Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 10.0 years
7 - 14 Lacs
Telangana
Work from Office
Has Implemented Large Scale implementation in Saviynt minimum 2 or mid-scale 3 or small scale 4 Projects. Hands one on Saviyntdevelopment , enhancement and troubleshooting components and Troubleshooting. Has complete knowledge on Provisioning and Access governance Tool. Lead the SaviyntProject work, participate in Project Planning Meetings Support Saviynt Integrated Applications (on-premise, cloud SaaS Applications) using out-of-box Connectors, Custom Connectors for Accounts, Groups, Entitlements Aggregation, Correlation - Support Saviynt Access Re-certification process Support Saviynt Access Request Management Process - Support access review process and LCM workflows Support Provisioning track for Accounts provisioning Requirements: - 8 Plus years of experience in the field of IT services with over 5+ years of experience in Identity and access management SailPoint Implementation experience for at least three Projects Experience in development phase for all Saviynt components LCM, Governance, Compliance, Provisioning Platform. - Saviynt Vendor
Posted 2 weeks ago
3.0 - 8.0 years
9 - 17 Lacs
Hyderabad
Hybrid
a)Experience in CyberArk Privileged Cloud b) Onboard domain, window, Linux, cloud, database administrator target systems to CyberArk c) Bulk account onboarding of privileged accounts d) Onboard and manage application service accounts and other privileged accounts that may impact applications when credentials are rotated via Central Credential Provider e) Onboard secrets in Secrets Hub, create sync policies etc. f) Maintain the underlying infrastructure high-availability, disaster recovery, network management & patching and upgrading the underlying infrastructure. g) Troubleshoot third party-integrations such as Active Directory, SIEM, SMTP. h) Troubleshoot password and session management issues i) Generate reports for password compliance and access certification j) Experience in configuring new load balancer for PSM and CCP k) Provide guidance on configuring master and password policy for password vaulting/rotation, session recording, and whitelist/blacklist commands. l) Train end user administrators on procedures to access PAM tool. m) Document known issues, administrator guide, SOPs for patching, upgrade activities.
Posted 2 weeks ago
2.0 - 6.0 years
0 Lacs
karnataka
On-site
As an Infoscion, your primary responsibility will be to actively support the consulting team throughout various phases of the project. This includes tasks such as problem definition, effort estimation, diagnosis, solution generation, design, and deployment. You will be required to explore alternative solutions based on thorough research, including literature surveys, public domain information, and vendor evaluations. Building POCs will also be a part of your role. Creating requirement specifications from business needs, defining processes, and developing detailed functional designs based on requirements will be essential. Additionally, you will assist in configuring solution requirements on products, diagnosing any issues, identifying root causes, seeking clarifications, and shortlisting solution alternatives. Your contribution to unit level and organizational initiatives will focus on delivering high-quality, value-adding solutions to customers. Moreover, you should be able to work with clients to identify business challenges and refine, analyze, and structure relevant data to contribute to client deliverables. Remaining aware of the latest technologies and trends, showcasing logical thinking and problem-solving skills, and collaborating effectively are key attributes for this role. You will also need to assess current processes, identify areas for improvement, and propose suitable technology solutions based on one or two industry domain knowledge. Furthermore, having expertise in various domains such as Network Security Firewall & Policies, IDAM (Cyberark, Forgerock, Microsoft Identity Manager, Okta, Oracle Access Manager, Oracle Identity Manager, Ping/Federate, Sailpoint, Saviyant), Application Security, Cloud Security (AWS - GRC), Enterprise Mobility Solution (MS Azure AD, MS Azure RMS, MS Intune), Infrastructure Security (Security Incident and Event Management - SIEM - Splunk), and Network technologies (CISCO, Palo Alto) will be advantageous in fulfilling your responsibilities effectively. If you believe you possess the skills and experience to help clients navigate their digital transformation journey successfully, this opportunity is tailored for you.,
Posted 2 weeks ago
4.0 - 7.0 years
5 - 10 Lacs
Pune
Work from Office
At Capgemini Invent, we believe difference drives change. As inventive transformation consultants, we blend our strategic, creative and scientific capabilities,collaborating closely with clients to deliver cutting-edge solutions. Join us to drive transformation tailored to our client"s challenges of today and tomorrow.Informed and validated by science and data. Superpowered by creativity and design. All underpinned by technology created with purpose. Your Role Drive and ensure business, IT and Security teams are compliant to applicable IAM policy, IAM .standards and instructions. Work closely with IAM team ( Run and Project) to design and deploy monitoring and control systems based on IAM policy and instructions. Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction. Develop and maintain measurable IAM security metrics; ensure metrics provide actionable insights to the applicable stakeholders. Maintain IAM policy & instruction awareness of business, technical, architecture, infrastructure, and end user support Develop and maintain measurable KPIs to showcase IAM governance performance Analyse internal and external threats and recommend remediation actions based on IAM capability. Perform IAM audit / gap assessments of internal systems and processes and provide recommendations to mitigate the same Your Profile Deliverables PAM Audit compliance Dashboard, reporting Analysis, Identity Health Check & governance What you will love about working here We recognize the significance of flexible work arrangements to provide support. Be it remote work, or flexible work hours, you will get an environment to maintain healthy work life balance. At the heart of our mission is your career growth. Our array of career growth programs and diverse professions are crafted to support you in exploring a world of opportunities. Equip yourself with valuable certifications in the latest technologies such as Generative AI.
Posted 2 weeks ago
6.0 - 11.0 years
18 - 33 Lacs
Hyderabad
Hybrid
Job Description Summary: To coordinate a critical team responsible for the security and smooth operation of our Identity and Access Management (IAM) environment. This leader will be responsible for a team that tackles incidents, problems, tasks, and patching for a diverse set of IAM services, including SailPoint, Active Directory, Azure AD, certificate management, and Privileged Access Management (PAM). The ideal candidate possesses a deep understanding of IAM principles, extensive experience in security operations, and the leadership skills to navigate complex technical challenges. Responsibilities: Incident Response & Security: Lead the team in responding to security incidents related to IAM systems, including user access issues, suspicious activity, and potential breaches. Conduct thorough investigations to identify root causes and implement corrective actions to prevent future incidents. Develop and maintain an effective incident response plan for IAM systems. Stay informed about emerging IAM security threats and vulnerabilities, implementing necessary security patches and updates promptly. Operations & Problem Solving: Manage a team of IAM specialists responsible for day-to-day operations, problem resolution, and task fulfillment within SailPoint, Active Directory, Azure AD, certificate management, and PAM systems. Ensure the team has the understanding of the comprehensive procedures for IAM operations, ensuring efficient user provisioning, access management, and lifecycle processes. Monitor and analyze IAM system performance metrics, identifying and resolving operational issues. Ensure adherence to established IAM policies, standards, and compliance requirements. IAM Process Governance: Through the feedback of incidents & problem cases provide visibility to the IAM & MyAccess teams where processes have issues or can be improved. Ensure the team is supporting the MyAccess project in defining test cases for newly onboarded applications Providing resources from the team to support application onboarding testing and reporting results. With the team, drive the engagement of identity standardization, central processes, and the adoption of concepts such as least privilege and zero trust in the organization Technical Expertise: Possess a strong understanding of IAM best practices, frameworks, and methodologies (e.g., NIST 800-53). Have in-depth knowledge of SailPoint, Active Directory, Azure AD, certificate management solutions, and PAM systems. Stay current on the latest security vulnerabilities and patches related to these IAM services. Work collaboratively with other security teams to ensure comprehensive security controls for user access and entitlements. Leadership & Communication: Foster a high-performing team environment that prioritizes security and operational efficiency. Provide clear direction and guidance to team members, ensuring they have the knowledge and resources to excel in their roles. Communicate effectively with stakeholders at all levels, including business leaders, IT operations, and security teams. Develop and deliver training programs to educate users and team members on IAM processes and security best practices. Qualifications: Bachelor's degree in information technology, Cybersecurity, or a related field (or equivalent experience). Minimum 7 years of experience in IAM operations, with at least 3 years in a leadership role. Proven experience in security operations, including incident response, investigation, and vulnerability management. In-depth knowledge of SailPoint, Active Directory, Azure AD, certificate management solutions, and PAM systems. Strong understanding of IAM best practices and frameworks. Excellent communication, collaboration, problem-solving, and analytical skills. Ability to work independently, manage multiple priorities, and lead a team in a fast-paced environment.
Posted 2 weeks ago
8.0 - 13.0 years
5 - 15 Lacs
Bengaluru
Hybrid
Job Description: Platform and Security Architect Customer Identity Access Management Context The team is seeking an experienced platform architect primarily skilled in Identity and Access management to provide technical support and overseeing all development support aspects of the External Identity Management System (cIAM). Requirements and Qualifications Expertise with identity technologies such as Auth0, OKTA,Ping Identity (ForgeRock),SailPoint,CyberArk, etc. Deep knowledge of modern identity protocols (OAuth2, OIDC, SAML), authentication flows, directory services, and access governance Strong consulting background, with proven ability to manage multiple stakeholders and lead strategic client conversations. In-depth knowledge of identity management concepts, IAM IT General Controls, and the latest IdM products. Strong understanding of Active Directory, Azure AD, cloud directories, MFA, and other authentication technologies. Practical operational knowledge of identity management solutions. Identity management certifications (CIAM, CIMP) and Vendor-specific certifications from Ping (ForgeRock), Auth0, Okta, SailPoint, or CyberArk Working knowledge in Angular JS/JavaScript, LDAP, Swagger and Linux commands / working experience in Linux environment Experience in web development like AWS, lambda, Node JS, React, API gateways and Web services development like Node JS and Restful APIs Broad and deep technical security background in identity management as well as Information Security more generally. Strong understanding of core identity and access management concepts and technologies, including provisioning, access, single sign-on (SSO), multi-factor authentication, privileged access management, public-key infrastructure, directory services, group policy, identity-related integrations, behavioral analytics and other identity management related technologies and functions. Experience designing and administering IMS, access controls, security and risk management as well as a security governance framework at scale. A solid background building testable, decoupled, maintainable code using a combination of best in market practices. Strong database experience including directory server. Automated build, test deploy strategies to include multiple CI/CD implementations and versioning systems like Git, Bitbucket, and GitHub Producescalabledesignsand performance enhancements. At least 8 years of industry experience, with a minimum of 5 years as an IdM/IAM expert
Posted 2 weeks ago
4.0 - 6.0 years
15 - 20 Lacs
Bengaluru
Hybrid
About Client Hiring for One of the Most Prestigious Multinational Corporations! Job Description: Job Title : IAM Quality Analyst Required skills and qualifications : We are looking for the skill mentioned below IAM Testing, Identity & Access Management, SailPoint, CyberArk Qualification : Any Graduate or Above Relevant Experience : 4 to 6yrs Location: Bangalore CTC Range : 15 to 20 lpa Notice period : 30 days Mode of Interview : Virtual Chaithra B Staffing analyst - IT recruiter Black and White Business solutions PVT Ltd Bangalore, Karnataka, INDIA chaithra.b@blackwhite.in / www.blackwhite.in +91 8067432409
Posted 2 weeks ago
3.0 - 8.0 years
15 - 30 Lacs
Kolkata, Hyderabad, Bengaluru
Work from Office
Role & responsibilities 1. Strong experience in Cyberark 2. Experiecne PAM Implemetation 3 Certification Mandatory (Defender OR PAM)
Posted 2 weeks ago
5.0 - 8.0 years
8 - 12 Lacs
Pune
Work from Office
Role: Presales Engineer Location: Pune Company : Inspirit Vision Pre Sales Engineer We are looking for a dynamic and technically proficient IAM Pre-Sales Engineer to join our growing cybersecurity team. In this role, you will act as a trusted advisor to customers, supporting the sales team throughout the sales cycle by providing deep technical knowledge in Identity and Access Management (IAM), solution demonstrations, architecture design, and proposal support. You will bridge the gap between business requirements and technical solutions, driving successful customer engagements from discovery to technical closure. Key Responsibilities • Collaborate with Sales and Account teams to understand customer requirements, pain points, and business goals. • Lead technical discovery and requirement-gathering sessions with prospective clients. • Design IAM architectures and solution blueprints tailored to client environments (covering Workforce IAM, CIAM, IGA, PAM, SSO, MFA, etc.). • Deliver compelling product demonstrations, Proof of Concepts (PoCs), and technical workshops. • Respond to RFPs/RFIs and create high-quality technical proposals in collaboration with sales and delivery teams. • Articulate and present IAM solution benefits, product roadmaps, and implementation approaches to both technical and executive stakeholders. • Act as a subject matter expert (SME) for IAM platforms such as ForgeRock, Ping Identity, Okta, SailPoint, CyberArk, IBM Verify, or Microsoft Entra. • Work closely with engineering and delivery teams to ensure alignment between pre-sales promises and implementation feasibility. • Represent the company at conferences, webinars, and client meetings as an IAM domain expert. • Maintain competitive and market intelligence in IAM and adjacent cybersecurity spaces. Required Qualifications • Bachelors or Master’s degree in Computer Science, Information Security, Engineering, or a related field. • 5+ years of experience in Identity & Access Management, including 2+ years in a customer-facing pre-sales or solution consulting role. • Strong knowledge of IAM protocols and standards (SAML, OAuth, OIDC, LDAP, SCIM, PKI). • Hands-on experience with one or more leading IAM platforms : ForgeRock, Ping Identity, Okta, SailPoint, CyberArk, IBM Verify, Saviynt, WSO2, or others. • Proven experience in delivering demos, building PoCs, and crafting technical responses for RFPs. • Excellent communication, presentation, and interpersonal skills. • Ability to work cross-functionally in a fast-paced, customer-centric environment.
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
As an Infoscion, you will play a vital role in the consulting team by actively supporting various phases of projects, such as problem definition, effort estimation, diagnosis, solution generation, design, and deployment. Your responsibilities will include exploring alternative solutions, conducting research through literature surveys, public domain information, vendor evaluations, etc., and developing proof of concepts (POCs). You will be tasked with creating requirement specifications based on business needs, defining processes, and detailed functional designs. Additionally, you will assist in configuring solution requirements, identifying and resolving issues, seeking clarifications, and proposing solution alternatives. Your contributions will focus on delivering high-quality, value-adding solutions to customers at both unit and organizational levels. Furthermore, you will collaborate with clients to understand their business challenges, refine and analyze relevant data, and contribute to client deliverables. It is essential to stay updated on the latest technologies and trends, showcase logical thinking, problem-solving abilities, and promote a collaborative work environment. You will be expected to evaluate current processes, pinpoint areas for improvement, and recommend suitable technology solutions. Industry domain knowledge, especially in network security, firewall policies, IDAM (Identity and Access Management) solutions like Cyberark, Forgerock, Microsoft Identity Manager, Okta, Oracle Access Manager (OAM), Oracle Identity Manager (OIM), Ping/Federate, Sailpoint, etc., will be beneficial. Your preferred skills should encompass expertise in various domains such as network security, application security, cloud security, enterprise mobility solutions, infrastructure security, etc. Familiarity with technologies like AWS - GRC, MS Azure AD, MS Azure RMS, MS Intune, CISCO technologies, Palo Alto, Splunk, among others, will be advantageous for this role. If you are enthusiastic about guiding clients through their digital transformation journey and possess the necessary skills and knowledge, this opportunity at Infosys is tailored for you.,
Posted 2 weeks ago
17.0 - 20.0 years
35 - 55 Lacs
Hyderabad
Work from Office
Job Title: Head of Identity and Access Management (Healthcare / Pharma industry experience Must) Department: Global Identity & Directory Solutions Reports To: Head of Global IT Infrastructure Technical Skills: (Mandatory Technical & Functional Requirements) SailPoint IdentityIQ / IdentityNow Implementation, governance, policy enforcement, and lifecycle automation. Privileged Access Management (PAM) Hands-on experience with tools like Delinea or CyberArk . Active Directory (AD) & Entra ID (Azure AD) Deep technical understanding of hybrid identity, group policies, federation services (ADFS), and cloud directory management. Authentication Protocols Proficient in OAuth2 , SAML , OpenID Connect , and MFA solutions. Certificate Lifecycle Management (CLM) In-depth experience with PKI , SSL/TLS certificate management , and basic cryptography principles . Integration with Cloud IAM Experience with Azure , AWS , Kubernetes RBAC , DevOps CI/CD tools . ITSM Integration Familiarity with ServiceNow for IAM workflow automation. Security Frameworks Knowledge of NIST 800-53 , ISO 27001 , GDPR , SoD , RBAC policies. Key Responsibilities Define and implement the global IAM strategy, roadmap, and governance model. Lead IAM operations, engineering, and governance teams to deliver secure and scalable IAM services. Ensure operational excellence across IAM services including performance monitoring, incident response, patching, and upgrades. Oversee IAM program compliance with internal controls and external regulations. Drive automation across identity lifecycle processes (Joiner-Mover-Leaver). Foster collaboration with IT, HR, Legal, Compliance, and business units. Own IAM controls during audits and drive timely remediation. Lead IAM-related risk assessments and integrate findings into business planning. Act as the subject matter expert (SME) on identity security in digital transformation initiatives. Education & Certifications Required : Bachelors degree in Computer Science, Cybersecurity, or equivalent. Preferred : Masters degree, CISSP, CISM, or equivalent IAM/security certifications. Experience Minimum 16 years in IT Security or IAM, with 5+ years in IAM leadership roles - Healthcare and pharma industry experience preferred . Demonstrated success managing global IAM programs and operational teams. Proven expertise in handling IAM audits, compliance, and regulatory frameworks. People & Budget Responsibilities Team Size : 7- 14 direct/indirect reports Budget : Responsible for cost planning and financial oversight of IAM services
Posted 2 weeks ago
8.0 - 10.0 years
6 - 10 Lacs
Bengaluru
Work from Office
8 - 10 years of industry experience with a minimum of 8 years relevant experience in OneIdentity. Experience in development and implementation, design and architecture of identity and access management solutions. Must possess the technical/functional skills necessary to understand and manage consulting project engagements. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Design and deliver high quality security architecture and infrastructure setups and/or sub-systems to agreed deadlines. Assist customers in developing a secured Identity management infrastructure and to define security policies to protect their applications from unauthorized access. Lead and own the security solution implementation. Establish and maintain operational processes, standards, and procedures for managing OneIdentity Manager environments, including incident management, change management, and problem management. Monitor and optimize the performance, availability, and scalability of OneIdentity Manager solutions, proactively identifying and addressing issues to ensure service reliability and customer satisfaction. Preferred technical and professional experience Experience with at least one of the following development environments/languagesJ2EE, Java, JavaScript,powershell, .Net OneIdentity Certified. Experience in specific industry verticals is preferred
Posted 2 weeks ago
6.0 - 11.0 years
16 - 30 Lacs
Pune
Work from Office
Role : IAM Presales Engineer Location: Pune Job Type: Full Time( Work from Office) Experience: 5+ yrs & Immediate Joiners are preferred Note : Should be ready to move any location in India/outside India We are looking for a dynamic and technically proficient IAM Pre-Sales Engineer to join our growing cybersecurity team. In this role, you will act as a trusted advisor to customers, supporting the sales team throughout the sales cycle by providing deep technical knowledge in Identity and Access Management (IAM), solution demonstrations, architecture design, and proposal support. You will bridge the gap between business requirements and technical solutions, driving successful customer engagements from discovery to technical closure. Key Responsibilities • Collaborate with Sales and Account teams to understand customer requirements, pain points, and business goals. • Lead technical discovery and requirement-gathering sessions with prospective clients. • Design IAM architectures and solution blueprints tailored to client environments (covering Workforce IAM, CIAM, IGA, PAM, SSO, MFA, etc.). • Deliver compelling product demonstrations, Proof of Concepts (PoCs), and technical workshops. • Respond to RFPs/RFIs and create high-quality technical proposals in collaboration with sales and delivery teams. • Articulate and present IAM solution benefits, product roadmaps, and implementation approaches to both technical and executive stakeholders. • Act as a subject matter expert (SME) for IAM platforms such as ForgeRock, Ping Identity, Okta, SailPoint, CyberArk, IBM Verify, or Microsoft Entra. • Work closely with engineering and delivery teams to ensure alignment between pre-sales promises and implementation feasibility. • Represent the company at conferences, webinars, and client meetings as an IAM domain expert. • Maintain competitive and market intelligence in IAM and adjacent cybersecurity spaces. Required Qualifications • Bachelors or Masters degree in Computer Science, Information Security, Engineering, or a related field. • 5+ years of experience in Identity & Access Management, including 2+ years in a customer-facing pre-sales or solution consulting role. • Strong knowledge of IAM protocols and standards (SAML, OAuth, OIDC, LDAP, SCIM, PKI). • Hands-on experience with one or more leading IAM platforms: ForgeRock, Ping Identity, Okta, SailPoint, CyberArk, IBM Verify, Saviynt, WSO2, or others. • Proven experience in delivering demos, building PoCs, and crafting technical responses for RFPs. • Excellent communication, presentation, and interpersonal skills. • Ability to work cross-functionally in a fast-paced, customer-centric environment.
Posted 2 weeks ago
8.0 - 13.0 years
25 - 32 Lacs
Noida, Hyderabad
Work from Office
Experience Required: 510+ years in Identity and Access Management (IAM), with deep expertise in CyberArk PAM and EPM Key Responsibilities: Architecture & Strategy • Lead the design and implementation of CyberArk PAM and EPM solutions. • Define privileged access policies, least privilege strategies, and endpoint security controls. • Align PAM/EPM architecture with organizational security goals and compliance requirements. Implementation & Integration • Deploy and configure CyberArk components including Vault, PVWA, PSM, CPM, and EPM. • Integrate CyberArk with Active Directory, LDAP, SIEM, cloud platforms, and DevOps pipelines. • Customize policies and workflows to meet specific business and security needs. Endpoint Privilege Management (EPM) • Implement EPM to manage and restrict endpoint privileges across Windows and macOS environments. • Develop policies to prevent privilege escalation and enforce application control. • Monitor endpoint activity and respond to suspicious behavior or policy violations. Operations & Support • Maintain and optimize CyberArk environments, ensuring high availability and performance. • Apply patches, upgrades, and backups regularly. • Troubleshoot issues related to privileged access and endpoint controls. Security & Compliance • Ensure CyberArk implementations comply with standards like ISO 27001, NIST, HIPAA, and PCI-DSS. • Conduct audits, access reviews, and risk assessments. • Generate reports for internal and external compliance requirements. Training & Documentation • Provide training and knowledge transfer to internal teams. • Maintain detailed documentation for configurations, policies, and procedures. Required Skills: • Hands-on experience with CyberArk PAM and EPM modules. • Proficiency in PowerShell, REST APIs, and scripting for automation. • Strong understanding of privileged access governance, endpoint security, and identity lifecycle management. • Familiarity with SIEM, IAM, and cloud security integrations. Preferred Qualifications: • Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field. • Certifications such as CyberArk Defender PAM (PAM-DEF) and CyberArk Defender EPM (EPM-DEF) • Experience with other PAM tools (BeyondTrust, Thycotic) is a plus
Posted 2 weeks ago
7.0 - 12.0 years
30 - 35 Lacs
Noida, Chennai, Bengaluru
Hybrid
Must Have Skills: 5 to 7 years of experience in deployment & implementation of Privileged Identity Management using CyberArk solution for large scale customers across various industry verticals Play active role in the execution of the project and demonstrate strong technical leadership Have a strong knowledge of the CyberArk privileged account security suite CyberArkversion 7.x, 8.x, 9.x and 10.x . Experience in the use of CyberArk PACLI to automate tasks related to user and safe management. Good understating of CyberArk components like EPM, OPM, AIM, etc. Capture detailed requirements for the CyberArk solution based on input from platform owners, eco-system owners, the target architecture and high-level requirements. Design and Architecture of the overall CyberArk implementation. Performing compliance checks on CyberArk for IT security safes and to Provide alerts and reports appropriately. Investigate, Provide RCA and resolve Incidents. Open to travel as and when required for deployment at customer sites Be a strong team player Advanced knowledge of windows/VMware administration. Advanced knowledge of Windows Cluster Server Strong grasp of network design, application/infrastructure security concepts, techniques, technologies, and tools Experience in working in an on/offshore environment and proven track record of delivering quality outcomes Customer service background – able to empathize with customer and own the issues raised to resolution Leading team contribution to any queries requiring technical specialist input Other Required Skills: Experience in deployment and implementation of anyof the other PIM tools: CA PAM (Xceedium) BeyondTrust Quest / OneIdentity Thycotic ERPM Good understanding of LDAP concepts and working experience with at least few of the following directories: Oracle Internet Directory/Oracle Virtual Directory Sun Directory Server Active Directory Tivoli Directory Server Novell Directory Server CA Directory Experience in using database client tools like Toad, etc. Experience in using standard protocols like SSH, Telnet, RDP, etc. and related tools like Putty. Experience in working with the Network devices like firewalls, routers, etc. Should have the ability to understand customer scenario and requirements (may include customized integration situations) and be capable of suggesting solutions. Excellent communication skills and ability to work with global counterparts. Knowledge of basic networking Experience in Windows and Linux operating systems from PIM integration and debugging perspective Exposure to virtual environments with experience in integrating ESX, ESX(i) hosts with the PIM solution. Good troubleshooting skills Runbook documentation Qualifications: 5-7 years of strong PAM implementation experience Strong oral and written communications skills Customer Facing Exposure is must Open to travel requirements
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
pune, maharashtra
On-site
As a Cyber Assurance Assistant Vice President (AVP) at Barclays in Pune, you will play a crucial role in partnering with the bank to provide independent assurance on control processes and offer advice on enhancements to ensure the efficiency and effectiveness of the bank's internal controls framework. Your responsibilities will include collaborating across the bank to maintain a robust control environment by conducting ad-hoc assessments and testing the design and operational effectiveness of internal controls aligned with the bank's policies and standards. You will develop detailed test plans and procedures to identify weaknesses in internal controls and other initiatives within the bank's control framework to mitigate potential risks and issues that could disrupt bank operations, lead to losses, or impact reputation. In this role, you will communicate key findings and observations to relevant stakeholders and business units to enhance overall control efficiency and provide corrective actions to senior managers. You will work closely with other control professionals to address complex issues and ensure consistent testing methodologies across the bank. Additionally, you will establish a knowledge center containing detailed documentation of control assessments, testing results, findings, and distribute material on internal controls to train and upskill colleagues within the bank. As an Assistant Vice President, you are expected to advise and influence decision making, contribute to policy development, and take responsibility for operational effectiveness. You will lead a team in performing complex tasks, set objectives, coach employees, appraise performance, and determine reward outcomes. If the position involves leadership responsibilities, you will demonstrate a clear set of leadership behaviors to create an environment for colleagues to excel. Your role may involve collaborating on assignments, guiding team members, identifying new directions for projects, and consulting on complex issues. You will identify ways to mitigate risks, develop new policies and procedures to support the control and governance agenda, and take ownership of managing risk and strengthening controls related to your work. Furthermore, you will engage in complex data analysis, communicate complex information effectively, and influence stakeholders to achieve desired outcomes. It is essential for all colleagues to uphold the Barclays Values of Respect, Integrity, Service, Excellence, and Stewardship, as well as demonstrate the Barclays Mindset of Empower, Challenge, and Drive in their behavior.,
Posted 3 weeks ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
As a highly skilled IAM Engineer Level 3 at Pure Storage, you will be an integral part of our IAM Systems Engineering team. Your role will involve leveraging your comprehensive knowledge of Identity and Access Management (IAM) to implement and deliver tasks of medium to high complexity. By collaborating with senior personnel, you will contribute to enhancing our security and operational efficiency through the implementation of automation and integration code. Key Responsibilities: - Showcase full competency and in-depth knowledge in IAM. - Contribute to IAM solutions and assist in shaping strategies and roadmap. - Execute tasks and deliver outcomes of medium to high complexity. - Develop and maintain integration and automation code. - Identify root causes within the team's service management incident response processes. - Assist in reducing the technical debt backlog for the team. - Stay updated with industry trends and technological advancements. - Possess and apply intermediate knowledge of major platform automation technologies (SaaS, IaaS, scripting languages, automation platforms). - Collaborate with senior engineers to deliver more complex tasks and outcomes. - Network with senior internal and external personnel within your area of expertise. Qualifications: - Bachelor's degree in Computer Science, Information Technology, or a related field with a minimum of 5 years of related experience; or Master's degree with 3 years of related experience; or intermediate knowledge of IAM standards and practices. - Experience with IAM tools and platforms such as Microsoft Azure AD, Okta, SailPoint, BeyondTrust, CyberArk, or similar. - Hands-on experience with scripting languages and automation platforms. - Proven track record of delivering commitments of medium to high complexity. - Strong problem-solving and analytical skills. - Excellent communication skills, both verbal and written. - Ability to thrive in a demanding environment. - Capability to mentor and collaborate with team members. What We Offer: - A dynamic and innovative work environment with passionate professionals. - Opportunities for professional growth and development. - Competitive salary and comprehensive benefits package. At Pure Storage, we value uniqueness, individuality, and the ability to think differently. We encourage you to bring your authentic self to work, ask big questions, and make a real impact. Join us to accelerate your career journey, learn, grow, and explore various roles. With our commitment to equality, personal development, and community support, Pure Storage is not just a workplace but an investment in your future. If you believe you can excel in the role and are a good match, we encourage you to apply regardless of how you identify. Pure is dedicated to equality and creating an inclusive environment for all team members. For any assistance or accommodation due to a disability, please contact us at TA-Ops@purestorage.com. Please refer to our Applicant & Candidate Personal Information Protection Notice for details on how Pure collects and uses the information provided by you. Please note that some positions may require a deemed export license for compliance with applicable laws and regulations. Pure currently does not sponsor deemed export license applications.,
Posted 3 weeks ago
8.0 - 13.0 years
0 - 3 Lacs
Chennai
Work from Office
Key Responsibilities: Administer and secure Linux servers, including SSH key management. Ensure CIS benchmark and OS security compliance. Implement and manage AWS and Azure cloud security controls. Deploy, configure, and support CyberArk for Privileged Access Management. Manage CrowdStrike Falcon for endpoint security. Design and implement microsegmentation and Zero Trust security models. Troubleshoot and resolve server and security issues. Maintain clear technical documentation.
Posted 3 weeks ago
4.0 - 8.0 years
1 - 6 Lacs
Pune
Work from Office
Location:- Pune Job Description Qualification: Graduate Job Requirement The resource is expected to manage the team 10+ associates comprising of multiple towers having Lead / MIS / QA / Training Key responsibilities include day to day SLA management, Client management, People Management, team performance, process improvement, interacting with client & business managers and ISU stakeholders. Strong analytical and MS Excel skills required, including a thorough understanding of how to interpret customer business needs to achieve desired results. The role would entail communication with internal senior stakeholders to keep them apprised of day to day delivery progress, risk / mitigation and participate in weekly / monthly review calls. Required Skills: Good Knowledge of IAM / Access Provisioning. Good knowledge of Windows Active Directory Knowledge of Workflow systems like Service Now Knowledge of Access Reviews/Re Certification Process Basic working knowledge or have worked with CyberArk and related IAM tools Analytical mindset and eye for details Excellent MS Office application knowledge (excel, power point, word etc.). Logical reasoning and problem solving abilities. Delivery Management (SLA Management, People Management , Client Management) Six Sigma Green Belt certified • Good understanding of Process improvement and Quality improvement methodologies • Ability to understand customer requirements. • Ability to work with minimal supervision and prioritize workload to meet deadlines. • Working both independently and in a team-oriented, collaborative environment across multiple locations is essential. Job Description • Key responsibility is to manage day to day deliverables as per contractual requirement. • Ensure SLA across multiple towers are met. • Ensure effective communication with all key stakeholders (Client, Team members, Sr management). • Identifying process risk and related mitigation plan. • Identify process improvement areas and work with T&I (Automation team) team as applicable to implement it. • Quality monitoring / CSS implementation.
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: : Privilege Password Management CyberArk Experience: 5-8 Years
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: : Privilege Password Management CyberArk Experience: 5-8 Years
Posted 3 weeks ago
2.0 - 5.0 years
8 - 13 Lacs
Pune
Work from Office
Project description You'll be working in control sustainability ( AC5, AC22) Team in Pune. The team is currently made up of approximately 12 dedicated staff. We focus on sustainability of the various platforms. Also we act as a consultant and On-boarding analyst for the teams who interested to move the PU/HPU accounts into CyberArk. Responsibilities Provide consultancy for our IT Security systems and their interfaces. Define scope and process to on-board applications and provide guidance for any migrations required Gather requirements needed to on-board applications to the Security platforms. Identify and document the main Stakeholders and other sources (e.g. existing systems, regulations) for said requirements Understand Business Applications and requirements advising how to integrate them into the Security Infrastructure (Identity & Access Management systems, CyberArk, etc) Prepare user interface mock-ups, create end-user documentation, work flow processes, data templates as well as release guides, when required Evaluate existing processes and optimize them in terms of efficiency and risk mitigation Skills Must have Knowledge of CyberArk and a good understanding of Security IT principles Strong analytical, problem-solving and synthesizing skills with the ability to manage own time effectively and efficiently Proven record in an Infrastructure/Technical Business Analyst role. Strong business analysis skills (especially documentation of business, functional and non-functional requirements) with a proven record of project participation and delivery. Good Microsoft Office skills (Excel, Access) and basic SQL knowledge Proven ability to work in a large enterprise environment. Experience working in complex organization is a clear asset Excellent communication and interpersonal skills Ability to explain complicated technical matters clearly and concisely to less technical colleagues as well as to work with demanding stakeholders Nice to have N/A
Posted 3 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 3-5 Years.
Posted 3 weeks ago
5.0 - 9.0 years
0 Lacs
pune, maharashtra
On-site
You will be responsible for maintaining and updating technology and platform solutions in Eaton's Identity and Access Management space. This involves addressing both business and technical requirements while leveraging standard principles and patterns. Your primary focus will be on supporting all IAM applications including Azure, Modern Identity Governance Solution (e.g. Sailpoint, Saviynt), CyberArk, BeyondTrust, and PKI. Your duties will include investigating, analyzing, diagnosing, recovering, and monitoring various technology applications/platform-related incidents, performing Root Cause Analysis, and executing the standard Problem Management process. You will collaborate with other IT support teams and key suppliers to resolve issues and escalate when necessary. Identifying gaps in monitoring and potential impact on service delivery will be part of your responsibilities. Additionally, you will work across functions to deliver technology and platform solutions that meet customer requirements, providing solution options and highlighting operational or security risks. Tuning and configuring technologies and platforms to meet customer and operational requirements will also be essential. Coordinating and regularly updating technology, platform, and documentation to ensure operational health and security will also fall under your purview. Lastly, you will support access provisioning and certification processes to ensure regulatory compliance and operational efficiency. Qualifications: - Bachelors or Associates degree from an accredited institution, or equivalent experience - Minimum of 5-7 years in Identity and Access Management Skills: - Experience in Identity and Access Management solutions and technologies - Proficiency in cloud access management tools - Hands-on experience with IAM applications such as Okta, Sailpoint, Saviynt, and CyberArk - Implementing and troubleshooting SAML and OIDC/Oauth integrations - Knowledge of SCIM protocol usage - Configuring Azure AD SSO using Modern auth protocols-SAML and OIDC/Oauth - Troubleshooting Synchronization Issues, Configuring Identity Governance policies, Configuring MFA and Conditional Access policies - Understanding of Modern SSO standards and ability to describe their flows/characteristics - Active Directory administration and integration expertise - Familiarity with LDAP standards and techniques for managing privileged access - Integration to Identity Governance solutions such as Saviynt and Sailpoint - Proficiency in web access management troubleshooting tools and API scripting tools - Experience in Development, Automation, or Scripting - Data Analysis and Integration skills (ETL, SQL, etc.) Nice To Have Experience In: - Public Key Infrastructure (PKI) Architecture and operation, Code Signing, Root CA - Web Development (Javascript, CSS, Java, Python, Ruby, Go, .Net, PHP) - Directory Server (AD or LDAP) - Okta + Zscaler integration - CyberArk EPM and Core PAS experience - BeyondTrust EPM experience - IaaS / PaaS access management - Java Development / SDLC management processes - ServiceNow integrations - ITIL certification or knowledge of best practices - Identity Governance topics like identity lifecycle, role-based access, ABAC, certification, access request workflows, SoD, audit Other Requirements: - Proven ability to communicate clearly and concisely - Excellent proficiency with the English language (written and verbal) - Strong analytical and problem-solving skills - Effective Time Management ,
Posted 3 weeks ago
3.0 - 5.0 years
8 - 12 Lacs
Pune, Bengaluru
Work from Office
Technical Skills Required: CyberArk Administration: Act as the secondary support for CyberArk administration, including managing and maintaining the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and other related components. Assist in the provision, rotation, and de-provision of privileged credentials within CyberArk. Support day-to-day operations, monitoring, and maintenance of the CyberArk environment. Collaborate with the primary CyberArk administrators to ensure alignment with organizational security policies and best practices. Support and Troubleshooting: Respond to and resolve support tickets, incidents, and requests in a timely and efficient manner, documenting steps and solutions. Perform root cause analysis for recurring issues and provide recommendations for resolution and improvement. Understanding of ITIL processes Ability to work with multiple stakeholders from Security, Operations, Application Owners and Service Providers on deployment activities and enhancing the IAM solution. Knowledge of Operating systems, Database concepts and other potential targets or endpoints for a typical IAM Solution. Good presentation and documentation skills
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough