Jobs
Interviews

309 Cyberark Jobs - Page 7

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

9.0 - 14.0 years

3 - 7 Lacs

Gurugram

Work from Office

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : CyberArk Privileged Access Management, No Technology Specialty Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for an experienced CyberArk PAM Specialist to design, implement, and support CyberArk Privileged Access Management (PAM) solution. Roles and Responsibilities:1. Define, design, and implement CyberArk Privilege Cloud (SaaS).2. Install and configure cloud connectors.3. Configure MFA, SAML, LDAP, SIEM integration4. Troubleshoot and resolve CyberArk related technical issues.5. Work closely with application teams to onboard different types to systems to CyberArk6. Generate custom CPM,PSM plugins if required7. Support application onboarding, including access policies, group assignments, and role management.8. Communicate effectively with business teams, external clients, and solution providers.9. Document technical designs, solutions, and implementation plans.10. Work independently and take ownership of technical deliverables. Professional & Technical Skills: 1. Strong experience in CyberArk P-cloud, Conjur Secrets Management, CyberArk PAM (Vault, CPM, PVWA, AAM)2. Solid understanding of security standards and protocols including SSO, MFA, SAML, OAuth, OIDC, LDAP, RADIUS, and Kerberos.3. Proficient in CyberArk and related technologies. Experience in system administration, scripting (UNIX, Linux scripting), Rest API, LDAP directories, Active Directory4. Experience in providing guidance in CyberArk strategy; must have PAM deep-dive experience.5. Strong understanding of PAM Architecture, deployment methodologies and best practices.6. Effective at presenting information to different audiences at the correct level of detail (e.g., from engineering teams to executive management).7. Be a product and domain expert in PAM domain experienced in conducting environment assessments and health checks in line with best practices.8. Strong troubleshooting and problem-solving skills.9. Experience in EPM is desirable but not mandatory10. Excellent verbal and written communication skills.11. Ability to work independently on technical tasks and client engagements.12. Candidate must be an independent self-starter able to perform all deployment activities with oversight and as a member of a project team.13. Candidate must have Sentry Certification. Nice to have CyberArk CDE14. Good to Have Skills Thycotic (Delinea), Beyond Trust, HashiCorp Vault Additional Information:1. 9+ years experience related to designing, deploying, and configuring PAM solutions, or 6+ years direct PAM consulting experience.2. Candidate must have completed 16 years of full-time education.3. This position is open to all Accenture locations. Qualification 15 years full time education

Posted 1 month ago

Apply

8.0 - 13.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Design. Implement and Manage Saviynt IGA solution. Strong knowledge of Saviynt and hands of experience of Saviynt implementation Solid understanding of Microsoft Windows Server operating systems, Active Directory, and LDAP Experience with IIS and DNS Able to communicate with client or stakeholders to ensure required outcomes are met. Integrate Saviynt IGA solution with critical applications as per customer requirements. Resolve technical issues for Saviynt implementation. Contribute towards training and mentoring the team on Saviynt capabilities. Demonstrate knowledge of market trends, new technology and security/Identity and Access Management services. Build and nurture positive working relationships with clients with the intention to exceed client expectations Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 8+ years of industry experience in Design, Development, Customization, Configuration, end-to-end implementation of any Identity Management and Governance products. Minimum 5+ years relevant experience in implementing and managing Saviynt IGA solution. Knowledge on User Lifecycle Management, Provisioning, Deprovisioning, Reconciliation, Password management, Access Certification, RBAC, SOD, Role Management, Access Request, Delegation, Auditing, Reporting and user activity Monitoring. Experience in MySQL and Unix Shell/Perl scripting. Knowledge of Web Services (REST/SOAP), Directories (LDAP, AD), etc. Knowledge of Application server like Tomcat, WebLogic and WebSphere. Build messaging for Saviynt products and solutions. Be a thought leader and act as an evangelist for Saviynt Experience with & passion for Identity Governance, Privileged Access Management and Cloud Security Preferred technical and professional experience Experience / Knowledge in CyberArk, Azure SSO and Experience with at least one of the following development environments/languagesJ2EE, Java, PowerShell, JavaScript Directory experience (AD, Azure AD, LDAP) SaaS deployment experience Knowledge of enterprise web technologies, security and cutting-edge infrastructures

Posted 1 month ago

Apply

8.0 - 10.0 years

6 - 10 Lacs

Bengaluru

Work from Office

8 - 10 years of industry experience with a minimum of 8 years relevant experience in One Identity. Experience in development and implementation, design and architecture of identity and access management solutions. Must possess the technical/functional skills necessary to understand and manage consulting project engagements Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Design and deliver high quality security architecture and infrastructure setups and/or sub-systems to agreed deadlines. Assist customers in developing a secured Identity management infrastructure and to define security policies to protect their applications from unauthorized access. Lead and own the security solution implementation. Establish and maintain operational processes, standards, and procedures for managing One Identity Manager environments, including incident management, change management, and problem management. Monitor and optimize the performance, availability, and scalability of One Identity Manager solutions, proactively identifying and addressing issues to ensure service reliability and customer satisfaction Preferred technical and professional experience Experience with at least one of the following development environments/languagesJ2EE, Java, JavaScript, PowerShell, .Net One Identity Certified. Experience in specific industry verticals is preferred

Posted 1 month ago

Apply

6.0 - 11.0 years

5 - 9 Lacs

Hyderabad

Hybrid

Immediate Openings on User Access Management(UAM) PAN INDIA - Contract Working Mode : Hybrid 6+ Years User Access Management(UAM) PAN INDIA Period :Immediate Employment Mode : Contract Description Primary Skills User Access Management (UAM) Administrator Secondary Skills "Operating Systems-Able to provide first and second level troubleshooting and problem analysis for all client operating systems. Administration-Capable of utilizing remote access software (e.g., Remote Desktop) to remotely control desktops. Applications -Understand how applications interact with hardware in order to provide first level troubleshooting and analysis. Files & File Systems-Understands data movement utilities and file permissions and can perform basic maintenance on file systems. Backup/Restore-Understands backup and restore processes. Security-Understands requirements for physical and virtual security within a managed environment, including virus protection. Networking -Can verify connectivity within a network, understands TCP/IP and familiar with infrastructure services (e.g., DNS, DHCP). Certifications (if any)

Posted 1 month ago

Apply

5.0 - 10.0 years

7 - 10 Lacs

Bengaluru

Hybrid

Person should be at least 4 to 5 years of Experience into CyberArk.Person must have hands on experience in below concepts 1.Onboarding of Accounts. 2.Offboarding of Accounts 3.Reports generation and preparation 4.Safe creation and access provision 5.Platform duplication and customization.Strong problem solving skills(Password management and session management issues)Person should know about master policy and how it works.person must have knowledge on DR drill process in CyberArk environment.Person should know how to install and upgrade our CyberArk Components((EPV,PVWA,CPM,PSM,PSMP, etc) Preferred Knowledge/experience on vulnerability management and ITGC controls

Posted 1 month ago

Apply

4.0 - 6.0 years

6 - 8 Lacs

Mumbai

Work from Office

Manages CyberArk security solutions for privileged access management.

Posted 1 month ago

Apply

4.0 - 6.0 years

6 - 8 Lacs

Chennai

Work from Office

Manage and secure privileged accounts using CyberArk solutions. You will implement access control policies, monitor accounts, and ensure compliance with security standards. Expertise in CyberArk and privileged access management (PAM) is required.

Posted 1 month ago

Apply

7.0 - 10.0 years

9 - 19 Lacs

Pune, Bengaluru

Hybrid

We are hiring a CyberArk Manager Work Mode: 24/7 Rotational Shifts and 5 days working from an office. (Shift allowance will be provided) Locations: Bengaluru, Pune Experience: 7 -12 Years Notice Period: Immediate to currently serving and 30-35 days max only. This role is for you if you have the below Educational qualifications Graduation degree in any stream or equivalent / post-graduation degree/diploma, Certification in any IAM product would be an added advantage. Work experience We are looking for a of IAM resource with 10+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts The ideal candidate will: At least 10 years of Privileged Access Management domain experience with expertise in CyberArk Privilege Cloud, Data Protection Advisor (DPA), and Secure Configuration Assessment (SCA) administration. •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: At least 10+ years of experience in CyberArk-PAM product CyberArk Privilege Cloud Architecture and Administration: Design, implement, and maintain the CyberArk Privilege Cloud infrastructure to ensure secure and reliable privileged access management. •Architect solutions that integrate CyberArk Privilege Cloud with existing IT and security systems, ensuring seamless operation and robust security. •Manage privileged accounts, secure authentication, and authorization using CyberArk Privilege Cloud tools and solutions. •Monitor, troubleshoot, and optimize the performance of the CyberArk Privilege Cloud environment. Data Protection Advisor (DPA) Administration: Architect and manage the Data Protection Advisor tool, focusing on data protection strategies and ensuring compliance with regulatory requirements. •Monitor and optimize backup and recovery operations, including performance tuning and capacity planning. •Provide expert analysis of backup performance, storage utilization, and data protection trends. •Generate detailed reports and recommendations to improve data protection strategies and ensure regulatory compliance. This role is for you if you have the below Secure Configuration Assessment (SCA) Administration: Perform secure configuration assessments using CyberArk SCA tools to identify and remediate vulnerabilities and misconfigurations. •Develop, implement, and maintain security configuration baselines for various systems and applications. •Conduct periodic reviews and audits to ensure compliance with security configuration policies and standards. •Provide comprehensive reports on secure configuration assessments and recommend corrective actions for identified issues. Technical Leadership and Strategy: Provide technical leadership and strategic direction for privileged access management and related security initiatives. •Lead the development and implementation of PAM policies, procedures, and standards. •Collaborate with cross-functional teams, including IT, security, and compliance, to ensure alignment with organizational goals and security best practices. •Mentor and guide junior team members, providing training and knowledge sharing on best practices and emerging technologies. •Project Management and Implementation: •Lead and manage PAM-related projects from concept through implementation, ensuring timely and successful completion. •Develop project plans, timelines, and budgets, and coordinate with stakeholders to ensure alignment and support. •Oversee the deployment of new PAM solutions and enhancements, ensuring thorough testing and smooth integration. Documentation and Reporting: Maintain comprehensive and up-to-date documentation of CyberArk Privilege Cloud, DPA, and SCA configurations, architecture, and procedures. •Generate and distribute detailed reports on system health, performance, and compliance to management and relevant stakeholders. •Ensure accurate maintenance and secure storage of all access and activity logs for audit and compliance purposes. Please let me know if you are interested in this position and send me the resumes to netra.s@twsol.com

Posted 1 month ago

Apply

15.0 - 20.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking a highly skilled PAM Engineer with deep expertise in HashiCorp Vault and working knowledge of CyberArk to support and enhance our enterprise privileged access security posture. This role will be responsible for designing, implementing, and maintaining secure PAM solutions across hybrid environments, ensuring compliance, automation, and operational excellence.Key Responsibilities:- HashiCorp Vault Operations :Design and manage secrets management workflows using HashiCorp Vault for non-human identities and application secrets.- Implement secure storage, access policies, and dynamic secrets for cloud and on-prem environments.- Integrate Vault with CI/CD pipelines, cloud platforms, and monitoring tools.- CyberArk Integration & Support:Provide support for CyberArk components including EPV, CPM, PVWA, and PSM.- Assist in onboarding privileged accounts, session management, and password rotation.- Collaborate with CyberArk teams to ensure seamless integration with HashiCorp Vault where applicable- Security Governance & Compliance- Enforce least privilege access and Zero Trust principles across PAM implementations.- Conduct periodic access reviews, audits, and remediation activities.- Maintain compliance with internal security policies and external regulatory standards.-Automation & DevSecOps:Automate credential provisioning and rotation using APIs and scripting (PowerShell, Python, Bash).- Support DevSecOps initiatives by embedding PAM controls into development workflows - Collaboration & Documentation:Work closely with IAM, cloud, and infrastructure teams to align PAM strategies.- Maintain detailed documentation of PAM architecture, configurations, and operational procedures. Professional & Technical Skills: - Experience in PAM with hands-on expertise in HashiCorp Vault.- Working knowledge of CyberArk components and architecture.- Experience with cloud platforms (AWS, Azure, GCP) and containerized environments.- Strong scripting skills and familiarity with REST APIs. Additional Information:- The candidate should have experience in CyberArk access management- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

4.0 - 9.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Must have skills- Cybersecurity, Cloud, CyberArk, Infrastructure, Onboarding, SaaS, Cyber Security, LDAP, Linux, Windows, Configuration, Error Messages, Patching, Safes Exp 3+ yr 15 LPA 0-15 days ONLY Hybrid - 3 days work from office Required Candidate profile Exp managing CyberArk SaaS Privilege Cloud & the Components Infrastructure

Posted 1 month ago

Apply

5.0 - 10.0 years

12 - 16 Lacs

Hyderabad

Work from Office

Project description Luxoft DXC Technology Company is an established company focusing on consulting and implementation of complex projects in the financial industry. At the interface between technology and business, we convince with our know-how, well-founded methodology and pleasure in success. As a reliable partner to our renowned customers, we support them in planning, designing and implementing the desired innovations. Together with the customer, we deliver top performance! For one of our Clients in the Insurance Segment we are searching for a CyberArk Engineer. Responsibilities 1.Work with business units and IT team to onboard privileged accounts to CyberArk 2.Perform CyberArk patching, upgrades, and platform stability. 3.Troubleshoot and resolve CyberArk related issues for privileged accounts and service accounts. 4.Lead the implementation and support of CyberArk Secrets Management initiatives. 5.Assist in periodic audits, compliance, assurance reviews and reporting related to privileged access management. 6.Onboard, configure, and migrate service accounts from basic vaulting to password rotation with full automation. 7.Configure CyberArk workflows, safes, and access controls for privileged account management. 8.Work with application teams to secure credentials for applications, scripts, and automation processes. 9.Maintain and optimize CyberArk policies and manage credential lifecycle. 10.Automate privileged account onboarding workflows to reduce manual effort. Client is in the USA: Mexico candidateswork from 9am EST time zone. India candidatesCandidate should be able to work until 11.00 am EST to overlap a few hours with the client and be able to attend meetings. Skills Must have This role requires a strong L3 engineer. L2 and L1 operational candidate profiles are not suitable for this role. Minimum 5 years of hands-on experience in CyberArk Engineering. Familiarity with CyberArk components such as PVWA, CPM, PSM, PTA etc. Nice to have Insurance industry experience Other Languages EnglishC1 Advanced Seniority Senior

Posted 1 month ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Mumbai, Pune, Bengaluru

Work from Office

Your role Drive and ensure business, IT and Security teams are compliant to applicable IAM policy, IAM .standards and instructions. Work closely with IAM team ( Run and Project) to design and deploy monitoring and control systems based on IAM policy and instructions. Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction. Develop and maintain measurable IAM security metrics; ensure metrics provide actionable insights to the applicable stakeholders. Maintain IAM policy & instruction awareness of business, technical, architecture, infrastructure, and end user support Develop and maintain measurable KPIs to showcase IAM governance performance Analyse internal and external threats and recommend remediation actions based on IAM capability. Your profile Maintain IAM policy & instruction awareness of business, technical, architecture, infrastructure, and end user support Develop and maintain measurable KPIs to showcase IAM governance performance Analyse internal and external threats and recommend remediation actions based on IAM capability. Perform IAM audit / gap assessments of internal systems and processes and provide recommendations to mitigate the same Deliverables: PAM Audit compliance Dashboard, reporting Analysis, Identity Health Check & governance

Posted 1 month ago

Apply

2.0 - 7.0 years

10 - 20 Lacs

Hyderabad, Pune, Bengaluru

Hybrid

Experience - 2 to 14 years Location - Mumbai / Bangalore/ Pune/ Hyderabad Looking for immediate joiners 2-4-cyberark defender certification is mandate 4+ yrs- cde/ cpc certification is mandate B.E./ B.TECH./ MCA or any other relevant engineering degree. Skills and Experience: Mandatory technical & functional skills Candidate in this role would be a part of the IAM/Cloud consultantgroup. As part of this group, the candidate should have 5 to 8 years of experience with one or more of the followingIAM/Cloud tools: CyberArk (CP, CCP, ASCP, Conjur, Privileged Cloud), BeyondTrust, and HashiCorp Strong development experience and scripting knowledge is a must . Additional Knowledge and experience on following IAM/Cloud tools (SailPoint, Saviynt, ForgeRock, CyberArk, Okta, Ping Federate, Azure AD) Intimately familiar with authentication and authorization protocols such as SAML, SPML, XACML, SCIM, OpenID and OAuth. Key behavioral attributes/requirements Ability to analyze complex identity and access scenarios and develop clear, actionable strategies. Commitment to maintaining high standards of quality and accuracy in all deliverables. Strong verbal and written communication skills for effectively interacting with clients, stakeholders, and team members. Dedicated to exceeding client expectations and providing exceptional service. Effective collaboration and teamwork skills, with the ability to work harmoniously within a team. Flexibility and responsiveness to changing requirements and environments, with the ability to quickly learn and adapt to new IAM technologies and solutions. Adherence to the highest standards of integrity and ethics, ensuring compliance with all legal and company policies related to IAM practices. Innovative and critical thinking in approaching IAM

Posted 1 month ago

Apply

4.0 - 7.0 years

7 - 9 Lacs

Pune

Work from Office

Role & responsibilities Administer and maintain AWS cloud infrastructure, including EC2, S3, VPC, and other related services. Manage and support Active Directory, including user accounts, group policies, and security configurations. Administer Okta for identity and access management, including user provisioning, MFA, and SSO. Manage CyberArk for privileged access management, ensuring secure access to critical systems. Administer and maintain VMware vSphere environment, including ESXi hosts, virtual machines, and vCenter Server. Manage and support Veeam for backup and disaster recovery, ensuring data integrity and recoverability. Utilize Cortex for security monitoring and threat detection, responding to security incidents. Manage and maintain Proofpoint for email security, protecting against phishing and malware. Administer and support Google Workspace, including email, calendar, drive, and other applications. Provide technical support to end-users, resolving system-related issues promptly and effectively. Monitor system performance and proactively identify and resolve potential problems. Implement and maintain system security measures to protect against cyber threats and data breaches. Collaborate with other IT team members to design and implement system enhancements and upgrades. Document system configurations, procedures, and troubleshooting steps. Stay up-to-date with the latest system administration technologies and trends. Preferred candidate profile Relevant certifications (e.g., AWS Certified SysOps Administrator, Microsoft Certified, VMware Certified Professional, etc.). Knowledge of ITIL framework. Willing to work in shifts

Posted 1 month ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Chennai

Work from Office

The Sailpoint role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Sailpoint domain.

Posted 1 month ago

Apply

4.0 - 6.0 years

9 - 12 Lacs

Pune

Work from Office

1. Bachelors degree in Computer Science, Information Security, or a related field (Masters preferred). 2. 5+ years of hands-on experience in Identity and Access Management (IAM) architecture and solutions. 3. Expertise in IAM technologies such as Okta, Azure AD, SailPoint, ForgeRock, Ping Identity, or equivalent. 4. Strong knowledge of security architecture frameworks (e.g., SABSA, TOGAF, Zero Trust) and best practices. 5. In-depth understanding of authentication protocols such as SAML, OAuth, OpenID Connect, LDAP, Kerberos, etc. Experience with Privileged Access Management (PAM) solutions such as CyberArk, BeyondTrust, or similar tools. 6.Familiarity with cloud security architecture for IAM in environments like AWS, Azure, and GCP. 7.Proven experience in role-based access control (RBAC), identity governance, and directory services. 8. Solid understanding of compliance requirements and industry standards (e.g., NIST, ISO 27001) related to IAM.

Posted 1 month ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

Pune, Bengaluru

Hybrid

Greetings from Teamware Solutions a division of Quantum Leap Consulting Pvt. Ltd We are hiring a Conjur Admin Work Mode: 24/7 Rotational Shifts and 5 days working from an office. (Shift allowance will be provided) Locations: Bengaluru, Pune Experience: 2 -7 Years Notice Period: Immediate to currently serving and 30-35 days max only. Technical Skills Required: 36 months of experience in Conjur product Conjur Administration: Serve as the primary administrator for Conjur, overseeing the installation, configuration, and maintenance of the Conjur environment. •Manage secrets within Conjur, ensuring their protection and access control according to organizational policies. •Monitor system performance, perform regular health checks, and ensure high availability and reliability of Conjur services. •Troubleshoot and resolve issues related to Conjur infrastructure and performance. •Implement Conjur best practices, including role-based access control (RBAC), policy management, and integration with other systems. CyberArk Administration: Act as the secondary support for CyberArk administration, including managing and maintaining the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and other related components. •Assist in the provision, rotation, and de-provision of privileged credentials within CyberArk. •Support day-to-day operations, monitoring, and maintenance of the CyberArk environment. •Collaborate with the primary CyberArk administrators to ensure alignment with organizational security policies and best practices. Support and Troubleshooting: Serve as the Level 2 support contact for Conjur and CyberArk-related issues, escalating complex issues to Level 3 support as needed. •Respond to and resolve support tickets, incidents, and requests in a timely and efficient manner, documenting steps and solutions. •Perform root cause analysis for recurring issues and provide recommendations for resolution and improvement. Please let me know if you are interested in this position and send me the resumes to netra.s@twsol.com

Posted 1 month ago

Apply

3.0 - 8.0 years

0 - 3 Lacs

Pune, Bengaluru

Work from Office

•We are looking for a of IAM resource with 3+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts •At least 36 months of Privileged Access Management domain experience with expertise in Conjur as the primary skill and CyberArk administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: •36 months of experience in Conjur product Conjur Administration: Serve as the primary administrator for Conjur, overseeing the installation, configuration, and maintenance of the Conjur environment. •Manage secrets within Conjur, ensuring their protection and access control according to organizational policies. •Monitor system performance, perform regular health checks, and ensure high availability and reliability of Conjur services. •Troubleshoot and resolve issues related to Conjur infrastructure and performance. •Implement Conjur best practices, including role-based access control (RBAC), policy management, and integration with other systems. CyberArk Administration: Act as the secondary support for CyberArk administration, including managing and maintaining the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and other related components. •Assist in the provision, rotation, and de-provision of privileged credentials within CyberArk. •Support day-to-day operations, monitoring, and maintenance of the CyberArk environment. •Collaborate with the primary CyberArk administrators to ensure alignment with organizational security policies and best practices. Support and Troubleshooting: Serve as the Level 2 support contact for Conjur and CyberArk-related issues, escalating complex issues to Level 3 support as needed. •Respond to and resolve support tickets, incidents, and requests in a timely and efficient manner, documenting steps and solutions. •Perform root cause analysis for recurring issues and provide recommendations for resolution and improvement

Posted 1 month ago

Apply

7.0 - 11.0 years

7 - 13 Lacs

Pune, Bengaluru

Work from Office

Greetings from Teamware Solutions a division of Quantum Leap Consulting Pvt. Ltd We are hiring a Centrify Admin Work Mode: 24/7 Rotational Shifts and 5 days working from an office. (Shift allowance will be provided) Locations: Bengaluru, Pune Experience: 7 -10 Years Notice Period: Immediate to currently serving and 30-35 days max only. Job Title: KGS Cyber MSS (IDM Team)- Consultant Educational qualifications •Graduation degree in any stream or equivalent / post-graduation degree/diploma, Certification in any IAM product would be an added advantage. Work experience •We are looking for a of IAM resource with 3+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts The ideal candidate will: •At least 36 months of Privileged Access Management domain experience with expertise in Centrify as the primary skill and Conjur administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: •36 months of experience in Centrify product Centrify Administration: Serve as the primary administrator for Centrify, overseeing the deployment, configuration, and maintenance of the Centrify environment. Manage privileged access and ensure secure authentication and authorization using Centrifys tools and solutions. Perform regular system checks, monitor performance, and ensure the high availability and reliability of Centrify services. Troubleshoot and resolve issues related to the Centrify infrastructure, including connectivity, policy enforcement, and access issues. Implement Centrify best practices and ensure compliance with organizational security policies and standards. Conjur Administration: Act as the secondary support for Conjur administration, including the installation, configuration, and maintenance of the Conjur environment. Manage secrets within Conjur, ensuring their protection and appropriate access control. Support daily operations, monitoring, and health checks of the Conjur system to ensure it is running optimally. Assist in troubleshooting and resolving Conjur-related issues and work collaboratively with other teams to integrate Conjur with other systems. Support and Troubleshooting: Serve as the Level 2 support contact for Centrify and Conjur-related issues, addressing escalations from Level 1 support and involving Level 3 support when necessary. Respond to and resolve support tickets, incidents, and requests efficiently, ensuring thorough documentation of issues and solutions. Conduct root cause analysis for recurring issues and recommend improvements to enhance system reliability and performance. Please let me know if you are interested in this position and send me the resumes to netra.s@twsol.com

Posted 1 month ago

Apply

8.0 - 12.0 years

6 - 14 Lacs

Hyderabad

Hybrid

Role & responsibilities Provide user account life cycle management, including creating, provisioning, securing, and inactivation of access. • Collaborate with corporate IAM team in integrating IAM for applications and Infrastructure components. • Perform periodic access review and certifications. • Engineer and implement IAM solutions for Infrastructure components. • Onboard and maintain privileged accounts to vaults like CyberArk etc., • Engineer solutions in SailPoint for access management and review. • Review and Manage AWS IAM Roles • Review and Manage AD/Okta Groups. • Implement access solutions using AWS secret manager. • Create and Maintain Encryption Keys • Review and Respond to Security Audits related to Access and Identity Management • Develop and Lead governance tasks for Access and Identity Management • Engineer and implement solutions to integrate cloud native services with centralized IDPs like Azure AD and Okta • Troubleshooting issues with IAM tools and processes • Review new IAM tools and Engineer solutions according to the infrastructure and application requirement Basic Required Qualifications: • Experience in managing IDPs like AzureAD, Okta, IDM, etc., • Experience working in AWS Cloud Environment • Experience working with Sailpoint or similar tools for user certification. • Experience working with CyberArk or similar privileged access management tool. • Experience managing users and groups for Openldap, git, Jenkins, etc., • Experience in integrating application and cloud native services with centralized IDPs • Experience in Install and Maintain Directory services like AzureAD, OpenLDAP etc., • Experience in attending Security Audits • Experience in Collaborating with Technical and Business Stakeholders

Posted 1 month ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience3-5 Years.

Posted 1 month ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years.

Posted 1 month ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience3-5 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.

Posted 1 month ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies