Jobs
Interviews

309 Cyberark Jobs - Page 5

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 11.0 years

5 - 9 Lacs

Mumbai

Work from Office

About The Role Skill required: Marketing Operations - Digital Project Management Designation: Digital Content Management Specialist Qualifications: Any Graduation Years of Experience: 7 to 11 years About Accenture Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Technology and Operations services, and Accenture Song all powered by the worlds largest network of Advanced Technology and Intelligent Operations centers. Our 699,000 people deliver on the promise of technology and human ingenuity every day, serving clients in more than 120 countries. Visit us at www.accenture.com What would you do Help balance increased marketing complexity and diminishing marketing resources. Drive marketing performance with deep functional and technical expertise, while accelerating time-to-market and operating efficiencies at scale through Data and Technology, Next Generation Content Services, Digital Marketing Services & Customer Engagement and Media Growth Services.Role requires Digital Marketing Ads & Promotion creation/designOverseeing the planning, execution, and delivery of projects that primarily rely on digital tools and technologies. It encompasses managing tasks, resources, timelines, and communication channels to ensure successful project outcomes in the digital realm. What are we looking for Strong understanding of ecommerce ecosystems and product data standards.Ability to drive cross-functional meetings with creative, QA, analytics, and tech teams.Experience handling client interactions, escalations, and stakeholder expectations.Clear communication style and ability to translate technical actions into business outcomes.3+ years of project management experience in digital marketing, content operations, or syndication.Proven experience working with syndication platforms (Salsify, Syndigo, Alkemics, 1WorldSync, etc.).Strong knowledge of PIM, DAM, and ecommerce content processes.Skilled in project tracking tools (Workfront, Smartsheet, JIRA, or MS Project).Excellent stakeholder management, written and verbal communication skills.Ability to manage distributed teams across geographies.Familiarity with retailer and marketplace requirements (Amazon, Walmart, Target, etc.).Strong analytical mindset with ability to interpret metrics, drive reporting, and derive insights. Roles and Responsibilities: Lead the planning, execution, and monitoring of syndication projects across multiple markets and categories.Define project scope, timelines, dependencies, and resource allocation for syndication activities.Manage coordination between content creators, DAM librarians, QA teams, retailers, and tech teams.Own delivery timelines for syndication across retailers like Amazon, Walmart, Carrefour, etc.Ensure compliance with brand standards, retailer-specific content requirements, and PIM/DAM processes.Monitor the syndication lifecycle:content readiness, asset upload, QA validation, go-live status, and updates.Track KPIs such as live SKU %age, TAT, defect rate, and drive continuous improvement.Provide weekly dashboards, RCA reports, and drive client governance calls and escalations.Identify opportunities to automate, templatize, or streamline syndication workflows. Qualification Any Graduation

Posted 3 weeks ago

Apply

3.0 - 8.0 years

6 - 10 Lacs

Chennai

Work from Office

Support for the technical IAM Infrastructure (Sailpoint): is a position to maintain and monitor the infrastructure, ensure that the applications are up and running and manage incidents and requests. Responsibilities Direct Responsibilities Infrastructure Maintenance Ensure the IAM infrastructure (SailPoint/ ETAC/ LDAP IDM) is available and functional with a daily Monitoring check Check and remediation: exploration errors, Authorization, Servers integration Provisioning check and remediation on servers to meet KPI expectations Infrastructure/ Application availability & monitoring Incident Management: First user contact: Support users in the resolution of incidents (ServiceNow/Email) Incident analysis and resolution Entry point for Expert escalation Contribution to continuous production optimization (curative and preventive) Service Requests management: Support people of end user queries (ServiceNow/Email) Strong hands-on experience on Web and Application servers Provide technical leadership and Propose improvements related to the support activity (job performance, service request, production incidents) Good knowledge on Incident/Change/Problem management process (ServiceNow). Have good knowledge on setting up monitoring of servers through Dynatrace tools Contributing Responsibilities Contribute to the knowledge transfer with Paris OPS teams Contribute to the definition of procedures and processes necessary for the team Help build team spirit and integrate into BNP Paribas culture Contribute to the regular activity reporting and KPI calculation Contribute to continuous improvement actions Contribute to the acquisition by ISPL team of new skills & knowledge to expand its scope Technical & Behavioral Competencies Knowledge of ITIL General IT infrastructure knowledge Strong infrastructure skills Cloud & OPEN (OS Linux RHEL, Windows Server, Middleware, etc.) Particular knowledge and experience with IAM tool: SAILPOINT/ Cyberark - Entreprise Password vault Good written and spoken English French speaking will be appreciated Measure and identify areas for improving Quality and overall Delivery Able to communicate efficiently Good Team Player Specific Qualifications (if required) Strong infrastructure skills Cloud & OPEN (OS Linux RHEL, Windows Server, Middleware, etc.) SailPoint expertise. LDAP IDM knowledge nice to have Strong interest in Incident Management with analytical and investigative skills Skills Referential Behavioural Skills : (Please select up to 4 skills) Adaptability Ability to collaborate / Teamwork Client focused Attention to detail / rigor Transversal Skills: Analytical Ability Ability to understand, explain and support change Ability to manage a project Ability to develop and adapt a process Ability to develop others & improve their skills Education Level: Master Degree or equivalent Experience Level At least 3 years

Posted 3 weeks ago

Apply

3.0 - 8.0 years

15 - 25 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Role & responsibilities 1. Strong experience in CyberArk 2. Experience in Implementation PAM 3. certification Defender OR PAM is Manatory

Posted 3 weeks ago

Apply

6.0 - 10.0 years

14 - 19 Lacs

Noida, Hyderabad

Work from Office

R1 RCM Inc. is a leading provider of technology-enabled revenue cycle management services that transform and solve challenges across health systems, hospitals, and physician practices. Headquartered in Chicago, R1 is a publicly traded organization with employees throughout the US and other international locations. Our mission is to be the one trusted partner to manage revenue, so providers and patients can focus on what matters most. Our priority is to always do what is best for our clients, patients, our employees, and the communities we operate in. With our proven and scalable operating model, we complement a healthcare organizations infrastructure. quickly driving sustainable improvements to net patient revenue and cash flows. while reducing operating costs and enhancing the patient experience. Our approach to building software is disciplined and quality-focused with an emphasis on creativity, craftsmanship and commitment. We are looking for smart, quality-minded individuals who want to be a part of a high functioning, dynamic global team. Position Summary A PAM Engineer plays a critical role in managing and configuring R1s Privileged Access Management (PAM) platform and workflows. As a subject matter expert on PAM systems and workflows, a PAM Engineer ensures continued function and inter-operability between PAM systems and identity providers within the environment. Additionally, the PAM Engineer plans, coordinates, and executes new PAM implementations throughout the organization with both organic and non-organic growth. Essential Responsibilities Interface with the organization to manage intake projects for new PAM implementations, including adding new environments or domains, adding controls to existing resources, and expanding the scope of users within PAM controls. Document all new processes, including developing SOPs for UAA and product documentation for the IAM Platform team, continually ensuring accurate and up-to-date information is available for all target audiences. Managing configuration of PAM systems and monitoring their usages and effectiveness. Coordinate with vendors as needed to expedite solutions, issues, or projects. Providing Tier 1 & Tier 2 troubleshooting for issues with PAM Systems and workflows. Continually analyze data from multiple sources to identify efficiencies or issues with data, workflows, and processes. Interface with the UAA team to transfer knowledge and transition new workflows. Interface with IAM Platform team to communicate/translate business needs into actions for the Platform Team to manage. Skills Excellent communication skills, both oral and written, with the ability to communicate effectively to customers, peers, and organizational leaders especially in communicating technical concepts. Demonstrated logical thought processes must have the ability to quickly learn new technologies, systems, concepts and procedures, and ability to utilize reports and data to improve operational results. Experience in merging normalized and non-normalized data from multiple sources for analytical and targeted review. Experience in configuring and installing vault technologies such as Delinea secret server, Thycotic Experience with Privileged Access Management concepts, controls, and best practices. Knowledge of data processing systems, concepts, and methodologies. Highly motivated and able to work autonomously as well as a part of a team. Other Qualifications Proficient computer skills (including, but not limited to, spreadsheets, Internet, and email) are required. Associate or bachelors Degree or equivalent professional experience preferred. Strong knowledge of Windows/Linux administration. Understanding incident and change management process Demonstrated understanding of scripting and automation with PowerShell/Python a plus r1rcm.com Facebook

Posted 3 weeks ago

Apply

2.0 - 7.0 years

3 - 7 Lacs

Bengaluru

Work from Office

Educational Intergrated course BCA+MCA,Bachelor of Engineering,BCA,BSc,MCA,Bachelor Of Technology,Master Of Technology,Master Of Engineering Service Line Cyber Security Responsibilities A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment You will explore the alternatives to the recommended solutions based on research that includes literature surveys, information available in public domains, vendor evaluation information, etc. and build POCs You will create requirement specifications from the business needs, define the to-be-processes and detailed functional designs based on requirements. You will support configuring solution requirements on the products; understand if any issues, diagnose the root-cause of such issues, seek clarifications, and then identify and shortlist solution alternatives You will also contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Ability to work with clients to identify business challenges and contribute to client deliverables by refining, analyzing, and structuring relevant data Awareness of latest technologies and trends Logical thinking and problem solving skills along with an ability to collaborate Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Technical and Professional : Primary skills:AWS DevOps,Cloud Security-AWS Security,Cloud Security-Azure Security,GRC,IDAM-Cyberark,Infrastructure Security-Email Security,Technology-Enterprise Mobility Solution-MS Azure AD, MS Azure RMS, MS Intune,Technology-Finacle-Core-RAS-CASA TD-Advance,Technology-Identity Management-Identity Governance Framework, Attestation,Access Cert, Role Mgmt,Auditing,Entitlement Mgmt, XACML,Technology-Identity Management-Identity,Account Provisioning and Reconciliation, SPML,Technology-Infrastructure-Server Administration-Active Directory Preferred Skills: GRC AWS DevOps Cloud Security-AWS Security Cloud Security-Azure Security IDAM-Cyberark Infrastructure Security-Email Security Technology-Identity Management-Identity Governance Framework Attestation/Access Cert Role Mgmt Auditing Entitlement Mgmt XACML-Sailpoint Identity IQ Technology-Identity Management-Identity/Account Provisioning and Reconciliation SPML-Sailpoint Identity IQ Technology-Infrastructure-Server Administration-Active Directory Technology-Enterprise Mobility Solution-MS Azure AD MS Azure RMS MS Intune Technology-Cloud Security-Microsoft Azure - Identity Management-Azure Active Directory

Posted 3 weeks ago

Apply

2.0 - 7.0 years

6 - 10 Lacs

Bengaluru

Work from Office

Educational Intergrated course BCA+MCA,Bachelor of Engineering,BCA,BSc,MCA,Bachelor Of Technology,Master Of Technology,Master Of Engineering Service Line Cyber Security Responsibilities A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment You will explore the alternatives to the recommended solutions based on research that includes literature surveys, information available in public domains, vendor evaluation information, etc. and build POCs You will create requirement specifications from the business needs, define the to-be-processes and detailed functional designs based on requirements. You will support configuring solution requirements on the products; understand if any issues, diagnose the root-cause of such issues, seek clarifications, and then identify and shortlist solution alternatives You will also contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Ability to work with clients to identify business challenges and contribute to client deliverables by refining, analyzing, and structuring relevant data Awareness of latest technologies and trends Logical thinking and problem solving skills along with an ability to collaborate Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Technical and Professional : Primary skills:IDAM-Cyberark,IDAM-Okta,IDAM-Oracle Identity Manager(OIM),IDAM-Ping/Federate,IDAM-Sailpoint,Technology-Identity Management-IDAM-Design , work flow , Implementation,Technology-Identity Management-Identity Management - ALL,Technology-Identity Management-Identity,Account Provisioning and Reconciliation, SPML Preferred Skills: IDAM-Oracle Identity Manager(OIM) IDAM-Sailpoint IDAM-Cyberark IDAM-Ping/Federate IDAM-Okta Technology-Identity Management-Identity Management - ALL Technology-Identity Management-Identity/Account Provisioning and Reconciliation SPML-Microsoft Forefront Identity Manager Technology-Identity Management-IDAM-Design work flow Implementation

Posted 3 weeks ago

Apply

2.0 - 5.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Educational Bachelor of Engineering,Bachelor Of Technology,Bachelor Of Comp. Applications,Master Of Technology,Master Of Engineering,Master Of Comp. Applications,Master of Science (Technology) Service Line Cyber Security Responsibilities A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment You will explore the alternatives to the recommended solutions based on research that includes literature surveys, information available in public domains, vendor evaluation information, etc. and build POCs You will create requirement specifications from the business needs, define the to-be-processes and detailed functional designs based on requirements. You will support configuring solution requirements on the products; understand if any issues, diagnose the root-cause of such issues, seek clarifications, and then identify and shortlist solution alternatives You will also contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Ability to work with clients to identify business challenges and contribute to client deliverables by refining, analyzing, and structuring relevant data Awareness of latest technologies and trends Logical thinking and problem solving skills along with an ability to collaborate Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Technical and Professional : Primary skills:Technology-Identity Management-IDAM-Design , work flow , Implementation,Technology-Identity Management-Identity Governance Framework, Attestation,Access Cert, Role Mgmt,Auditing,Entitlement Mgmt, XACML,Technology-Identity Management-Identity Management - ALL,Technology-Oracle Industry Solutions-Retail Application Admin Preferred Skills: Technology-Identity Management-Identity Governance Framework Attestation/Access Cert Role Mgmt Auditing Entitlement Mgmt XACML-Forgerock Identity Manager Technology-Identity Management-Identity Management - ALL Technology-Identity Management-IDAM-Design work flow Implementation-Okta Technology-Oracle Industry Solutions-Retail Application Admin-Oracle Identity Manager (OIM)

Posted 3 weeks ago

Apply

2.0 - 5.0 years

5 - 8 Lacs

Bengaluru

Work from Office

Educational Bachelor of Engineering,BTech,BSc,BCA,Master Of Engineering,MTech,MSc,MCA Service Line Cyber Security Responsibilities As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment Technical and Professional : Primary skills:AWS DevOps,Cloud Security-AWS Security,Cloud Security-Azure Security,Devops-Google Cloud Ptatform (GCP),GRC,GRC-RSA Archer(e-GRC),IDAM-Cyberark,IDAM-IBM Security Identity manager(ISIM),IDAM-Okta,IDAM-Oracle Identity Manager(OIM),IDAM-Ping/Federate,IDAM-Sailpoint,Infrastructure Security-Email Security,Network Security,Network Security-Firewalls-Checkpoint,Network Security-Firewalls-Juniper-Firewalls,Network Security-Firewalls-Palo Alto,Network Security-Firewalls-Web Application Firewall(WAF),Network Security-Load Balancer-F5,Technology-Identity Management-IDAM-Design , work flow , Implementation,Technology-Identity Management-Identity Governance Framework, Attestation,Access Cert, Role Mgmt,Auditing,Entitlement Mgmt, XACML,Technology-Identity Management-Identity,Account Provisioning and Reconciliation, SPML,Tools-Splunk Preferred Skills: Technology-Identity Management-Identity Management - ALL Technology-Identity Management-Privileged User Management-Novell NetIQ Privilege User Manager Technology-Enterprise Mobility Solution-MS Azure AD MS Azure RMS MS Intune

Posted 3 weeks ago

Apply

5.0 - 9.0 years

8 - 12 Lacs

Bengaluru

Work from Office

Educational Bachelor of Engineering,BTech,BCA,Bachelor Of Computer Science,MCA,Master of Computer Science,Master Of Engineering,Bachelor Of Technology,Master Of Technology Service Line Cyber Security Responsibilities A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to get to the heart of customer issues, diagnose problem areas, design innovative solutions and facilitate deployment resulting in client delight. You will develop a proposal by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise. You will plan the activities of configuration, configure the product as per the design, conduct conference room pilots and will assist in resolving any queries related to requirements and solution design You will conduct solution/product demonstrations, POC/Proof of Technology workshops and prepare effort estimates which suit the customer budgetary requirements and are in line with organization’s financial guidelines Actively lead small projects and contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Ability to develop value-creating strategies and models that enable clients to innovate, drive growth and increase their business profitability Good knowledge on software configuration management systems Awareness of latest technologies and Industry trends Logical thinking and problem solving skills along with an ability to collaborate Understanding of the financial processes for various types of projects and the various pricing models available Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Client Interfacing skills Project and Team management Technical and Professional : Primary skills:IDAM,IDAM-Cyberark,IDAM-Forgerock,IDAM-Microsoft Identity manager,IDAM-Okta,IDAM-Oracle Access Manager(OAM),IDAM-Oracle Identity Manager(OIM),IDAM-Ping/Federate,IDAM-Sailpoint,IDAM-Saviyant,Technology-Access Management-Desktop,Federated,Web based SSO, Kerberos, SAML,Technology-Identity Management-IDAM-Design , work flow , Implementation,Technology-Identity Management-Identity Governance Framework, Attestation,Access Cert, Role Mgmt,Auditing,Entitlement Mgmt, XACML,Technology-Identity Management-Identity,Account Provisioning and Reconciliation, SPML Preferred Skills: IDAM IDAM-Oracle Identity Manager(OIM) IDAM-Oracle Access Manager(OAM) IDAM-Sailpoint IDAM-Cyberark IDAM-Ping/Federate IDAM-Forgerock IDAM-Microsoft Identity manager IDAM-Okta IDAM-Saviyant Technology-Access Management-Desktop/Federated/Web based SSO Kerberos SAML-Forgerock Open AM Technology-Identity Management-Identity Governance Framework Attestation/Access Cert Role Mgmt Auditing Entitlement Mgmt XACML-Sailpoint Identity IQ Technology-Identity Management-Identity/Account Provisioning and Reconciliation SPML-Sailpoint Identity IQ Technology-Identity Management-IDAM-Design work flow Implementation-Saviynt

Posted 3 weeks ago

Apply

2.0 - 7.0 years

7 - 10 Lacs

Hubli

Work from Office

Educational Bachelor of Engineering,BTech,BCA,Bachelor Of Computer Science,MCA,Master of Computer Science Service Line Cyber Security Responsibilities A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment You will explore the alternatives to the recommended solutions based on research that includes literature surveys, information available in public domains, vendor evaluation information, etc. and build POCs You will create requirement specifications from the business needs, define the to-be-processes and detailed functional designs based on requirements. You will support configuring solution requirements on the products; understand if any issues, diagnose the root-cause of such issues, seek clarifications, and then identify and shortlist solution alternatives You will also contribute to unit-level and organizational initiatives with an objective of providing high quality value adding solutions to customers. If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Ability to work with clients to identify business challenges and contribute to client deliverables by refining, analyzing, and structuring relevant data Awareness of latest technologies and trends Logical thinking and problem solving skills along with an ability to collaborate Ability to assess the current processes, identify improvement areas and suggest the technology solutions One or two industry domain knowledge Technical and Professional : Primary skills:Domain-Network-Network Security Firewall & Policies,IDAM,IDAM-Cyberark,IDAM-Forgerock,IDAM-Microsoft Identity manager,IDAM-Okta,IDAM-Oracle Access Manager(OAM),IDAM-Oracle Identity Manager(OIM),IDAM-Ping/Federate,IDAM-Sailpoint,IDAM-Saviyant,Technology-Application Security-Application Security - ALL,Technology-Enterprise Mobility Solution-MS Azure AD, MS Azure RMS, MS Intune,Technology-Finacle-Core-Payments-Faster Payment Service-Advance,Technology-Infrastructure Security-Security Incident and Event Management (SIEM),Technology-Network-CISCO technologies,Technology-Network-Firewall_and_Media-Palo Alto Preferred Skills: IDAM IDAM-Oracle Identity Manager(OIM) IDAM-Oracle Access Manager(OAM) IDAM-Sailpoint IDAM-Cyberark IDAM-Ping/Federate IDAM-Forgerock IDAM-Microsoft Identity manager IDAM-Okta IDAM-Saviyant Domain-Network-Network Security Firewall & Policies Technology-Application Security-Application Security - ALL Technology-Infrastructure Security-Security Incident and Event Management (SIEM)-Splunk Technology-Network-CISCO technologies Technology-Enterprise Mobility Solution-MS Azure AD MS Azure RMS MS Intune Technology-Network-Firewall_and_Media-Palo Alto Technology-Cloud Security-AWS - GRC

Posted 3 weeks ago

Apply

4.0 - 7.0 years

8 - 13 Lacs

Navi Mumbai

Work from Office

Role & responsibilities Cyber Security Engineer Preferred candidate profile EDR /XDR , PAM , VA Specialist , MDM would be added advantage , Good knowledge of SIEM.

Posted 3 weeks ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Bengaluru

Work from Office

FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity " The Security Engineer is a highly visible and critical role, collaborating on complex cloud and corporate service edge protection technologies and oversight. With your proven history of technical knowledge of identity and access management systems and services you will be working on a variety of different challenges facing the organization. You will provide both guidance and direct input to help ensure a secure, well-protected environment that complies with all applicable security standards ". Director, Cyber Security. What Youll Contribute Assist with implementation of security tools and services to enhance the oversight and governance of all company identities. Assist with implementation of identity governance and administration (IGA) solutions for the company. Implement identity security detections using next-gen Identity Threat Detection and Response (ITDR) and Non-Human Identity (NHI) platforms and tools. Create automated tooling to test identity systems to ensure detections work as designed. Create automation to produce automated policy and posture collection and reporting, to allow for identity-specific proofs managed within Infrastructure as Code. Create pipelines to deploy and manage IAM solutions and tooling. Provide engineering and technical guidance for supporting the automation of interacting with security tools and services that support the IAM program within the company. Keep current on emerging security technologies and tools and provide recommendations. Support our compliance and certification initiatives and design with those in mind. Collaborate with other engineers on design, analysis, architecture, implementation, pen-testing, security reviews and process enhancements. What Were Seeking 2-4 years in a security role, preferably in financial services or technology. Experience in securing hybrid network infrastructure services. Expertise in security, identity, architecture, and design. Hands-on experience with AWS, Azure, or other cloud platforms and IAM best practices. 2-4 years of experience with privileged access management tools (CyberArk, SailPoint, Delinea). Experience with Okta preferred. Proficiency in identity-related technologies and protocols (LDAP, SAML, OAuth, OIDC). Experience with identity provider services (Active Directory, AWS IAM, Okta). Familiarity with Zero Trust security models (Zscaler, AWS networking). Knowledge of Identity Governance Administration services. Experience with automation scripting and API integrations. Familiarity with DevOps concepts, IaC tools, and CI/CD pipelines. Proficiency in at least one high-level language (e.g., Python). Understanding of compliance frameworks (PCI-DSS, ISO 27001, NIST). Certifications like CISSP, AWS Security Specialty, or Azure SC-300 preferred. Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at www.fico.com/Careers FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at https://www.fico.com/en/privacy-policy

Posted 3 weeks ago

Apply

5.0 - 8.0 years

8 - 12 Lacs

Hyderabad

Work from Office

Be responsible for maintaining, and uplifting IAM PAM control Collaborate with business units and IT teams, to gather requirements and ensure smooth project execution. Experience of working in a regulated environment with exposure to global regulatory requirements, including GDPR, SOX, PCI DSS, and ISO 27001. Lead cross-functional teams, work alongside project managers, control owners, business analysts, and technical specialists. Foster collaboration and resolve conflicts to maintain project momentum. Continuously evaluate processes and propose enhancements to improve efficiency, scalability, and security.. Identify, assess, and mitigate risks throughout the project lifecycle. Project initiation, planning, execution, monitoring, and closure documentation including but not limit project charter, project plan, various status report, performance report and project closeout report. Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years.

Posted 3 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Coimbatore

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.

Posted 3 weeks ago

Apply

8.0 - 10.0 years

17 - 20 Lacs

Bengaluru

Work from Office

Required Skills and Competencies: A minimum of 8-10 years of experience with Information Security or in a technology related field, preferably on Identity and Access Management domain Must have expertise with BeyondTrust PAM solution including requirement, design and implementation Bachelor s degree from an accredited college/university or equivalent professional experience Experience implementing at least two of the following PAM solutionsBeyondTrust PAM and any of the other PAM products like Beyond Trust CyberArk, Centrify, Thycotic, Hitachi ID, Delinea . Hands on experience installing and configuring BeyondTrust PAM components like Vault, resource broker, application servers etc. Integration experience of PAM solution with at least three or more out of on-prem servers, AWS, Azure, GCP, SaaS Applications, Web Application, Network Devices (Firewall/Switches/Routers), Active Directory (multiple domain setup), Databases Architect and design technology components such as deployment architecture, resource broker, application servers, Vault, access control based on certain privileges etc Knowledge on platform security, administration, and management, such as Linux/UNIX / Windows system administration Exceptional written and verbal communication skills, including the ability to produce quality documentation Ability to work both independently and in a team-oriented, collaborative environment Ability to think strategically, evaluate and resolve customer problems WHAT YOU BRING Lead requirement gathering sessions with stakeholders and propose solutions following best practices of PAM Lead PAM design, implementation, and deployment Provide support for production PAM infrastructure systems and processes Operate as a technical subject matter expert in the PAM space Mentor and coach junior resources within the team Applications from people with disabilities are explicitly welcome.

Posted 3 weeks ago

Apply

5.0 - 10.0 years

6 - 9 Lacs

Kochi

Work from Office

Key Roles& Responsibilities Includes Integrating various platforms with PAM solution like Delinea (earlier Thycotic) /CyberArk, such as different LDAP providers, Windows Servers, UNIX Servers, Databases and networking Devices; Experience with Windows/ UNIX platforms in large heterogeneous environment; 3.5 + Years of strong hands on experience in Delinea (earlier Thycotic) CyberArk/Beyond Trust solutions and 6+ years of overall Cybersecurity experience; Central Policy Manager (CPM) policies management or redistribution. Strong experience using PSM connectors/ customization Interpretation and analysis of security standards and baselines. Extensive experience with digital password vaulting solutions; Experience with human versus non-human (service) accounts; Ability to document installation procedures, Standard Operating Procedures (SOP), etc; Create security reports used for troubleshooting and problem resolution; Perform health check monitoring on all CyberArk severs to ensure consistent availability of system to end user; Test and certify new product versions, bug fix and provide detailed reports; Responsible for Privileged User account administration of various Windows and UNIX accounts using CyberArk components; Creating and Managing Safes, Platforms and Owners; Assist architects/engineers to collect data and generate reports per specifications; Maintain Security tool FAQ and Support Documentation; Experience of LDAP (server and client), NIS, NIS+, PAM; Understanding typical Enterprise Change Management processes; Incident Response & Troubleshooting: Act as a subject matter expert in identifying, analysing, and resolving security incidents related to privileged access management, ensuring minimal disruption to business operations. Collaboration & Decision-Making: Engage in key decision-making processes, providing subject-matter expertise and recommendations to senior management, while collaborating across teams to define and implement security best practices. Cross-functional Collaboration: Work closely with IT, DevOps, and other cross-functional teams to ensure a seamless integration of security measures into system architecture and business processes. Cyber Threat Monitoring: Stay abreast of the latest cybersecurity trends, threats, and vulnerabilities to ensure security solutions are up-to-date and can mitigate emerging risks. Mentorship & Leadership: Provide technical leadership and guidance to junior engineers, fostering a culture of continuous improvement and knowledge sharing to enhance the team's overall performance and capabilities. CyberArk Platform certification preferred. Basic understanding of high-availability (HA) and failover im plementations for network infrastructure and server systems;

Posted 3 weeks ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

Noida

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitate the transition to cloud security-managed operations, ensuring that all security measures align with organizational objectives and compliance standards. You will engage in discussions to refine security strategies and provide guidance on best practices, contributing to a secure and efficient cloud environment. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and maintain comprehensive documentation of security architecture and frameworks.- Conduct regular assessments of cloud security controls to ensure effectiveness and compliance. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Strong understanding of cloud security principles and best practices.- Experience with identity and access management solutions.- Familiarity with regulatory compliance frameworks such as GDPR, HIPAA, or PCI-DSS.- Ability to analyze security incidents and implement corrective actions. Additional Information:- The candidate should have minimum 5 years of experience in CyberArk Privileged Access Management.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

9.0 - 14.0 years

12 - 16 Lacs

Gurugram

Work from Office

Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : CyberArk Privileged Access Management Good to have skills : No Technology SpecialtyMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for an experienced CyberArk PAM Specialist to design, implement, and support CyberArk Privileged Access Management PAM solution. Roles and Responsibilities:1. Define, design, and implement CyberArk Privilege Cloud-SaaS.2. Install and configure cloud connectors.3. Configure MFA, SAML, LDAP, SIEM integration4. Troubleshoot and resolve CyberArk related technical issues.5. Work closely with application teams to onboard different types to systems to CyberArk6. Generate custom CPM, PSM plugins if required7. Support application onboarding, including access policies, group assignments, and role management.8. Communicate effectively with business teams, external clients, and solution providers.9. Document technical designs, solutions, and implementation plans.10. Work independently and take ownership of technical deliverables. Professional & Technical Skills: 1. Strong experience in CyberArk P-cloud, Conjure Secrets Management, CyberArk PAM-Vault, CPM, PVWA, AAM2. Solid understanding of security standards and protocols including SSO, MFA, SAML, OAuth, OIDC, LDAP, RADIUS, and Kerberos.3. Proficient in CyberArk and related technologies. Experience in system administration, scripting UNIX, Linux scripting, Rest API, LDAP directories, Active Directory4. Experience in providing guidance in CyberArk strategy; must have PAM deep dive experience.5. Strong understanding of PAM Architecture, deployment methodologies and best practices.6. Effective at presenting information to different audiences at the correct level of detail e.g. from engineering teams to executive management.7. Be a product and domain expert in PAM domain experienced in conducting environment assessments and health checks in line with best practices.8. Strong troubleshooting and problem-solving skills.9. Experience in EPM is desirable but not mandatory10. Excellent verbal and written communication skills.11. Ability to work independently on technical tasks and client engagements.12. Candidate must be an independent self-starter able to perform all deployment activities with oversight and as a member of a project team.13. Candidate must have Sentry Certification. Nice to have CyberArk CDE14. Good to Have Skills Thycotic Delinea, Beyond Trust, HashiCorp Vault Additional Information:1. 9+ years experience related to designing, deploying, and configuring PAM solutions, or 6+ years direct PAM consulting experience.2. Candidate must have completed 16 years of full-time education.3. This position is open to all Accenture locations. Qualification 15 years full time education

Posted 3 weeks ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

Hyderabad

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitating the transition to cloud security-managed operations. You will engage in discussions to align security strategies with organizational objectives, ensuring that all security measures are effectively integrated into the cloud environment. Your role will also require you to stay updated on the latest security trends and technologies to enhance the overall security posture of the organization. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and maintain comprehensive documentation of security architecture and controls.- Conduct regular assessments and audits to ensure compliance with security policies and standards. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Strong understanding of cloud security principles and best practices.- Experience with identity and access management solutions.- Familiarity with regulatory compliance frameworks such as GDPR, HIPAA, or PCI-DSS.- Ability to analyze and mitigate security risks in cloud environments. Additional Information:- The candidate should have minimum 5 years of experience in CyberArk Privileged Access Management.- This position is based at our Hyderabad office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

9.0 - 14.0 years

12 - 16 Lacs

Gurugram

Work from Office

Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : CyberArk Privileged Access Management, No Technology Specialty Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for an experienced CyberArk PAM Specialist to design, implement, and support CyberArk Privileged Access Management (PAM) solution. Roles and Responsibilities:1. Define, design, and implement CyberArk Privilege Cloud (SaaS).2. Install and configure cloud connectors.3. Configure MFA, SAML, LDAP, SIEM integration4. Troubleshoot and resolve CyberArk related technical issues.5. Work closely with application teams to onboard different types to systems to CyberArk6. Generate custom CPM, PSM plugins if required7. Support application onboarding, including access policies, group assignments, and role management.8. Communicate effectively with business teams, external clients, and solution providers.9. Document technical designs, solutions, and implementation plans.10. Work independently and take ownership of technical deliverables. Professional & Technical Skills: 1. Strong experience in CyberArk P-cloud, Conjure Secrets Management, CyberArk PAM (Vault, CPM, PVWA, AAM)2. Solid understanding of security standards and protocols including SSO, MFA, SAML, OAuth, OIDC, LDAP, RADIUS, and Kerberos.3. Proficient in CyberArk and related technologies. Experience in system administration, scripting (UNIX, Linux scripting), Rest API, LDAP directories, Active Directory4. Experience in providing guidance in CyberArk strategy; must have PAM deep dive experience.5. Strong understanding of PAM Architecture, deployment methodologies and best practices.6. Effective at presenting information to different audiences at the correct level of detail (e.g., from engineering teams to executive management).7. Be a product and domain expert in PAM domain experienced in conducting environment assessments and health checks in line with best practices.8. Strong troubleshooting and problem-solving skills.9. Experience in EPM is desirable but not mandatory10. Excellent verbal and written communication skills.11. Ability to work independently on technical tasks and client engagements.12. Candidate must be an independent self-starter able to perform all deployment activities with oversight and as a member of a project team.13. Candidate must have Sentry Certification. Nice to have CyberArk CDE14. Good to Have Skills Thycotic (Delinea), Beyond Trust, HashiCorp Vault Additional Information:1. 9+ years experience related to designing, deploying, and configuring PAM solutions, or 6+ years direct PAM consulting experience.2. Candidate must have completed 16 years of full-time education.3. This position is open to all Accenture locations. Qualification 15 years full time education

Posted 3 weeks ago

Apply

7.0 - 12.0 years

13 - 17 Lacs

Gurugram

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for an experienced HashiCorp Secrets Vault Specialist to design, implement Hashicorp Secret Vault. As a Security Lead, you will be responsible for defining security frameworks and architectures, aligning security controls with business requirements, and supporting the transition to Hashicorp Secret Vault.Roles and Responsibilities:1. Define, design, and implement HashiCorp Vaults Infra Architecture, scaling, reliability, DR, Raft storage, Consul storage etc.2. Implement HashiCorp Vaults Logical Architecture, policies, secret engine, namespace, auth method, governance etc.3. Basic Linux commands.4. Troubleshoot and resolve complex Hashicorp Vault-related technical issues.5. Experience in scripting / coding.6. Idea on basic DevOps tools like GitLab, artifactory, Splunk etc.7. Experience and knowledge on HashiCorp Terraform and its use to deploy HashiCorp Vault resources.8. Idea on how License and client count works in Vault.9. Communicate effectively with business teams, external clients, and solution providers.10. Document technical designs, solutions, and implementation plans.11. Work independently and take ownership of technical deliverables. Professional & Technical Skills: 1. Strong experience working with Hashicorp Secrets Vault solution.2. HashiCorp Vaults Infra Architecture, scaling, reliability, DR, Raft storage, Consul storage etc.3. HashiCorp Vaults Logical Architecture, policies, secret engine, namespace, auth method, governance etc.4. Good understanding on different types of secret engines and auth methods.5. Hands-on knowledge of using Vault API, CLI and UI.6. Audit and Monitoring for HashiCorp Vault and its integration with tools like Splunk.7. Integrations with different tools / platforms such as HSM, GitLab, Microservices, Kubernetes, Databases, Cloud, Vault Agent etc.8. Strong troubleshooting and problem-solving skills.9. Experience in working on Enterprise version of HashiCorp Vault.10. Excellent verbal and written communication skills.11. Ability to work independently on technical tasks and client engagements. Additional Information:1. Minimum of 7+ years of relevant experience in Hashicorp with a focus on Secrets Management.2. Candidate must have completed 16 years of full-time education.3. This position is open to all Accenture locations." Qualification 15 years full time education

Posted 3 weeks ago

Apply

3.0 - 5.0 years

5 - 10 Lacs

Mumbai, Mumbai Suburban, Mumbai (All Areas)

Work from Office

Job Requirements Role: CyberArk Engineer Location: Mumbai Qualification: Any Graduate Experience: 3-5 YEARS Work Schedule: Shift-Rotational Level: L2 Support Responsibilities Provide CyberArk expert technical services to enterprise customers Lead and manage the successful implementations of CyberArk solutions at strategic customers Understand and ensure successful delivery of the customer's objectives Provide technical expertise and support to regional customers and partners Understand current requirements and processes, identifying additional opportunities within the account Solve technical issues through research, reproduction, and troubleshooting while applying acquired knowledge Document all technical inquiries Develop and review content for knowledge sharing for both internal purposes and customer-facing platforms Help expand the usage of our solutions with our customers Hands on experience in Connector Handle L2 level issues Good knowledge in CyberArk Architecture Need hands on experience in Customization Key Requirements Candidate should have implemented CyberArk PIM suite solution in production or LAB environment Must have knowledge on Integration of Active Directory, SMTP, and third-party tools with CyberArk Good understanding of CyberArk concepts 5+ years' experience as a windows administrator 5+ years' experience with Active Directory, Group policy and RDS services Demonstrable knowledge of Information Security and Network Architecture concepts Mastery of Windows Operating Systems and environments, IIS and LDAP Experience with UNIX/Linux Experience with virtualization Experience with Cloud Services - AWS, Google, Azure (advantage) Excellent written and verbal communications skills Scripting/Development experience (Advantage) Knowledge of developing a custom connector for CPM and PSM Auto IT, PowerShell Scripting/Development experience (Advantage) Experience in upgrading CyberArk PAM solution (Advantage) Demonstrable knowledge of Information Security and Network Architecture concepts

Posted 3 weeks ago

Apply

10.0 - 20.0 years

40 - 65 Lacs

Bengaluru

Work from Office

8+ years in IAM/PAM, with 3+ years in CyberArk architecture Expertise in CyberArk core components Strong scripting and integration skills (PowerShell, REST APIs) Knowledge of security frameworks (NIST, ISO 27001) CyberArk certifications

Posted 3 weeks ago

Apply

7.0 - 12.0 years

20 - 35 Lacs

Gurugram

Remote

Experience - 8+ yrs Sr. IAM compliance Analyst Work Mode - Remote( quarterly visit to Gurugram office for 8 days) Free Ac cab available in Delhi / NCR (pick and drop) Shift time - 12 PM to 9 PM Contract - 12 months Reply on - smita@yeslandmark.com Required Candidate profile Good knowledge of identity management systems such as, Active Directory, Azure Active Directory, Google Cloud Identity or Saviynt (preferred) . Must have in IGA tools from Business point of view. Perks and benefits Fixed CTC + Joining Bonus

Posted 3 weeks ago

Apply

2.0 - 5.0 years

8 - 13 Lacs

Pune

Work from Office

Project description You'll be working in control sustainability ( AC5, AC22) Team in Pune. The team is currently made up of approximately 12 dedicated staff. We focus on sustainability of the various platforms. Also we act as a consultant and On-boarding analyst for the teams who interested to move the PU/HPU accounts into CyberArk. Responsibilities Provide consultancy for our IT Security systems and their interfaces. Define scope and process to on-board applications and provide guidance for any migrations required Gather requirements needed to on-board applications to the Security platforms. Identify and document the main Stakeholders and other sources (e.g. existing systems, regulations) for said requirements Understand Business Applications and requirements advising how to integrate them into the Security Infrastructure (Identity & Access Management systems, CyberArk, etc) Prepare user interface mock-ups, create end-user documentation, work flow processes, data templates as well as release guides, when required Evaluate existing processes and optimize them in terms of efficiency and risk mitigation SkillsMust have Knowledge of CyberArk and a good understanding of Security IT principles Strong analytical, problem-solving and synthesizing skills with the ability to manage own time effectively and efficiently Proven record in an Infrastructure/Technical Business Analyst role. Strong business analysis skills (especially documentation of business, functional and non-functional requirements) with a proven record of project participation and delivery. Good Microsoft Office skills (Excel, Access) and basic SQL knowledge Proven ability to work in a large enterprise environment. Experience working in complex organization is a clear asset Excellent communication and interpersonal skills Ability to explain complicated technical matters clearly and concisely to less technical colleagues as well as to work with demanding stakeholders Nice to have N/A

Posted 4 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies