Jobs
Interviews

22 Multifactor Authentication Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 7.0 years

0 Lacs

thiruvananthapuram, kerala

On-site

As a Cyber Managed Service SAP IDAM Operations Specialist Staff at EY, you will play a crucial role in ensuring the security and efficiency of our identity and access management processes within the SAP environment. You will be responsible for providing L2 support for SAP IDAM-related issues, managing user identities and access rights, monitoring system performance, and collaborating with IT and security teams to ensure compliance with security policies. Your key responsibilities will include troubleshooting user access problems, managing user identities and access rights, monitoring system performance, ensuring compliance with security policies, contributing to policy documentation and training materials, conducting security reviews and audits, implementing security measures, resolving service requests, and staying updated on new SAP IDAM features. To excel in this role, you should have up to 3 years of experience in operations support, a Bachelor's degree in computer science or a related field, basic knowledge of SAP IDAM solutions, familiarity with network security and IAM technologies, and experience in customer support. Preferred skills include relevant certifications and familiarity with ITIL or other IT service management frameworks. You should be willing to travel, work as an on-call support engineer, work occasional overtime, and work in shifts as required. By joining EY, you will be part of a global network that is dedicated to building a better working world through innovative solutions and trust in capital markets.,

Posted 1 day ago

Apply

4.0 - 10.0 years

0 Lacs

hyderabad, telangana

On-site

You have solid experience with ForgeRock technologies, including deploying the ForgeRock stack on cloud platforms like AKS/GKP. You possess a minimum of 4-10 years of hands-on experience and are proficient in Java/J2EE, CI/CD concepts, and DevOps tools. Your communication and collaboration skills are strong, and you may also hold ForgeRock certifications, which are desired. In this role, you will design and customize ForgeRock products to seamlessly integrate with existing systems, applications, and workflows. Your expertise includes a deep understanding of ForgeRock Directory Services (Open DS), Oracle Unified Directory, ForgeRock Access Manager (OpenAM), and ForgeRock Identity Gateway. You have hands-on experience in installing and configuring ForgeRock OpenAM on Windows, UNIX/Linux platforms with Open DJ, Active Directory, or LDAP. Your responsibilities will include developing ForgeRock OpenAM/AM Custom Authentication modules, setting up Authentication Trees of ForgeRock AM, and implementing solutions using SAML, WS-Trust, OAuth, Kerberos, OpenID Connect, and REST API. You will work on Single Sign-On, Social Sign-On, Mobile Authentication & Authorization, Intelligent Authentication, Federation, Web & API Protection, MFA, and Self-Service for applications using OpenAM. Additionally, you will handle session management, authorization policies, adapter & rule/policy customization, UI customization, Fedlet, Java Script, Groovy, build & deployment. Experience with utilities such as Amster, Configurator, Admin tools, Web Agents, and Java Agents is essential. You will implement and maintain identity federation solutions for SSO across applications and services, automate user provisioning and deprovisioning processes, manage user onboarding, offboarding, and role changes, and perform ForgeRock UI customization while developing scripts/code for client requirements. Troubleshooting and resolving technical issues related to ForgeRock configurations, integrations, and customizations will also be part of your responsibilities.,

Posted 3 days ago

Apply

12.0 - 18.0 years

1 - 3 Lacs

Hyderabad, Coimbatore

Work from Office

Experience needed: 12+ years Type: Full-Time Mode: WFO Shift: General Shift IST Location: Hyderabad (or) Coimbatore NP: Immediate Joinee - 30 days Job Summary: We are looking for a seasoned Cloud Architect with over 12 years of IT experience, including at least 6 years in cloud technologies. The role involves designing and implementing cloud architectures on Azure or AWS, managing DevSecOps/Platform Engineering/CloudOps principles, and collaborating with cross-functional teams. The ideal candidate will have strong expertise in IaaS, PaaS, datacentre migration, and cloud governance. Responsibilities: Manage the adoption lifecycle of DevSecOps/Platform Engineering/CloudOps principles within the cloud environment, including containerization and build/release management. Collaborate with cross-functional teams to design and implement cloud-based solutions. Develop technical proposals for cloud solutions, accurately estimating effort and cost. Implement observability tools and manage cloud service consumption plans. Design, develop, and implement cloud architectures on Azure/AWS, following best practices and standards. Integrate cloud solutions with existing infrastructure and tools. Implement and manage CloudOps practices for optimized cloud resource utilization. Work closely with cross-functional teams to deliver projects on time and within budget. Provide technical expertise and guidance to other engineers. Participate in knowledge sharing and continuous improvement initiatives. Maintain engineering knowledge base and templates. Requirements: Minimum of 12+ years of IT experience, with at least 6 years focused on cloud technologies. Proven experience in cloud architecture design and implementation on Azure or AWS platforms. In-depth knowledge of IaaS and PaaS services offered by Azure or AWS. Expertise in datacentre migration strategies and best practices. Strong understanding of DevSecOps principles, including containerization technologies (e.g., Docker, Kubernetes) and build/release management tools. Experience with CloudOps methodologies for efficient cloud resource management. Proficient in Terraform automation or other cloud-native infrastructure provisioning tools. Hands-on experience with Azure AD, MFA, and SSO for user access and identity management. Familiarity with the Microsoft/AWS Well-Architected Framework for cloud architecture design. Experience in end-to-end cloud proposal management in T&M model or fixed bid engagement with cost analysis. Good understanding of cloud governance models.

Posted 4 days ago

Apply

11.0 - 15.0 years

0 Lacs

hyderabad, telangana

On-site

About Evernorth: Evernorth Health Services, a division of The Cigna Group (NYSE: CI), is dedicated to creating pharmacy, care, and benefits solutions to enhance health and vitality. The organization focuses on relentless innovation to enhance the prediction, prevention, and treatment of illnesses and diseases, making these solutions more accessible to millions of people. Information Protection Manager Position Summary: As an Information Protection Manager, you will lead a team of 5-10 cybersecurity experts responsible for conducting application and infrastructure security assessments. Your primary objective will be to ensure the confidentiality, integrity, and availability of systems across various technology platforms such as Mainframe, Mac, Windows, Linux, Cloud (AWS, Azure, Google), and more. Additionally, you will collaborate with IT and business partners to address security issues identified through security evaluations and secure scanning reports. Job Description & Responsibilities: Join us at an exciting time as we enhance our security program to align with the needs of an Agile IT workforce and enhance Cigna's security posture. This role demands strong leadership, people management, teamwork, and technical skills. Key responsibilities include: - Assessing the design and implementation of cybersecurity controls in line with Cigna's Policies, Standards, and Baselines. - Overseeing security evaluations to ensure the security and compliance of technology assets. - Conducting risk assessments of existing and new services and technologies, identifying design gaps, risks, and recommending security enhancements. - Acting as an information security expert and advisor to IT and business partners for informed risk management decisions. - Identifying opportunities to enhance risk posture, proposing solutions to mitigate risks, and assessing residual risk. - Building strong relationships with individuals and groups involved in managing information risks. - Staying updated on current and emerging security threats and designing security architectures to counter them. - Collaborating with the enterprise to evaluate security solutions aligned with business and technology needs. - Communicating risk assessment findings to information security and business partners. - Developing strong relationships with IT leaders and driving improvements within the function through automation, process enhancements, and other initiatives to enhance customer experience and function effectiveness. - Effectively communicating project status to senior management and contributing to talent attraction, retention, and development. Experience Required: - Eleven to thirteen years of relevant work experience. - Previous management experience. - Comprehensive understanding of Application, Infrastructure, Network, and Cloud security. Experience Desired: - Preferably, experience in the Health Insurance or Health Care Industry. Education and Training Required: - BS or MA in Computer Science, Information Security, or a related field or equivalent work experience. - Relevant certifications such as CISSP, CISA, CCSP, CISM, CRISC, Security+, Network+, etc. Primary Skills: - Proficiency in information security management frameworks and regulatory compliance. - Strong communication skills to articulate cyber risks, controls, and solutions effectively. - Focus on continuous improvement and challenging the status quo. - Ability to assess risks and communicate findings to drive objective decisions. Working knowledge or understanding of various technologies/protocols/methodologies: - Physical and Virtual Infrastructure - Network Security - Cloud Computing - Containerization - Infrastructure as Code - Microservices - Mobile Security - Encryption and Key Management - Multifactor Authentication - Secure Software Development Lifecycle (Note: The above job description is based on the provided details and may require further customization as per the specific job requirements.),

Posted 4 days ago

Apply

10.0 - 16.0 years

0 - 0 Lacs

Hyderabad, Pune, Chennai

Work from Office

Job Description: 10+ Years experience in Identity MFA Concepts and hands on in any MFA product. Expertise in leading , mentoring a team to deliver on time. Expertise in Java, Spring, Spring boot, Microservices and cloud. Experienced in Helm / Kubernetes / Docker / Containerisation. Experience in working on an Agile/Scrum environment. Experience in Issue analysis, trouble shooting and providing solutions. Experience in OpenShift Platform. Good communicator & Team Player. Self-organised and ability to figure out integrations of components, ability to innovate for the best practice. Providing regular updates to leads. Oracle DB experience (SQL, Stored procedure, Capacity planning, etc). Experience in any MFA product. Additional: Additional Full stack skills. Maven / Gradle. DX-APM or similar monitoring product. Splunk. GitLab Develop CI/CI Pipelines integrating with other components such a Vault and Test Automation script. Understand of GIT flow. Shell scripting on Linux. Understanding of Linux and Networking. Understanding on setting up application monitoring.

Posted 4 days ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

At Broadridge, we have cultivated a culture that prioritizes empowering individuals to achieve more. If you are enthusiastic about advancing your career while also aiding others in their professional development, we invite you to join our team. Broadridge is a prominent global fintech firm with a revenue exceeding $6 billion. Our expertise lies in providing communication services, cutting-edge technology solutions, data management, and insightful analytics. We are dedicated to facilitating business evolution for our clients by offering solutions that enhance customer engagement, manage risks, streamline operations, and drive revenue growth. With a workforce of over 10,000 full-time professionals worldwide, Broadridge maintains a substantial presence across North America, Europe, and Asia. For further information, please visit our website at www.broadridge.com. As part of our team, you will assume a technical role supporting and contributing to the planning, construction, and maintenance of the Identity Access Management (IAM) program. In this position, you will collaborate with various departments within the information technology sector and business units to incorporate information security prerequisites into Identity & Access Management solutions effectively. **Essential Qualifications:** - Bachelor's degree in Technology or a related field - Possess 3 to 6 years of experience in Information Security - Excellent verbal and written communication skills, with the ability to follow instructions and provide constructive feedback - Proficiency in managing Privileged Access Management (PAM) tools, preferably Broadcom CA PAM or BeyondTrust - Sound understanding of contemporary identity and access management principles and best practices, including managing privileged user accounts, implementing least-privileged access models, and segregating duties. Familiarity with OS-level, application-level, and database-level integrations is essential - Skilled in overseeing the identity lifecycle, encompassing provisioning, deprovisioning, and access rights management, particularly in platforms like Active Directory - Experience in bulk onboarding of users, devices, and policy configurations across diverse operating systems - Proficient in troubleshooting and resolving access-related issues, accounts, authentication, authorization, entitlements, and permissions - Ability to implement secure systems providing seamless application access, supporting internal teams while ensuring system stability and security - Responsible for administering privileged user accounts across various platforms, including Windows, UNIX, databases, networks, and applications - Availability for on-call duties on a rotational basis as dictated by business needs - Collaborative mindset for joint deliverables with extended teams - Effective coordination of multiple tasks to meet tight deadlines efficiently - Good to have Information Security/IAM Certifications **Desired Experiences:** - Contribute to identity architecture development and strategic decisions as Broadridge grows and matures - Design and implement Role-Based Access Control (RBAC) systems to enhance access management and compliance - Basic familiarity with cloud environments such as AWS or Azure, and Windows and Unix administration is advantageous - Proficient in scripting and logical thinking for automating IAM processes - Understanding of Multi-Factor Authentication (MFA) technologies - Operational skills with experience in auditing and log management - Knowledge of authentication technologies and their interaction with various platforms, both on-premises and in the cloud - Insight into integrating platforms like Active Directory, SIEM systems, MFA, and custom applications into PAM tools - Proficiency in managing Vault solutions, preferably HashiCorp, with experience in cloud environment integration **Roles and Responsibilities:** - Onboard users and devices, establish and administer access policies within the PAM tool, and ensure seamless integration and adherence to security protocols - Actively participate in implementing, integrating, and evaluating IAM solutions, expanding capabilities to support organizational growth - Supervise the maintenance and ongoing support of the PAM platform to ensure high availability and optimal performance - Provide support during system upgrades, patch deployments, and routine maintenance activities, ensuring compliance with security standards - Monitor reports to identify potential security incidents, respond to alerts, and take appropriate actions to mitigate risks - Deliver comprehensive operational support for all IAM-related processes and systems, proactively troubleshooting and resolving access-related issues - Collaborate with internal teams to gather necessary information and facilitate joint deliverables, integrating IAM solutions with other security and IT systems Join us in our commitment to fostering a collaborative, engaging, and inclusive environment where every individual feels safe, valued, and understood. At Broadridge, we celebrate and recognize the unique perspectives of our associates, striving to create a workplace that empowers everyone to bring their best selves to work.,

Posted 6 days ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

As an Application Analyst at Okta, you will play a crucial role in expanding and maintaining the Okta Integration Network (OIN). The OIN consists of various integrations such as SAML, SCIM, Secure Web Authentication, OIDC, MFA, and VPN. Your responsibilities will include verifying the functionality of features, documenting integrations submitted by partners, and coordinating efforts to deliver integrations in a timely manner. To excel in this role, you should have knowledge of web technologies (HTML, CSS, JavaScript), authentication methods (SAML, OAuth, OIDC), and API integration technologies (REST, SOAP, SCIM). Effective communication, documentation, and project management skills are essential as you will collaborate with internal teams, developers, and external partners to enhance existing integrations and add new ones to the OIN. Key Responsibilities: - Implement OIDC, SAML, and Secure Web Authentication SSO integrations using declarative tools - Troubleshoot and resolve SSO and SCIM integration issues - Review and curate integrations submitted by partners for inclusion in the Okta Integration Network - Collaborate with ISVs and Product Management teams - Document application requests, enhancements, and fixes - Work closely with developers to improve tools and processes - Collaborate with Technical Writers to enhance app integration documentation Required Skills: - Understanding of secure authentication concepts - Proficiency in HTML and CSS - Strong troubleshooting and problem-solving abilities - Ability to review third-party API documentation for integration feasibility - Capacity to build strong relationships with partners and ISVs - Detail-oriented and well-organized - Effective multitasking and adaptability - Enthusiasm for continuous learning Preferred Skills: - Familiarity with HTTP/HTTPS protocols - Basic coding knowledge - Experience in IT analysis or systems integration projects Education and Training: - Bachelor's degree in a technical field such as Information Systems or Computer Science Joining Okta means being part of a dynamic work environment that offers excellent benefits, opportunities for personal development, and a strong sense of community. If you are passionate about making a social impact and thrive in a collaborative setting, Okta is the place for you. Visit our careers page to explore current opportunities and find your fit at Okta.,

Posted 6 days ago

Apply

5.0 - 9.0 years

0 Lacs

maharashtra

On-site

You are an experienced Google Workspace Administrator responsible for managing, configuring, and maintaining the Google Workspace environment of our organization. Your primary focus will be to ensure smooth operations, optimize collaboration tools, provide end-user support, and maintain security compliance. This role is based in our Mumbai, Parel office and involves a rotational shift schedule with 5 working days and 2 days off per week. As a Google Workspace Administrator, your key responsibilities include managing and administering Google Workspace services such as Gmail, Drive, Calendar, Meet, and Admin Console. You will be provisioning and de-provisioning user accounts, groups, and access permissions in accordance with company policies. Monitoring system performance, troubleshooting issues, and coordinating with Google support when necessary are also part of your duties. Additionally, you will implement and enforce security policies, provide technical support and training to end-users, manage integrations with third-party tools, and plan migration projects or updates related to Google Workspace. Maintaining documentation on configurations, procedures, and best practices, as well as collaborating with IT teams for seamless communication and infrastructure support, are essential aspects of this role. To qualify for this position, you should have a minimum of 5 years of hands-on experience managing Google Workspace environments in a corporate setting. Strong knowledge of the Google Workspace Admin Console, user lifecycle management, and security controls is required. Experience with Google Workspace APIs, scripting, and automation will be beneficial. Familiarity with cloud security best practices, identity management, and data governance is essential. Excellent problem-solving, troubleshooting, and communication skills are necessary to effectively train and support end-users. The ability to work in rotational shifts and be onsite at the Mumbai, Parel office is mandatory. Preferred skills for this role include holding a Google Workspace Administrator certification or equivalent. Experience with other cloud platforms like Microsoft 365 and AWS is advantageous. Knowledge of ITIL or other IT service management frameworks would be a plus.,

Posted 1 week ago

Apply

0.0 - 4.0 years

0 Lacs

karnataka

On-site

The University Help Desk Associate role involves providing frontline technical support to students, faculty, and staff to ensure the smooth operation of IT services. Your primary responsibility will be to address hardware, software, and network issues efficiently, combining problem-solving skills with exceptional customer service. You will troubleshoot and resolve issues related to operating systems (Windows/macOS), software (MS Office, LMS), network connectivity, and devices (laptops, mobile). Additionally, you will assist users with password resets, account access, email/VPN setups, and multi-factor authentication through various channels such as phone, email, chat, and in-person interactions. In this role, you will be responsible for installing/configuring software/hardware, updating documentation, and escalating complex issues to senior IT staff. You will also handle setting up audio-visual equipment for campus events and classrooms, educate users on IT best practices and security protocols, and manage hardware/loaner equipment inventory. The qualifications required for this position include a high school diploma (required) and an Associates/Bachelors degree in IT, Computer Science, or a related field (preferred). Soft skills such as strong communication, patience, and problem-solving abilities are crucial for this role, along with the ability to explain technical concepts to non-technical users.,

Posted 1 week ago

Apply

2.0 - 6.0 years

0 Lacs

navi mumbai, maharashtra

On-site

As a highly skilled Team Leader Remote Desktop Support Technician with a minimum of 3 years of relevant experience supporting international clients, you will play a crucial role in ensuring the seamless operation of our clients" IT systems. Your responsibilities will include managing a team of remote technical support engineers, overseeing day-to-day operations, and ensuring that each team member meets Service Level Agreements (SLAs) and Key Performance Indicators (KPIs). In your role as Team Leader, it will be your responsibility to manage the team efficiently, enforce schedules, and provide necessary training and support for the development of your team members. Conducting team huddles, coaching sessions, and addressing weaknesses to offer solutions for improvement will be essential in delivering a superior customer experience, which aligns with the core objective of your department. You will be expected to provide remote technical support to international clients through various channels such as phone, email, chat, and remote desktop tools. Troubleshooting and resolving hardware and software issues related to desktops, laptops, printers, and peripherals will be a key aspect of your role. Additionally, you will be required to install, configure, and maintain operating systems, software applications, and security patches, as well as set up and configure VPN connections for secure remote access. Collaborating effectively with cross-functional teams across different time zones to escalate and resolve complex technical issues will be vital. Documenting support tickets, solutions, and troubleshooting procedures in ticketing systems like Jira, providing training and guidance to international end-users on IT best practices, and staying updated on emerging technologies and industry trends to enhance service delivery and client satisfaction are also part of your responsibilities. Requirements: - Minimum of 2 years of experience as a team leader in remote desktop support, preferably with international clients. - Proficiency in using remote support tools and technologies. - Strong troubleshooting skills with the ability to diagnose and resolve technical issues efficiently. - Experience with multi-factor authentication (MFA) solutions, such as Yubikey, and VPN technologies. - Excellent communication skills and cultural sensitivity to effectively interact with clients from diverse backgrounds. - Ability to work independently and collaborate effectively in a remote team environment. - Experience using collaboration tools like Slack for communication and Jira for ticket management. Preferred Qualifications: - Bachelor's degree in Computer Science, Information Technology, or related field. - Certifications in relevant technologies (e.g., CompTIA A+, Network+, Security+). - Experience supporting a diverse range of operating systems, including Windows, macOS, and Linux. TaskUs is an equal opportunity workplace and an affirmative action employer, committed to fostering diversity and creating an inclusive environment for all employees. The people-first culture at TaskUs is dedicated to benefiting employees, clients, services, and the community.,

Posted 1 week ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

You are a detail-oriented and experienced IAM Governance manager who will be a valuable addition to our cybersecurity team. In this role, you will be responsible for governance, risk management, and compliance within the Identity and Access Management (IAM) domain. Your primary focus will be to ensure that our IAM processes and policies align with industry best practices and regulatory requirements. Your key responsibilities will include: - Ensuring that IAM processes comply with policies, industry standards, and regulatory requirements. - Developing and enforcing governance policies, procedures, and standards to enhance the IAM program. - Governing the onboarding of applications to the IAM solution by ensuring adequate security controls are in place for each integration, including role matrices, Role-Based Access Control (RBAC), and access recertification cycles. You will also be responsible for: - Governing and maintaining Role-Based Access Controls (RBAC) and Segregation of Duties (SoD) principles for internal applications and infrastructure. - Monitoring user access review cycles, including access certifications and privileged access management. - Reviewing Multi-Factor Authentication (MFA) and conditional policies for internal teams. - Managing the complete user lifecycle to identify access control gaps and implement necessary controls. Additionally, you will: - Design and maintain role definitions and role-based access control frameworks. - Conduct risk assessments related to identity and access management and mitigate potential security risks. - Collaborate with various departments to ensure smooth onboarding, role changes, and offboarding processes. - Provide support and guidance on IAM to business units and end-users. - Prepare and present IAM governance reports and metrics to senior management and document IAM policies, procedures, and compliance activities. To excel in this role, you should possess strong interpersonal, analytical, and technical skills, along with decision-making and prioritization abilities. A background in the banking environment with a solid understanding of key security frameworks such as ISO27001, PCI DSS, and NIST 800-63 is preferred. Additionally, you should have over 5 years of experience in managing enterprise projects and coordinating in an enterprise environment. Your commitment to continuous learning, driving security risk reduction, and aligning actions with business priorities will be crucial in ensuring the success of our IAM governance initiatives.,

Posted 1 week ago

Apply

8.0 - 12.0 years

0 Lacs

pune, maharashtra

On-site

You will be responsible for designing, developing, and implementing robust, scalable OIC integration solutions at YASH Technologies. This includes defining integration architecture, developing flows, and ensuring optimal performance and security. It is crucial to stay current with OIC advancements and leverage IDCS for secure authentication and authorization within OIC flows. You will also be configuring and managing IDCS for security and access control, designing integrations from scratch following Oracle best practices, and debugging complex integrations. Additionally, you will manage OIC administrative tasks, lead integration migrations to OIC to minimize operational disruptions, and use Terraform to automate OIC infrastructure provisioning and management. Developing custom Java code to extend OIC functionality, diagnosing and resolving integration issues, and providing timely support for production incidents are also key aspects of the role. Expertise in Gen2 and Gen3 integrations is required, along with maintaining detailed documentation, sharing knowledge and best practices through training and mentorship, and effective communication with stakeholders. Your required technical competencies include being an expert in implementing OIC Integrations, hands-on experience in Gen2 to Gen3 integration migration, and experience on PaaS and OCI Infrastructure. In terms of behavioral competencies, you should demonstrate accountability, collaboration, agility, customer focus, effective communication, driving results, and conflict resolution. Certifications related to the field are also valued at YASH. At YASH, you will have the opportunity to create a career path tailored to your goals while working in an inclusive team environment. The company emphasizes career-oriented skilling models, continuous learning, unlearning, and relearning at a rapid pace, and a supportive Hyperlearning workplace grounded in flexibility, agility, collaboration, and ethical corporate culture.,

Posted 1 week ago

Apply

5.0 - 9.0 years

0 Lacs

hyderabad, telangana

On-site

You will be working in the AWS platform managing SAP workloads and developing automation scripts using AWS services. It is essential to support a 24*7 environment and have the willingness to learn new technologies. As a part of this role, your major accountabilities will include solving incidents and implementing changes in the AWS Cloud environment. You will be responsible for owning and driving incidents to resolution, with a strong focus on performance troubleshooting and capacity management. Additionally, you will champion the standardization and simplification of AWS Operations involving various services such as S3, EC2, EBS, Lamda, Network, NACL, Security Groups, and others. You will also prepare and execute internal AWS projects, identifying critical integration points, proposing solutions for key gaps, and providing effort estimations while ensuring alignment with business and other teams. Consistency and traceability between user requirements, functional specifications, and Agile ways of working are crucial aspects of this role. It is important to deliver assigned project work within the agreed timeline, budget, and quality standards, while adhering to the release calendars. Being able to work in a dynamic environment and support users globally is key, along with being a team player and being available for weekend on-call duties as needed. Minimum Requirements for this role include a Bachelor's degree in business/technical domains, AWS Cloud certifications/trainings, and over 5 years of relevant professional IT experience in the related technical area. Proven experience in handling AWS Cloud workloads, preparing Terraform scripts, running pipelines, and excellent troubleshooting skills are necessary. Additionally, knowledge of handling SAP workloads, extensive monitoring experience, and experience in a 24*7 environment are advantageous. Experience with installing and setting up SAP environment in AWS Cloud, EC2 Instance setup, EBS and EFS Setup, S3 configuration, as well as Alert Configuration in Cloud Watch are required. Good knowledge of NACL and Security Groups, usage of Cloud Formation and automation pipelines, and Identity and Access Management are important for this role. An understanding of ITIL v4 principles and the ability to work in complex 24*7 environments are also essential. Novartis is committed to creating an outstanding, inclusive work environment with diverse teams. If you want to be a part of a mission to reimagine medicine and improve lives, consider joining Novartis. For more information about Novartis and career opportunities, visit: https://www.novartis.com/about/strategy/people-and-culture If you are interested in staying connected with Novartis and learning about future career opportunities, join the Novartis Network here: https://talentnetwork.novartis.com/network To explore the benefits and rewards offered by Novartis, read our handbook here: https://www.novartis.com/careers/benefits-rewards,

Posted 2 weeks ago

Apply

10.0 - 17.0 years

20 - 30 Lacs

Thane

Work from Office

Role & responsibilities Implement and maintain the security policies and procedures for the complete Identity Management and Access Control life cycle, including the implementation of Access Control. Analyze ASLs business and systems and adopt the best use of Identity and Access Management infrastructure tools for overall business success. Support the evolution of the Identity and Access Management program by implementing and leading integration processes, framework, and activities. Collaborate with application and infrastructure teams to understand scope and requirements of the system to comply with Security process, procedures, policies and best practices. Create and develop standards, guidelines, workflow processes and participate in Access Management Compliance and internal audit exercises as required. Direct design and Implement web access management with single sign-on (SSO) access to multiple resources to create a more efficient and satisfying user experience. Design and implement services interfaces while applying technical standards that enable and protect API access which meets enterprise architecture, security, and privacy needs. Design and implement the Role Based Access Control (Matrix) across ASL systems and applications, enabling users to access resources based on assigned job role. Handle the deployment, configuration and on-going administration of Identity management and Authentication products on an enterprise scale while adhering to Group level Information Security standards and guidelines. Develop Identity Management Integration plan and framework for internal and external applications. Lead the planning and design of enterprise VPN solutions for secure authorization based on international standards and best practices. Implement, and provide continuous improvement by defining the business use of enabling IAM technologies such as Access Control, Multi-Factor Authentication, Privileged Access Management, Single Sign-On, and core Identity Management services. Configure and implement access and authorization controls and provide various security-related services related to Identity Management and Access Control to end users (answering questions, processing requests, and escalating issues as appropriate) and update authorization lists on a regular basis. Conduct security testing of information access systems to highlight security weaknesses and provide recommendations for the effective solution of those issues. Ensure the quality of deliverables and data security across multiple projects in terms of supporting requirements analysis and the technical architecture. Report the compliance level of SOD matrix for all key business applications. Preferred candidate profile Excellent understanding of authentication, authorization, role-based access, least privilege and segregation of duties access control concepts. Proven experience leading the troubleshooting and solving issues related to identities, access, accounts, authentication, authorization, entitlements, and permissions. Hand on experience in one or more IAM technologies such as Quest One Identity Manager, Okta, Thycotic (PAM), Multi-Factor Authentication (MFA), Active Directory etc. Understanding of Information Security principles and basics of Information Security policy, techniques and implications across computing platforms. Certifications on either CISA / CISSP/CISM preferable. Familiarity with compliance processes and standards. Strong analytical & problem-solving skills with ability to translate ideas into practical implementation. Ability to manage stakeholder relationships including team members, vendors and partners. Excellent leadership and communication skills with ability to present and communicate effectively with both technical and non-technical audience.

Posted 2 weeks ago

Apply

1.0 - 3.0 years

1 - 5 Lacs

Hyderabad, Coimbatore

Work from Office

Proficiency in at least 3 of the following IAM technologies o Active Directory o Identity and Access Management o Single Sign On (SSO) o Virtual Directories o PKI o Privileged Access Management o OKTA experience Mandatory Required Candidate profile *OKTA expert skills *Experience in IT regulation & compliance standards such as SOC1& 2 & ISO27001

Posted 2 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

noida, uttar pradesh

On-site

We're looking for a skilled professional to join our dynamic team and work with cutting-edge technologies in a fast-paced environment. Key Responsibilities: Manage and support Broadcom/CA Tools including: SiteMinder Multi-Factor Authentication (MFA) & Advanced Authentication Directory Services Identity Manager Access Gateway & API Gateway Work with LexisNexis ThreatMetrix (TMX) for advanced fraud detection. Support and manage Microsoft Technologies: Active Directory PKI (Public Key Infrastructure) Azure Active Directory (Azure AD) (Good to Have) Knowledge of AWS for cloud-based identity solutions. Shift Details: Rotational Shifts including Night Shifts (flexible schedule to support global operations).,

Posted 3 weeks ago

Apply

7.0 - 15.0 years

7 - 15 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

We are seeking a highly experienced SOC Architect, Lead Analyst, to join our global Cyber Operations team. This role involves leading and enhancing our security operations capabilities across various environments, including cloud and on-premises systems. The ideal candidate will have a deep background in SOC operations, incident response, and advanced threat management, with a focus on automation and integration of cutting-edge security technologies. What you will be doing: Leading SOC Operations: Implement, and optimize SOC architectures and processes to effectively detect and respond to cyber threats. Develop and manage advanced security monitoring and SOC response frameworks, leveraging tools such as Microsoft Sentinel and other cloud-native SOC platforms. Case Management and Response: Lead and manage critical security events, including complex investigations and forensic analysis. Develop and refine SOC playbooks and procedures to ensure efficient and effective resolution or escalation of security events. Automation and Integration: Implement and manage Security Orchestration, Automation, and Response (SOAR) solutions to streamline SOC operations. Create and optimize automation rules and workflows to enhance incident detection and response capabilities. Integrate SOC tools and platforms to ensure seamless data flow and operational efficiency. Threat Intelligence and Hunting: Analyze threat intelligence data to identify emerging threats and vulnerabilities and integrate this intelligence into SOC operations. Conduct advanced threat hunting activities and develop strategies to proactively identify and mitigate potential threats. Team Leadership and Development: Mentor and guide SOC team members, including SOC Level 1 Analysts, providing leadership on complex incidents and security challenges. Collaborate with other teams and departments to ensure cohesive and coordinated security efforts across the organization. Continuous Improvement: Stay current with the latest cybersecurity trends, threats, and technologies to continuously enhance SOC operations. Contribute to the development of new use cases, dashboards, and reporting templates to improve SOC performance and visibility. Key Accountabilities: Shift Lead for SOC in maintaining security operations across private, hybrid, and public cloud environments. Ensure timely and effective resolution of security events and escalate complex issues as necessary. Ensure SOC capabilities with training and skill development that aligns with continuous improvement to handle complex and evolving cyber threats. Develop custom parsers and enrichments for improved alert handling. Collaborate with vendors and internal teams to resolve security issues and enhance SOC capabilities. Maintain compliance with legal, regulatory, and industry standards. What we are looking for : Experience: 7-15 years of experience in SOC roles, with a strong focus on SOC event management, threat management, and SOC architecture. Proven track record of managing large-scale SOC operations in global environments. Must be a self-starter and motivated to bring more to this role and team than what is directed. Technical Skills: In depth experience with cloud-native security tools, including Microsoft Sentinel, Microsoft 365 Defender, and Microsoft Defender for Cloud. In depth experience with endpoint detection and response (EDR) including Microsoft Defender for Endpoint. In depth experience with identity concepts, including multifactor authentication, authentication protocols, user behaviors. In-depth understanding of cloud and endpoint, including malware forensics, browser forensics, cloud forensics, mobile device forensics. Experience with network security tools, including Palo Alto and web application firewalls (WAFs) like Akamai, Cloudflare and Azure WAF. Advanced knowledge of scripting and automation using languages. Experience with SOAR platforms and security automation. Certifications: Relevant certifications such as CISSP, CISM, CCSP, GCIH, or GIAC Security Operations Certified (GSOC) are highly desirable. Additional certifications in cloud security or incident response are a plus. Soft Skills: Strong analytical and problem-solving skills with the ability to handle complex security events. Excellent communication skills to articulate security concepts to both technical and non-technical stakeholders. Highly organized, detail-oriented, and capable of working under pressure in a dynamic environment. Arrow Electronics, Inc. (NYSE: ARW), an award-winning Fortune 133 and one of Fortune Magazine s Most Admired Companies. Arrow guides innovation forward for over 220,000 leading technology manufacturers and service providers. With 2024 sales of USD $27.9 billion, Arrow develops technology solutions that improve business and daily life. Our broad portfolio that spans the entire technology landscape helps customers create, make and manage forward-thinking products that make the benefits of technology accessible to as many people as possible. Learn more at www.arrow.com . Our strategic direction of guiding innovation forward is expressed as Five Years Out, a way of thinking about the tangible future to bridge the gap between whats possible and the practical technologies to make it happen. Learn more athttps://www.fiveyearsout.com/. Location: IN-KA-Bangalore, India (SKAV Seethalakshmi) GESC

Posted 1 month ago

Apply

6.0 - 9.0 years

25 - 30 Lacs

Noida

Remote

- Deliver and implement SD-WAN solutions including solution design, configuration, deployment and troubleshooting. - Implementation of inter networking technologies, including LAN, WAN, and IP routing protocols. - Integrate authentication protocols. Required Candidate profile Exp. : 7+ yrs CTC : Upto 30 Lacs - Delivering enterprise-grade SD-WAN and network security solutions to the clients. - Strong technical expertise in SD-WAN, networking and security technologies.

Posted 1 month ago

Apply

3.0 - 6.0 years

8 - 12 Lacs

Gurugram

Work from Office

WORK FROM OFFICE (GURUGRAM) - 5 DAYS SHIFT TIMINGS - 5:30 PM - 2:30 AM IST Job Description Mobile App Developer Position Overview We are seeking a skilled and passionate Mobile App Developer with expertise in React Native to join our dynamic team. The ideal candidate will have strong debugging skills, experience integrating third-party APIs, and a solid understanding of session management and mobile security best practices. If you are driven by solving complex challenges and delivering robust, user-friendly mobile applications, wed like to meet you. Key Responsibilities • Debug and resolve issues in mobile applications, ensuring high performance and stability. • Integrate third-party APIs seamlessly into mobile applications. • Implement and manage session handling, including SSO, SAML, and OAUTH protocols. • Develop and maintain in-app browser capabilities for managing SAML sessions in the background. • Work with cloud technologies such as AWS and Firebase to enhance app functionality. • Implement mobile push notifications and Multi-Factor Authentication (MFA) integration. • Ensure compliance with mobile security best practices, addressing vulnerabilities and protecting user data. • Collaborate with cross-functional teams to design, develop, and deploy highquality mobile applications. • Identify and address bottlenecks and bugs in a timely manner, ensuring seamless app performance. Requirements • Proficiency in Java(Android) or Swift (iOS), preferably both • Experience with relevant frameworks like SwiftUI and/or Android SDK • Proven experience in developing mobile applications using React Native. • Strong debugging and problem-solving skills with attention to detail. • Hands-on experience integrating third-party APIs into mobile applications. • Proficiency in session management protocols, including SSO, SAML, and OAUTH. • Knowledge of managing in-app browsers for background SAML session handling. • Familiarity with AWS and Firebase for cloud-based application enhancements. • Experience with mobile push notifications and MFA integration. • Solid understanding of mobile security best practices. • Strong analytical skills with the ability to work in a fast-paced environment. Preferred Qualifications • Prior experience in developing and deploying apps with high security requirements. • Knowledge of CI/CD pipelines for mobile app development. • Understanding of user experience (UX) principles for mobile platforms.

Posted 1 month ago

Apply

10.0 - 17.0 years

20 - 30 Lacs

Thane

Work from Office

Role & responsibilities Implement and maintain the security policies and procedures for the complete Identity Management and Access Control life cycle, including the implementation of Access Control. Analyze ASLs business and systems and adopt the best use of Identity and Access Management infrastructure tools for overall business success. Support the evolution of the Identity and Access Management program by implementing and leading integration processes, framework, and activities. Collaborate with application and infrastructure teams to understand scope and requirements of the system to comply with Security process, procedures, policies and best practices. Create and develop standards, guidelines, workflow processes and participate in Access Management Compliance and internal audit exercises as required. Direct design and Implement web access management with single sign-on (SSO) access to multiple resources to create a more efficient and satisfying user experience. Design and implement services interfaces while applying technical standards that enable and protect API access which meets enterprise architecture, security, and privacy needs. Design and implement the Role Based Access Control (Matrix) across ASL systems and applications, enabling users to access resources based on assigned job role. Handle the deployment, configuration and on-going administration of Identity management and Authentication products on an enterprise scale while adhering to Group level Information Security standards and guidelines. Develop Identity Management Integration plan and framework for internal and external applications. Lead the planning and design of enterprise VPN solutions for secure authorization based on international standards and best practices. Implement, and provide continuous improvement by defining the business use of enabling IAM technologies such as Access Control, Multi-Factor Authentication, Privileged Access Management, Single Sign-On, and core Identity Management services. Configure and implement access and authorization controls and provide various security-related services related to Identity Management and Access Control to end users (answering questions, processing requests, and escalating issues as appropriate) and update authorization lists on a regular basis. Conduct security testing of information access systems to highlight security weaknesses and provide recommendations for the effective solution of those issues. Ensure the quality of deliverables and data security across multiple projects in terms of supporting requirements analysis and the technical architecture. Report the compliance level of SOD matrix for all key business applications. Preferred candidate profile Excellent understanding of authentication, authorization, role-based access, least privilege and segregation of duties access control concepts. Proven experience leading the troubleshooting and solving issues related to identities, access, accounts, authentication, authorization, entitlements, and permissions. Hand on experience in one or more IAM technologies such as Quest One Identity Manager, Okta, Thycotic (PAM), Multi-Factor Authentication (MFA), Active Directory etc. Understanding of Information Security principles and basics of Information Security policy, techniques and implications across computing platforms. Certifications on either CISA / CISSP/CISM preferable. Familiarity with compliance processes and standards. Strong analytical & problem-solving skills with ability to translate ideas into practical implementation. Ability to manage stakeholder relationships including team members, vendors and partners. Excellent leadership and communication skills with ability to present and communicate effectively with both technical and non-technical audience.

Posted 1 month ago

Apply

6 - 10 years

30 - 35 Lacs

Chennai, Bengaluru

Work from Office

Multi-factor authentication (MFA) with any product like Ping , IAM etc. Java and Spring boot

Posted 2 months ago

Apply

5 - 8 years

5 - 13 Lacs

Hyderabad, Chennai, Bengaluru

Hybrid

Role & responsibilities We are looking for only immediate joiners withe experience in, The Senior Technical Lead will be responsible for providing technical leadership and guidance in .net, asp.net, C#, and SQL server projects. This role involves leading a team of developers, architecting solutions, and ensuring the successful delivery of projects within the defined timelines and quality standards. Development experience in implementing IAM solutions, Single Sign-On (SSO ) and Multi-Factor Authentication using PingFederate product for applications. Should have knowledge in CRUD REST APIs in .Net related applications- Knowledge in Open LDAP and MySQL- Have experience in Azure cloud Have work experience in Agile Projects

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies