2 - 4 years
4.0 - 6.0 Lacs P.A.
Bengaluru
Posted:2 months ago| Platform:
Work from Office
Full Time
Job Summary: We are seeking an experienced Identity and Access Management (IAM) Engineer with a strong focus on authentication and authorization to join our team. This role will be responsible for the design, implementation, and ongoing maintenance of IAM solutions, particularly in the areas of authentication protocols (OAuth 2.0, OpenID Connect, SAML 2.0), integration with Identity Providers (Keycloak, ForgeRock, Ping), and supporting LDAP-based directory services. The ideal candidate will have hands-on experience with Java development to support customizations and enhancements of IAM systems, a deep understanding of IAM best practices, and a proactive approach to ensuring the security and scalability of our access management systems. This role offers the opportunity to work closely with cross-functional teams to deliver secure and efficient IAM solutions across on-prem and cloud environments. Key Responsibilities: Core Role: Design, implement, and maintain information security tools and services in the Identity and Access Management (IAM) domain, with a primary focus on authentication and authorization solutions. IAM Products: Support and manage enterprise-level IAM systems and services, such as Keycloak , ForgeRock , Ping , and other Identity Providers (IdPs). Demonstrate expertise in configuring, troubleshooting, and enhancing these systems to meet security and access management requirements. Authentication Standards: Ensure the adoption and implementation of authentication standards (e.g., OAuth 2.0 , OpenID Connect (OIDC) , SAML 2.0 ). Translate organizational requirements into appropriate authentication and authorization frameworks. LDAP Knowledge: Apply a solid understanding of LDAP concepts, integration with enterprise directories, and their role in IAM systems. Troubleshoot, optimize, and maintain LDAP-based access management environments. System Design & Deployment: Collaborate with the engineering and security teams to design, deploy, and operate secure authentication solutions across the organization. Develop and document IAM-related policies, processes, and procedures in line with best practices. Security Monitoring & Incident Response: Assist the Information Security team with monitoring security systems, analyzing logs, identifying vulnerabilities, and addressing escalated security incidents. Support incident response efforts related to IAM solutions. Cross-team Collaboration: Partner with other teams to design and implement secure solutions for various enterprise applications and infrastructure components. Cloud IAM Integration: Assist in integrating IAM solutions with cloud technologies and platforms (e.g., AWS, Azure, GCP). Ensure secure identity and access management in hybrid or cloud-native environments. Continuous Learning & Development: Stay up to date with the latest technological advancements in IAM, security standards, and cybersecurity best practices. Participate in continuing education related to identity access management and information security. Security Best Practices: Contribute to secure coding initiatives by developing secure enhancements and using security best practices to mitigate vulnerabilities. Ensure compliance with security standards in all IAM-related activities. Cybersecurity Tools & Threat Management: Analyze the output of industry-standard cybersecurity tools (e.g., vulnerability scanners, SIEM systems) to identify threats and reduce risk exposure. Develop strategies to address IAM-related security weaknesses. Incident Management: Assist in the implementation of proactive IAM measures and contribute to security breach response procedures. Aid in the management of incidents by diagnosing, troubleshooting, and remediating IAM security issues. Custom Enhancements & Documentation: Assist in custom development using Java or other relevant programming languages for enhancements in IAM systems. Contribute to technical documentation in a software development environment, ensuring compliance with IAM best practices. Vendor & Product Support: Collaborate with vendors and product teams for troubleshooting, maintenance, and the enhancement of IAM products and services. Ensure proper documentation and knowledge sharing within the team. Required Qualifications: Bachelor s degree in computer science, Cybersecurity, Engineering, or a related field (or equivalent work experience). At least 2 years of experience in technology system support, software development, or a related field, with at least 1 year of experience in information security applications and systems, specifically IAM. Strong working knowledge of Identity and Access Management concepts, including authentication and authorization mechanisms. Hands-on experience with IAM products such as Keycloak , ForgeRock , or Ping (Keycloak is a preferred focus). Ability to configure, troubleshoot, and manage these systems in enterprise environments. Solid understanding of LDAP , including its role in directory services and user authentication management. Knowledge of authentication protocols like OAuth 2.0 , OpenID Connect (OIDC) , and SAML 2.0 , and the ability to implement these protocols in IAM environments. Experience with API security and integration using JSON , REST , and web services . Java development experience for customizations and enhancements of IAM systems, including writing secure, maintainable code to support authentication and authorization workflows. Knowledge of IAM solutions in Cloud environments (AWS, Azure, or GCP) and how IAM integrates within those platforms. Excellent written and verbal communication skills, with the ability to document technical processes and contribute to knowledge sharing. Preferred Qualifications: Master s degree in computer science, Cybersecurity, Business Administration, or a related field. Experience with development life cycles (SDLC) and working on projects involving IAM system implementations. Relevant certifications such as CISSP , CISM , CEH , CISA , OSCP , CompTIA Security+ or equivalent IAM/security certifications. Hands-on experience analyzing cybersecurity tools (e.g., vulnerability scanners, SIEM tools) and identifying remediation actions to reduce risk. Advanced understanding of information security practices , policies, and standards related to IAM. Experience with ITIL or other IT service management frameworks. Experience with multi-cloud IAM deployments or hybrid environments, ensuring security and access management are consistent across on-prem and cloud infrastructures.
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Mumbai, Bengaluru, Gurgaon
INR 32.5 - 37.5 Lacs P.A.
Chennai, Pune, Mumbai, Bengaluru, Gurgaon
INR 35.0 - 42.5 Lacs P.A.
Chennai, Pune, Delhi, Mumbai, Bengaluru, Hyderabad, Kolkata
INR 8.0 - 12.0 Lacs P.A.
Pune, Bengaluru, Mumbai (All Areas)
INR 0.5 - 0.7 Lacs P.A.
INR 2.5 - 5.5 Lacs P.A.
INR 3.0 - 4.5 Lacs P.A.
Bengaluru
INR 3.0 - 3.0 Lacs P.A.
Bengaluru
INR 3.5 - 3.75 Lacs P.A.
INR 2.5 - 3.0 Lacs P.A.
INR 4.0 - 4.0 Lacs P.A.