell or Python scripting- Assist application team to integrate CONJUR, CP & CCP to remove hard coded password vulnerabilities.- Have great experience in troubleshooting the above from BAU operations perspective.- Demonstrate strong independent work skills, initiative & accountability to work with client team. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Experience with identity and access management solutions.- Strong understanding of security frameworks and compliance regulations.- Knowledge of network security protocols and best practices.- Familiarity with incident response and threat management processes. Additional Information:- The candidate should have minimum 5 years of experience in CyberArk Privileged Access Management.- This position is based at our Bengaluru office.- A 15 years full time education is required.- Willing to work in shift timings which are scheduled to commence between 2:00 PM and 4:00 PM IST. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 8.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and facilitating the transition to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud technologies and security threats. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular assessments of cloud security measures to identify potential vulnerabilities and recommend improvements.- Collaborate with cross-functional teams to ensure alignment of security practices with business objectives. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Strong understanding of cloud security principles and best practices.- Experience with identity and access management solutions.- Familiarity with compliance frameworks such as ISO 27001, NIST, or GDPR.- Ability to analyze security incidents and develop effective response strategies. Additional Information:- The candidate should have minimum 3 years of experience in CyberArk Privileged Access Management.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 8.0 years
13 - 17 Lacs
Pune
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitate the transition to cloud security-managed operations, ensuring that all security measures align with organizational objectives and compliance standards. You will also engage in discussions to refine security strategies and address any emerging challenges in the cloud environment, contributing to a secure and efficient operational landscape. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Develop and maintain comprehensive documentation of cloud security architecture and controls.- Evaluate and recommend security technologies and practices to enhance the cloud security posture. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Strong understanding of cloud security principles and best practices.- Experience with identity and access management solutions.- Familiarity with compliance frameworks such as ISO 27001, NIST, or GDPR.- Ability to analyze security incidents and implement corrective actions. Additional Information:- The candidate should have minimum 3 years of experience in CyberArk Privileged Access Management.- This position is based at our Pune office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
7.0 - 10.0 years
7 - 14 Lacs
Pune
Work from Office
Role & responsibilities Preferred candidate profile This role is for you if you have the below Educational qualifications •Graduation degree in any stream or equivalent / post-graduation degree/diploma, Certification in any IAM product would be an added advantage. Work experience •We are looking for a of IAM resource with 5+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts The ideal candidate will: •At least 60 months of Privileged Access Management domain experience with expertise in Conjur as the primary skill and CyberArk administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: •60 months of experience in Conjur and CyberArk administration 1. Conjur Administration: •Serve as the primary administrator for Conjur, overseeing deployment, configuration, and maintenance of the Conjur environment. •Manage secrets within Conjur, ensuring their protection and proper access control according to organizational policies and requirements. •Monitor system performance, conduct regular health checks, and ensure high availability and reliability of Conjur services. •Troubleshoot and resolve complex issues related to Conjur infrastructure and performance. •Implement and enforce best practices for secrets management, policy management, and integration with other systems. 2. CyberArk Privilege Cloud Administration: •Act as a secondary administrator for CyberArk Privilege Cloud, contributing to the deployment, configuration, and maintenance of the solution. •Assist in managing privileged accounts, credential rotation, session management, and audit trails as per organizational policies. •Support monitoring and troubleshooting of CyberArk Privilege Cloud performance and issues, ensuring reliable and secure operations.
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
vadodara, gujarat
On-site
Wipro Limited is a leading technology services and consulting company dedicated to creating innovative solutions for clients" complex digital transformation needs. With a global presence spanning 65 countries and over 230,000 employees, Wipro helps clients achieve their boldest ambitions and build sustainable businesses for the future. The organization is committed to supporting customers, colleagues, and communities in an ever-evolving world. The role's purpose is to analyze, identify, rectify, and recommend specific improvement measures to enhance the organization's security posture and protect sensitive information. Key responsibilities include: - Ensuring customer-centric cybersecurity solutions - Monitoring and safeguarding log sources and security access - Planning disaster recovery in case of security breaches - Monitoring for attacks, intrusions, and unauthorized activity - Conducting log reviews and forensic analysis - Performing security assessments and risk analysis - Handling escalated security incidents in 24x7 rotational shifts - Utilizing advanced analytics tools to identify emerging threat patterns - Completing tactical security operations tasks - Conducting detailed incident analysis and creating reports - Coordinating with stakeholders and providing audit assistance - Maintaining an information security risk register - Assisting with internal and external audits related to information security - Providing cybersecurity awareness training to colleagues - Offering advice and guidance on issues such as spam and malicious emails Key Performance Parameters: - Customer centricity: Timely security breach resolution for end users, stakeholders, and external customers - Process Adherence: Adherence to SLAs, response time, and resolution time Mandatory Skills: Privilege Password Management, CyberArk Experience: 5-8 Years Wipro is on a journey to reinvent itself as a modern digital transformation partner with ambitious goals. The organization is looking for individuals inspired by reinvention and constant evolution. Join Wipro to design your reinvention and realize your ambitions in a purpose-driven environment. Applications from people with disabilities are encouraged and welcomed.,
Posted 2 weeks ago
8.0 - 12.0 years
0 Lacs
chennai, tamil nadu
On-site
As a Senior Information Security Engineer, you will be responsible for leading vulnerability assessments and policy compliance scans across various environments including on-premises, cloud, container, database, and web environments using tools like Qualys. Your role will involve validating scan results, eliminating false positives, and delivering accurate, actionable reports to stakeholders. You will serve as a technical Subject Matter Expert (SME), analyzing findings, diagnosing root causes, and guiding remediation efforts. Additionally, you will be expected to develop and maintain a knowledge base to support continuous improvement and team expertise while staying current on emerging threats, tools, and vulnerability management lifecycle advancements to recommend service enhancements. Effective communication of security requirements across the organization and stepping in as an interim team lead when necessary will also be part of your responsibilities. In terms of experience and education, you should have a minimum of 8 years in the field of information security along with a Bachelor's degree in Engineering, Computer Science, Information Technology, or equivalent. Industry certifications such as CISSP, CISA, CISM, CRISC, or CCNA/CCNP/CCIE Security are preferred. You are expected to be proficient in working with vulnerability scanning platforms like Qualys, Nessus, etc., false-positive tuning, and compliance frameworks. Your technical expertise should span across cloud and on-premises systems, network devices such as routers, firewalls, proxies, and various infrastructure components. Skills in risk and threat assessment, as well as security policy enforcement, are essential. Familiarity with containers, DDI (DNS/DHCP/IPAM), WAF/CDN/DDOS solutions (e.g., Infoblox, Zscaler, Imperva) will be advantageous. Knowledge of scripting languages like Python and experience with monitoring tools like Spectrum, SevOne, ThousandEyes, CyberArk, and MS-Entra-ID will also be beneficial. Apart from technical skills, soft skills and leadership qualities are equally important. Excellent analytical, communication, and report-writing abilities are required. Strong organizational and time-management skills are essential for success in this role. Demonstrated leadership abilities, including guiding teams, managing escalations, and fostering a security culture, are expected. As an adaptable self-starter, you should be committed to continuous learning and proactive problem-solving.,
Posted 2 weeks ago
7.0 - 12.0 years
15 - 27 Lacs
Hyderabad, Chennai, Bengaluru
Hybrid
CyberArk Implementation hands on experience, expertise for developing PSM and CPM Plugins. Design, Develop and Integrate CyberArk Privilege Cloud or on-prem solution Privileged Access Management tool technical certification and or hands-on experience in tools like CyberArk Privileged Cloud SaaS or on-prem. CyberArk conjur CyberArk Credential Manager Ability to work remotely and collaborate with teams across various locations (e.g., Eastern / Western Europe, Eastern United States, United Arab Emirates, Asia / Pacific). Strong project management and communication skills. Good documentation skills for LLD,HLD and . CyberArk Upgrade,Migration experience or experience working with CyberArk version 14.x is good to have
Posted 2 weeks ago
7.0 - 10.0 years
13 - 22 Lacs
Hyderabad
Work from Office
Job Title: IAM Business Analyst Department: Global Identity & Directory Solutions Reporting To: Global Head of Identity & Access Management (IAM) Employment Type: Full-Time Job Summary: EY is hiring an experienced IAM Business Analyst to lead requirement gathering, process design, and governance support across our global IAM landscape. Youll play a key role in shaping and optimizing IAM processes, focusing on Active Directory, Azure Entra ID, PAM tools (e.g., CyberArk), and SailPoint IIQ . Key Responsibilities: Gather and document IAM business and functional requirements. Improve JML (Joiner-Mover-Leaver), provisioning, and deprovisioning workflows. Design scalable IAM process models and workflows (RBAC, SoD, Access Requests). Collaborate with stakeholders across Security, QA, IT, and Compliance teams. Support testing (UAT), training, and post-go-live deployment. Build Power BI/Excel dashboards and maintain audit-ready documentation (GxP, SOX, GDPR). Must-Have Skills: Identity Lifecycle Management (JML) Active Directory, Azure Entra ID SailPoint IIQ & PAM tools (CyberArk, Delinea) IAM Process Design & Workflow Modelling Compliance Standards: GxP, GDPR, SOX Power BI / Excel Reporting Business Requirement Gathering & UAT Support Qualifications: Bachelor’s in Computer Science, InfoSec, or related field 5–10 years of IAM/Business Analysis experience Regulated environment experience (GxP/SOX) Preferred Certifications: CIAM / CBAP / PMI-PBA ITIL Foundation Microsoft Identity & Access Administrator SailPoint IIQ Associate / Professional
Posted 2 weeks ago
3.0 - 5.0 years
5 - 5 Lacs
Kochi
Work from Office
Responsibilities : Design and implement SailPoint IdentityNow or IIQ and access management solutions to meet the needs of the organization. Work with Application Teams to identify, aggregate and correlate Application/System User Accounts to Identity Cubes within SailPoint. Development and configuration experience of SailPoint various modules (e.g. audit, compliance, lifecycle, service account). Design, Develop, Test, and Troubleshoot Custom System/Application Connectors within SailPoint IdentityNow. Product expertise in IIQ, CyberArk, Microsoft Active Directory, Relational databases (Oracle/SQL Server/MySQL/DB2), Java, BeanShell, REST API, and web services. Troubleshoot and resolve technical issues related to the SailPoint platform. Conduct regular audits and reviews to ensure compliance with security policies and procedures. Develop and maintain documentation for processes, procedures, and system configurations. Mentor and train junior team members on SailPoint best practices and technologies. Requirements : Experience in integrating SailPoint IdentityNow, CyberArk, Azure AD, ServiceNow and API development experience for SailPoint functions is must to have. Experience with Rest Web services, SAML 2.0, SailPoint IdentityNow, OAuth, WS-Security, and other authentication/authorization protocols is required. Excellent communication skills and extensive experience working with clients and partners. Expert-level experience with IAM Protocols such as SCIM, Web services, WS-Fed, SAML, OpenID Connect, and OAuth. Required Skills SailPoint, JAVA
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough