Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
10.0 - 17.0 years
20 - 30 Lacs
Thane
Work from Office
Role & responsibilities Implement and maintain the security policies and procedures for the complete Identity Management and Access Control life cycle, including the implementation of Access Control. Analyze ASLs business and systems and adopt the best use of Identity and Access Management infrastructure tools for overall business success. Support the evolution of the Identity and Access Management program by implementing and leading integration processes, framework, and activities. Collaborate with application and infrastructure teams to understand scope and requirements of the system to comply with Security process, procedures, policies and best practices. Create and develop standards, guidelines, workflow processes and participate in Access Management Compliance and internal audit exercises as required. Direct design and Implement web access management with single sign-on (SSO) access to multiple resources to create a more efficient and satisfying user experience. Design and implement services interfaces while applying technical standards that enable and protect API access which meets enterprise architecture, security, and privacy needs. Design and implement the Role Based Access Control (Matrix) across ASL systems and applications, enabling users to access resources based on assigned job role. Handle the deployment, configuration and on-going administration of Identity management and Authentication products on an enterprise scale while adhering to Group level Information Security standards and guidelines. Develop Identity Management Integration plan and framework for internal and external applications. Lead the planning and design of enterprise VPN solutions for secure authorization based on international standards and best practices. Implement, and provide continuous improvement by defining the business use of enabling IAM technologies such as Access Control, Multi-Factor Authentication, Privileged Access Management, Single Sign-On, and core Identity Management services. Configure and implement access and authorization controls and provide various security-related services related to Identity Management and Access Control to end users (answering questions, processing requests, and escalating issues as appropriate) and update authorization lists on a regular basis. Conduct security testing of information access systems to highlight security weaknesses and provide recommendations for the effective solution of those issues. Ensure the quality of deliverables and data security across multiple projects in terms of supporting requirements analysis and the technical architecture. Report the compliance level of SOD matrix for all key business applications. Preferred candidate profile Excellent understanding of authentication, authorization, role-based access, least privilege and segregation of duties access control concepts. Proven experience leading the troubleshooting and solving issues related to identities, access, accounts, authentication, authorization, entitlements, and permissions. Hand on experience in one or more IAM technologies such as Quest One Identity Manager, Okta, Thycotic (PAM), Multi-Factor Authentication (MFA), Active Directory etc. Understanding of Information Security principles and basics of Information Security policy, techniques and implications across computing platforms. Certifications on either CISA / CISSP/CISM preferable. Familiarity with compliance processes and standards. Strong analytical & problem-solving skills with ability to translate ideas into practical implementation. Ability to manage stakeholder relationships including team members, vendors and partners. Excellent leadership and communication skills with ability to present and communicate effectively with both technical and non-technical audience.
Posted 2 months ago
1.0 - 3.0 years
1 - 5 Lacs
Hyderabad, Coimbatore
Work from Office
Proficiency in at least 3 of the following IAM technologies o Active Directory o Identity and Access Management o Single Sign On (SSO) o Virtual Directories o PKI o Privileged Access Management o OKTA experience Mandatory Required Candidate profile *OKTA expert skills *Experience in IT regulation & compliance standards such as SOC1& 2 & ISO27001
Posted 2 months ago
3.0 - 7.0 years
0 Lacs
noida, uttar pradesh
On-site
We're looking for a skilled professional to join our dynamic team and work with cutting-edge technologies in a fast-paced environment. Key Responsibilities: Manage and support Broadcom/CA Tools including: SiteMinder Multi-Factor Authentication (MFA) & Advanced Authentication Directory Services Identity Manager Access Gateway & API Gateway Work with LexisNexis ThreatMetrix (TMX) for advanced fraud detection. Support and manage Microsoft Technologies: Active Directory PKI (Public Key Infrastructure) Azure Active Directory (Azure AD) (Good to Have) Knowledge of AWS for cloud-based identity solutions. Shift Details: Rotational Shifts including Night Shifts (flexible schedule to support global operations).,
Posted 2 months ago
7.0 - 15.0 years
7 - 15 Lacs
Bengaluru / Bangalore, Karnataka, India
On-site
We are seeking a highly experienced SOC Architect, Lead Analyst, to join our global Cyber Operations team. This role involves leading and enhancing our security operations capabilities across various environments, including cloud and on-premises systems. The ideal candidate will have a deep background in SOC operations, incident response, and advanced threat management, with a focus on automation and integration of cutting-edge security technologies. What you will be doing: Leading SOC Operations: Implement, and optimize SOC architectures and processes to effectively detect and respond to cyber threats. Develop and manage advanced security monitoring and SOC response frameworks, leveraging tools such as Microsoft Sentinel and other cloud-native SOC platforms. Case Management and Response: Lead and manage critical security events, including complex investigations and forensic analysis. Develop and refine SOC playbooks and procedures to ensure efficient and effective resolution or escalation of security events. Automation and Integration: Implement and manage Security Orchestration, Automation, and Response (SOAR) solutions to streamline SOC operations. Create and optimize automation rules and workflows to enhance incident detection and response capabilities. Integrate SOC tools and platforms to ensure seamless data flow and operational efficiency. Threat Intelligence and Hunting: Analyze threat intelligence data to identify emerging threats and vulnerabilities and integrate this intelligence into SOC operations. Conduct advanced threat hunting activities and develop strategies to proactively identify and mitigate potential threats. Team Leadership and Development: Mentor and guide SOC team members, including SOC Level 1 Analysts, providing leadership on complex incidents and security challenges. Collaborate with other teams and departments to ensure cohesive and coordinated security efforts across the organization. Continuous Improvement: Stay current with the latest cybersecurity trends, threats, and technologies to continuously enhance SOC operations. Contribute to the development of new use cases, dashboards, and reporting templates to improve SOC performance and visibility. Key Accountabilities: Shift Lead for SOC in maintaining security operations across private, hybrid, and public cloud environments. Ensure timely and effective resolution of security events and escalate complex issues as necessary. Ensure SOC capabilities with training and skill development that aligns with continuous improvement to handle complex and evolving cyber threats. Develop custom parsers and enrichments for improved alert handling. Collaborate with vendors and internal teams to resolve security issues and enhance SOC capabilities. Maintain compliance with legal, regulatory, and industry standards. What we are looking for : Experience: 7-15 years of experience in SOC roles, with a strong focus on SOC event management, threat management, and SOC architecture. Proven track record of managing large-scale SOC operations in global environments. Must be a self-starter and motivated to bring more to this role and team than what is directed. Technical Skills: In depth experience with cloud-native security tools, including Microsoft Sentinel, Microsoft 365 Defender, and Microsoft Defender for Cloud. In depth experience with endpoint detection and response (EDR) including Microsoft Defender for Endpoint. In depth experience with identity concepts, including multifactor authentication, authentication protocols, user behaviors. In-depth understanding of cloud and endpoint, including malware forensics, browser forensics, cloud forensics, mobile device forensics. Experience with network security tools, including Palo Alto and web application firewalls (WAFs) like Akamai, Cloudflare and Azure WAF. Advanced knowledge of scripting and automation using languages. Experience with SOAR platforms and security automation. Certifications: Relevant certifications such as CISSP, CISM, CCSP, GCIH, or GIAC Security Operations Certified (GSOC) are highly desirable. Additional certifications in cloud security or incident response are a plus. Soft Skills: Strong analytical and problem-solving skills with the ability to handle complex security events. Excellent communication skills to articulate security concepts to both technical and non-technical stakeholders. Highly organized, detail-oriented, and capable of working under pressure in a dynamic environment. Arrow Electronics, Inc. (NYSE: ARW), an award-winning Fortune 133 and one of Fortune Magazine s Most Admired Companies. Arrow guides innovation forward for over 220,000 leading technology manufacturers and service providers. With 2024 sales of USD $27.9 billion, Arrow develops technology solutions that improve business and daily life. Our broad portfolio that spans the entire technology landscape helps customers create, make and manage forward-thinking products that make the benefits of technology accessible to as many people as possible. Learn more at www.arrow.com . Our strategic direction of guiding innovation forward is expressed as Five Years Out, a way of thinking about the tangible future to bridge the gap between whats possible and the practical technologies to make it happen. Learn more athttps://www.fiveyearsout.com/. Location: IN-KA-Bangalore, India (SKAV Seethalakshmi) GESC
Posted 2 months ago
6.0 - 9.0 years
25 - 30 Lacs
Noida
Remote
- Deliver and implement SD-WAN solutions including solution design, configuration, deployment and troubleshooting. - Implementation of inter networking technologies, including LAN, WAN, and IP routing protocols. - Integrate authentication protocols. Required Candidate profile Exp. : 7+ yrs CTC : Upto 30 Lacs - Delivering enterprise-grade SD-WAN and network security solutions to the clients. - Strong technical expertise in SD-WAN, networking and security technologies.
Posted 3 months ago
3.0 - 6.0 years
8 - 12 Lacs
Gurugram
Work from Office
WORK FROM OFFICE (GURUGRAM) - 5 DAYS SHIFT TIMINGS - 5:30 PM - 2:30 AM IST Job Description Mobile App Developer Position Overview We are seeking a skilled and passionate Mobile App Developer with expertise in React Native to join our dynamic team. The ideal candidate will have strong debugging skills, experience integrating third-party APIs, and a solid understanding of session management and mobile security best practices. If you are driven by solving complex challenges and delivering robust, user-friendly mobile applications, wed like to meet you. Key Responsibilities • Debug and resolve issues in mobile applications, ensuring high performance and stability. • Integrate third-party APIs seamlessly into mobile applications. • Implement and manage session handling, including SSO, SAML, and OAUTH protocols. • Develop and maintain in-app browser capabilities for managing SAML sessions in the background. • Work with cloud technologies such as AWS and Firebase to enhance app functionality. • Implement mobile push notifications and Multi-Factor Authentication (MFA) integration. • Ensure compliance with mobile security best practices, addressing vulnerabilities and protecting user data. • Collaborate with cross-functional teams to design, develop, and deploy highquality mobile applications. • Identify and address bottlenecks and bugs in a timely manner, ensuring seamless app performance. Requirements • Proficiency in Java(Android) or Swift (iOS), preferably both • Experience with relevant frameworks like SwiftUI and/or Android SDK • Proven experience in developing mobile applications using React Native. • Strong debugging and problem-solving skills with attention to detail. • Hands-on experience integrating third-party APIs into mobile applications. • Proficiency in session management protocols, including SSO, SAML, and OAUTH. • Knowledge of managing in-app browsers for background SAML session handling. • Familiarity with AWS and Firebase for cloud-based application enhancements. • Experience with mobile push notifications and MFA integration. • Solid understanding of mobile security best practices. • Strong analytical skills with the ability to work in a fast-paced environment. Preferred Qualifications • Prior experience in developing and deploying apps with high security requirements. • Knowledge of CI/CD pipelines for mobile app development. • Understanding of user experience (UX) principles for mobile platforms.
Posted 3 months ago
10.0 - 17.0 years
20 - 30 Lacs
Thane
Work from Office
Role & responsibilities Implement and maintain the security policies and procedures for the complete Identity Management and Access Control life cycle, including the implementation of Access Control. Analyze ASLs business and systems and adopt the best use of Identity and Access Management infrastructure tools for overall business success. Support the evolution of the Identity and Access Management program by implementing and leading integration processes, framework, and activities. Collaborate with application and infrastructure teams to understand scope and requirements of the system to comply with Security process, procedures, policies and best practices. Create and develop standards, guidelines, workflow processes and participate in Access Management Compliance and internal audit exercises as required. Direct design and Implement web access management with single sign-on (SSO) access to multiple resources to create a more efficient and satisfying user experience. Design and implement services interfaces while applying technical standards that enable and protect API access which meets enterprise architecture, security, and privacy needs. Design and implement the Role Based Access Control (Matrix) across ASL systems and applications, enabling users to access resources based on assigned job role. Handle the deployment, configuration and on-going administration of Identity management and Authentication products on an enterprise scale while adhering to Group level Information Security standards and guidelines. Develop Identity Management Integration plan and framework for internal and external applications. Lead the planning and design of enterprise VPN solutions for secure authorization based on international standards and best practices. Implement, and provide continuous improvement by defining the business use of enabling IAM technologies such as Access Control, Multi-Factor Authentication, Privileged Access Management, Single Sign-On, and core Identity Management services. Configure and implement access and authorization controls and provide various security-related services related to Identity Management and Access Control to end users (answering questions, processing requests, and escalating issues as appropriate) and update authorization lists on a regular basis. Conduct security testing of information access systems to highlight security weaknesses and provide recommendations for the effective solution of those issues. Ensure the quality of deliverables and data security across multiple projects in terms of supporting requirements analysis and the technical architecture. Report the compliance level of SOD matrix for all key business applications. Preferred candidate profile Excellent understanding of authentication, authorization, role-based access, least privilege and segregation of duties access control concepts. Proven experience leading the troubleshooting and solving issues related to identities, access, accounts, authentication, authorization, entitlements, and permissions. Hand on experience in one or more IAM technologies such as Quest One Identity Manager, Okta, Thycotic (PAM), Multi-Factor Authentication (MFA), Active Directory etc. Understanding of Information Security principles and basics of Information Security policy, techniques and implications across computing platforms. Certifications on either CISA / CISSP/CISM preferable. Familiarity with compliance processes and standards. Strong analytical & problem-solving skills with ability to translate ideas into practical implementation. Ability to manage stakeholder relationships including team members, vendors and partners. Excellent leadership and communication skills with ability to present and communicate effectively with both technical and non-technical audience.
Posted 3 months ago
6 - 10 years
30 - 35 Lacs
Chennai, Bengaluru
Work from Office
Multi-factor authentication (MFA) with any product like Ping , IAM etc. Java and Spring boot
Posted 4 months ago
5 - 8 years
5 - 13 Lacs
Hyderabad, Chennai, Bengaluru
Hybrid
Role & responsibilities We are looking for only immediate joiners withe experience in, The Senior Technical Lead will be responsible for providing technical leadership and guidance in .net, asp.net, C#, and SQL server projects. This role involves leading a team of developers, architecting solutions, and ensuring the successful delivery of projects within the defined timelines and quality standards. Development experience in implementing IAM solutions, Single Sign-On (SSO ) and Multi-Factor Authentication using PingFederate product for applications. Should have knowledge in CRUD REST APIs in .Net related applications- Knowledge in Open LDAP and MySQL- Have experience in Azure cloud Have work experience in Agile Projects
Posted 4 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |