Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
5 - 7 years
10 - 20 Lacs
Pune, Bengaluru, Noida
Hybrid
Dear Candidates, Greetings from Fujitsu, Your Profile has been shortlisted from Naukri. Apply Here: https://r.ripplehire.com/s/csxbX PFB the JD for your reference. Role: Security Technician Experience : 7-9 Years Location: Pune Shift: UK Shift Requirement : Endpoint Detect and Respond (EDR), Cortex XDR. Responsibilities: The Candidate should be able to communicate with Customers and understand the problem statement and act on it, Experience in CyberArk Privileged Account Security and supporting L2 support. Investigate and resolve complex technical issues related to PAM, especially those involving CyberArk products like CyberArk Privileged Access Security. Create and maintain technical documentation, knowledge base articles, and guides to help customers and internal teams. Manage and escalate critical support issues, when necessary, while maintaining clear communication with customers to manage expectations.Ensure that customer issues are resolved in a timely and satisfactory manner, striving for high levels of customer satisfaction. Ensure that customer issues are resolved in a timely and satisfactory manner, striving for high levels of customer satisfaction. Stay updated on evolving cybersecurity threats, industry compliance requirements, and emerging technologies. Implement monitoring and reporting solutions to proactively identify and address potential security risks and issues. Note : Please apply on the above given link.
Posted 2 months ago
5 - 9 years
15 - 30 Lacs
Chennai
Hybrid
*Java, core Java (primary), Python* Hands-on experience in CPM plugins & PSM session connectors. Strong knowledge of RBAC, PIM/PAM, MFA, SSO, SAML, OAUTH, NTLM, LDAP, Kerberos, PKI. Certified-CyberArk Defender & CyberArk Sentry Required Candidate profile Experience with SailPoint, OKTA, Azure AD, Active Directory. Proficiency in Oracle, MSSQL, MySQL, LDAP. Experience with SSL certificate creation, deployment, renewal. SAFe Agile Methodology
Posted 2 months ago
5 - 10 years
15 - 30 Lacs
Pune
Hybrid
Job Title: Application Security SME Location: Bangalore, India (Mandatory) Best fit Roles: Web Application Penetration Testing, API Testing, Network Penetration Testing Mobile Application Penetration Testing, Source Code Review, Thick Client Application Testing Certifications: Certified Ethical Hacker (CEH), Certified Red Team Professional (CRTP), Certified AppSec Pentester (CAPen), Certified API Security Analyst (CASA), OffSec Certified Professional (OSCP) Job Title: SDLC SUPPORT SME Location: Pune, India Best fit Roles: SAST SME, DAST SME , DevSecOps Integration specialist, SDLC Secure Developer, Automated Scripting Knowledge The Key Skills Proficient in SDLC Security with experience in both Agile and Waterfall Software Development Life Cycles. Understanding of integration & automation of various security technologies including SAST, DAST, MAST, IAST, container security tools within DevOps tooling pipeline (Jenkins, GitHub, Chef, Ansible, Nexus, etc). Understanding of platform-specific security risks, common vulnerabilities for web and architectures that are commonly used by mobile application. (HTML, XML, JavaScript, JSON, REST, Microservices etc.). Tools Proficiency in one or more tools like Checkmarx, Invicti(Netsparker), Quokka(Kryptowire), IriusRisk, Aquasec, etc. Job Title: Vulnerability Management SME Location: Hyderabad, India (Preferred) || Pune, India Requirement: CISA, CRISC, CISM, CISSP, CGEIT The Key Skills In-Depth knowledge of Vulnerabilities, Threat, Risk, Vulnerabilities Identification and Remediation. Must have knowledge of Security Testing and good exposure of vulnerabilities listed in OWASP Top 10/SANS 25. Cultivate a culture of continuous self-improvement, professional development, and self-directed learning, encouraging team members to maintain subject matter expertise in both their specific areas and the broader cybersecurity domain. Expertise in Risk and Compliance Management, Vulnerability Management, and Security Testing. Job Title: CyberArk Engineer Location: Mumbai The Key Skills: Proven experience working as a CyberArk Engineer, CyberArk Administrator, or similar role, with at least 2+ years of experience in designing, implementing, and supporting CyberArk solutions. Expertise in CyberArk PAS Suite components, including EPV, PSM, CPM, PVWA, and AIM, and proficiency in CyberArk REST API, PACLI, and scripting languages (PowerShell, Python, etc.). Strong understanding of privileged access management (PAM) concepts, principles, and best practices, including privileged account discovery, rotation, and monitoring. Experience with integrating CyberArk with identity governance, ticketing, SIEM, and other security and IT systems using APIs, connectors, and integration frameworks. Familiarity with regulatory compliance standards, such as NIST, PCI DSS, GDPR, HIPAA, and SOX, and experience with compliance assessments and audits. Job Title: SailPoint IIQ Developer Location: Mumbai The Key Skills: 3+ years of experience working as a SailPoint IIQ Developer or similar role in Identity and Access Management. In-depth knowledge of SailPoint IIQ architecture, components, and capabilities. Strong proficiency in scripting and programming languages such as Java, BeanShell, PowerShell, or Python. Experience with IAM concepts and technologies, including RBAC, SSO, LDAP, OAuth, and SAML. Hands-on experience with integration technologies such as REST APIs, SOAP, JDBC, and SCIM. Familiarity with cloud platforms (e.g., AWS, Azure, GCP) and their IAM services is a plus.. Preferred (Good-to-Have) Credentials: SailPoint Certified IdentityIQ Associate or Professional certification. Relevant certifications such as CISSP, CISM, or IAM certifications (e.g., CIAM, CIMP) are a plus. Job Title: IBM Verify Governance Location: Pune Job Title: Saviynt Location: Pune Desired qualifications 2 to 4 years of experience working in Identity-IGA Domain with minimum 2 years of experience in Saviynt Identity Platform. Strong understanding of identity and access management principles. Proficiency in programming languages such as Java, Python, or PowerShell. Experience in working with cloud platforms such as AWS, Azure, or GCP. Saviynt certification(s) preferred. Job Title: Incident Response Location: Bangalore The Key Skills: Experience on EDR tools for Incident response and threat hunting (Crowdstrike, MS Defender, Sentinel One) Certifications like ECIH v2, CHFI, GCIH or GCIA is preferred Job Title: ISMS Location: Delhi The key skills required are as follows: Responsible for ISO 27001 based Information Security Management System implementation and sustenance Responsible for advising clients on Business Continuity Planning, IT Disaster Recovery planning Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Job Title: PCI DSS Location: Mumbai Job Title: SIEM/Sentinle/Chronicle Location: Bangalore The Key Skills: Proven experience working with QRadar SIEM and other security tools. Ability to drive call and summarizing it post discussion. Deep understanding on Windows, DB, Mail cluster, VM and Linux commands. Good Understanding of Firewall, IDP/IPS, SIEM functioning Strong understanding of network protocols, TCP/IP, and security technologies. Familiarity with log analysis and correlation techniques. Knowledge of security incident response methodologies and best practices. Understanding of common security frameworks (e.g., NIST, ISO 27001). Job Title: Forescout Location: Bangalore The Key Skills: Proven experience in configuring and designing Forescout solutions. In-depth knowledge of network security principles and practices. Familiarity with cybersecurity frameworks and compliance standards (e.g., NIST, ISO 27001). Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. Relevant certifications (e.g., Forescout Certified Administrator/Engineer) are a plus. Experience with scripting languages (e.g., Python) for automation is desirable.
Posted 2 months ago
5 - 10 years
15 - 30 Lacs
Bengaluru
Hybrid
Job Title: Application Security SME Location: Bangalore, India (Mandatory) Best fit Roles: Web Application Penetration Testing, API Testing, Network Penetration Testing Mobile Application Penetration Testing, Source Code Review, Thick Client Application Testing Certifications: Certified Ethical Hacker (CEH), Certified Red Team Professional (CRTP), Certified AppSec Pentester (CAPen), Certified API Security Analyst (CASA), OffSec Certified Professional (OSCP) Job Title: SDLC SUPPORT SME Location: Pune, India Best fit Roles: SAST SME, DAST SME , DevSecOps Integration specialist, SDLC Secure Developer, Automated Scripting Knowledge The Key Skills Proficient in SDLC Security with experience in both Agile and Waterfall Software Development Life Cycles. Understanding of integration & automation of various security technologies including SAST, DAST, MAST, IAST, container security tools within DevOps tooling pipeline (Jenkins, GitHub, Chef, Ansible, Nexus, etc). Understanding of platform-specific security risks, common vulnerabilities for web and architectures that are commonly used by mobile application. (HTML, XML, JavaScript, JSON, REST, Microservices etc.). Tools Proficiency in one or more tools like Checkmarx, Invicti(Netsparker), Quokka(Kryptowire), IriusRisk, Aquasec, etc. Job Title: Vulnerability Management SME Location: Hyderabad, India (Preferred) || Pune, India Requirement: CISA, CRISC, CISM, CISSP, CGEIT The Key Skills In-Depth knowledge of Vulnerabilities, Threat, Risk, Vulnerabilities Identification and Remediation. Must have knowledge of Security Testing and good exposure of vulnerabilities listed in OWASP Top 10/SANS 25. Cultivate a culture of continuous self-improvement, professional development, and self-directed learning, encouraging team members to maintain subject matter expertise in both their specific areas and the broader cybersecurity domain. Expertise in Risk and Compliance Management, Vulnerability Management, and Security Testing. Job Title: CyberArk Engineer Location: Mumbai The Key Skills: Proven experience working as a CyberArk Engineer, CyberArk Administrator, or similar role, with at least 2+ years of experience in designing, implementing, and supporting CyberArk solutions. Expertise in CyberArk PAS Suite components, including EPV, PSM, CPM, PVWA, and AIM, and proficiency in CyberArk REST API, PACLI, and scripting languages (PowerShell, Python, etc.). Strong understanding of privileged access management (PAM) concepts, principles, and best practices, including privileged account discovery, rotation, and monitoring. Experience with integrating CyberArk with identity governance, ticketing, SIEM, and other security and IT systems using APIs, connectors, and integration frameworks. Familiarity with regulatory compliance standards, such as NIST, PCI DSS, GDPR, HIPAA, and SOX, and experience with compliance assessments and audits. Job Title: SailPoint IIQ Developer Location: Mumbai The Key Skills: 3+ years of experience working as a SailPoint IIQ Developer or similar role in Identity and Access Management. In-depth knowledge of SailPoint IIQ architecture, components, and capabilities. Strong proficiency in scripting and programming languages such as Java, BeanShell, PowerShell, or Python. Experience with IAM concepts and technologies, including RBAC, SSO, LDAP, OAuth, and SAML. Hands-on experience with integration technologies such as REST APIs, SOAP, JDBC, and SCIM. Familiarity with cloud platforms (e.g., AWS, Azure, GCP) and their IAM services is a plus.. Preferred (Good-to-Have) Credentials: SailPoint Certified IdentityIQ Associate or Professional certification. Relevant certifications such as CISSP, CISM, or IAM certifications (e.g., CIAM, CIMP) are a plus. Job Title: IBM Verify Governance Location: Pune Job Title: Saviynt Location: Pune Desired qualifications 2 to 4 years of experience working in Identity-IGA Domain with minimum 2 years of experience in Saviynt Identity Platform. Strong understanding of identity and access management principles. Proficiency in programming languages such as Java, Python, or PowerShell. Experience in working with cloud platforms such as AWS, Azure, or GCP. Saviynt certification(s) preferred. Job Title: Incident Response Location: Bangalore The Key Skills: Experience on EDR tools for Incident response and threat hunting (Crowdstrike, MS Defender, Sentinel One) Certifications like ECIH v2, CHFI, GCIH or GCIA is preferred Job Title: ISMS Location: Delhi The key skills required are as follows: Responsible for ISO 27001 based Information Security Management System implementation and sustenance Responsible for advising clients on Business Continuity Planning, IT Disaster Recovery planning Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Job Title: PCI DSS Location: Mumbai Job Title: SIEM/Sentinle/Chronicle Location: Bangalore The Key Skills: Proven experience working with QRadar SIEM and other security tools. Ability to drive call and summarizing it post discussion. Deep understanding on Windows, DB, Mail cluster, VM and Linux commands. Good Understanding of Firewall, IDP/IPS, SIEM functioning Strong understanding of network protocols, TCP/IP, and security technologies. Familiarity with log analysis and correlation techniques. Knowledge of security incident response methodologies and best practices. Understanding of common security frameworks (e.g., NIST, ISO 27001). Job Title: Forescout Location: Bangalore The Key Skills: Proven experience in configuring and designing Forescout solutions. In-depth knowledge of network security principles and practices. Familiarity with cybersecurity frameworks and compliance standards (e.g., NIST, ISO 27001). Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. Relevant certifications (e.g., Forescout Certified Administrator/Engineer) are a plus. Experience with scripting languages (e.g., Python) for automation is desirable.
Posted 2 months ago
4 - 9 years
7 - 11 Lacs
Mumbai
Work from Office
? As a L2 resource of the Run team, he/she will : Take up technical tasks in the ITSM queues to resolve day-to-day BAU / Project Requests and Incidents Plan, prepare and execute Change technical tasks in the ITSM queues Respond to and resolve alerts from the monitoring management system Manage, maintain and operate data storage solution of SAN, NAS, FC Fabrics and Inter-site links. Manage, maintain and operate data storage replication between Data Centers Provision and allocate storage to server assets and reclaim of storage for decommissioned volumes Perform zoning, mapping and masking of LUNs from arrays to server assets Plan, prepare and coordinate with vendors for campaign upgrades for SAN, NAS and Fabrics Perform storage performance analysis and troubleshoot storage-related performance/capacity issues with other teams (Platform, Database, etc) Perform basic to intermediate root cause analysis in Incident and Problem tasks Identify, assess and remediate vulnerabilities reported by security sources (scan report, pen test, audit finding, etc) Plan, prepare, execute and support Data Center maintenance activities Plan, prepare, execute and support Disaster Recovery / Business Continuity exercises Coordinate and deliver with internal clients/partners and external vendors for hardware break/fix cases, software cases, etc Respond to and own L1/L2 escalations Engage in taskforce resolution squad in priority incident management / crisis management cases Document, review, maintain and share technical information and write-up (primarily, SOP) as part of Knowledge Management Extract and prepare data needed for reporting and dashboard (capacity planning, health checks, IT controls, compliance, audit, etc) Must Have SAN – HPE XP7/XP8/Hitachi (VSP 5000), Primera/3PAR Brocade SAN Fabric Storage Replication technologies Storage failover/failback in Disaster Recovery operations Basic working knowledge of Windows and Red Hat Operating Systems and storage-related software & configuration parameters Good To Have: NAS – Dell PowerScale (formerly ISILON) Basic working knowledge of High-Availability solution – Microsoft Cluster Service and Veritas InfoScale Scripting / automation experience Work with tools such as CyberArk (privileged access management), OMI suite (events/alerts management)
Posted 2 months ago
7 - 11 years
11 - 15 Lacs
Hyderabad
Work from Office
Responsibilities: Administer IBM Security Access Manager (ISAM), creating objects, policies, junctions, adding identity attributes. Support project engagements in the enablement of web security infrastructure into an application's design. Assist application teams with issue resolution. Install, upgrade, and configure ISAM infrastructure Configure SAML OIDC and OAuth Troubleshoot access issues in web applications Triage/resolve federation challenges Work closely with vendors, open problem tickets, and product enhancements Willingness and ability to participate in an on-call rotation, involving off-hours / weekend support Qualifications Required Skills: Proven ISAM product subject matter expert Hands-on experience managing large enterprise-wide ISAM deployments across multiple environments Experience and expert knowledge of Identity as a Service and Federation technologies Working experience implementing applications with modern authentication and authorization protocols (OAuth, OIDC, SAML). Knowledge of Single Sign On, various authentication mechanisms and authorization schemas. Working knowledge of WireShark, Fiddler, JavaScript, JAVA, JSON, PERL/CURL, XML, SOAP, WS-Security Working knowledge of LDAP or IBM Directory Server, WebSphere Application Server, IIS, IBM HTTP Server. Working knowledge of Unix/Linux Environments, AIX, Solaris, RedHat. Working knowledge of systems management tools and practices for application monitoring. Preferred experience in technologies including ISAM, OAuth, Federation, SAML 2.0, OIDC, XML, JavaScript, HTML, TAM, LDAP, Git, x50 Secondary technologies include Python3, NodeJS, JSON, Ansible, AWS, REST, Okta, Linux shell, Postman, CyberArk, basic networking knowledge to include ISAM interfaces, Splunk Experience with Splunk, ServiceNow, QRADAR, JIRA Strong customer service focus
Posted 2 months ago
8 - 13 years
25 - 35 Lacs
Bengaluru
Work from Office
A Global MNC is looking for presales consultant who has hands on experience in PAM (Privileged Access Management). Good at Server, security and networking products. Multiple client handling experience is required..ct 9940085723
Posted 2 months ago
7 - 12 years
11 - 15 Lacs
Karnataka
Work from Office
CyberArk Engineer ExperienceMin 8 Years experience CyberArk CDE (Certified Delivery Engineer) certification is must. Hands on experience in installing, troubleshooting, maintaining CyberArk ( 10.0 and above) Password Management tool. Experience in configuring various CyberArk components like EPV, PVWA, PSM, PrivateArk, CPM and other. Experience in developing and troubleshooting wrappers using CyberArk AIM SDK using javapasswordsdk, netpasswordsdk, REST API and command utilities. Plan and manage deployments from Development all the way to Production using the standard change management methodology. Strong understanding of Credential Management and Identity Access Management concepts, and strong experience with integrating SailPoint with CyberArk. Strong knowledge in database programming using ORACLE, MSSQL to generate various reports. Strong object orient programming knowledge & experience in developing application tools using JAVA and .NET., Rest API, Powershell scripting. Required to interact with various business stake holders to understand their requirements to integrate with CyberArk, analyze, develop and implement the solution. Required to provide L3/L4 production support for CyberArk tool or API, work on incidents, troubleshoot and escalate the issues to the CyberArk vendor and provide solution. Required to develop various CyberArk custom connectors for CyberArk CPM based on the business requirements. Required to modify/debug existing CyberArk connectors based on the need. PSM Webform Connectors, Web base connector using AutoIT script. Strong knowledge on CP & CCP and Break glass scenario. Required to work with L3 support teams to deploy the various wrappers or connectors in PROD and Non Prod environments. Required to create SOP and technical documents for the wrappers and connectors developed along w/ architecture diagrams. Excellent oral and written communication skills Proven ability to work independently or in conjunction with a team.
Posted 2 months ago
4 - 9 years
7 - 11 Lacs
Karnataka
Work from Office
Description Job Summary We are seeking a skilled GCP IAM Security Engineer to enhance our identity and access management (IAM) Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility No Global Role Family To be defined Local Role Name To be defined Local Skills Google Cloud Platform;identity and access management Languages RequiredENGLISH Role Rarity To Be Defined
Posted 2 months ago
6 - 11 years
8 - 12 Lacs
Karnataka
Work from Office
Description Job Summary We are seeking a skilled GCP IAM Security Engineer to enhance our identity and access management (IAM) practices within Google Cloud Platform (GCP). In this role, you will be responsible for implementing Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility No Global Role Family To be defined Local Role Name To be defined Local Skills Google Cloud Platform;identity and access management Languages RequiredENGLISH Role Rarity To Be Defined
Posted 2 months ago
11 - 13 years
35 - 40 Lacs
Hyderabad
Work from Office
The Information Protection Advisor will be responsible for the design, development, and execution of Role Based and Attribute Based Access Controls and Role Reviews. They will also ensure our colleagues have an efficient way to obtain the system access they need while preserving the integrity and security of the data being accessed. Responsibilities include, but are not limited to, the following: Planning, designing, developing, and implementing roles across the enterprise Work among various teams within the IAM department to analyze and articulate user access data for trouble shooting and enforcing role best practices Collaborate with application and tool implementation teams on a daily basis Recommend and implement new processes to proactively address colleagues onboarding efficiency needs and requirements Understand the goals of various stakeholders and look for ways to support their needs without compromising the integrity and security of the data being accessed Think critically about best practices, blind spots, and opportunities to improve current processes Required Skills: Hands-on experience in Identity and Access Management tools such as Saviynt Experience with application entitlements and RBAC/ABAC Controls Effective and appropriate communication skills for working with both technical teams and business end users Comfortable with utilization of Microsoft Excel formulas Knowledge of agile development methodologies Basic experience working in the fields of Identity and Access Management and Privileged Access Management Required Experience & Education: 11-13 years of experience required Bachelors degree in computer science, Cyber Security, Information Technology, Information Sciences, Risk Management, or equivalent educational or professional experience and/or qualifications preferred but not required At least 2+ years of experience working in the fields of Identity and Access Management and Privileged Access Management Understanding of information risk management concepts Strong analytical abilities and mind-set Attention to detail Working experience adapting to a dynamic work environment by learning quickly, solving problems, and making decisions with minimal supervision Effective verbal and written communication skills for working with both technical teams and business end-users Demonstrated ability to coordinate people and teams cross-functionally to resolve complex issues with designated time frames
Posted 2 months ago
1 - 3 years
3 - 6 Lacs
Bengaluru
Work from Office
We are seeking experienced individuals with both broad and deep IAM experience and skills to join our team and deliver strategy, assessment, implementation, and managed services to RSM clients in a variety of industries and geographic locations. Successful candidates will have experience leading teams of varying sizes, mentoring and developing junior staff, and performing daily duties commensurate with the role. Candidates will have solid working knowledge of IAM leading practices, common business use cases, leading vendor products & solutions, federated and composite IAM architectures, IAM technology trends and innovation; and experience leveraging this knowledge to benefit clients. Associates are responsible for developing strong working relationships with clients built on understanding their businesses and challenges. Associates will identify, pursue, and help close new opportunities with both existing and new clients and will provide subject matter knowledge support to pursuit teams. Associates will work across multiple client account teams within a wide variety of industries. These individuals will also work across multiple client account teams within a wide variety of industries. They are responsible for managing multiple team engagements simultaneously, including several pieces of any assignmentnot just a single area of focus. Working in a mutually respectful team environment helps our associates perform at their best and integrate their career with their personal life. Associate typically have 1-3 years of experience in the following areas: Building, leading and developing high performing teams Mentoring and influencing others both internally within RSM and within client organizations Serving as an ambassador and champion of IAM services throughout RSM Providing thought leadership collateral annually for distribution to clients and through our various marketing channels Developing RSM's market eminence as a leader in IAM implementation services to the middle market Ability to manage client work and drive client communications with little or no oversight from RSM Senior Leadership. In-depth understanding of authentication protocols (SAML, OAuth, OpenID Connect, etc.). Experience with implementation of one or more IAM technologies including: SailPoint IdentityNow, IdentityIQ, Okta, ForgeRock, Ping, Delinea, CyberArk, and/or Microsoft Entra ID. Leading IAM federated architecture design and implementation including, but not limited to SSO/MFA, IAG/HRIS, AD/LDAP integration. Knowledge of key IAM concepts and protocols such as AuthN, AuthZ, Role-Based Access Control. Fluency in SailPoint IdentityIQ/IdentityNow leading practices, Okta leading practices and/or Azure AD leading practices Knowledge of common IAM processes such as lifecycle events, request/approval, password management, provisioning/de-provisioning, governance, and certifications Knowledge of infrastructure sizing, hardening and configuration (e.g., VPCs, network topology, DBMS, API gateway, connectors) Familiarity with common IAM data schemas (e.g., Identity Cubes) Knowledge of IAM solution error/exception handling and troubleshooting Solid understanding of NIST/ISO standards for IAM Leading IAM maturity assessments to identify gaps, deficiencies, and recommendations Familiarity with IAM custom development and deployment Basic knowledge of common compliance requirements (e.g., GDPR, CCPA, PCI, HIPPA, HITRUST, DFARS, CMMC, etc.) as they relate to IAM IAM testing strategies and methods (user acceptance testing, integration testing, performance testing, high availability/failover testing) Excellent written and verbal communication skills Basic qualifications for a Associate-level position include: Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences Computer science, information technology, information systems management, or other similar degrees preferably with a focus on information security Prior management experience building, mentoring, and developing teams Experience managing budgets and resource allocation including, but not limited to program and project management 1-3 years of experience in IAM Implementations with leading IAM solutions (e.g., SailPoint, Okta) Strong knowledge of computer network technologies, protocols, and topologies Proficiency with a variety of Windows, Unix, and Linux operating systems The ability to interpret and convey technical information through written and oral communications to all levels of technical aptitude, including senior management High degree of integrity and confidentiality, as well as ability to adhere to company policies and best practices Possess a strong internal drive and motivation for continuous improvement
Posted 2 months ago
3 - 7 years
6 - 12 Lacs
Pune, Trivandrum
Hybrid
Hi Everyone, We are hiring for IAM Operation Location: Pune & Trivandrum (Kerala) Years of experience: 2.5+yrs Mandatory Skills: IAM Operations (in any tools), SQL Technical Experience in One Identity tool (preferred) operations or similar IAM tools. Knowledge of Windows server technologies. Knowledge of Microsoft Active Directory Knowledge in DNS, TCP/IP, network technologies Knowledge in MS-SQL (single and cluster configuration) database technologies. Knowledge of incident, problem, change process handling Knowledge of Jenkins Automation tool , IAAS , Infrastructure background. Knowledge in DevOps tools of Github/Azure Kubernetes/pipeline deployment.
Posted 2 months ago
10 - 15 years
35 - 40 Lacs
Hyderabad
Work from Office
The impact you will have in this role: In this role, you will be responsible for the functional and technical design of business systems; integration of business services & information security; driving industry-specific best practices & standards; understanding regulatory compliance needs; coordinating test planning & execution; providing leadership to AD teams and acting as technology liaison to all IT areas within DTCC, to the business partners, and to the industry. Leading projects, teams, code reviews are required to be able to lead by example. Your Primary Responsibilities: As an expert solutions engineer and senior software engineer, mission is to help lead our team of innovators and technologists toward crafting next-generation solutions that improve the way our business is run. Taking part in the development and deployment of Cyberark solution. Create and enforce Cyberark PAM policies and procedures, ensuring adherence to industry best practices and regulatory requirements. Develop and manage the PAM roadmap, including technology upgrades, new features, and integrations. Manage and maintain the CyberArk PAM platform, including Privileged Session Manager (PSM), Central Policy Manager (CPM), Password Vault Web Access (PVWA), and Vault. Defines and factors in performance, scalability, availability, resiliency, security, maintainability, support, testing and cost requirements when making technology selection and application design decisions. Define approaches for modernizing legacy applications including migration to public or private cloud infrastructure. Own the engineering design practices of our software development organization. Lead design reviews session. Collaborate with Infrastructure and Solution Architecture to choose efficient hosting environment. Focus on industry practices such as lose coupling of applications, standardization, APIs, reusability, concepts of isolation, extensibility, extendibility, and consistency of solutions while proposing and reviewing architectures. Identify and solve for non-functional requirements for the platform consumers. Ensures solutions adhere to security policies and standards of firm and industry. Conduct POCs for tools as seen fit for the area. **NOTE: The Primary Responsibilities of this role are not limited to the details above. ** Qualifications: Minimum of 10+ years of experience in Information Security with at least 5 years in Privileged Access Management Bachelors degree in Computer Science, Information Systems or a related field and/or equivalent experience Talents Needed for Success: Extensive experience with CyberArk PAM platform, including PSM, CPM, PVWA, and Vault. Ability to understand architectural diagrams and design Advanced understanding of privileged user life cycle management and controls around privileged access. Experience with AWS, Azure, and/or GCP IAM and PAM concepts Experience with troubleshooting issues with PAM solutions and applications. Sound understanding of regulatory requirements and standards such as GDPR, FISMA, PCI, HIPAA, SOX, FICA, etc Ability to guide teams through sophisticated issues and drive resolution for issues that arise within sophisticated and high-risk applications Ability to effectively translate technical information between vendors, IT management and other internal and external IT teams Ability to work with all levels of management to define requirements associated with PAM services, incorporating security standard processes.
Posted 2 months ago
4 - 8 years
6 - 10 Lacs
Maharashtra
Work from Office
Description: Grade D1 PAM Engineer Developer Job description A skilled CyberArk Developer with expertise in onpremises and cloudbased CyberArk implementations This role is instrumental in designing developing and implementing solutions within the CyberArk ecosystem ensuring effective privileged access management The ideal candidate will bring handson experience in CyberArk development migration customization and integration across diverse environments Primary Skills Design develop and implement solutions within the CyberArk ecosystem to secure and manage privileged access across onpremises and cloud environments Utilize specific experience in transitioning from onpremises to cloud environments such as implementing P Cloud solutions Customise and extend CyberArk functionalities to meet specific business and security requirements ensuring adaptability in diverse scenarios Collaborate closely with security architects SMEs operations teams and other stakeholders to integrate CyberArk solutions seamlessly into hybrid infrastructures Implement and maintain CyberArk Privileged Cloud components including Vaults Central Policy Manager CPM Privileged Session Manager PSM and others ensuring optimal performance and reliability Implement and maintain CyberArk advanced module like EPM DPA Secret Hub and credential provider Develop and automate workflows scripts and connectors to streamline and enhance privileged access management processes within the CyberArk framework Collaborate with crossfunctional teams to understand business needs and translate them into effective CyberArk solutions considering both onpremises and cloudbased contexts Stay updated on the latest CyberArk features best practices and industry trends applying this knowledge to continually optimise and enhance privileged access security Conduct testing debugging and troubleshooting of CyberArk components addressing issues promptly and ensuring a robust and secure privileged access environment Drive documentation of CyberArk development processes including code configurations and integrations ensuring clarity and knowledge transfer within the team Mentor and collaborate with other developers and team members fostering a culture of continuous learning and improvement in CyberArk development practices Effectively communicate technical concepts to both technical and nontechnical stakeholders ensuring a clear understanding of CyberArk implementations in hybrid environments Proactively contribute to the resolution of technical issues minimizing impact on business operations and maintaining a secure privileged access environment across diverse platforms Other skills CyberArk Proficiency Indepth knowledge of CyberArk PAS and P Cloud components and functionalities CyberArk CDE certification preferred Cloud Integration Skills Familiarity with private cloud platforms and integration mechanisms Scripting and Automation Proficiency in scripting languages like PowerShell and automation tools such as Ansible IAM Principles Understanding of Identity and Access Management principles Troubleshooting and Debugging Strong diagnostic skills for problem resolution within CyberArk components Security Awareness Adherence to security best practices and compliance requirements Communication and Collaboration Effective communication with stakeholders and collaborative teamwork Transition Planning and Execution Experience in planning and executing transitions with minimal disruption
Posted 2 months ago
5 - 10 years
25 - 40 Lacs
Bengaluru
Work from Office
Summary Of Primary Responsibilities Perform critical analysis on information consolidated from multiple sources, identify, and resolve conflicts, and break down high-level information into actionable work plans. Support IAM transformation on IDM/PAM technology expansion by developing enhancements and new features driven by business requirements as well as internally identified opportunities for efficiency gain/automation. Resolve and identify root cause scenarios for any issues within our PAM platforms. Be responsible for system health, patching, and vulnerability support across different IAM systems across on-prem & cloud environments. Recommend adjustments to the technical requirements to adjust with agility to the business needs. Be responsible for minimizing/reducing interruption for the Organization within our IDM/PAM systems. Prioritize specifications based on business value and support implementation according to the timelines. Provide On-call support as required according to team support rotation. Support and implement compliance activities as needed to comply with different PAM controls. Qualifications 5-8 years of hands-on experience in IAM & PAM product support, such as CyberArk, Secret Server, Centrify, OKTA, Sailpoint, Saviynt, or similar. CyberArk is desired. Working knowledge of IAM concepts and technologies such as AD, Azure, LDAP protocols, authentication & authorization across on-prem and Cloud environments. Hands-on experience with Windows and Linux OS and common utilities to provide infrastructure support and implement PAM controls, especially on the UNIX side. Background and understanding of Cloud concepts on AWS, AZURE, or GCP is required. Strong understanding of networking concepts such as TCP/IP to troubleshoot and support application issues.
Posted 2 months ago
3 - 8 years
12 - 20 Lacs
Bengaluru, Hyderabad, Mumbai (All Areas)
Hybrid
Years of experience: 2-9 years Certification- CDE/Sentry(mandatory) CyberArk Implementation : Must have 2-9 years of experience in the understanding, working knowledge, architecture and configuration skills including the following CyberArk areas: Vault security layers Vault installation and configuration (including high availability architecture) Load balancing across components CPM and PVWA installation and configuration Users, Groups and LDAP integration Access Control and Safe Design Password Management Safes, Policies and Accounts Logon Accounts Password Reconciliation Exclusive and one-time passwords Database passwords Dual control and workflow Auto detection Discovery and Audit (DNA) Module Password upload utility Privileged Session Manager Backup and restore Disaster recovery vault Privileged Session Manager (PSM) configuration (preferably with Windows, Unix and databases)
Posted 2 months ago
2 - 7 years
5 - 12 Lacs
Mumbai, Thane
Work from Office
PAM Admin Required Technical Skill Set : Hands on experience on PAM/IAM tool Experience : 2-8 Years Location : Thane Walk-in interview date : 29th March (saturday) Desired Competencies (Technical/Behavioral Competency) 1. Analytical capability to understand different server access mechnaism, role based access control. 2. Good understanding of Java script/API. 3. Good networking knowledge for leveraging device integration and Load Balancing. 4. Sound knowledge on security solutions like firewall, web security, endpoint security etc. 5. Managing server configuration like Memory, CPU, tempdb etc., 6. Creating logins and users, managing permissions to users, Troubleshooting ,managing Password vaults. 7. Deep skill in CyberArk PAM tool Good to have 1.Working of PAM or IAM technology 2. Should have basic knowledge on various security technologies like Antivirus, URL content filtering Proxy, IPS/IDS, SIEM, VA/PT, Data Leakage Prevention 3.Good understanding of information risk with respect to business infrastructure 4. Certifications like CISSP, CEH, etc. would be an added advantage 5.Expertise on Linux Administration. Responsibility of / Expectations from the Role Need to handle different teams access management requirement and manage Password vault. skills Writing advance query for scripting, rule creation, reporting and alerting Cross-functional analysis of processes to reduce redundancy, better synchronization and streamlining Problem solving capabilities based on security guidelines and overall organization practices Should have visions for adopting and implementing new technologies. Providing significant factual reports with meaningful insights for various audience Infrastructure review for sustainable framework Excellent verbal and written communication, team management
Posted 2 months ago
5 - 10 years
10 - 15 Lacs
Bengaluru
Work from Office
As a Senior System Specialist at Novo Nordisk, you will: Support PAM/IAM Architects in requirement analysis, technical design, implementation planning and documentation. Deploy and configure PAM solutions, ensuring they meet security requirements and business needs. Monitor and maintain PAM systems, ensuring their availability, performance, and security. Identify and resolve issues related to PAM systems, providing technical support as needed. Manage privileged access accounts, ensuring appropriate access controls and monitoring are in place. Conduct regular audits and reviews of privileged access to ensure compliance with policies and regulations. Work with stakeholders to gather, refine, and document business requirements for PAM projects. Analyse incoming ideas for similarities of requirements, groom and batch requirements for further processing of capability leads. Monitor trends of requests to allow more efficient assessments on the intake process. Create detailed documentation, including requirements, process flows, and functional specifications. Qualifications We are looking for a candidate with the following qualifications: Over 5 years of experience in IAM, including hands-on work with PAM solutions. Comprehensive knowledge of PAM principles and technologies such as CyberArk, Beyond Trust, and Entra Privileged Identity Management. Proficiency in Identity and Access Management (IAM) principles and technologies. Effective communication, presentation, and interpersonal skills for managing both internal stakeholders and external suppliers, with the ability to explain complex PAM concepts to non-technical audiences. Strong documentation and process mapping skills. Thorough understanding of Active Directory (AD) and Azure AD. Familiarity with security protocols and technologies, including SAML, OAuth, OpenID Connect, and LDAP. In-depth knowledge of security best practices and regulatory requirements related to privileged access management. Strong analytical and problem-solving skills, with the capability to troubleshoot and resolve complex PAM issue.
Posted 2 months ago
2 - 7 years
4 - 9 Lacs
Maharashtra
Work from Office
Description Key ResponsibilitiesA skilled SailPoint/IAM Developer with expertise in on-premises and cloud-based SailPoint implementations. This role is instrumental in designing, developing, and implementing solutions within the IAM/SailPoint ecosystem, ensuring effective Identity access management. The ideal candidate will bring hands-on experience in SailPoint development, migration, customization, and integration across diverse environments. Primary Skills Design, develop, and implement solutions within the SailPoint ecosystem to secure and manage access across on-premises and cloud environments. Utilize specific experience in transitioning from on-premises to cloud environments, such as implementing P Cloud solutions. Customise and extend SailPoint functionalities to meet specific business and security requirements, ensuring adaptability in diverse scenarios. Collaborate closely with security architects, SMEs, operations teams, and other stakeholders to integrate SailPoint solutions seamlessly into hybrid infrastructures. Implement and maintain SailPoint advanced capabilities Develop and automate workflows, scripts, and connectors to streamline and enhance IAM Collaborate with cross-functional teams to understand business needs and translate them into effective SailPoint solutions, considering both on-premises and cloud-based contexts. Stay updated on the latest SailPoint features, best practices, and industry trends, applying this knowledge to continually optimise and enhance identity access security. Conduct testing, debugging, and troubleshooting of SailPoint components, addressing issues promptly and ensuring a robust and secure identity access environment. Drive documentation of SailPoint development processes, including code, configurations, and integrations, ensuring clarity and knowledge transfer within the team. Effectively communicate technical concepts to both technical and non-technical stakeholders, ensuring a clear understanding of SailPoint implementations in hybrid environments. Proactively contribute to the resolution of technical issues, minimizing impact on business operations and maintaining a secure identity access environment across diverse platforms. Other skills Cloud Integration Skills: Familiarity with private cloud platforms and integration mechanisms. Scripting and AutomationProficiency in scripting languages like PowerShell and automation tools such as Ansible. IAM PrinciplesUnderstanding of Identity and Access Management principles. Troubleshooting and DebuggingStrong diagnostic skills for problem resolution within SailPoint components. Security AwarenessAdherence to security best practices and compliance requirements. Communication and CollaborationEffective communication with stakeholders and collaborative teamwork. Transition Planning and ExecutionExperience in planning and executing transitions with minimal disruption. IAM/PAM/IGA Strategy and Architecture for Migration Projects Define and implement IAM, PAM, and IGA strategies tailored to the requirements of application migration, ensuring robust access management during and after migration. Assess current access controls and recommend improvements to align with security best practices and compliance standards during migration. Design and oversee secure frameworks for identity management, privilege escalation, and governance in new application environments. Access Control Implementation and Management Deploy and configure IAM/PAM/IGA solutions (such as Okta, CyberArk, SailPoint) within sprint cycles, ensuring seamless integration with migrated applications. Develop and enforce role-based access control (RBAC), least privilege principles, and secure access protocols across applications and data assets. Manage privileged accounts by implementing PAM practices that protect critical resources during migration to cloud or hybrid environments. Application Migration Support within Agile Sprints Work closely with Agile teams to ensure IAM/PAM/IGA requirements are integrated into sprint planning, execution, and testing phases. Provide expertise on managing access controls and governance requirements in short sprint cycles, ensuring they align with migration milestones. Act as an advisor to development teams, ensuring that IAM/PAM/IGA practices are consistently implemented in each sprint and across each application migration. Risk Mitigation and Compliance Ensure that access management processes adhere to regulatory requirements (e.g., SOX, GDPR) and industry standards, such as NIST and ISO. Conduct risk assessments specific to access management within the migration project, identifying vulnerabilities and implementing controls. Document IAM/PAM/IGA configurations and processes, providing reports to support audits and compliance verifications. Cross-Functional Collaboration and Training Collaborate with cybersecurity, application, and infrastructure teams to align IAM/PAM/IGA solutions with broader security requirements. Train team members and stakeholders on IAM/PAM/IGA best practices, tools, and configurations specific to migration and Agile environments. Serve as a subject matter expert, offering guidance on IAM/PAM/IGA issues related to application migration projects and Agile sprint schedules. Continuous Improvement and Incident Management Regularly evaluate IAM/PAM/IGA solutions to ensure they are up-to-date and capable of addressing new security risks and compliance needs. Respond to security incidents related to access management, working with incident response teams to mitigate impacts and prevent future occurrences. Support continuous improvement initiatives by refining access management policies and processes, leveraging lessons learned from previous sprints and migrations. Required Skills and QualificationsEducational BackgroundBachelors degree in Cybersecurity, Information Technology, Computer Science, or a related field. Advanced certifications such as CISSP, CISM, CISA, or specific IAM/PAM/IGA certifications (e.g., CyberArk, SailPoint) are preferred. ExperienceMinimum of 7-10 years of experience in IAM/PAM/IGA roles, with a strong focus on application migration and Agile sprint cycles. Technical ProficiencyIn-depth knowledge of IAM/PAM/IGA tools (e.g., Okta, CyberArk, SailPoint, ForgeRock) and hands-on experience with implementing these tools in cloud and hybrid environments. Knowledge of Agile and DevOpsExperience working within Agile sprint cycles and knowledge of DevOps practices related to secure access management during application migration. Preferred CompetenciesProblem-Solving and Analytical Skills: Ability to assess security needs, identify risks, and recommend effective access management controls. Communication Skills: Strong communication skills for interacting with technical and non-technical stakeholders, conveying complex IAM/PAM/IGA concepts clearly. Attention to DetailPrecision in configuring and managing access controls to prevent unauthorized access and ensure compliance. Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility Yes Global Role Family To be defined Local Role Name To be defined Local Skills Agile methodology;ServiceNow Release Management;release management;cybersecurity;PAM Languages RequiredENGLISH Role Rarity To Be Defined
Posted 2 months ago
6 - 8 years
9 - 17 Lacs
Hyderabad
Work from Office
Job Title: IAM L3 Architect Client: [Mouri Tech] POC: Naga Madhu Maddula Location: Hyderabad (Work from Office 5 Days a Week) Work Timings: Rotational Shifts Experience Required: 8+ Years Compensation: 17 LPA (FTE) / 850 per hour (Contract) – Inclusive of Margin & Taxes Employment Type: Full-Time / Contract-to-Hire (C2H) / Contract Job Overview: We are looking for a highly skilled IAM L3 Architect to lead the Identity and Access Management (IAM) architecture, strategy, and support efforts for enterprise systems. The ideal candidate will have hands-on experience with Okta, Azure AD, CyberArk, SailPoint , and a strong background in IAM security frameworks and governance . This is a critical role with responsibilities across authentication, authorization, compliance, and lifecycle governance . Key Responsibilities: Architect, implement, and maintain IAM solutions using Okta, Azure AD, CyberArk, and SailPoint . Configure and manage authentication protocols such as SSO, MFA, LDAP, SAML, SCIM . Drive lifecycle governance , access provisioning/deprovisioning, and user role management. Ensure IAM compliance with industry regulations, internal security policies, and risk frameworks. Support escalated L3-level IAM incidents and requests, ensuring minimal downtime and resolution SLAs. Collaborate with Security, Infrastructure, DevOps, and Compliance teams to align IAM strategy. Develop architecture documentation, technical standards, and IAM best practices. Stay current with IAM trends, technologies, and emerging security threats. Required Skills & Qualifications: 8+ years of experience in Identity & Access Management , including architecture and design Deep expertise in Okta , Azure Active Directory , CyberArk , and SailPoint Proficient in configuring SSO, MFA, SAML, LDAP, SCIM Strong knowledge of IAM lifecycle governance , policy enforcement, and audit readiness Hands-on experience with IAM risk management and access reviews Ability to operate independently in L3 support scenarios and handle architectural escalations Excellent documentation, communication, and cross-functional collaboration skills Preferred Qualifications: Bachelor's or Master’s degree in Information Security, Computer Science, or related fields IAM Certifications (e.g., Okta Certified, Microsoft Identity and Access Administrator, CyberArk Guardian, SailPoint Certified IdentityNow) Knowledge of regulatory standards (GDPR, SOX, HIPAA) and IAM frameworks (NIST, ISO 27001) Why Join Us? Lead and shape enterprise IAM strategy and architecture Exposure to a variety of top IAM technologies in a critical infrastructure environment Competitive pay model – Full-Time or Contract-based flexibility
Posted 2 months ago
2 - 7 years
4 - 9 Lacs
Karnataka
Work from Office
Description Client Interview Yes LocationIN-CHN/BLR Primary Sailpoint IIQ, Workflow, rules, roles, modification, onboarding applications to sailpoint, Secondary SkillsJava Developer Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility No Global Role Family To be defined Local Role Name To be defined Local Skills SailPoint IdentityIQ;SailPoint Languages RequiredENGLISH Role Rarity To Be Defined
Posted 2 months ago
2 - 7 years
4 - 9 Lacs
Karnataka
Work from Office
"Experience5+ Years Responsibilities Provide Level 3 engineering support for CyberArk PAM, addressing complex issues and advanced troubleshooting. Configure PAM policies, manage vault and session management setup, and maintain secure access controls. Perform system upgrades, patches, and customizations to enhance functionality. Conduct root cause analysis for high impact incidents and collaborate with IT security teams for solution enhancements. Requirements 5+ years of hands on experience with CyberArk PAM, including vault configuration, policy creation, and session management. Strong troubleshooting skills with expertise in privilege management and security practices."
Posted 2 months ago
2 - 7 years
4 - 9 Lacs
Maharashtra
Work from Office
Description Key ResponsibilitiesA skilled SailPoint/IAM Developer with expertise in on-premises and cloud-based SailPoint implementations. This role is instrumental in designing, developing, and implementing solutions within the IAM/SailPoint ecosystem, ensuring effective Identity access management. The ideal candidate will bring hands-on experience in SailPoint development, migration, customization, and integration across diverse environments. Primary Skills Design, develop, and implement solutions within the SailPoint ecosystem to secure and manage access across on-premises and cloud environments. Utilize specific experience in transitioning from on-premises to cloud environments, such as implementing P Cloud solutions. Customise and extend SailPoint functionalities to meet specific business and security requirements, ensuring adaptability in diverse scenarios. Collaborate closely with security architects, SMEs, operations teams, and other stakeholders to integrate SailPoint solutions seamlessly into hybrid infrastructures. Implement and maintain SailPoint advanced capabilities Develop and automate workflows, scripts, and connectors to streamline and enhance IAM Collaborate with cross-functional teams to understand business needs and translate them into effective SailPoint solutions, considering both on-premises and cloud-based contexts. Stay updated on the latest SailPoint features, best practices, and industry trends, applying this knowledge to continually optimise and enhance identity access security. Conduct testing, debugging, and troubleshooting of SailPoint components, addressing issues promptly and ensuring a robust and secure identity access environment. Drive documentation of SailPoint development processes, including code, configurations, and integrations, ensuring clarity and knowledge transfer within the team. Effectively communicate technical concepts to both technical and non-technical stakeholders, ensuring a clear understanding of SailPoint implementations in hybrid environments. Proactively contribute to the resolution of technical issues, minimizing impact on business operations and maintaining a secure identity access environment across diverse platforms. Other skills Cloud Integration Skills: Familiarity with private cloud platforms and integration mechanisms. Scripting and AutomationProficiency in scripting languages like PowerShell and automation tools such as Ansible. IAM PrinciplesUnderstanding of Identity and Access Management principles. Troubleshooting and DebuggingStrong diagnostic skills for problem resolution within SailPoint components. Security AwarenessAdherence to security best practices and compliance requirements. Communication and CollaborationEffective communication with stakeholders and collaborative teamwork. Transition Planning and ExecutionExperience in planning and executing transitions with minimal disruption. IAM/PAM/IGA Strategy and Architecture for Migration Projects Define and implement IAM, PAM, and IGA strategies tailored to the requirements of application migration, ensuring robust access management during and after migration. Assess current access controls and recommend improvements to align with security best practices and compliance standards during migration. Design and oversee secure frameworks for identity management, privilege escalation, and governance in new application environments. Access Control Implementation and Management Deploy and configure IAM/PAM/IGA solutions (such as Okta, CyberArk, SailPoint) within sprint cycles, ensuring seamless integration with migrated applications. Develop and enforce role-based access control (RBAC), least privilege principles, and secure access protocols across applications and data assets. Manage privileged accounts by implementing PAM practices that protect critical resources during migration to cloud or hybrid environments. Application Migration Support within Agile Sprints Work closely with Agile teams to ensure IAM/PAM/IGA requirements are integrated into sprint planning, execution, and testing phases. Provide expertise on managing access controls and governance requirements in short sprint cycles, ensuring they align with migration milestones. Act as an advisor to development teams, ensuring that IAM/PAM/IGA practices are consistently implemented in each sprint and across each application migration. Risk Mitigation and Compliance Ensure that access management processes adhere to regulatory requirements (e.g., SOX, GDPR) and industry standards, such as NIST and ISO. Conduct risk assessments specific to access management within the migration project, identifying vulnerabilities and implementing controls. Document IAM/PAM/IGA configurations and processes, providing reports to support audits and compliance verifications. Cross-Functional Collaboration and Training Collaborate with cybersecurity, application, and infrastructure teams to align IAM/PAM/IGA solutions with broader security requirements. Train team members and stakeholders on IAM/PAM/IGA best practices, tools, and configurations specific to migration and Agile environments. Serve as a subject matter expert, offering guidance on IAM/PAM/IGA issues related to application migration projects and Agile sprint schedules. Continuous Improvement and Incident Management Regularly evaluate IAM/PAM/IGA solutions to ensure they are up-to-date and capable of addressing new security risks and compliance needs. Respond to security incidents related to access management, working with incident response teams to mitigate impacts and prevent future occurrences. Support continuous improvement initiatives by refining access management policies and processes, leveraging lessons learned from previous sprints and migrations. Required Skills and QualificationsEducational BackgroundBachelors degree in Cybersecurity, Information Technology, Computer Science, or a related field. Advanced certifications such as CISSP, CISM, CISA, or specific IAM/PAM/IGA certifications (e.g., CyberArk, SailPoint) are preferred. ExperienceMinimum of 7-10 years of experience in IAM/PAM/IGA roles, with a strong focus on application migration and Agile sprint cycles. Technical ProficiencyIn-depth knowledge of IAM/PAM/IGA tools (e.g., Okta, CyberArk, SailPoint, ForgeRock) and hands-on experience with implementing these tools in cloud and hybrid environments. Knowledge of Agile and DevOpsExperience working within Agile sprint cycles and knowledge of DevOps practices related to secure access management during application migration. Preferred CompetenciesProblem-Solving and Analytical Skills: Ability to assess security needs, identify risks, and recommend effective access management controls. Communication Skills: Strong communication skills for interacting with technical and non-technical stakeholders, conveying complex IAM/PAM/IGA concepts clearly. Attention to DetailPrecision in configuring and managing access controls to prevent unauthorized access and ensure compliance. Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility Yes Global Role Family To be defined Local Role Name To be defined Local Skills Agile methodology;ServiceNow Release Management;SailPoint IdentityIQ;CyberArk Languages RequiredENGLISH Role Rarity To Be Defined
Posted 2 months ago
2 - 7 years
4 - 9 Lacs
Maharashtra
Work from Office
Description Key ResponsibilitiesA skilled SailPoint/IAM Developer with expertise in on-premises and cloud-based SailPoint implementations. This role is instrumental in designing, developing, and implementing solutions within the IAM/SailPoint ecosystem, ensuring effective Identity access management. The ideal candidate will bring hands-on experience in SailPoint development, migration, customization, and integration across diverse environments. Primary Skills Design, develop, and implement solutions within the SailPoint ecosystem to secure and manage access across on-premises and cloud environments. Utilize specific experience in transitioning from on-premises to cloud environments, such as implementing P Cloud solutions. Customise and extend SailPoint functionalities to meet specific business and security requirements, ensuring adaptability in diverse scenarios. Collaborate closely with security architects, SMEs, operations teams, and other stakeholders to integrate SailPoint solutions seamlessly into hybrid infrastructures. Implement and maintain SailPoint advanced capabilities Develop and automate workflows, scripts, and connectors to streamline and enhance IAM Collaborate with cross-functional teams to understand business needs and translate them into effective SailPoint solutions, considering both on-premises and cloud-based contexts. Stay updated on the latest SailPoint features, best practices, and industry trends, applying this knowledge to continually optimise and enhance identity access security. Conduct testing, debugging, and troubleshooting of SailPoint components, addressing issues promptly and ensuring a robust and secure identity access environment. Drive documentation of SailPoint development processes, including code, configurations, and integrations, ensuring clarity and knowledge transfer within the team. Effectively communicate technical concepts to both technical and non-technical stakeholders, ensuring a clear understanding of SailPoint implementations in hybrid environments. Proactively contribute to the resolution of technical issues, minimizing impact on business operations and maintaining a secure identity access environment across diverse platforms. Other skills Cloud Integration Skills: Familiarity with private cloud platforms and integration mechanisms. Scripting and AutomationProficiency in scripting languages like PowerShell and automation tools such as Ansible. IAM PrinciplesUnderstanding of Identity and Access Management principles. Troubleshooting and DebuggingStrong diagnostic skills for problem resolution within SailPoint components. Security AwarenessAdherence to security best practices and compliance requirements. Communication and CollaborationEffective communication with stakeholders and collaborative teamwork. Transition Planning and ExecutionExperience in planning and executing transitions with minimal disruption. IAM/PAM/IGA Strategy and Architecture for Migration Projects Define and implement IAM, PAM, and IGA strategies tailored to the requirements of application migration, ensuring robust access management during and after migration. Assess current access controls and recommend improvements to align with security best practices and compliance standards during migration. Design and oversee secure frameworks for identity management, privilege escalation, and governance in new application environments. Access Control Implementation and Management Deploy and configure IAM/PAM/IGA solutions (such as Okta, CyberArk, SailPoint) within sprint cycles, ensuring seamless integration with migrated applications. Develop and enforce role-based access control (RBAC), least privilege principles, and secure access protocols across applications and data assets. Manage privileged accounts by implementing PAM practices that protect critical resources during migration to cloud or hybrid environments. Application Migration Support within Agile Sprints Work closely with Agile teams to ensure IAM/PAM/IGA requirements are integrated into sprint planning, execution, and testing phases. Provide expertise on managing access controls and governance requirements in short sprint cycles, ensuring they align with migration milestones. Act as an advisor to development teams, ensuring that IAM/PAM/IGA practices are consistently implemented in each sprint and across each application migration. Risk Mitigation and Compliance Ensure that access management processes adhere to regulatory requirements (e.g., SOX, GDPR) and industry standards, such as NIST and ISO. Conduct risk assessments specific to access management within the migration project, identifying vulnerabilities and implementing controls. Document IAM/PAM/IGA configurations and processes, providing reports to support audits and compliance verifications. Cross-Functional Collaboration and Training Collaborate with cybersecurity, application, and infrastructure teams to align IAM/PAM/IGA solutions with broader security requirements. Train team members and stakeholders on IAM/PAM/IGA best practices, tools, and configurations specific to migration and Agile environments. Serve as a subject matter expert, offering guidance on IAM/PAM/IGA issues related to application migration projects and Agile sprint schedules. Continuous Improvement and Incident Management Regularly evaluate IAM/PAM/IGA solutions to ensure they are up-to-date and capable of addressing new security risks and compliance needs. Respond to security incidents related to access management, working with incident response teams to mitigate impacts and prevent future occurrences. Support continuous improvement initiatives by refining access management policies and processes, leveraging lessons learned from previous sprints and migrations. Required Skills and QualificationsEducational BackgroundBachelors degree in Cybersecurity, Information Technology, Computer Science, or a related field. Advanced certifications such as CISSP, CISM, CISA, or specific IAM/PAM/IGA certifications (e.g., CyberArk, SailPoint) are preferred. ExperienceMinimum of 7-10 years of experience in IAM/PAM/IGA roles, with a strong focus on application migration and Agile sprint cycles. Technical ProficiencyIn-depth knowledge of IAM/PAM/IGA tools (e.g., Okta, CyberArk, SailPoint, ForgeRock) and hands-on experience with implementing these tools in cloud and hybrid environments. Knowledge of Agile and DevOpsExperience working within Agile sprint cycles and knowledge of DevOps practices related to secure access management during application migration. Preferred CompetenciesProblem-Solving and Analytical Skills: Ability to assess security needs, identify risks, and recommend effective access management controls. Communication Skills: Strong communication skills for interacting with technical and non-technical stakeholders, conveying complex IAM/PAM/IGA concepts clearly. Attention to DetailPrecision in configuring and managing access controls to prevent unauthorized access and ensure compliance. Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility Yes Global Role Family To be defined Local Role Name To be defined Local Skills Agile methodology;ServiceNow Release Management;release management Languages RequiredENGLISH Role Rarity To Be Defined
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2