Home
Jobs
Companies
Resume

499 Mfa Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Company: Aptara's digital content, learning and performance, and business support services are in place at market-leading companies worldwide. Our industry specialists design and implement strategies that capitalize on new digital and mobile technologies for information providers in Information Technology, law, healthcare, pharmaceuticals, insurance, financial services, and publishing. Founded in 1988, Aptara is headquartered in the United States of America and has offices on four continents. Our parent company, iEnergizer, is publicly traded in the United Kingdom. For more details please visit https://www.aptaracorp.com/ Job Description: You will be responsible to create and understand the entire process of overall visual design requirements of a large account and the projects within/under the account, for shaping the visual output of various media files/elements. You will manage the day-to-day task of your team and ensure customer requirements are met and exceed expectations. You need to have a creative flair and a strong ability to translate requirements into design. You will be providing modern solutions for an enhanced customer experience & visual interactions and also participates in pre-sales projects. Candidates Profile: Graduate / Diploma in Fine Arts (GD Art, BFA, or MFA) OR Certification in Graphic Design Added Advantage: Human-Computer Interaction (HCI), Human Factors International (HFI), or AR-VR Certification. Role & Responsibilities: Participate in pre-sales activities (RFPs, RFQs, RFIs, etc.) and create prototypes/pilots as per clients specifications & requirements. Responsible to provide Innovative solutions to customers by using new technology, techniques, and creative ideas. Ability to work on effort estimates and the assumptions for the proposal/SOW based on the design solutions provided. Conduct team meetings from time to time and maintain a healthy work environment. Create and develop deliverables as per project specifications, quality standards, and design strategy. Conduct peer reviews of the deliverables at different stages of training development. Participate in org. level activities e.g. Induction training, Project-specific functional training & Recruitment activities (candidate interviews, test evaluations etc.) Coordinate with Lead/Manager/Delivery Manager for different activities (planning, solutions, training, RFPs/RFQs/RFIs etc.) Attend client calls and ensure that the client's feedback and requirements are addressed. Participate in people management activities resolve conflicts & manage expectations. Manage large team and accounts. Coordination with vendors to ensure quality and timely delivery. Should audit the graphic design processes. Create project specific design guidelines and checklist documents, & also ensure adherence from the team. Take responsibility for work and ensure communication with leads for any delays or challenges. Skills: Conceptualize visuals based on requirements and prepare rough drafts and present ideas. Exposure in all design and development tools (Adobe CC Suite, Articulate-360, Camtasia, and other rapid development tools, etc.). Create innovative UI, mock-ups, and animations with a keen eye for detail. Ability to work independently and manage responsibilities and priorities in a dynamic and time-critical environment. Learn new tools, design approaches, & methodologies as per the trends in graphic/visual design. Expert in creating custom UI and custom interactions for rapid tools such as Storyline 360, Captivate, etc. Expert in Accessibility Compliance. Show more Show less

Posted 12 hours ago

Apply

5.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Job Title: Cloud Security Consultant Location: Mumbai Experience: 5+ years Availability: Immediate Joiners Preferred Job Description: We are seeking an experienced Cloud Security Consultant to implement and maintain robust cloud security standards across leading platforms (AWS, Azure, GCP). The candidate must have a deep understanding of cloud provisioning, identity and access management, encryption standards, and network security. Key Responsibilities: Implement Secure Cloud Account & Environment Provisioning Standards (SCAEPS) including: Account/subscription setup protocols Root/owner account security controls Baseline configurations and naming standards Deploy and manage Cloud IAM Technical Baseline (IAMTB) such as: Password policies, RBAC, and MFA enforcement SSO/federation with enterprise identity systems Secure management of service principals and cross-account access Design and implement Network Security Configurations (NSCD) : Secure VPC/VNet design and subnet configurations Routing, firewall, and IDS/IPS configurations Enforce Data Encryption Standards (DETS) : AES-256 encryption and KMS key lifecycle management TLS/SSL configuration and certificate management Apply Cloud Storage Security Configurations (CSSCD) : Prevent public access to storage Encryption and access policy implementation for cloud storage Requirements: Minimum 5 years of experience in cloud security Hands-on experience with AWS/Azure/GCP security best practices Expertise in IAM, encryption, and network architecture Strong knowledge of regulatory standards (e.g., ISO, NIST, CIS) Relevant certifications preferred: AZ-500, AWS Security Specialty, CCSP, etc. Show more Show less

Posted 14 hours ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

Remote

Linkedin logo

Wrike is the most powerful work management platform. Built for teams and organizations looking to collaborate, create, and exceed every day, Wrike brings everyone and all work into a single place to remove complexity, increase productivity, and free people up to focus on their most purposeful work. Our vision: A world where everyone is free to focus on their most purposeful work, together. Ready to become a Wriker? As a Helpdesk Engineer, you bring solid experience in supporting enterprise IT environments with a strong customer focus and security-awareness in a dynamic workplace. You are proficient at solving a wide variety of IT issues relating to hardware, software, and user access, and you enjoy continuously improving IT processes and technologies. You are adept at managing your own priorities on daily bases and are always looking for meaningful ways to improve the support we provide to all Wrikers. About You And Your Team We are a global IT Helpdesk team of six, distributed across multiple locations, responsible for delivering reliable, high-quality IT support for over 1000 Wrike employees. As an in-office team member based in Bengaluru, you’ll become a critical part of our worldwide IT operations—supporting a broad set of devices and services, collaborating on automation projects with IT Operations, and working closely with local HR and Workplace Ops to ensure a seamless office and remote user experience. In this role, you will be: Acting as the primary point of contact for internal IT requests, owning user issues from first report to resolution and escalation if needed. Managing and improving user lifecycle processes (onboarding/offboarding), including hardware and account provisioning, and ensuring timely device return and access revocation. Ensuring device compliance and security using MDM platforms (e.g., Jamf, Intune/MEM), and collaborating with the global IT Operations team to automate device management and streamline processes. Maintaining and optimizing IT asset management, including hardware procurement, inventory monitoring, and vendor coordination for the Bengaluru office. Supporting and optimizing AV infrastructure, ensuring smooth operation for Zoom rooms and video conference events, including onsite troubleshooting and proactive maintenance. Participating in process improvements and automation initiatives to reduce manual workload and improve efficiency, quality, and security in service delivery. Serving as a local escalation point and collaborating with your global teammates to share knowledge and resolve more complex or distributed challenges. Staying current with IT best practices and technologies, with a willingness to cross-train and expand your technical skillset. Being a key support presence during major projects, onboarding cycles, and incident response situations as required. Our Technical Environment: MacOS and Windows endpoints managed with Jamf and Microsoft Endpoint Manager (Intune/MEM) Okta and SSO solutions for centralized access management and security Office 365 and Google Workspace productivity platforms Zoom video conferencing & AV hardware (Poly/Neat/Logitech) We value automation and scripting—experience with Python (especially for workflow/task automation) is a plus. PowerShell or shell scripting experience is also beneficial. IT ticketing and asset management via Wrike and/or ServiceNow CI/CD and self-service solutions being developed in partnership with IT Operations You will achieve your best if you have: Must be able to work standard Indian shift hours Should be flexible to work extended shifts whenever required This is a full-time, onsite role with mandatory attendance at the office for all 5 working days each week Advanced troubleshooting skills with the ability to diagnose and resolve hardware, software, and network problems efficiently Experience with MacOS and Windows administration in a managed, corporate setting (via MDM/SCCM/Jamf/Intune, etc.) Working knowledge of identity platforms (Okta, Azure AD, SSO/MFA concepts) Working experience with AV systems, video conferencing solutions, and modern office networking (Wi-Fi, VPN, DNS basics) Strong organizational skills and ability to prioritize in a fast-paced, distributed environment Solid communication skills with proficiency in English (written and verbal) A creative, solutions-oriented approach to IT issues, and a proven ability to think outside the box when tackling complex or unfamiliar challenges You will stand out with: Experience with configuration management or automation tools (e.g., Ansible, Terraform, scripting in Python/Bash/PowerShell) Demonstrated initiative in driving improvements to IT security, automation, or end-user workflows Familiarity with enterprise-grade IT asset management and inventory systems Experience delivering IT support across multiple geographic locations or multicultural teams Proven ability to document procedures, build knowledge bases, and enable self-service for users Strong service-oriented mindset, with exemplary analytical and problem-solving skills Perks of working with Wrike 10 days of National and Festival Holidays per year (eight fixed, two flexible) 18 days of paid vacation per year 14 days of sick leave with a medical certificate per year 5 uncertified sick days per year Group Medical Plan: Coverage for employees, spouse, children, and parents/in-laws for Rs 5,00,000. Free health checkup for employees Personal Accident Insurance: Rs 50,00,000 Term Life Insurance: Rs 50,00,000 Up to 26 weeks of paid maternity leave for the first two children 4 weeks of paid parental leave 2 days off for volunteering with nonprofit charities Broadband/Internet Reimbursement: INR 1500 per month Full-stocked pantry and complimentary lunch Hybrid work model Your recruitment buddy will be Saran Krishnamoorthy, Senior Recruiter. Who Is Wrike And Our Culture We’re a team of innovators and creators who solve the complex work problems of today and tomorrow. Hybrid work mode Wrike promotes a hybrid model for team members near our office hubs in San Diego, Prague, Dublin, Nicosia, and Tallinn, with 2–3 in-office days per week to foster collaboration and teamwork. This work mode supports our culture of collaboration and solving problems fast to deliver business outcomes and win together. Our persona 💡 Smart: We love what we do, and we’re great at it because this is our domain. Our combined knowledge in this space is unmatched. 💚 Dedicated: We get up every day focused on helping our customers win. We’re committed to helping our teammates win, too! 🤗 Approachable: We're friendly, easy to get along with, considerate, and helpful. Our culture and Values 🤩 Customer-Focused We care about our customers. We understand the customer journey, experience, and value derived from Wrike. Decision-making and action-taking are done with the customer in mind. 🤝 Collaborative We work as one and win together, each bringing unique strengths that contribute to diversity of thought for better outcomes. Leveraging our own work management platform, we foster an environment of creative collaboration and shared achievement. 🎨 Creative We strive to succeed through continuous innovation. It’s our pursuit of novel concepts that helped us create a market category. We continue to cultivate a workplace that fosters creative thinking as a means of transcending conventional boundaries and empowers us to break new ground to deliver extraordinary work management solutions. 💪 Committed We believe in ownership at all levels of the organization, by owning workflows from start to finish. Each member of our team is an integral part of this commitment, establishing work as a platform for personal growth and transformation, as well as collective success and growth. Check out our LinkedIn Life Page, Company culture page, Instagram, Wrike Engineering Team, Medium, Meetup.com, Youtube for a feel for what life is like at Wrike. Show more Show less

Posted 14 hours ago

Apply

4.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: Ping Identity Desired Skill Set Any: IAM, Ping Suite, Ping One, Ping Access, Ping Federate, Ping Directory, SSO, MFA, SAML, OAuth, OIDC, LDAP Experience Range : 4+ years Joining Location : PAN India We are currently planning to do a Walk-In Interview on 21st June 2025 at TCS Hyderabad. Date - 21st June 2025 (Saturday) Venue - TCS Synergy Park , Phase1, Premises No 2-56/1/36, Gachibowli, Opposite IIIT Hyderabad Campus, Seri Lingampally, RR District, Hyderabad , Telangana 500019. Job Description Role & Responsibilities: Strong knowledge on Access Management concepts, such as SSO, Federation, MFA, SAML, OAuth, OIDC, WSFED, LDAP and Reverse Proxy Good understanding of Ping Federation, Ping Access and Ping Directory Hands-on experience on onboarding applications on Ping Federate using SAML, OAuth/OIDC protocols Hands-on experience on configuring Data Store and implementation of authentication policies, adapters, PCVs, access token manager, mappings and OIDC policy Knowledge on REST APIs, XML/JSON Show more Show less

Posted 14 hours ago

Apply

5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

The Woxsen University School of Arts and Design seeks visionary artist-educators who combine exceptional creative practice with scholarly rigor and innovative pedagogy. We are building a world-class faculty that bridges traditional craftsmanship with cutting-edge technology, fostering the next generation of creative leaders who will shape the future of design and artistic expression. KEY RESPONSIBILITIES Creative Practice & Research (50%) Maintain an active and internationally recognized creative practice Develop innovative research programs combining practice-based and theoretical inquiry Publish in peer-reviewed journals and present at international conferences Exhibit work in prestigious galleries, museums, and design venues globally Secure external funding for creative projects and research initiatives Collaborate on interdisciplinary projects with industry and academic partners Teaching Excellence (35%) Deliver undergraduate and graduate courses in area of specialization Develop innovative curricula integrating traditional techniques with emerging technologies Mentor students in portfolio development and professional preparation Supervise thesis projects and independent study programs Lead study abroad programs and international design workshops Professional Service (15%) Contribute to departmental and university governance Serve on admissions, curriculum, and faculty search committees Review submissions for journals, conferences, and grant applications Engage with professional organizations and industry associations Participate in community outreach and public engagement initiatives RESEARCH & CREATIVE EXPECTATIONS Creative Output Requirements: Annual solo or significant group exhibitions/shows Regular publication of creative work in respected venues Development of innovative design solutions with measurable impact Integration of research findings into creative practice Scholarly Contributions: Minimum 2-3 peer-reviewed publications annually in design/arts journals Conference presentations at major international venues (SIGGRAPH, CHI, AIGA, etc.) Book chapters, catalogues, and scholarly essays Grant applications and external funding acquisition Innovation & Impact: Patent applications or design awards recognition Industry partnerships and collaborative projects Social impact initiatives through design intervention Technology transfer and commercialization opportunities TEACHING PORTFOLIO Undergraduate Courses: Foundation studies in design principles and methodology Specialized studio courses in area of expertise Design history and theory Professional practice and portfolio development Graduate Programs: Advanced studio practice and research methodology Thesis supervision and independent study guidance Industry collaboration projects International exchange program coordination Innovative Pedagogy: Integration of emerging technologies (AI, VR/AR, 3D printing) Experiential learning through real-world client projects Cross-cultural design workshops and global perspectives Entrepreneurship and design thinking bootcamps QUALIFICATIONS Essential Requirements: Terminal degree (MFA, Ph.D., or equivalent) from internationally recognized institution Minimum 5 years of professional practice in relevant design field Strong portfolio demonstrating creative excellence and innovation Evidence of scholarly engagement and research capability International exhibition or publication record Proficiency in industry-standard software and emerging technologies Excellent communication skills in English Show more Show less

Posted 14 hours ago

Apply

4.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: Ping Identity Desired Skill Set Any: IAM, Ping Suite, Ping One, Ping Access, Ping Federate, Ping Directory, SSO, MFA, SAML, OAuth, OIDC, LDAP Experience Range : 4+ years Joining Location : PAN India We are currently planning to do a Walk-In Interview on 21st June 2025 at TCS Chennai. Date - 21st June 2025 (Saturday) Venue - TCS Siruseri, ATL Building- 1/G1, SIPCOT IT Park Navalur, Siruseri , Tamil Nadu 603103. Job Description Role & Responsibilities: Strong knowledge on Access Management concepts, such as SSO, Federation, MFA, SAML, OAuth, OIDC, WSFED, LDAP and Reverse Proxy Good understanding of Ping Federation, Ping Access and Ping Directory Hands-on experience on onboarding applications on Ping Federate using SAML, OAuth/OIDC protocols Hands-on experience on configuring Data Store and implementation of authentication policies, adapters, PCVs, access token manager, mappings and OIDC policy Knowledge on REST APIs, XML/JSON Show more Show less

Posted 15 hours ago

Apply

4.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: Okta Engineer Desired Skill Set Any: IAM, SSO, MFA, Oauth, OIDC, SAML Experience Range : 4+ years Joining Location : PAN India We are currently planning to do a Walk-In Interview on 21st June 2025 at TCS Chennai. Date - 21st June 2025 (Saturday) Venue - TCS Siruseri, ATL Building- 1/G1, SIPCOT IT Park Navalur, Siruseri , Tamil Nadu 603103. Job Description Role & Responsibilities: Assist with managing Policies, standards and IT Controls for IAM related to SSO/MFA Work with large business programs to provide IAM/SSO/MFA guidance, requirements and help to develop solutions patterns. Expertise with Okta APIs and integrating applications and third party services with Okta Expertise with various OAuth2 Flows supported in Okta, Custom Authorization Servers, SAML2.0 Federations, OpenID Connect, SCIM integrations and legacy based integrations. Design and implement API, external IDP integrations, directory and database integrations and synchronization. Experience in user onboarding, application onboarding and user lifecycle management. Acts independently to establish and implement security and define service integrations with all other IT services such as build teams, asset management, service and incident management Should be skilled in coordinating and communicating with other teams to manage dependencies on other teams and stakeholders. Ability to work under fixed timelines and meet deadlines Work closely with Okta Architects, Okta developers and customer business and application development team to understand current landscape, use cases, gather requirements and plan Okta Setup and Integration activities. Communicating to clients and partners aspects of both the product and the implementation at the technical and/or functional level appropriate for the situation Show more Show less

Posted 15 hours ago

Apply

40.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description We’re looking for a highly skilled UI Developer with a strong background in building native applications across Windows, macOS, iOS, and Android platforms. This role requires hands-on expertise in platform-specific development tools and languages, such as C/C++, WinAPI, Cocoa, Swift, Kotlin, and Android NDK, to deliver intuitive, high-performance user interfaces tailored to each ecosystem. The ideal candidate also brings a strong focus on security, with the ability to integrate features like hardware-backed encryption, secure boot, and multi-factor authentication into consumer-facing applications. You’ll play a critical role in creating seamless, secure user experiences across desktop and mobile devices. Requirements Bachelor’s degree in Computer Science, Engineering, or a related field. Proven experience developing native applications for Windows and at least two additional platforms (macOS, iOS, Android). Proficient in C/C++ and platform-native development frameworks such as WinAPI, Cocoa, Swift, Kotlin, and Android NDK. Proven experience designing and building commercial-grade endpoint software at scale, with a strong emphasis on reliability, performance, and maintainability across diverse hardware and operating system environments Strong knowledge of TPM, Secure Enclave, and Android Keystore, with experience integrating these technologies for secure storage and authentication. Hands-on experience with cryptographic libraries such as OpenSSL, CryptoAPI, and CommonCrypto. Familiarity with authentication protocols like OAuth2.0, OpenID Connect, FIDO, and optionally Kerberos, SAML, and LDAP. Deep understanding of Windows and macOS internals, including system architecture, low-level APIs, and built-in security features such as BitLocker, User Account Control (UAC), Windows Defender, and macOS System Integrity Protection (SIP), Gatekeeper, and FileVault. Experience using mobile security testing tools such as AppScan, Burp Suite, or Mobile Security Framework (MobSF). Strong attention to detail with a passion for writing secure, efficient, and maintainable code. Excellent communication skills and a collaborative mindset, with the ability to mentor and inspire peers. Responsibilities As a member of the software engineering division, you will assist in defining and developing software for tasks associated with the developing, debugging or designing of software applications or operating systems. Provide technical leadership to other software developers. Specify, design and implement modest changes to existing software architecture to meet changing needs. Key Responsibilities Design and develop secure, high-performance native user interfaces for Windows, macOS, iOS, and Android platforms. Leverage platform-specific technologies (e.g., WinAPI, Cocoa, Swift, Kotlin, Android NDK) to deliver responsive, intuitive UI experiences. Integrate hardware-backed security features including Trusted Platform Module (TPM), Apple Secure Enclave, and Android Keystore for secure boot, attestation, and encrypted storage. Implement cryptographic algorithms and secure communication protocols to protect data at rest and in transit. Build and support robust authentication mechanisms, including MFA, biometrics (Face ID, Touch ID, fingerprint), and token-based access. Collaborate with security architects and engineers to define and implement secure software architecture. Conduct code reviews, threat modelling, and security assessments to proactively identify and address vulnerabilities. Stay informed on emerging threats, CVEs, and platform security updates, ensuring applications are always a step ahead. Partner closely with product managers, UX designers, and backend engineers to deliver cohesive, high-quality apps on time. Mentor junior developers in secure coding practices, cryptography, and platform-specific development techniques. Qualifications Career Level - IC3 About Us As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less

Posted 15 hours ago

Apply

4.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: Okta Engineer Desired Skill Set Any: IAM, SSO, MFA, Oauth, OIDC, SAML Experience Range : 4+ years Joining Location : PAN India We are currently planning to do a Walk-In Interview on 21st June 2025 at TCS Hyderabad. Date - 21st June 2025 (Saturday) Venue - TCS Synergy Park , Phase1, Premises No 2-56/1/36, Gachibowli, Opposite IIIT Hyderabad Campus, Seri Lingampally, RR District, Hyderabad , Telangana 500019. Job Description Role & Responsibilities: Assist with managing Policies, standards and IT Controls for IAM related to SSO/MFA Work with large business programs to provide IAM/SSO/MFA guidance, requirements and help to develop solutions patterns. Expertise with Okta APIs and integrating applications and third party services with Okta Expertise with various OAuth2 Flows supported in Okta, Custom Authorization Servers, SAML2.0 Federations, OpenID Connect, SCIM integrations and legacy based integrations. Design and implement API, external IDP integrations, directory and database integrations and synchronization. Experience in user onboarding, application onboarding and user lifecycle management. Acts independently to establish and implement security and define service integrations with all other IT services such as build teams, asset management, service and incident management Should be skilled in coordinating and communicating with other teams to manage dependencies on other teams and stakeholders. Ability to work under fixed timelines and meet deadlines Work closely with Okta Architects, Okta developers and customer business and application development team to understand current landscape, use cases, gather requirements and plan Okta Setup and Integration activities. Communicating to clients and partners aspects of both the product and the implementation at the technical and/or functional level appropriate for the situation Show more Show less

Posted 15 hours ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

The role involves building and managing data pipelines, troubleshooting issues, and ensuring data accuracy across various platforms such as Azure Synapse Analytics, Azure Data Lake Gen2, and SQL environments. This position requires extensive SQL experience and a strong background in PySpark development. Responsibilities Data Engineering: Work with Azure Synapse Pipelines and PySpark for data transformation and pipeline management. Perform data integration and schema updates in Delta Lake environments, ensuring smooth data flow and accurate reporting. Work with our Azure DevOps team on CI/CD processes for deployment of Infrastructure as Code (IaC) and Workspace artifacts. Develop custom solutions for our customers defined by our Data Architect and assist in improving our data solution patterns over time. Documentation : Document ticket resolutions, testing protocols, and data validation processes. Collaborate with other stakeholders to provide specifications and quotations for enhancements requested by customers. Ticket Management: Monitor the Jira ticket queue and respond to tickets as they are raised. Understand ticket issues, utilizing extensive SQL, Synapse Analytics, and other tools to troubleshoot them. Communicate effectively with customer users who raised the tickets and collaborate with other teams (e.g., FinOps, Databricks) as needed to resolve issues. Troubleshooting and Support: Handle issues related to ETL pipeline failures, Delta Lake processing, or data inconsistencies in Synapse Analytics. Provide prompt resolution to data pipeline and validation issues, ensuring data integrity and performance. Desired Skills & Requirements Seeking a candidate with 5+ years of Dynamics 365 ecosystem experience with a strong PySpark development background. While various profiles may apply, we highly value a strong person-organization fit. Our ideal candidate possesses the following attributes and qualifications: Extensive experience with SQL, including query writing and troubleshooting in Azure SQL, Synapse Analytics, and Delta Lake environments. Strong understanding and experience in implementing and supporting ETL processes, Data Lakes, and data engineering solutions. Proficiency in using Azure Synapse Analytics, including workspace management, pipeline creation, and data flow management. Hands-on experience with PySpark for data processing and automation. Ability to use VPNs, MFA, RDP, jump boxes/jump hosts, etc., to operate within the customers secure environments. Some experience with Azure DevOps CI/CD IaC and release pipelines. Ability to communicate effectively both verbally and in writing, with strong problem-solving and analytical skills. Understanding of the operation and underlying data structure of D365 Finance and Operations, Business Central, and Customer Engagement. Experience with Data Engineering in Microsoft Fabric Experience with Delta Lake and Azure data engineering concepts (e.g., ADLS, ADF, Synapse, AAD, Databricks). Certifications in Azure Data Engineering. Why Join Us? Opportunity to work with innovative technologies in a dynamic environment where progressive work culture with a global perspective where your ideas truly matter, and growth opportunities are endless. Work with the latest Microsoft Technologies alongside Dynamics professionals committed to driving customer success. Enjoy the flexibility to work from anywhere Work-life balance that suits your lifestyle. Competitive salary and comprehensive benefits package. Career growth and professional development opportunities. A collaborative and inclusive work culture. Show more Show less

Posted 17 hours ago

Apply

4.0 - 7.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 day ago

Apply

5.0 years

5 - 9 Lacs

Pune

On-site

The role involves building and managing data pipelines, troubleshooting issues, and ensuring data accuracy across various platforms such as Azure Synapse Analytics, Azure Data Lake Gen2, and SQL environments. This position requires extensive SQL experience and a strong background in PySpark development. Responsibilities Data Engineering: Work with Azure Synapse Pipelines and PySpark for data transformation and pipeline management. Perform data integration and schema updates in Delta Lake environments, ensuring smooth data flow and accurate reporting. Work with our Azure DevOps team on CI/CD processes for deployment of Infrastructure as Code (IaC) and Workspace artifacts. Develop custom solutions for our customers defined by our Data Architect and assist in improving our data solution patterns over time. Documentation : Document ticket resolutions, testing protocols, and data validation processes. Collaborate with other stakeholders to provide specifications and quotations for enhancements requested by customers. Ticket Management: Monitor the Jira ticket queue and respond to tickets as they are raised. Understand ticket issues, utilizing extensive SQL, Synapse Analytics, and other tools to troubleshoot them. Communicate effectively with customer users who raised the tickets and collaborate with other teams (e.g., FinOps, Databricks) as needed to resolve issues. Troubleshooting and Support: Handle issues related to ETL pipeline failures, Delta Lake processing, or data inconsistencies in Synapse Analytics. Provide prompt resolution to data pipeline and validation issues, ensuring data integrity and performance. Desired Skills & Requirements Seeking a candidate with 5+ years of Dynamics 365 ecosystem experience with a strong PySpark development background. While various profiles may apply, we highly value a strong person-organization fit. Our ideal candidate possesses the following attributes and qualifications: Extensive experience with SQL, including query writing and troubleshooting in Azure SQL, Synapse Analytics, and Delta Lake environments. Strong understanding and experience in implementing and supporting ETL processes, Data Lakes, and data engineering solutions. Proficiency in using Azure Synapse Analytics, including workspace management, pipeline creation, and data flow management. Hands-on experience with PySpark for data processing and automation. Ability to use VPNs, MFA, RDP, jump boxes/jump hosts, etc., to operate within the customers secure environments. Some experience with Azure DevOps CI/CD IaC and release pipelines. Ability to communicate effectively both verbally and in writing, with strong problem-solving and analytical skills. Understanding of the operation and underlying data structure of D365 Finance and Operations, Business Central, and Customer Engagement. Experience with Data Engineering in Microsoft Fabric Experience with Delta Lake and Azure data engineering concepts (e.g., ADLS, ADF, Synapse, AAD, Databricks). Certifications in Azure Data Engineering. Why Join Us? Opportunity to work with innovative technologies in a dynamic environment where progressive work culture with a global perspective where your ideas truly matter, and growth opportunities are endless. Work with the latest Microsoft Technologies alongside Dynamics professionals committed to driving customer success. Enjoy the flexibility to work from anywhere Work-life balance that suits your lifestyle. Competitive salary and comprehensive benefits package. Career growth and professional development opportunities. A collaborative and inclusive work culture.

Posted 1 day ago

Apply

0 years

0 Lacs

Ahmedabad, Gujarat, India

Remote

Linkedin logo

About Unreconciled: Unreconciled is a fast-growing fractional finance firm that provides end-to-end financial management solutions to startups, tech companies, and creative agencies globally. With offices in Ahmedabad and Kochi, we serve clients across the UK, US, and beyond, handling sensitive financial data that requires the highest level of security and compliance. Job Summary: We are seeking a proactive and detail-oriented Junior Cybersecurity Analyst to assist in enhancing and securing our IT infrastructure. The ideal candidate will play a crucial role in implementing and managing security measures essential for an accounting firm handling end-to-end finance functions. This includes setting up and managing tools such as Google Chrome Managed Browser, Active Directory (AD), Sophos Management, 1Password, and securing payment systems on laptops. As we scale from 30 to 100 employees over the next two years, this role is critical in building a robust security foundation that protects both our internal operations and our clients' sensitive financial information. Key Responsibilities: Core Security Implementation: Google Chrome Managed Browser Setup: Configure and deploy managed browser settings to ensure secure and compliant internet usage across the organization Implement policies to control extensions, updates, and security settings Active Directory (AD) Setup: Assist in the design and implementation of AD structures, including user accounts, groups, and organizational units Manage group policies to enforce security settings and access controls Sophos Management: Deploy and manage Sophos endpoint protection across all company devices Monitor security alerts and assist in incident response activities 1Password Management: Implement and manage 1Password for secure password storage and sharing among team members Educate staff on best practices for password management and security Securing Payment Systems on Laptops: Ensure that laptops used for payment processing are secured with encryption and up-to-date security patches Implement multi-factor authentication (MFA) and other security measures to protect sensitive financial data Security Operations & Compliance: Access and Identity Management: Implement role-based access controls to ensure employees have access only to the information necessary for their roles Regularly review and update access permissions, especially when employees change roles or depart from the company Employee Education and Training: Conduct regular cybersecurity awareness training sessions to educate staff on recognizing phishing attempts and other social engineering attacks Develop and enforce a clear cybersecurity policy that outlines acceptable use of company resources and data handling procedures Data Encryption: Ensure that all sensitive data, both at rest and in transit, is encrypted using industry-standard encryption protocols Utilize encrypted communication channels, such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS), for transmitting sensitive information Regular Software Updates and Patch Management: Maintain an inventory of all software and hardware assets to ensure timely updates and patching Establish a routine schedule for applying security patches to operating systems, applications, and firmware to mitigate vulnerabilities Network Security: Deploy firewalls to monitor and control incoming and outgoing network traffic based on predetermined security rules Implement intrusion detection and prevention systems (IDPS) to identify and respond to potential security breaches in real-time Business Continuity & Risk Management: Data Backup and Recovery: Regularly back up all critical data to secure, off-site locations to prevent loss in case of a security incident Develop and test a disaster recovery plan to ensure business continuity in the event of a cyberattack or data breach Third-Party Risk Management: Conduct thorough due diligence on third-party vendors to assess their cybersecurity posture before engaging in business relationships Establish clear contractual agreements that outline security expectations and responsibilities for safeguarding shared data Regular Security Audits and Assessments: Perform periodic security audits to evaluate the effectiveness of existing security measures and identify areas for improvement Utilize vulnerability scanning tools to detect and remediate security weaknesses proactively Incident Response Planning: Develop a comprehensive incident response plan that outlines procedures for detecting, responding to, and recovering from cybersecurity incidents Conduct regular drills and simulations to ensure all team members are prepared to act swiftly and effectively during a security event Compliance with Regulatory Standards: Stay informed about relevant cybersecurity regulations and standards applicable to the accounting industry, such as the NIST Cybersecurity Framework Ensure that all security practices align with legal requirements to avoid potential penalties and maintain client trust Support ISO 27001 and GDPR compliance initiatives Qualifications: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field Basic understanding of cybersecurity principles and best practices Familiarity with tools such as Active Directory, endpoint protection software, password managers, and VPNs is a plus Strong problem-solving skills and attention to detail Excellent communication and teamwork abilities Key Competencies: Technical Proficiency Analytical Thinking Attention to Detail Effective Communication Proactive Learning What Makes This Role Unique at Unreconciled: Protect financial data for high-growth startups and Web3 companies Work across two offices (Ahmedabad and Kochi) managing security infrastructure Direct reporting to Jay Desai (CTO) with significant autonomy Opportunity to build security framework from ground up as we scale Exposure to international compliance requirements (UK/US data protection) Work Environment: Hours: 12:30 PM - 10:00 PM IST (with on-call responsibilities) Location: Ahmedabad office Team: Work independently while coordinating with CTO and external consultants Growth Path: Progress to IT Head or Security Engineer role Company Benefits: UK Work Culture: Collaborative environment with flat hierarchy 12 Fixed Holidays Per Year 18 Casual Leaves Per Year 14 Work from Home Days Per Year Best in Class Infrastructure Daily Dinner Provided Show more Show less

Posted 1 day ago

Apply

4.0 - 7.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 days ago

Apply

5.0 - 8.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM – Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Engage and contribute to the Identity & Access Management projects Work effectively as a team member, sharing responsibility, providing support, maintaining communication, and updating senior team members on progress Execute the engagement requirements, along with review of work by junior team members Help prepare reports and schedules that will be delivered to clients and other interested parties Develop and maintain productive working relationships with client personnel Build strong internal relationships within EY Consulting Services and with other services across the organization Help senior team members in performance reviews and contribute to performance feedback for staff/junior level team members Contribute to people related initiatives including recruiting and retaining IAM professionals Maintain an educational program to continually develop personal skills Understand and follow workplace policies and procedures Building a quality culture at GTH Manage the performance management for the direct reportees, as per the organization policies Foster teamwork and lead by example Training and mentoring of project resources Participating in the organization-wide people initiatives Skills And Attributes For Success Hands-on experience on end-to-end implementation of various IAM tool, with expertise in Okta. Completed at least 2-6 implementations. Good understanding of Access Management and CIAM solutions. Strong Understanding of Okta API’s and good understanding of XML, HTML, CSS. Should be capable of dissecting large problems and designing modular, scalable solutions. Validated experience of onboarding applications on leading IAM platforms like Okta, PINGFED. Knowledge on FIDO, OAuth, Open ID connect and REST Concepts. Hands-on experience in setting up the Identity and Access Management environment in standalone and cluster environment. Hands-on experience on configuring the tool as per the requirements. Hands-on experience on Directory level integration with Okta for AD, LDAP, Azure AD, Oracle AD. Good Understanding on IWA and Okta Workflows. Hands-on experience on Okta APIs. Should be knowledge on Okta Access Gateway, Okta Advance Server Access and SCIM. Hands-on experience on developing custom UI pages, branding and email template as per business needs. Should be familiar with the RBAC, ABAC, User provisioning, data synchronization, password management and IAM governance with AM tools such as Okta. Strong understanding of access management fundamentals like SSO, authentication and authorization. Good hands-on experience on OAuth 2.0, OIDC, WS-Fed protocols. Define and set up approach for risk-based MFA and applications access control. Hands-on experience on security related assessments and configuration for AM platforms, adaptive risk configurations and Multi-factor authentications. Capability of understanding the business requirements and converting that into design. Ability to perform risk assessment and threat modelling exercises with technology engineering teams. Should be flexible to work on new technologies in IAM domain. Worked in client facing role. Need to be thorough in their respective tool with hands-on experience involving configuration, implementation & customization. Hands-on Java/Python development and debugging experience. Use case design, Solution Requirements Specification and mapping business requirements to technical requirements (Traceability Matrix). Architecture Design (optimising the resources made available – servers and load sharing etc.). Involvement in a successful pursuit of a potential client by being part of the RFP response team. To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience Access Management tools such as Okta, PingFed Strong interpersonal and presentation skills. 5-8 Years’ Work Experience Security Analyst – IAM (Okta) Very good understanding of information security concepts with in-depth knowledge of IAM solutions and latest trends. Should be able to understand business requirement and translate them in technical requirement and implement the same. Experience in installation, configuration, deployment, and implementation on Okta tool. Experience over integration of on-prem and legacy applications with Okta. Good understanding of federation protocols like SAML2.0, OAuth, OIDC, WS-Fed, SWA Working knowledge on multi-factor authentication, Security Rules, Policies and Provisioning. Hands-on experience in troubleshooting the issues related with Okta and any other AM specific tools. Scripting knowledge in Python Unix Shell scripting. Basic AD and LDAP Functionality authentication, authorization. Experience in Directory Integration with Okta. Experience in troubleshooting the access related issue reported by application team. Self-motivated and works with minimal direction. Takes ownership of task and executes. Should have had direct client experience, including working with client teams in an on-site and offshore mode. Good soft skills i.e., verbal & written communication, technical document writing etc Customer orientation skills Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. What We Look For Who has hands on experience in setting up the Identity and Access Management environment in standalone and cluster environment. Who has hands-on Development experience on Application and Directory Integration, User Provisioning, Okta Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 days ago

Apply

4.0 - 7.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 days ago

Apply

4.0 - 7.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 days ago

Apply

4.0 - 7.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 days ago

Apply

2.0 - 5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In cybersecurity incident management at PwC, you will focus on effectively responding to, and mitigating, cyber threats, maintaining the security of client systems and data. You will be responsible for identifying, analysing, and resolving security incidents to minimise potential damage and protect against future attacks. Driven by curiosity, you are a reliable, contributing member of a team. In our fast-paced environment, you are expected to adapt to working with a variety of clients and team members, each presenting varying challenges and scope. Every experience is an opportunity to learn and grow. You are expected to take ownership and consistently deliver quality work that drives value for our clients and success as a team. As you navigate through the Firm, you build a brand for yourself, opening doors to more opportunities. Skills Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to: Apply a learning mindset and take ownership for your own development. Appreciate diverse perspectives, needs, and feelings of others. Adopt habits to sustain high performance and develop your potential. Actively listen, ask questions to check understanding, and clearly express ideas. Seek, reflect, act on, and give feedback. Gather information from a range of sources to analyse facts and discern patterns. Commit to understanding how the business works and building commercial awareness. Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements. IAM Operations Associate (India) JD - Ping A career in our Cyber Managed Services will provide you the opportunity to solve our clients most critical business and data protection related challenges. You will be part of a growing team driving strategic programs, data analytics, innovation, deals, cyber resiliency, response, and technical implementation activities. You will have access to not only the top Cybersecurity, Privacy, and Forensics professionals at PwC, but to our clients and industry analysts across the globe. A career in our Advisory Acceleration Center is the natural extension of PwC’s leading class global delivery capabilities. We provide premium, cost-effective, high-quality services that support process quality and delivery capability in support for client engagements. Our Acceleration Center team extends our leading Cybersecurity, Privacy & Forensics capabilities. Responsibilities As a Cyber Ops Associate, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to: Share and collaborate effectively with others, creating a positive team spirit. Identify and make suggestions for improvements when problems and/or opportunities arise. Validate data and analysis for accuracy and relevance. Follow risk management and compliance procedures. Keep up to date with developments in my area of specialty Communicate confidently in a clear, concise and articulate manner - verbally and in written form. Seek opportunities to learn about the wider economy alongside the business models/corporate governance and/or regulatory environment of our clients Uphold the firm's code of ethics and business conduct Basic Qualifications Minimum Degree Required: Bachelor’s Degree Minimum Years of Experience: 2 to 5 Years Certification(s) Preferred: Ping Identity certified professionals are strongly preferred. Preferred Knowledge/Skills Demonstrates knowledge, leadership, and/or a proven record of success in the following areas: Proficiency with IAM platforms such as Ping Identity, Microsoft Azure AD, or similar. Proficient knowledge of IAM technologies, such as user provisioning, access management, authentication. Knowledge of IT security principles, including authentication, authorization, and encryption. Advanced knowledge of identity federation, Single Sign-On (SSO), and Multi-Factor Authentication (MFA) solutions. Strong understanding of IAM concepts and protocols (SAML, OAuth, OpenID Connect). Experience with Enterprise Provisioning, Roles based Access Controls, Single-Sign On, external and internal federation and systems integration. Knowledge of regulatory compliance requirements related to identity management (e.g., GDPR, HIPAA). Proficiency in integrating IAM solutions with a wide range of applications and platforms. Experience with APIs, SDKs, and automation scripting (e.g., Python, PowerShell) for complex IAM workflows. Basic knowledge of networking concepts and security principles. Understanding of firewalls, VPNs, and encryption technologies. Strong analytical and troubleshooting skills to resolve complex identity-related issues. Good experience in ITIL process. Exceptional analytical skills to diagnose and resolve complex identity-related issues. Strong analytical and problem-solving skills to troubleshoot and resolve access management issues. Ability to work effectively in a fast-paced environment and manage multiple priorities and projects simultaneously Innovative thinking to develop solutions for unique IAM challenges. Excellent communication and collaboration skills to work with cross-functional teams and stakeholders. IAM L1 Analyst Responsibilities Oversee daily operations of identity and access management (IAM) systems. Ensure the smooth functioning of identity services, including user provisioning, de-provisioning, and access control. Monitor identity systems for performance and security issues. Implement advanced monitoring solutions to proactively identify performance and security issues. Perform regular maintenance and updates to ensure system efficiency and security compliance. Manage high-priority identity-related incidents and conduct root cause analysis. Develop risk management strategies and mitigation plans for IAM-related issues. Lead the creation and enforcement of comprehensive access control policies. Act as a liaison between IT, security, and business units to ensure IAM solutions meet organizational needs. Provide technical support and guidance to users regarding identity management solutions. Provide leadership and mentorship to junior consultants and other team members. Facilitate knowledge sharing and skill development within the team. Maintain comprehensive documentation of system configurations, processes, and changes. Lead efforts in generating comprehensive reports on IAM operations and performance metrics. Implement best practices and innovative solutions to enhance IAM systems. Drive continuous improvement initiatives and the adoption of best practices. Tools Knowledge: Ping Identity, Entra ID, Active Directory, Postman, Putty, WinSCP, Git, ServiceNow, Jira, Python, REST API Show more Show less

Posted 2 days ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Job Description: Our SRE role spans software, systems, and operations engineering. If your passion is building stable, scalable systems for a growing set of innovative products, as well as helping to reduce the friction for deploying these products for our engineering team, Pattern is the place for you. Come help us build a best-in-class platform for amazing growth. This position requires minimum 3 years of working experience on SAAS products Key Responsibilities: Infrastructure and Automation Design, build, and manage scalable and reliable infrastructure in AWS (Postgres, Redis, Docker, Queues, Kinesis Streams, S3, etc.)Develop Python or shell scripts for automation, reducing operational toil. Implement and maintain CI/CD pipelines for efficient build and deployment processes using Github Actions. Monitoring and Incident Response Establish robust monitoring and alerting systems using observability methods, logs, and APM tools. Participate in on-call rotations (aligned with US business hours) to respond to incidents, troubleshoot problems, and ensure system reliability. Perform root cause analysis on production issues and implement preventative measures to mitigate future incidents. Cloud Administration Manage AWS resources, including Lambda functions, SQS, SNS, IAMs, RDS, etc. Perform Snowflake administration and set up backup policies for various databases. Reliability Engineering Define Service Level Indicators (SLIs) and measure Service Level Objectives (SLOs) to maintain high system reliability. Utilize Infrastructure as Code (IaC) tools like Terraform for managing and provisioning infrastructure. Collaboration and Empowerment Collaborate with development teams to design scalable and reliable systems. Empower development teams to deliver value quickly and accurately. Document system architectures, procedures, run books and best practices. Assist developers in creating automation scripts and workflows to streamlineoperational tasks and deployments. Innovative Infrastructure Solutions Spearhead the exploration of innovative infrastructure solutions and technologies aligned with industry best practices. Embrace a research-based approach to continuously improve system reliability, scalability, and performance. Encourage a culture of experimentation to test and implement novel ideas for system optimization. Required Qualifications Bachelor’s degree in a technical field or relevant work experience 6+ years of experience in engineering, development, DevOps/SRE fields 3+ years experience deploying and managing systems using Amazon Web Services 3+ years experience on Software as a Service (SaaS) applications. Proven “doer” attitude with ability to self-start, take a project to completion. Demonstrate project ownership. Familiarity with container orchestration tools like Kubernetes, Fargate, etc. Familiarity with Infrastructure as Code tooling like Terraform, CloudFormation, Ansible, Puppet Experience working with CI/CD automated deployments using tools like Github Actions, Jenkins, CircleCI Experience working on observability tools like Datadog, NewRelic, Dynatrace, Grafana, Prometheus, etc. Experience with Linux server management, bash scripting, SSH keys, SSL/TLS certificates, MFA, cron, and log files Deep understanding of AWS networking (VPCs, subnets, security groups, route tables, internet gateways, NAT gateways, NACLs), IAM policies, DNS, Route53, and domain management Strong problem-solving and troubleshooting skills Attention to Details: Thoroughness in accomplishing tasks, ensuring accuracy and quality in all aspects of work. Excellent communication and collaboration abilities Desire to help take Pattern to the next level through exploration and innovation Preferred Qualifications Experience in deploying applications on ECS, Fargate with ELB/ALB and Auto Scaling Groups. Experience in deploying serverless applications with Lambda, API Gateway, Cognito, CloudFront. Experience in deploying applications built using JavaScript, Ruby, Go, Python. Experience with Infrastructure as Code (IaC) using Terraform. Experience with database administration for Snowflake, Postgres. AWS Certification would be a plus. A focus on adopting security best practices while building great tools. What We're About Data Fanatics: Our edge is always found in the data Partner Obsessed: We are obsessed with partner success Team of Doers: We have a bias for action Game Changers: We encourage innovation Pattern is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. Show more Show less

Posted 2 days ago

Apply

3.0 - 5.0 years

4 - 5 Lacs

Thiruvananthapuram

On-site

3 - 5 Years 2 Openings Trivandrum Role description We are seeking a skilled Identity and Security Engineer to design, implement, and manage scalable Identity and Access Management (IAM) solutions across our hybrid enterprise environment. This is a hands-on engineering role that demands a strong grasp of IAM protocols, cloud security, and automation. You will collaborate closely with infrastructure, DevOps, application, and compliance teams to embed identity security as a core pillar of our architecture. Your contributions will play a vital role in protecting users, data, and applications across a complex IT landscape. Key Responsibilities Identity Architecture & Engineering Design and deploy scalable IAM solutions (SSO, MFA, RBAC). Manage identity lifecycle processes (onboarding, offboarding, access reviews). Integrate IAM with cloud platforms (Azure AD, AWS IAM), enterprise systems, and SaaS tools. Security Operations & Automation Develop automation scripts for provisioning, de-provisioning, and access management. Deploy and manage Privileged Access Management (PAM) solutions. Support implementation of Zero Trust Architecture and enforce least-privilege principles. Monitoring, Detection & Incident Response Monitor identity-related events using SIEM and IAM analytics. Investigate and respond to suspicious access patterns and incidents. Perform root cause analysis and recommend security improvements. Compliance & Governance Ensure IAM systems align with compliance frameworks (GDPR, PCI-DSS, ISO 27001). Maintain access logs, audit trails, and documentation. Participate in internal audits, risk assessments, and policy creation. Collaboration & Continuous Improvement Work with DevOps and Security to integrate IAM into CI/CD pipelines. Mentor junior engineers and support knowledge sharing. Stay updated on emerging IAM trends, tools, and threats. Required Qualifications Minimum 5 years of experience in IAM or security engineering roles. Proficiency in IAM protocols (SAML, OAuth2, OpenID Connect, SCIM, LDAP). Hands-on experience with Azure AD, Active Directory, AWS IAM, or GCP IAM. Experience with PAM solutions (CyberArk, BeyondTrust, or HashiCorp Vault). Strong scripting skills (e.g., PowerShell, Python). Solid understanding of Zero Trust principles and identity governance. Preferred Qualifications Relevant certifications (e.g., Microsoft Identity and Access Administrator, CISSP, Azure Security Engineer). Experience in large-scale enterprise or retail IT environments. Familiarity with behavioral identity analytics and Just-In-Time (JIT) access. Exposure to DevSecOps practices and integrating IAM into CI/CD workflows. What We Offer Competitive compensation and performance-based incentives Health, dental, and vision insurance plans Employee wellness and discount programs Certification and professional development support Collaborative and security-first work culture Opportunity to work on impactful projects across digital and retail platforms Skills Identity Access Management,Information Security,Security Monitoring About UST UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.

Posted 2 days ago

Apply

0 years

0 Lacs

Hyderābād

On-site

Job Summary Azure Entra-Connect Administrator to maintain and troubleshoot Hybrid AD infrastructure. play a key role in ensuring the stability security and scalability of Azure Entra-connect environment As well as supporting a range of related technologies including Azure Entra-Connect MFA Conditional access Azure Insight NPS DHCP DNS KMS DFS and PKI. Responsibilities Deep Expertise in AD concepts Azure Architecture and troubleshooting. Strong hands-on experience with Azure AD DHCP DNS DFS and PKI. Proficient in Hybrid Azure Active Directory Environment (Azure Entra-Connect) Administration and Reporting. Proficient in Server Operating system Windows Server 2016 2019 and 2022. Ability to work independently and prioritize tasks effectively and involve P1 and P2 issues. Problem solving skills and attention to providing the root cause analysis. Architecting designing consulting Directory/DNS/Entra solutions as per enterprise/business requirements. Build/ Configure/Maintain the azure resources in azure IaaS and PaaS environment. Configure and maintain the azure Conditional access MFA PIM HA DRS Backups and Restoration conduct DR drills Virtual Machines Migration etc. Entra: Responsible for monitoring evaluating and proposing adoption of new Entra services/capabilities. Integrate AD with Azure AD / Azure Entra-Connect to synchronize On-prem AD objects with Azure/Troubleshoot Azure Entra-Connect sync issues. Partnering with other Entra stakeholders (non-DS) deliver new enterprise solutions/capabilities and Perform frequent AD health checks. Manage and maintain all aspects of AD including users groups computers OUs GPOs trusts and FSMO roles / Troubleshoot account lockout issues. Optimize AD performance and troubleshoot complex issues /Conducting Root cause analysis. Implement and enforce AD security best practices /Keeping up with industry trends and identify opportunities for improvement of existing configuration. Build and configure new domain controllers/Upgrade Domain controllers to latest OS. Demote the Domain controllers and perform meta data cleanup. Patch Domain Controllers using the WSUS SCCM patching tools and validate the post patching server health using the PowerShell scripts. Move or seize the FSMO roles during the Primary domain control fail. Create/Maintain the AD group policies. Configure/Maintain/Troubleshoot DHCP DNS NPS servers. Configure/maintain backups of DNS zones DHCP Servers Scopes and AD GPOs. Troubleshoot DNS resolutions and name server issues. Troubleshoot DHCP client configuration and connectivity issues. Configure and maintain DHCP failover/ DHCP Cluster (business continuity) Configure and manage Network access policies including authentication authorization and accounting. Configure and manage DFS namespaces and replication.

Posted 2 days ago

Apply

4.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. TCS Hiring for Okta Role**: Okta Engineer/ Developer/ Admin/ Specialist Required Technical Skill Set: Okta, SSO, MFA, SCIM, OpenID, OAuth, SAML Desired Experience Range: 4+ years Joining Location: PAN India We are currently planning to do a Walk-In Interview on 21st June 2025 at TCS Chennai Drive Date: 21st June 2025 (Saturday) Venue : TCS Siruseri ATL Building- 1/G1, SIPCOT IT Park Navalur, Siruseri, Tamil Nadu 603103 Job Description Assist with managing Policies, standards and IT Controls for IAM related to SSO/MFA Work with large business programs to provide IAM/SSO/MFA guidance, requirements and help to develop solutions patterns. Expertise with Okta APIs and integrating applications and third party services with Okta Expertise with various OAuth2 Flows supported in Okta, Custom Authorization Servers, SAML2.0 Federations, OpenID Connect, SCIM integrations and legacy based integrations. Design and implement API, external IDP integrations, directory and database integrations and synchronization. Experience in user onboarding, application onboarding and user lifecycle management. Acts independently to establish and implement security and define service integrations with all other IT services such as build teams, asset management, service and incident management Should be skilled in coordinating and communicating with other teams to manage dependencies on other teams and stakeholders. Ability to work under fixed timelines and meet deadlines Work closely with Okta Architects, Okta developers and customer business and application development team to understand current landscape, use cases, gather requirements and plan Okta Setup and Integration activities. Communicating to clients and partners aspects of both the product and the implementation at the technical and/or functional level appropriate for the situation Show more Show less

Posted 2 days ago

Apply

5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Qualification- MFA and BFA Requirements- Minimum of 5years teaching at the Middle School level, with at least 3 years specifically within the MYP for years 4 &5 Recognized teaching qualification with strong knowledge of the MYP/DP curriculum is preferred. At least two years of teaching experience within the IB programmes is preferred. Show more Show less

Posted 2 days ago

Apply

1.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

About *RenderNet.ai RenderNet is building the next generation of AI powered story telling tools which turbo charges the productivity for creatives across industries.\ \ Role Overview We are looking for a Visual Designer to join our dynamic creative team. The ideal candidate will be enthusiastic about learning, open to feedback, and able to conceptualize fresh, compelling designs that align with our brand and client objectives. Key Responsibilities AI Design: Learn generative AI tools and stay updated with latest innovations. Help founders and product managers research and experiment on new workflows Design & Layouts Assist in creating and refining design assets for web and print (including banners, social media graphics, presentations, brochures, and other marketing materials). Work closely with senior designers and marketing teams to produce high-quality visuals that uphold brand consistency. Brand Consistency Help maintain and evolve Rendernet.ai’s visual identity across all platforms, ensuring a cohesive and professional look. Collaboration Work with cross-functional teams (developers, product managers, marketing) to understand design requirements and deliver innovative solutions. Participate in brainstorming sessions and contribute to creative strategy discussions. File Management & Organization Maintain organized project folders, version control, and ensure all artwork is properly saved and documented for future use. Required Skills & Qualifications Education & Experience: Bachelor’s or Masters degree in Design (B.Des, B.Arch, BFA, M.Des, M.Arch, MFA) 0–1 years of industry experience or relevant internships in graphic design. Software Proficiency Familiarity with Adobe Creative Suite (Photoshop, Illustrator, InDesign) and Figma Design Fundamentals Strong understanding of color theory, typography, layout, and composition. Eye for detail and consistency. Creativity & Communication Ability to translate client or internal briefs into visually appealing designs. Good verbal and written communication skills for feedback and presentation purposes. Time Management Capable of handling multiple tasks, meeting tight deadlines, and adapting to evolving priorities. What We Offer Opportunity to work on the most cutting edge of design and product with a steep learning curve. Show more Show less

Posted 2 days ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies