Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Join a Leading Cybersecurity Innovator for a Strong Future. Job Overview Deploy, configure, and manage the CyberArk Privileged Access Management (PAM) solution, including the CyberArk Vault, CPM, PSM, and PTA. Design and implement secure access policies, password vaulting, session monitoring, and privileged access controls across various systems and platforms. Install, configure, and maintain CyberArk components, ensuring the highest levels of security and efficiency. Monitor the performance of the CyberArk infrastructure and troubleshoot issues as they arise. Implement proactive monitoring of the CyberArk systems to ensure availability, reliability, and security of the privileged access management solutions. Integrate CyberArk with other enterprise security tools and systems, such as SIEM, MFA, Active Directory, and other identity management solutions. Collaborate with other teams (e.g, network security, application security) to improve security posture and manage privileged access across the organization. Provide expert-level support for incidents related to CyberArk, including troubleshooting and providing resolutions to security issues. Respond to security incidents and work to mitigate any risks involving privileged access or compromised credentials. Requirements 3-5 years of hands-on experience with CyberArk Privileged Access Management solutions. Experience with CyberArk Vault, CPM, PSM, PTA, and related components. Strong knowledge of network and system security principles. Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field (preferred). Personal Attributes Self-motivated with the ability to work independently and as part of a team. Strong attention to detail and a proactive approach to problem-solving. Willingness to learn and grow in the information security field. About the Company : (www.acpl.com) : We at ACPL are Cyber Security specialists and help corporates with their complete cycle of setting up the Cyber security platform. Right from selecting the adaptable security tools to the deployment of the same and then providing dedicated cybersecurity services. Established in 1990, ACPL is the developer of India's first antivirus software "SmartDog". We offer our services and solutions by integrating complex technologies offered by the leading IT companies through strategic partnerships. Our solutions and services are majorly focused on the most challenging industry verticals like BFSI, Manufacturing, Telecommunication, Retail, Healthcare, IT/ ITES, Power, Media Education, Distribution and more. We are $70 million company with PAN India presence with services across ASIA and a branch office in Singapore and Australia. We are a team of 300+ highly qualified professionals having certifications like CISSP , CISA , GICH etc. Apart from winning various Industry awards and recognitions ACPL is 100% RBA Compliant and a certified "Great place to work". (ref:hirist.tech) Show more Show less
Posted 1 month ago
6.0 - 8.0 years
0 Lacs
Nagpur, Maharashtra, India
On-site
We are seeking a highly skilled Cyber Security Consultant with deep expertise in Identity and Access Management (IAM), especially with IBM Verify Access (ISAM) and IBM Verify Governance (ISIM). The ideal candidate will have hands-on experience designing, implementing, and maintaining IAM solutions across enterprise environments, with a strong focus on access governance, system integrations, workflow development, and security best practices. Key Responsibilities Design, implement, and support enterprise-wide IAM solutions using IBM ISAM and ISIM. Conduct current state assessments and develop IAM roadmaps and architecture strategies. Integrate IAM solutions with enterprise applications, directories, and cloud environments. Define and manage user access policies, entitlements, roles, and segregation of duties (SoD) frameworks. Implement and manage identity lifecycle workflows provisioning, de-provisioning, approvals, notifications, and certifications. Ensure compliance with internal policies and external regulatory standards (e.g., GDPR, SOX). Customize connectors, workflows, rules, and policies based on organizational requirements. Design and develop role-based access control (RBAC) and attribute-based access control (ABAC) models. Develop scripts and utilities to support automation and customization using Java, JavaScript, Shell, or other scripting languages. Integrate IAM solutions with web services, APIs, and SOA-based enterprise systems. Troubleshoot issues and optimize performance of IAM components. Provide security consulting to business and IT stakeholders for identity security-related initiatives. Assist in the development and enforcement of IAM governance and operational models. Stay current with emerging IAM trends, threats, and technologies. Required Skills & Qualifications Bachelor's degree in Computer Science, Information Security, or a related technical field. 6- 8 years of relevant experience in Cybersecurity with a focus on IAM. Hands-on experience with IBM Verify Access (ISAM) and IBM Verify Governance (ISIM). Solid understanding of identity lifecycle management, access governance, SSO, MFA, and RBAC/ABAC models. Proficiency in Java and scripting languages (Shell, Python, JavaScript). Experience working with REST/SOAP APIs, web services, and SOA workflows. Strong analytical, troubleshooting, and documentation skills. Excellent verbal and written communication, client-facing, and stakeholder management abilities. Exposure to Cloud IAM solutions (e.g., Azure AD, Okta, Ping Identity, AWS IAM). IBM Security certifications or equivalent IAM certifications. Experience with containerized deployments (Docker/Kubernetes) and DevSecOps practices. Understanding of Zero Trust Security and modern authentication protocols (OAuth2, SAML, OIDC). Technical Requirements Strong domain expertise in Identity and Access Governance. In-depth, hands-on experience with IBM Verify Access (ISAM) and IBM Verify Governance (ISIM). Proven background in IAM consulting and solution architecture. Experience in implementing, supporting, and maintaining IAM solutions. Proficiency in workflow design, rules, role definitions, notifications, certifications, connectors, policies, and entitlements. Good working knowledge of Java, scripting languages, web services, and SOA workflows. Experience with Cloud IAM solutions is a strong plus. (ref:hirist.tech) Show more Show less
Posted 1 month ago
5.0 - 10.0 years
10 - 15 Lacs
Bengaluru
Hybrid
Role & responsibilities Collaborate with business units to gather and document IAM requirements. Translate business needs into technical specifications for IAM solutions. Conduct gap analysis of existing IAM processes and recommend improvements. Assist in the design and implementation of IAM tools such as Single Sign On, Multi Factor Authentication, and Privileged Access Management. Support the implementation of role-based access control RBAC, policy frameworks, and governance structures. Ensure alignment of IAM solutions with business and regulatory requirements Design, build, and optimize complex Okta workflows to automate identity and access management processes, ensuring seamless user experiences. Collaborate with business stakeholders to gather and document workflow requirements and translate them into actionable solutions. Primary Skill Okta,Access Management (SSO/MFA),Identity Governance & Administration (IGA),Identity Management (LCM/RBAC)
Posted 1 month ago
0 years
0 Lacs
Kolkata, West Bengal, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Global Managed Service – Identity and access Management – Staff As a Azure AD Operations Support Specialist, you will be responsible for providing first-level support and maintenance of our Azure Active Directory environment. You will assist in managing user accounts, permissions, and access rights in accordance with company policies and regulatory requirements. Key Requirements / Responsibilities: Provide first-level support for Azure Active Directory issues, including user account management, group management, and access control. Assist in the creation, modification, and deletion of user accounts and groups as per the requests and in compliance with the security policies. Monitor Azure AD health and performance, responding to alerts and notifications. Help in troubleshooting and resolving authentication and authorization issues. Support the implementation of Azure AD policies, Conditional Access policies, and Multi-Factor Authentication (MFA). Collaborate with the security team to ensure compliance with governance policies and audit requirements. Document operational procedures and issue resolution steps. Participate in the on-call rotation for after-hours support as needed. Stay current with Microsoft Azure updates and new features Monitor Azure AD services, ensuring uptime and availability, and proactively address any issues that arise Assist with the management of user identities, groups, and role-based access control (RBAC) within Azure AD. Respond to and resolve service tickets related to Azure AD, including user access issues, group membership changes, and application access problems. Participate in the onboarding and offboarding of employees, ensuring proper access is granted and revoked in a timely manner. Provide training and support to end-users on Azure AD-related services and features. Stay up-to-date with the latest Azure AD features and updates to provide recommendations for improvements. Maintain documentation for Azure AD processes and operational procedures. Preferred Skills: Experience in IAM operations, with a strong emphasis on Azure AD and related Microsoft identity solutions. Demonstrated experience in operational support, incident management, and problem-solving within an IAM context. In-depth knowledge of cloud security, IAM protocols, and regulatory compliance requirements. Strong analytical, troubleshooting, and decision-making skills. Relevant certifications such as Microsoft Certified: Identity and Access Administrator Associate, ITIL, or similar Proficiency with scripting and automation tools (e.g., PowerShell, Azure CLI) to streamline operational tasks. Education: Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field. Work Requirements: Willingness to travel as required Willingness to be on call support engineer and work occasional overtime as required Willingness to work in shifts as required EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Coimbatore, Tamil Nadu, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Global Managed Service – Identity and access Management – Staff As a Azure AD Operations Support Specialist, you will be responsible for providing first-level support and maintenance of our Azure Active Directory environment. You will assist in managing user accounts, permissions, and access rights in accordance with company policies and regulatory requirements. Key Requirements / Responsibilities: Provide first-level support for Azure Active Directory issues, including user account management, group management, and access control. Assist in the creation, modification, and deletion of user accounts and groups as per the requests and in compliance with the security policies. Monitor Azure AD health and performance, responding to alerts and notifications. Help in troubleshooting and resolving authentication and authorization issues. Support the implementation of Azure AD policies, Conditional Access policies, and Multi-Factor Authentication (MFA). Collaborate with the security team to ensure compliance with governance policies and audit requirements. Document operational procedures and issue resolution steps. Participate in the on-call rotation for after-hours support as needed. Stay current with Microsoft Azure updates and new features Monitor Azure AD services, ensuring uptime and availability, and proactively address any issues that arise Assist with the management of user identities, groups, and role-based access control (RBAC) within Azure AD. Respond to and resolve service tickets related to Azure AD, including user access issues, group membership changes, and application access problems. Participate in the onboarding and offboarding of employees, ensuring proper access is granted and revoked in a timely manner. Provide training and support to end-users on Azure AD-related services and features. Stay up-to-date with the latest Azure AD features and updates to provide recommendations for improvements. Maintain documentation for Azure AD processes and operational procedures. Preferred Skills: Experience in IAM operations, with a strong emphasis on Azure AD and related Microsoft identity solutions. Demonstrated experience in operational support, incident management, and problem-solving within an IAM context. In-depth knowledge of cloud security, IAM protocols, and regulatory compliance requirements. Strong analytical, troubleshooting, and decision-making skills. Relevant certifications such as Microsoft Certified: Identity and Access Administrator Associate, ITIL, or similar Proficiency with scripting and automation tools (e.g., PowerShell, Azure CLI) to streamline operational tasks. Education: Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field. Work Requirements: Willingness to travel as required Willingness to be on call support engineer and work occasional overtime as required Willingness to work in shifts as required EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Kanayannur, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Global Managed Service – Identity and access Management – Staff As a Azure AD Operations Support Specialist, you will be responsible for providing first-level support and maintenance of our Azure Active Directory environment. You will assist in managing user accounts, permissions, and access rights in accordance with company policies and regulatory requirements. Key Requirements / Responsibilities: Provide first-level support for Azure Active Directory issues, including user account management, group management, and access control. Assist in the creation, modification, and deletion of user accounts and groups as per the requests and in compliance with the security policies. Monitor Azure AD health and performance, responding to alerts and notifications. Help in troubleshooting and resolving authentication and authorization issues. Support the implementation of Azure AD policies, Conditional Access policies, and Multi-Factor Authentication (MFA). Collaborate with the security team to ensure compliance with governance policies and audit requirements. Document operational procedures and issue resolution steps. Participate in the on-call rotation for after-hours support as needed. Stay current with Microsoft Azure updates and new features Monitor Azure AD services, ensuring uptime and availability, and proactively address any issues that arise Assist with the management of user identities, groups, and role-based access control (RBAC) within Azure AD. Respond to and resolve service tickets related to Azure AD, including user access issues, group membership changes, and application access problems. Participate in the onboarding and offboarding of employees, ensuring proper access is granted and revoked in a timely manner. Provide training and support to end-users on Azure AD-related services and features. Stay up-to-date with the latest Azure AD features and updates to provide recommendations for improvements. Maintain documentation for Azure AD processes and operational procedures. Preferred Skills: Experience in IAM operations, with a strong emphasis on Azure AD and related Microsoft identity solutions. Demonstrated experience in operational support, incident management, and problem-solving within an IAM context. In-depth knowledge of cloud security, IAM protocols, and regulatory compliance requirements. Strong analytical, troubleshooting, and decision-making skills. Relevant certifications such as Microsoft Certified: Identity and Access Administrator Associate, ITIL, or similar Proficiency with scripting and automation tools (e.g., PowerShell, Azure CLI) to streamline operational tasks. Education: Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field. Work Requirements: Willingness to travel as required Willingness to be on call support engineer and work occasional overtime as required Willingness to work in shifts as required EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Global Managed Service – Identity and access Management – Staff As a Azure AD Operations Support Specialist, you will be responsible for providing first-level support and maintenance of our Azure Active Directory environment. You will assist in managing user accounts, permissions, and access rights in accordance with company policies and regulatory requirements. Key Requirements / Responsibilities: Provide first-level support for Azure Active Directory issues, including user account management, group management, and access control. Assist in the creation, modification, and deletion of user accounts and groups as per the requests and in compliance with the security policies. Monitor Azure AD health and performance, responding to alerts and notifications. Help in troubleshooting and resolving authentication and authorization issues. Support the implementation of Azure AD policies, Conditional Access policies, and Multi-Factor Authentication (MFA). Collaborate with the security team to ensure compliance with governance policies and audit requirements. Document operational procedures and issue resolution steps. Participate in the on-call rotation for after-hours support as needed. Stay current with Microsoft Azure updates and new features Monitor Azure AD services, ensuring uptime and availability, and proactively address any issues that arise Assist with the management of user identities, groups, and role-based access control (RBAC) within Azure AD. Respond to and resolve service tickets related to Azure AD, including user access issues, group membership changes, and application access problems. Participate in the onboarding and offboarding of employees, ensuring proper access is granted and revoked in a timely manner. Provide training and support to end-users on Azure AD-related services and features. Stay up-to-date with the latest Azure AD features and updates to provide recommendations for improvements. Maintain documentation for Azure AD processes and operational procedures. Preferred Skills: Experience in IAM operations, with a strong emphasis on Azure AD and related Microsoft identity solutions. Demonstrated experience in operational support, incident management, and problem-solving within an IAM context. In-depth knowledge of cloud security, IAM protocols, and regulatory compliance requirements. Strong analytical, troubleshooting, and decision-making skills. Relevant certifications such as Microsoft Certified: Identity and Access Administrator Associate, ITIL, or similar Proficiency with scripting and automation tools (e.g., PowerShell, Azure CLI) to streamline operational tasks. Education: Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field. Work Requirements: Willingness to travel as required Willingness to be on call support engineer and work occasional overtime as required Willingness to work in shifts as required EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Global Managed Service – Identity and access Management – Staff As a Azure AD Operations Support Specialist, you will be responsible for providing first-level support and maintenance of our Azure Active Directory environment. You will assist in managing user accounts, permissions, and access rights in accordance with company policies and regulatory requirements. Key Requirements / Responsibilities: Provide first-level support for Azure Active Directory issues, including user account management, group management, and access control. Assist in the creation, modification, and deletion of user accounts and groups as per the requests and in compliance with the security policies. Monitor Azure AD health and performance, responding to alerts and notifications. Help in troubleshooting and resolving authentication and authorization issues. Support the implementation of Azure AD policies, Conditional Access policies, and Multi-Factor Authentication (MFA). Collaborate with the security team to ensure compliance with governance policies and audit requirements. Document operational procedures and issue resolution steps. Participate in the on-call rotation for after-hours support as needed. Stay current with Microsoft Azure updates and new features Monitor Azure AD services, ensuring uptime and availability, and proactively address any issues that arise Assist with the management of user identities, groups, and role-based access control (RBAC) within Azure AD. Respond to and resolve service tickets related to Azure AD, including user access issues, group membership changes, and application access problems. Participate in the onboarding and offboarding of employees, ensuring proper access is granted and revoked in a timely manner. Provide training and support to end-users on Azure AD-related services and features. Stay up-to-date with the latest Azure AD features and updates to provide recommendations for improvements. Maintain documentation for Azure AD processes and operational procedures. Preferred Skills: Experience in IAM operations, with a strong emphasis on Azure AD and related Microsoft identity solutions. Demonstrated experience in operational support, incident management, and problem-solving within an IAM context. In-depth knowledge of cloud security, IAM protocols, and regulatory compliance requirements. Strong analytical, troubleshooting, and decision-making skills. Relevant certifications such as Microsoft Certified: Identity and Access Administrator Associate, ITIL, or similar Proficiency with scripting and automation tools (e.g., PowerShell, Azure CLI) to streamline operational tasks. Education: Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field. Work Requirements: Willingness to travel as required Willingness to be on call support engineer and work occasional overtime as required Willingness to work in shifts as required EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
4.0 - 5.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Details: Job Description Detailed Job Description:- Mandatory Skills:-4-5 years relevant experience in Intune Intune/Azure AD - User Management: On boarding of new users. Assigning User Licenses to users for endpoint configuration. Create, edit or delete Azure Active Directory (AAD) User and Device groups. Intune/AAD - Application Creation and Deployment/Assignment Upload and Configure LOB applications (Windows, iOS and Android). Upload and Configure OEM Store applications (Microsoft, Apple and Google). Deploy LOB applications to endpoints. Deploy OEM Store applications to endpoints. Deploy LOB/Store applications to group of users (AAD user groups). Monitor application deployment status. Intune - Service Administration Assignment of subscriptions and licenses to users. Apple APN cert Management (renewal) Android for Work (Google), Apple Business Manager (Apple), Autopilot (Microsoft). Device settings configuration to enable Azure AD join (for Windows 10 devices) MDM auto enrollment configurations (for Windows 10 devices) Reporting. Intune - Mobile Application Management LOB Application Wrapping for iOS and Android managed applications. Wrap the LOB apps using iOS SDK. Wrap the LOB apps using Android SDK. Intune - Device/Profile Management Create, Maintain, Update, Deploy and Delete policies Configuration policies like Device restrictions, Wi-Fi profile, domain join profile etc. Compliance Policies iOS, Android and Windows. Device Life Cycle Enrollment process of endpoints (iOS, Windows 10 and Android). Retire and Wipe Devices. AAD/Intune - Conditional Access Create, Maintain, Update, Deploy and Delete CA policies CA for Windows, Android, iOS, MacOS. Intune - Auto-Pilot Excellent experience on the below. Extensive experience in Design & implementation of Microsoft Endpoint Configuration Manager (MECM)/SCCM environment including Co-Management, CMG Extensive experience in designing and execute the technical implementation of Windows 10 Autopilot\Modern Management solution using Intune, Azure AD, Office365 based on client requirements and design specifications. Production of High-level/Low Level Design documentations. Proficient in customizing and deploying Windows 10. Knowledge on Group Policy Objects, Active Directory security and compliancy configurations and migrating to Intune CSP\ADMX templates. Experience in setting up Intune based Software Distribution, Patch Management, Windows as Service, Driver Management processes. Configure Device Compliance, Conditional access and endpoint protection policies, Windows Defender, Bitlocker, Windows Hello for Business etc. Experience in Microsoft Azure AD, AzureAD AppProxy. In depth understanding with deployment technologies to include, but not limited to AD DS, AD FS, AAD Connect, Identity & Access Management, MFA, RMS, AIP Mobile Device Management and Mobile Application Management (MAM); protection and app restrictions on for Outlook and Office mobile apps on various mobile devices. Job Requirements Details: Mandatory Skills:- Intune/Azure AD - User Management: On boarding of new users. Assigning User Licenses to users for endpoint configuration. Create, edit or delete Azure Active Directory (AAD) User and Device groups. Intune/AAD - Application Creation and Deployment/Assignment Upload and Configure LOB applications (Windows, iOS and Android). Upload and Configure OEM Store applications (Microsoft, Apple and Google). Deploy LOB applications to endpoints. Deploy OEM Store applications to endpoints. Deploy LOB/Store applications to group of users (AAD user groups). Monitor application deployment status. Intune - Service Administration Assignment of subscriptions and licenses to users. Apple APN cert Management (renewal) Android for Work (Google), Apple Business Manager (Apple), Autopilot (Microsoft). Device settings configuration to enable Azure AD join (for Windows 10 devices) MDM auto enrollment configurations (for Windows 10 devices) Reporting. Intune - Mobile Application Management LOB Application Wrapping for iOS and Android managed applications. Wrap the LOB apps using iOS SDK. Wrap the LOB apps using Android SDK. Intune - Device/Profile Management Create, Maintain, Update, Deploy and Delete policies Configuration policies like Device restrictions, Wi-Fi profile, domain join profile etc. Compliance Policies iOS, Android and Windows. Device Life Cycle Enrollment process of endpoints (iOS, Windows 10 and Android). Retire and Wipe Devices. AAD/Intune - Conditional Access Create, Maintain, Update, Deploy and Delete CA policies CA for Windows, Android, iOS, MacOS. Intune - Auto-Pilot Excellent experience on the below. Extensive experience in Design & implementation of Microsoft Endpoint Configuration Manager (MECM)/SCCM environment including Co-Management, CMG Extensive experience in designing and execute the technical implementation of Windows 10 Autopilot\Modern Management solution using Intune, Azure AD, Office365 based on client requirements and design specifications. Production of High-level/Low Level Design documentations. Proficient in customizing and deploying Windows 10. Knowledge on Group Policy Objects, Active Directory security and compliancy configurations and migrating to Intune CSP\ADMX templates. Experience in setting up Intune based Software Distribution, Patch Management, Windows as Service, Driver Management processes. Configure Device Compliance, Conditional access and endpoint protection policies, Windows Defender, Bitlocker, Windows Hello for Business etc. Experience in Microsoft Azure AD, AzureAD AppProxy. In depth understanding with deployment technologies to include, but not limited to AD DS, AD FS, AAD Connect, Identity & Access Management, MFA, RMS, AIP Mobile Device Management and Mobile Application Management (MAM); protection and app restrictions on for Outlook and Office mobile apps on various mobile devices. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
About Company: Aptara's digital content, learning and performance, and business support services are in place at market-leading companies worldwide. Our industry specialists design and implement strategies that capitalize on new digital and mobile technologies for information providers in Information Technology, law, healthcare, pharmaceuticals, insurance, financial services, and publishing. Founded in 1988, Aptara is headquartered in the United States of America and has offices on four continents. Our parent company, iEnergizer, is publicly traded in the United Kingdom. For more details please visit https://www.aptaracorp.com/ Job Description: You will be responsible to create and understand the entire process of overall visual design requirements of a large account and the projects within/under the account, for shaping the visual output of various media files/elements. You will manage the day-to-day task of your team and ensure customer requirements are met and exceed expectations. You need to have a creative flair and a strong ability to translate requirements into design. You will be providing modern solutions for an enhanced customer experience & visual interactions and also participates in pre-sales projects. Candidates Profile: Graduate / Diploma in Fine Arts (GD Art, BFA, or MFA) OR Certification in Graphic Design Added Advantage: Human-Computer Interaction (HCI), Human Factors International (HFI), or AR-VR Certification. Role & Responsibilities: Participate in pre-sales activities (RFPs, RFQs, RFIs, etc.) and create prototypes/pilots as per clients specifications & requirements. Responsible to provide Innovative solutions to customers by using new technology, techniques, and creative ideas. Ability to work on effort estimates and the assumptions for the proposal/SOW based on the design solutions provided. Conduct team meetings from time to time and maintain a healthy work environment. Create and develop deliverables as per project specifications, quality standards, and design strategy. Conduct peer reviews of the deliverables at different stages of training development. Participate in org. level activities e.g. Induction training, Project-specific functional training & Recruitment activities (candidate interviews, test evaluations etc.) Coordinate with Lead/Manager/Delivery Manager for different activities (planning, solutions, training, RFPs/RFQs/RFIs etc.) Attend client calls and ensure that the client's feedback and requirements are addressed. Participate in people management activities resolve conflicts & manage expectations. Manage large team and accounts. Coordination with vendors to ensure quality and timely delivery. Should audit the graphic design processes. Create project specific design guidelines and checklist documents, & also ensure adherence from the team. Take responsibility for work and ensure communication with leads for any delays or challenges. Skills: Conceptualize visuals based on requirements and prepare rough drafts and present ideas. Exposure in all design and development tools (Adobe CC Suite, Articulate-360, Camtasia, and other rapid development tools, etc.). Create innovative UI, mock-ups, and animations with a keen eye for detail. Ability to work independently and manage responsibilities and priorities in a dynamic and time-critical environment. Learn new tools, design approaches, & methodologies as per the trends in graphic/visual design. Expert in creating custom UI and custom interactions for rapid tools such as Storyline 360, Captivate, etc. Expert in Accessibility Compliance. Show more Show less
Posted 1 month ago
5.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Job Title: Cloud Security Consultant Location: Mumbai Experience: 5+ years Availability: Immediate Joiners Preferred Job Description: We are seeking an experienced Cloud Security Consultant to implement and maintain robust cloud security standards across leading platforms (AWS, Azure, GCP). The candidate must have a deep understanding of cloud provisioning, identity and access management, encryption standards, and network security. Key Responsibilities: Implement Secure Cloud Account & Environment Provisioning Standards (SCAEPS) including: Account/subscription setup protocols Root/owner account security controls Baseline configurations and naming standards Deploy and manage Cloud IAM Technical Baseline (IAMTB) such as: Password policies, RBAC, and MFA enforcement SSO/federation with enterprise identity systems Secure management of service principals and cross-account access Design and implement Network Security Configurations (NSCD) : Secure VPC/VNet design and subnet configurations Routing, firewall, and IDS/IPS configurations Enforce Data Encryption Standards (DETS) : AES-256 encryption and KMS key lifecycle management TLS/SSL configuration and certificate management Apply Cloud Storage Security Configurations (CSSCD) : Prevent public access to storage Encryption and access policy implementation for cloud storage Requirements: Minimum 5 years of experience in cloud security Hands-on experience with AWS/Azure/GCP security best practices Expertise in IAM, encryption, and network architecture Strong knowledge of regulatory standards (e.g., ISO, NIST, CIS) Relevant certifications preferred: AZ-500, AWS Security Specialty, CCSP, etc. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Bengaluru, Karnataka, India
Remote
Wrike is the most powerful work management platform. Built for teams and organizations looking to collaborate, create, and exceed every day, Wrike brings everyone and all work into a single place to remove complexity, increase productivity, and free people up to focus on their most purposeful work. Our vision: A world where everyone is free to focus on their most purposeful work, together. Ready to become a Wriker? As a Helpdesk Engineer, you bring solid experience in supporting enterprise IT environments with a strong customer focus and security-awareness in a dynamic workplace. You are proficient at solving a wide variety of IT issues relating to hardware, software, and user access, and you enjoy continuously improving IT processes and technologies. You are adept at managing your own priorities on daily bases and are always looking for meaningful ways to improve the support we provide to all Wrikers. About You And Your Team We are a global IT Helpdesk team of six, distributed across multiple locations, responsible for delivering reliable, high-quality IT support for over 1000 Wrike employees. As an in-office team member based in Bengaluru, you’ll become a critical part of our worldwide IT operations—supporting a broad set of devices and services, collaborating on automation projects with IT Operations, and working closely with local HR and Workplace Ops to ensure a seamless office and remote user experience. In this role, you will be: Acting as the primary point of contact for internal IT requests, owning user issues from first report to resolution and escalation if needed. Managing and improving user lifecycle processes (onboarding/offboarding), including hardware and account provisioning, and ensuring timely device return and access revocation. Ensuring device compliance and security using MDM platforms (e.g., Jamf, Intune/MEM), and collaborating with the global IT Operations team to automate device management and streamline processes. Maintaining and optimizing IT asset management, including hardware procurement, inventory monitoring, and vendor coordination for the Bengaluru office. Supporting and optimizing AV infrastructure, ensuring smooth operation for Zoom rooms and video conference events, including onsite troubleshooting and proactive maintenance. Participating in process improvements and automation initiatives to reduce manual workload and improve efficiency, quality, and security in service delivery. Serving as a local escalation point and collaborating with your global teammates to share knowledge and resolve more complex or distributed challenges. Staying current with IT best practices and technologies, with a willingness to cross-train and expand your technical skillset. Being a key support presence during major projects, onboarding cycles, and incident response situations as required. Our Technical Environment: MacOS and Windows endpoints managed with Jamf and Microsoft Endpoint Manager (Intune/MEM) Okta and SSO solutions for centralized access management and security Office 365 and Google Workspace productivity platforms Zoom video conferencing & AV hardware (Poly/Neat/Logitech) We value automation and scripting—experience with Python (especially for workflow/task automation) is a plus. PowerShell or shell scripting experience is also beneficial. IT ticketing and asset management via Wrike and/or ServiceNow CI/CD and self-service solutions being developed in partnership with IT Operations You will achieve your best if you have: Must be able to work standard Indian shift hours Should be flexible to work extended shifts whenever required This is a full-time, onsite role with mandatory attendance at the office for all 5 working days each week Advanced troubleshooting skills with the ability to diagnose and resolve hardware, software, and network problems efficiently Experience with MacOS and Windows administration in a managed, corporate setting (via MDM/SCCM/Jamf/Intune, etc.) Working knowledge of identity platforms (Okta, Azure AD, SSO/MFA concepts) Working experience with AV systems, video conferencing solutions, and modern office networking (Wi-Fi, VPN, DNS basics) Strong organizational skills and ability to prioritize in a fast-paced, distributed environment Solid communication skills with proficiency in English (written and verbal) A creative, solutions-oriented approach to IT issues, and a proven ability to think outside the box when tackling complex or unfamiliar challenges You will stand out with: Experience with configuration management or automation tools (e.g., Ansible, Terraform, scripting in Python/Bash/PowerShell) Demonstrated initiative in driving improvements to IT security, automation, or end-user workflows Familiarity with enterprise-grade IT asset management and inventory systems Experience delivering IT support across multiple geographic locations or multicultural teams Proven ability to document procedures, build knowledge bases, and enable self-service for users Strong service-oriented mindset, with exemplary analytical and problem-solving skills Perks of working with Wrike 10 days of National and Festival Holidays per year (eight fixed, two flexible) 18 days of paid vacation per year 14 days of sick leave with a medical certificate per year 5 uncertified sick days per year Group Medical Plan: Coverage for employees, spouse, children, and parents/in-laws for Rs 5,00,000. Free health checkup for employees Personal Accident Insurance: Rs 50,00,000 Term Life Insurance: Rs 50,00,000 Up to 26 weeks of paid maternity leave for the first two children 4 weeks of paid parental leave 2 days off for volunteering with nonprofit charities Broadband/Internet Reimbursement: INR 1500 per month Full-stocked pantry and complimentary lunch Hybrid work model Your recruitment buddy will be Saran Krishnamoorthy, Senior Recruiter. Who Is Wrike And Our Culture We’re a team of innovators and creators who solve the complex work problems of today and tomorrow. Hybrid work mode Wrike promotes a hybrid model for team members near our office hubs in San Diego, Prague, Dublin, Nicosia, and Tallinn, with 2–3 in-office days per week to foster collaboration and teamwork. This work mode supports our culture of collaboration and solving problems fast to deliver business outcomes and win together. Our persona 💡 Smart: We love what we do, and we’re great at it because this is our domain. Our combined knowledge in this space is unmatched. 💚 Dedicated: We get up every day focused on helping our customers win. We’re committed to helping our teammates win, too! 🤗 Approachable: We're friendly, easy to get along with, considerate, and helpful. Our culture and Values 🤩 Customer-Focused We care about our customers. We understand the customer journey, experience, and value derived from Wrike. Decision-making and action-taking are done with the customer in mind. 🤝 Collaborative We work as one and win together, each bringing unique strengths that contribute to diversity of thought for better outcomes. Leveraging our own work management platform, we foster an environment of creative collaboration and shared achievement. 🎨 Creative We strive to succeed through continuous innovation. It’s our pursuit of novel concepts that helped us create a market category. We continue to cultivate a workplace that fosters creative thinking as a means of transcending conventional boundaries and empowers us to break new ground to deliver extraordinary work management solutions. 💪 Committed We believe in ownership at all levels of the organization, by owning workflows from start to finish. Each member of our team is an integral part of this commitment, establishing work as a platform for personal growth and transformation, as well as collective success and growth. Check out our LinkedIn Life Page, Company culture page, Instagram, Wrike Engineering Team, Medium, Meetup.com, Youtube for a feel for what life is like at Wrike. Show more Show less
Posted 1 month ago
4.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: Ping Identity Desired Skill Set Any: IAM, Ping Suite, Ping One, Ping Access, Ping Federate, Ping Directory, SSO, MFA, SAML, OAuth, OIDC, LDAP Experience Range : 4+ years Joining Location : PAN India We are currently planning to do a Walk-In Interview on 21st June 2025 at TCS Hyderabad. Date - 21st June 2025 (Saturday) Venue - TCS Synergy Park , Phase1, Premises No 2-56/1/36, Gachibowli, Opposite IIIT Hyderabad Campus, Seri Lingampally, RR District, Hyderabad , Telangana 500019. Job Description Role & Responsibilities: Strong knowledge on Access Management concepts, such as SSO, Federation, MFA, SAML, OAuth, OIDC, WSFED, LDAP and Reverse Proxy Good understanding of Ping Federation, Ping Access and Ping Directory Hands-on experience on onboarding applications on Ping Federate using SAML, OAuth/OIDC protocols Hands-on experience on configuring Data Store and implementation of authentication policies, adapters, PCVs, access token manager, mappings and OIDC policy Knowledge on REST APIs, XML/JSON Show more Show less
Posted 1 month ago
5.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
The Woxsen University School of Arts and Design seeks visionary artist-educators who combine exceptional creative practice with scholarly rigor and innovative pedagogy. We are building a world-class faculty that bridges traditional craftsmanship with cutting-edge technology, fostering the next generation of creative leaders who will shape the future of design and artistic expression. KEY RESPONSIBILITIES Creative Practice & Research (50%) Maintain an active and internationally recognized creative practice Develop innovative research programs combining practice-based and theoretical inquiry Publish in peer-reviewed journals and present at international conferences Exhibit work in prestigious galleries, museums, and design venues globally Secure external funding for creative projects and research initiatives Collaborate on interdisciplinary projects with industry and academic partners Teaching Excellence (35%) Deliver undergraduate and graduate courses in area of specialization Develop innovative curricula integrating traditional techniques with emerging technologies Mentor students in portfolio development and professional preparation Supervise thesis projects and independent study programs Lead study abroad programs and international design workshops Professional Service (15%) Contribute to departmental and university governance Serve on admissions, curriculum, and faculty search committees Review submissions for journals, conferences, and grant applications Engage with professional organizations and industry associations Participate in community outreach and public engagement initiatives RESEARCH & CREATIVE EXPECTATIONS Creative Output Requirements: Annual solo or significant group exhibitions/shows Regular publication of creative work in respected venues Development of innovative design solutions with measurable impact Integration of research findings into creative practice Scholarly Contributions: Minimum 2-3 peer-reviewed publications annually in design/arts journals Conference presentations at major international venues (SIGGRAPH, CHI, AIGA, etc.) Book chapters, catalogues, and scholarly essays Grant applications and external funding acquisition Innovation & Impact: Patent applications or design awards recognition Industry partnerships and collaborative projects Social impact initiatives through design intervention Technology transfer and commercialization opportunities TEACHING PORTFOLIO Undergraduate Courses: Foundation studies in design principles and methodology Specialized studio courses in area of expertise Design history and theory Professional practice and portfolio development Graduate Programs: Advanced studio practice and research methodology Thesis supervision and independent study guidance Industry collaboration projects International exchange program coordination Innovative Pedagogy: Integration of emerging technologies (AI, VR/AR, 3D printing) Experiential learning through real-world client projects Cross-cultural design workshops and global perspectives Entrepreneurship and design thinking bootcamps QUALIFICATIONS Essential Requirements: Terminal degree (MFA, Ph.D., or equivalent) from internationally recognized institution Minimum 5 years of professional practice in relevant design field Strong portfolio demonstrating creative excellence and innovation Evidence of scholarly engagement and research capability International exhibition or publication record Proficiency in industry-standard software and emerging technologies Excellent communication skills in English Show more Show less
Posted 1 month ago
4.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: Ping Identity Desired Skill Set Any: IAM, Ping Suite, Ping One, Ping Access, Ping Federate, Ping Directory, SSO, MFA, SAML, OAuth, OIDC, LDAP Experience Range : 4+ years Joining Location : PAN India We are currently planning to do a Walk-In Interview on 21st June 2025 at TCS Chennai. Date - 21st June 2025 (Saturday) Venue - TCS Siruseri, ATL Building- 1/G1, SIPCOT IT Park Navalur, Siruseri , Tamil Nadu 603103. Job Description Role & Responsibilities: Strong knowledge on Access Management concepts, such as SSO, Federation, MFA, SAML, OAuth, OIDC, WSFED, LDAP and Reverse Proxy Good understanding of Ping Federation, Ping Access and Ping Directory Hands-on experience on onboarding applications on Ping Federate using SAML, OAuth/OIDC protocols Hands-on experience on configuring Data Store and implementation of authentication policies, adapters, PCVs, access token manager, mappings and OIDC policy Knowledge on REST APIs, XML/JSON Show more Show less
Posted 1 month ago
4.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: Okta Engineer Desired Skill Set Any: IAM, SSO, MFA, Oauth, OIDC, SAML Experience Range : 4+ years Joining Location : PAN India We are currently planning to do a Walk-In Interview on 21st June 2025 at TCS Chennai. Date - 21st June 2025 (Saturday) Venue - TCS Siruseri, ATL Building- 1/G1, SIPCOT IT Park Navalur, Siruseri , Tamil Nadu 603103. Job Description Role & Responsibilities: Assist with managing Policies, standards and IT Controls for IAM related to SSO/MFA Work with large business programs to provide IAM/SSO/MFA guidance, requirements and help to develop solutions patterns. Expertise with Okta APIs and integrating applications and third party services with Okta Expertise with various OAuth2 Flows supported in Okta, Custom Authorization Servers, SAML2.0 Federations, OpenID Connect, SCIM integrations and legacy based integrations. Design and implement API, external IDP integrations, directory and database integrations and synchronization. Experience in user onboarding, application onboarding and user lifecycle management. Acts independently to establish and implement security and define service integrations with all other IT services such as build teams, asset management, service and incident management Should be skilled in coordinating and communicating with other teams to manage dependencies on other teams and stakeholders. Ability to work under fixed timelines and meet deadlines Work closely with Okta Architects, Okta developers and customer business and application development team to understand current landscape, use cases, gather requirements and plan Okta Setup and Integration activities. Communicating to clients and partners aspects of both the product and the implementation at the technical and/or functional level appropriate for the situation Show more Show less
Posted 1 month ago
40.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Job Description We’re looking for a highly skilled UI Developer with a strong background in building native applications across Windows, macOS, iOS, and Android platforms. This role requires hands-on expertise in platform-specific development tools and languages, such as C/C++, WinAPI, Cocoa, Swift, Kotlin, and Android NDK, to deliver intuitive, high-performance user interfaces tailored to each ecosystem. The ideal candidate also brings a strong focus on security, with the ability to integrate features like hardware-backed encryption, secure boot, and multi-factor authentication into consumer-facing applications. You’ll play a critical role in creating seamless, secure user experiences across desktop and mobile devices. Requirements Bachelor’s degree in Computer Science, Engineering, or a related field. Proven experience developing native applications for Windows and at least two additional platforms (macOS, iOS, Android). Proficient in C/C++ and platform-native development frameworks such as WinAPI, Cocoa, Swift, Kotlin, and Android NDK. Proven experience designing and building commercial-grade endpoint software at scale, with a strong emphasis on reliability, performance, and maintainability across diverse hardware and operating system environments Strong knowledge of TPM, Secure Enclave, and Android Keystore, with experience integrating these technologies for secure storage and authentication. Hands-on experience with cryptographic libraries such as OpenSSL, CryptoAPI, and CommonCrypto. Familiarity with authentication protocols like OAuth2.0, OpenID Connect, FIDO, and optionally Kerberos, SAML, and LDAP. Deep understanding of Windows and macOS internals, including system architecture, low-level APIs, and built-in security features such as BitLocker, User Account Control (UAC), Windows Defender, and macOS System Integrity Protection (SIP), Gatekeeper, and FileVault. Experience using mobile security testing tools such as AppScan, Burp Suite, or Mobile Security Framework (MobSF). Strong attention to detail with a passion for writing secure, efficient, and maintainable code. Excellent communication skills and a collaborative mindset, with the ability to mentor and inspire peers. Responsibilities As a member of the software engineering division, you will assist in defining and developing software for tasks associated with the developing, debugging or designing of software applications or operating systems. Provide technical leadership to other software developers. Specify, design and implement modest changes to existing software architecture to meet changing needs. Key Responsibilities Design and develop secure, high-performance native user interfaces for Windows, macOS, iOS, and Android platforms. Leverage platform-specific technologies (e.g., WinAPI, Cocoa, Swift, Kotlin, Android NDK) to deliver responsive, intuitive UI experiences. Integrate hardware-backed security features including Trusted Platform Module (TPM), Apple Secure Enclave, and Android Keystore for secure boot, attestation, and encrypted storage. Implement cryptographic algorithms and secure communication protocols to protect data at rest and in transit. Build and support robust authentication mechanisms, including MFA, biometrics (Face ID, Touch ID, fingerprint), and token-based access. Collaborate with security architects and engineers to define and implement secure software architecture. Conduct code reviews, threat modelling, and security assessments to proactively identify and address vulnerabilities. Stay informed on emerging threats, CVEs, and platform security updates, ensuring applications are always a step ahead. Partner closely with product managers, UX designers, and backend engineers to deliver cohesive, high-quality apps on time. Mentor junior developers in secure coding practices, cryptography, and platform-specific development techniques. Qualifications Career Level - IC3 About Us As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less
Posted 1 month ago
4.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: Okta Engineer Desired Skill Set Any: IAM, SSO, MFA, Oauth, OIDC, SAML Experience Range : 4+ years Joining Location : PAN India We are currently planning to do a Walk-In Interview on 21st June 2025 at TCS Hyderabad. Date - 21st June 2025 (Saturday) Venue - TCS Synergy Park , Phase1, Premises No 2-56/1/36, Gachibowli, Opposite IIIT Hyderabad Campus, Seri Lingampally, RR District, Hyderabad , Telangana 500019. Job Description Role & Responsibilities: Assist with managing Policies, standards and IT Controls for IAM related to SSO/MFA Work with large business programs to provide IAM/SSO/MFA guidance, requirements and help to develop solutions patterns. Expertise with Okta APIs and integrating applications and third party services with Okta Expertise with various OAuth2 Flows supported in Okta, Custom Authorization Servers, SAML2.0 Federations, OpenID Connect, SCIM integrations and legacy based integrations. Design and implement API, external IDP integrations, directory and database integrations and synchronization. Experience in user onboarding, application onboarding and user lifecycle management. Acts independently to establish and implement security and define service integrations with all other IT services such as build teams, asset management, service and incident management Should be skilled in coordinating and communicating with other teams to manage dependencies on other teams and stakeholders. Ability to work under fixed timelines and meet deadlines Work closely with Okta Architects, Okta developers and customer business and application development team to understand current landscape, use cases, gather requirements and plan Okta Setup and Integration activities. Communicating to clients and partners aspects of both the product and the implementation at the technical and/or functional level appropriate for the situation Show more Show less
Posted 1 month ago
5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
The role involves building and managing data pipelines, troubleshooting issues, and ensuring data accuracy across various platforms such as Azure Synapse Analytics, Azure Data Lake Gen2, and SQL environments. This position requires extensive SQL experience and a strong background in PySpark development. Responsibilities Data Engineering: Work with Azure Synapse Pipelines and PySpark for data transformation and pipeline management. Perform data integration and schema updates in Delta Lake environments, ensuring smooth data flow and accurate reporting. Work with our Azure DevOps team on CI/CD processes for deployment of Infrastructure as Code (IaC) and Workspace artifacts. Develop custom solutions for our customers defined by our Data Architect and assist in improving our data solution patterns over time. Documentation : Document ticket resolutions, testing protocols, and data validation processes. Collaborate with other stakeholders to provide specifications and quotations for enhancements requested by customers. Ticket Management: Monitor the Jira ticket queue and respond to tickets as they are raised. Understand ticket issues, utilizing extensive SQL, Synapse Analytics, and other tools to troubleshoot them. Communicate effectively with customer users who raised the tickets and collaborate with other teams (e.g., FinOps, Databricks) as needed to resolve issues. Troubleshooting and Support: Handle issues related to ETL pipeline failures, Delta Lake processing, or data inconsistencies in Synapse Analytics. Provide prompt resolution to data pipeline and validation issues, ensuring data integrity and performance. Desired Skills & Requirements Seeking a candidate with 5+ years of Dynamics 365 ecosystem experience with a strong PySpark development background. While various profiles may apply, we highly value a strong person-organization fit. Our ideal candidate possesses the following attributes and qualifications: Extensive experience with SQL, including query writing and troubleshooting in Azure SQL, Synapse Analytics, and Delta Lake environments. Strong understanding and experience in implementing and supporting ETL processes, Data Lakes, and data engineering solutions. Proficiency in using Azure Synapse Analytics, including workspace management, pipeline creation, and data flow management. Hands-on experience with PySpark for data processing and automation. Ability to use VPNs, MFA, RDP, jump boxes/jump hosts, etc., to operate within the customers secure environments. Some experience with Azure DevOps CI/CD IaC and release pipelines. Ability to communicate effectively both verbally and in writing, with strong problem-solving and analytical skills. Understanding of the operation and underlying data structure of D365 Finance and Operations, Business Central, and Customer Engagement. Experience with Data Engineering in Microsoft Fabric Experience with Delta Lake and Azure data engineering concepts (e.g., ADLS, ADF, Synapse, AAD, Databricks). Certifications in Azure Data Engineering. Why Join Us? Opportunity to work with innovative technologies in a dynamic environment where progressive work culture with a global perspective where your ideas truly matter, and growth opportunities are endless. Work with the latest Microsoft Technologies alongside Dynamics professionals committed to driving customer success. Enjoy the flexibility to work from anywhere Work-life balance that suits your lifestyle. Competitive salary and comprehensive benefits package. Career growth and professional development opportunities. A collaborative and inclusive work culture. Show more Show less
Posted 1 month ago
4.0 - 7.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
5.0 years
5 - 9 Lacs
Pune
On-site
The role involves building and managing data pipelines, troubleshooting issues, and ensuring data accuracy across various platforms such as Azure Synapse Analytics, Azure Data Lake Gen2, and SQL environments. This position requires extensive SQL experience and a strong background in PySpark development. Responsibilities Data Engineering: Work with Azure Synapse Pipelines and PySpark for data transformation and pipeline management. Perform data integration and schema updates in Delta Lake environments, ensuring smooth data flow and accurate reporting. Work with our Azure DevOps team on CI/CD processes for deployment of Infrastructure as Code (IaC) and Workspace artifacts. Develop custom solutions for our customers defined by our Data Architect and assist in improving our data solution patterns over time. Documentation : Document ticket resolutions, testing protocols, and data validation processes. Collaborate with other stakeholders to provide specifications and quotations for enhancements requested by customers. Ticket Management: Monitor the Jira ticket queue and respond to tickets as they are raised. Understand ticket issues, utilizing extensive SQL, Synapse Analytics, and other tools to troubleshoot them. Communicate effectively with customer users who raised the tickets and collaborate with other teams (e.g., FinOps, Databricks) as needed to resolve issues. Troubleshooting and Support: Handle issues related to ETL pipeline failures, Delta Lake processing, or data inconsistencies in Synapse Analytics. Provide prompt resolution to data pipeline and validation issues, ensuring data integrity and performance. Desired Skills & Requirements Seeking a candidate with 5+ years of Dynamics 365 ecosystem experience with a strong PySpark development background. While various profiles may apply, we highly value a strong person-organization fit. Our ideal candidate possesses the following attributes and qualifications: Extensive experience with SQL, including query writing and troubleshooting in Azure SQL, Synapse Analytics, and Delta Lake environments. Strong understanding and experience in implementing and supporting ETL processes, Data Lakes, and data engineering solutions. Proficiency in using Azure Synapse Analytics, including workspace management, pipeline creation, and data flow management. Hands-on experience with PySpark for data processing and automation. Ability to use VPNs, MFA, RDP, jump boxes/jump hosts, etc., to operate within the customers secure environments. Some experience with Azure DevOps CI/CD IaC and release pipelines. Ability to communicate effectively both verbally and in writing, with strong problem-solving and analytical skills. Understanding of the operation and underlying data structure of D365 Finance and Operations, Business Central, and Customer Engagement. Experience with Data Engineering in Microsoft Fabric Experience with Delta Lake and Azure data engineering concepts (e.g., ADLS, ADF, Synapse, AAD, Databricks). Certifications in Azure Data Engineering. Why Join Us? Opportunity to work with innovative technologies in a dynamic environment where progressive work culture with a global perspective where your ideas truly matter, and growth opportunities are endless. Work with the latest Microsoft Technologies alongside Dynamics professionals committed to driving customer success. Enjoy the flexibility to work from anywhere Work-life balance that suits your lifestyle. Competitive salary and comprehensive benefits package. Career growth and professional development opportunities. A collaborative and inclusive work culture.
Posted 1 month ago
0 years
0 Lacs
Ahmedabad, Gujarat, India
Remote
About Unreconciled: Unreconciled is a fast-growing fractional finance firm that provides end-to-end financial management solutions to startups, tech companies, and creative agencies globally. With offices in Ahmedabad and Kochi, we serve clients across the UK, US, and beyond, handling sensitive financial data that requires the highest level of security and compliance. Job Summary: We are seeking a proactive and detail-oriented Junior Cybersecurity Analyst to assist in enhancing and securing our IT infrastructure. The ideal candidate will play a crucial role in implementing and managing security measures essential for an accounting firm handling end-to-end finance functions. This includes setting up and managing tools such as Google Chrome Managed Browser, Active Directory (AD), Sophos Management, 1Password, and securing payment systems on laptops. As we scale from 30 to 100 employees over the next two years, this role is critical in building a robust security foundation that protects both our internal operations and our clients' sensitive financial information. Key Responsibilities: Core Security Implementation: Google Chrome Managed Browser Setup: Configure and deploy managed browser settings to ensure secure and compliant internet usage across the organization Implement policies to control extensions, updates, and security settings Active Directory (AD) Setup: Assist in the design and implementation of AD structures, including user accounts, groups, and organizational units Manage group policies to enforce security settings and access controls Sophos Management: Deploy and manage Sophos endpoint protection across all company devices Monitor security alerts and assist in incident response activities 1Password Management: Implement and manage 1Password for secure password storage and sharing among team members Educate staff on best practices for password management and security Securing Payment Systems on Laptops: Ensure that laptops used for payment processing are secured with encryption and up-to-date security patches Implement multi-factor authentication (MFA) and other security measures to protect sensitive financial data Security Operations & Compliance: Access and Identity Management: Implement role-based access controls to ensure employees have access only to the information necessary for their roles Regularly review and update access permissions, especially when employees change roles or depart from the company Employee Education and Training: Conduct regular cybersecurity awareness training sessions to educate staff on recognizing phishing attempts and other social engineering attacks Develop and enforce a clear cybersecurity policy that outlines acceptable use of company resources and data handling procedures Data Encryption: Ensure that all sensitive data, both at rest and in transit, is encrypted using industry-standard encryption protocols Utilize encrypted communication channels, such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS), for transmitting sensitive information Regular Software Updates and Patch Management: Maintain an inventory of all software and hardware assets to ensure timely updates and patching Establish a routine schedule for applying security patches to operating systems, applications, and firmware to mitigate vulnerabilities Network Security: Deploy firewalls to monitor and control incoming and outgoing network traffic based on predetermined security rules Implement intrusion detection and prevention systems (IDPS) to identify and respond to potential security breaches in real-time Business Continuity & Risk Management: Data Backup and Recovery: Regularly back up all critical data to secure, off-site locations to prevent loss in case of a security incident Develop and test a disaster recovery plan to ensure business continuity in the event of a cyberattack or data breach Third-Party Risk Management: Conduct thorough due diligence on third-party vendors to assess their cybersecurity posture before engaging in business relationships Establish clear contractual agreements that outline security expectations and responsibilities for safeguarding shared data Regular Security Audits and Assessments: Perform periodic security audits to evaluate the effectiveness of existing security measures and identify areas for improvement Utilize vulnerability scanning tools to detect and remediate security weaknesses proactively Incident Response Planning: Develop a comprehensive incident response plan that outlines procedures for detecting, responding to, and recovering from cybersecurity incidents Conduct regular drills and simulations to ensure all team members are prepared to act swiftly and effectively during a security event Compliance with Regulatory Standards: Stay informed about relevant cybersecurity regulations and standards applicable to the accounting industry, such as the NIST Cybersecurity Framework Ensure that all security practices align with legal requirements to avoid potential penalties and maintain client trust Support ISO 27001 and GDPR compliance initiatives Qualifications: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field Basic understanding of cybersecurity principles and best practices Familiarity with tools such as Active Directory, endpoint protection software, password managers, and VPNs is a plus Strong problem-solving skills and attention to detail Excellent communication and teamwork abilities Key Competencies: Technical Proficiency Analytical Thinking Attention to Detail Effective Communication Proactive Learning What Makes This Role Unique at Unreconciled: Protect financial data for high-growth startups and Web3 companies Work across two offices (Ahmedabad and Kochi) managing security infrastructure Direct reporting to Jay Desai (CTO) with significant autonomy Opportunity to build security framework from ground up as we scale Exposure to international compliance requirements (UK/US data protection) Work Environment: Hours: 12:30 PM - 10:00 PM IST (with on-call responsibilities) Location: Ahmedabad office Team: Work independently while coordinating with CTO and external consultants Growth Path: Progress to IT Head or Security Engineer role Company Benefits: UK Work Culture: Collaborative environment with flat hierarchy 12 Fixed Holidays Per Year 18 Casual Leaves Per Year 14 Work from Home Days Per Year Best in Class Infrastructure Daily Dinner Provided Show more Show less
Posted 1 month ago
4.0 - 7.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
5.0 - 8.0 years
0 Lacs
Kolkata, West Bengal, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM – Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Engage and contribute to the Identity & Access Management projects Work effectively as a team member, sharing responsibility, providing support, maintaining communication, and updating senior team members on progress Execute the engagement requirements, along with review of work by junior team members Help prepare reports and schedules that will be delivered to clients and other interested parties Develop and maintain productive working relationships with client personnel Build strong internal relationships within EY Consulting Services and with other services across the organization Help senior team members in performance reviews and contribute to performance feedback for staff/junior level team members Contribute to people related initiatives including recruiting and retaining IAM professionals Maintain an educational program to continually develop personal skills Understand and follow workplace policies and procedures Building a quality culture at GTH Manage the performance management for the direct reportees, as per the organization policies Foster teamwork and lead by example Training and mentoring of project resources Participating in the organization-wide people initiatives Skills And Attributes For Success Hands-on experience on end-to-end implementation of various IAM tool, with expertise in Okta. Completed at least 2-6 implementations. Good understanding of Access Management and CIAM solutions. Strong Understanding of Okta API’s and good understanding of XML, HTML, CSS. Should be capable of dissecting large problems and designing modular, scalable solutions. Validated experience of onboarding applications on leading IAM platforms like Okta, PINGFED. Knowledge on FIDO, OAuth, Open ID connect and REST Concepts. Hands-on experience in setting up the Identity and Access Management environment in standalone and cluster environment. Hands-on experience on configuring the tool as per the requirements. Hands-on experience on Directory level integration with Okta for AD, LDAP, Azure AD, Oracle AD. Good Understanding on IWA and Okta Workflows. Hands-on experience on Okta APIs. Should be knowledge on Okta Access Gateway, Okta Advance Server Access and SCIM. Hands-on experience on developing custom UI pages, branding and email template as per business needs. Should be familiar with the RBAC, ABAC, User provisioning, data synchronization, password management and IAM governance with AM tools such as Okta. Strong understanding of access management fundamentals like SSO, authentication and authorization. Good hands-on experience on OAuth 2.0, OIDC, WS-Fed protocols. Define and set up approach for risk-based MFA and applications access control. Hands-on experience on security related assessments and configuration for AM platforms, adaptive risk configurations and Multi-factor authentications. Capability of understanding the business requirements and converting that into design. Ability to perform risk assessment and threat modelling exercises with technology engineering teams. Should be flexible to work on new technologies in IAM domain. Worked in client facing role. Need to be thorough in their respective tool with hands-on experience involving configuration, implementation & customization. Hands-on Java/Python development and debugging experience. Use case design, Solution Requirements Specification and mapping business requirements to technical requirements (Traceability Matrix). Architecture Design (optimising the resources made available – servers and load sharing etc.). Involvement in a successful pursuit of a potential client by being part of the RFP response team. To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience Access Management tools such as Okta, PingFed Strong interpersonal and presentation skills. 5-8 Years’ Work Experience Security Analyst – IAM (Okta) Very good understanding of information security concepts with in-depth knowledge of IAM solutions and latest trends. Should be able to understand business requirement and translate them in technical requirement and implement the same. Experience in installation, configuration, deployment, and implementation on Okta tool. Experience over integration of on-prem and legacy applications with Okta. Good understanding of federation protocols like SAML2.0, OAuth, OIDC, WS-Fed, SWA Working knowledge on multi-factor authentication, Security Rules, Policies and Provisioning. Hands-on experience in troubleshooting the issues related with Okta and any other AM specific tools. Scripting knowledge in Python Unix Shell scripting. Basic AD and LDAP Functionality authentication, authorization. Experience in Directory Integration with Okta. Experience in troubleshooting the access related issue reported by application team. Self-motivated and works with minimal direction. Takes ownership of task and executes. Should have had direct client experience, including working with client teams in an on-site and offshore mode. Good soft skills i.e., verbal & written communication, technical document writing etc Customer orientation skills Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. What We Look For Who has hands on experience in setting up the Identity and Access Management environment in standalone and cluster environment. Who has hands-on Development experience on Application and Directory Integration, User Provisioning, Okta Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
4.0 - 7.0 years
0 Lacs
Gurugram, Haryana, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Technology Risk – Senior As part of our EY- Technology Risk team you will contribute technically to IT Risk and Assurance client engagements and internal projects. An important part of your role will be to actively establish, maintain, and strengthen internal and external relationships. You will also identify potential business opportunities for Ernst & Young within existing engagements and escalate these as appropriate. Similarly, you will anticipate and identify risks within engagements and share any issues with senior members of the team. The opportunity We are looking for a senior to join the Cyber COE group of our EY-Technology Risk Team. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Competencies and Expertise Needed Understanding of Identity and Access Management (IAM) principles, frameworks, and best practices. Strong consulting and advisory skills, capable of understanding and addressing clients’ needs. Hands-on experience with Privileged Access Management (PAM) tools and strategies, including the implementation of solutions like PAM services. In-depth knowledge of identity lifecycle management processes, encompassing user provisioning, de-provisioning, and role management, as demonstrated in various IAM implementation projects. Skilled in analysing security risks associated with identity and access, and formulating effective mitigation strategies, as evidenced by successful project outcomes. Understanding of role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) implementations. Interest in working on security compliance projects related to IAM. Experience or interest in leading workshops, trainings, or presentations for clients. Desire to work collaboratively with IT teams to implement IAM and PAM solutions by ensuring seamless integration and operational efficiency. Responsible for ISO 27001 based Information Security Management System implementation and sustenance Assess client information security posture, identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk Responsible to assist client in review / implement Information Security controls in areas as mentioned, but not limited to: Change management process, Incident management process, Backup process, User identity and access management, Antivirus management, SLA performance and monitoring, Media handling & Exchange of information, Physical and environmental Security, and Media & Information Handling Responsible for conducting clients’ vendors risk assessment and providing a holistic view of client’s risk exposure due to outsourcing Responsible for advising and assisting clients to develop and implement Information classification framework Conduct Information Systems audits covering IT infrastructure assets Serves as technical lead or subject matter specialist on security and privacy implementation projects, responsible for design, build, testing and deployment of solutions Technical Knowledge of Security Capabilities such as, CSPM, EDR, SIEM/SOAR, Vulnerability Management will be a plus. Have a knowledge of cyber security concepts around Vulnerability Management, Identity Management, Risk Management, etc. Good understanding of overall cyber security objective of the organization and having an ability translate data into actionable metrics to drive initiatives to improve cyber security posture. Understanding of Senior stakeholder’s requirements in the organization such CISO, CIO, CRO and ability to communicate with them in an effective manner with excellent verbal and written communication skills. Experienced in conducting information security assessments including business continuity plan audits, network security audits, GenAI Audit, and infrastructure audits. Performed NIST assessments, ISO assessments, and privacy impact audits, Data Privacy and GDPR implementation, experience in developing Data inventory and Third-Party Risk Assessment. Familiar with IT industry frameworks such as ISO27001, ISO42001, NIST, PCI-DSS, TISAX, DSA/DMA, GDPR, NIS2 and HITRUST. Your Key Responsibilities Test and supervise the delivery of assigned controls not limited to ITGC and ITAC but ISO27001 & NIST assessment, Privacy Assessment, Cyber Maturity Assessment, IT Policies Standards Assessment, Software Development Lifecycle (SDLC), System Architecture, Operating Systems, Databases, Networks, Security Systems, Cloud Services, Asset Inventories, Incident Management, Recovery Management and knowledge to intervene and redirect testing as required, resolving, or redirecting escalations as required. Collaborate with your team to manage control owners and other stakeholders, ensuring the success of each assigned reviews, minimising contention where possible and requesting support, where deemed necessary. Apply judgement and risk management concepts to identify, formulate findings and provide valuable insights to the clients to improve processes and manage risks to achieving operational and strategic goals. Review IT Policies and Standards and ensure that they are as per the different industry standard. Stay current with cybersecurity regulations and promote awareness of applicable regulatory standards, upstream risks, and industry best practices across the enterprise. To qualify for the role, you must have. Graduate (CS/ IT, Electronics, Electronics & Telecommunications,)/MBA/M.Sc. with at least 4-7 years of experience. Having industry certification such as CISSP, CISM, CRISC or CISA a strong plus Bring your significant experience in applying relevant technical knowledge in at least one of the following engagements: (a) ISO assessments (b) NIST assessments (c) Data privacy audits (d) Network and Infrastructure audits (e) Cyber Maturity Assessment (f) IT Policies and Standards Assessment (g) IAM and IT Asset Management (h) IT Health Check (i) BCP/DR audit (j) Application security audits. What We Look For A Team of people with commercial acumen, technical experience, and enthusiasm to learn new things in this fast-moving environment Opportunities to work with EY Assurance practices globally with leading businesses across a range of industries. What Working At EY Offers At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
40005 Jobs | Dublin
Wipro
19416 Jobs | Bengaluru
Accenture in India
16187 Jobs | Dublin 2
EY
15356 Jobs | London
Uplers
11435 Jobs | Ahmedabad
Amazon
10613 Jobs | Seattle,WA
Oracle
9462 Jobs | Redwood City
IBM
9313 Jobs | Armonk
Accenture services Pvt Ltd
8087 Jobs |
Capgemini
7830 Jobs | Paris,France