Jobs
Interviews

1216 Okta Jobs - Page 11

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

6.0 - 11.0 years

7 - 11 Lacs

Khammam

Work from Office

Position Summary The F5 Global Cyber Defense and Intelligence team within the Office of the CISO is seeking hard-working and versatile Security Logging Engineers who will focus on updating, maintaining, and creating data pipelines fundamental to security services at F5. You will play a key role in protecting F5 and translating residual risk from critical application deployment into our logging and event platform to ensure data is flowing smoothly and consistently. Success in this role requires individuals to possess a blend of profound technical expertise, extensive knowledge in security, and substantial experience with logging. You'll be working with teams around the world in this position, so flexibility and excellent communication is key to excel in this role. Responsibilities Be part of the architectural direction, administration, maintenance, documentation, and oversight of the event logger and Security information and event management (SIEM) solution Analyze threat models and work with partner teams to ingest logging into the security event monitoring tool. Create and maintain integrations and solutions for the log collection, aggregation, indexing, search, alerting Manage implementation, enhancement and adoption of the solutions built by the team into operations Utilize log ingestion platform for security analytics and identification of tactics, techniques and patterns of attackers Collect and review security logs from all systems (Cloud Providers, GitLab, OS, G-Suite, OKTA, IDS, etc.) to ensure they can be used by the detection engineering team Ensure compliance with internal policies, standards, and regulatory requirements Contribute to creation of security operation runbooks, threat hunting run books Required Skills & Knowledge Requires at least 6+ years of relevant industry experience preferably in SIEM Experience with large scale log aggregation/SIEM systems like SumoLogic, Splunk, Exabeam, LogRhythm, etc. Good written and verbal communication skills Experience working in site-reliability engineering, cloud security, system engineering, or similar positions Demonstrated experience with running systems at scale Proficiency to communicate over a text-based medium (Slack, GitLab Issues, Email) and can succinctly document technical details A Computer Science or Engineering degree is preferred, but not required AutomationProficiency in scripting language such as Python or Bash. Experience with log identifications and analysis withing GCP, AWS, Azure, or other cloud provider. Bonus Points: Experience analysing and interpreting large volumes of data to identify potential threats and security incidents Nice to haveExperience implementing Data Engineering patterns with Spark, Databricks, pandas, or SQL Nice to haveAn understanding of attacker exploit and evasion techniques Nice to have competency in BigQuery, Athena, or any cloud provider query language. Nice to have familiarity with regex SANS (GCFR, GMON, or other related certifications )

Posted 2 weeks ago

Apply

6.0 - 11.0 years

7 - 11 Lacs

Nizamabad

Work from Office

Position Summary The F5 Global Cyber Defense and Intelligence team within the Office of the CISO is seeking hard-working and versatile Security Logging Engineers who will focus on updating, maintaining, and creating data pipelines fundamental to security services at F5. You will play a key role in protecting F5 and translating residual risk from critical application deployment into our logging and event platform to ensure data is flowing smoothly and consistently. Success in this role requires individuals to possess a blend of profound technical expertise, extensive knowledge in security, and substantial experience with logging. You'll be working with teams around the world in this position, so flexibility and excellent communication is key to excel in this role. Responsibilities Be part of the architectural direction, administration, maintenance, documentation, and oversight of the event logger and Security information and event management (SIEM) solution Analyze threat models and work with partner teams to ingest logging into the security event monitoring tool. Create and maintain integrations and solutions for the log collection, aggregation, indexing, search, alerting Manage implementation, enhancement and adoption of the solutions built by the team into operations Utilize log ingestion platform for security analytics and identification of tactics, techniques and patterns of attackers Collect and review security logs from all systems (Cloud Providers, GitLab, OS, G-Suite, OKTA, IDS, etc.) to ensure they can be used by the detection engineering team Ensure compliance with internal policies, standards, and regulatory requirements Contribute to creation of security operation runbooks, threat hunting run books Required Skills & Knowledge Requires at least 6+ years of relevant industry experience preferably in SIEM Experience with large scale log aggregation/SIEM systems like SumoLogic, Splunk, Exabeam, LogRhythm, etc. Good written and verbal communication skills Experience working in site-reliability engineering, cloud security, system engineering, or similar positions Demonstrated experience with running systems at scale Proficiency to communicate over a text-based medium (Slack, GitLab Issues, Email) and can succinctly document technical details A Computer Science or Engineering degree is preferred, but not required AutomationProficiency in scripting language such as Python or Bash. Experience with log identifications and analysis withing GCP, AWS, Azure, or other cloud provider. Bonus Points: Experience analysing and interpreting large volumes of data to identify potential threats and security incidents Nice to haveExperience implementing Data Engineering patterns with Spark, Databricks, pandas, or SQL Nice to haveAn understanding of attacker exploit and evasion techniques Nice to have competency in BigQuery, Athena, or any cloud provider query language. Nice to have familiarity with regex SANS (GCFR, GMON, or other related certifications )

Posted 2 weeks ago

Apply

6.0 - 11.0 years

7 - 11 Lacs

Karimnagar

Work from Office

Position Summary The F5 Global Cyber Defense and Intelligence team within the Office of the CISO is seeking hard-working and versatile Security Logging Engineers who will focus on updating, maintaining, and creating data pipelines fundamental to security services at F5. You will play a key role in protecting F5 and translating residual risk from critical application deployment into our logging and event platform to ensure data is flowing smoothly and consistently. Success in this role requires individuals to possess a blend of profound technical expertise, extensive knowledge in security, and substantial experience with logging. You'll be working with teams around the world in this position, so flexibility and excellent communication is key to excel in this role. Responsibilities Be part of the architectural direction, administration, maintenance, documentation, and oversight of the event logger and Security information and event management (SIEM) solution Analyze threat models and work with partner teams to ingest logging into the security event monitoring tool. Create and maintain integrations and solutions for the log collection, aggregation, indexing, search, alerting Manage implementation, enhancement and adoption of the solutions built by the team into operations Utilize log ingestion platform for security analytics and identification of tactics, techniques and patterns of attackers Collect and review security logs from all systems (Cloud Providers, GitLab, OS, G-Suite, OKTA, IDS, etc.) to ensure they can be used by the detection engineering team Ensure compliance with internal policies, standards, and regulatory requirements Contribute to creation of security operation runbooks, threat hunting run books Required Skills & Knowledge Requires at least 6+ years of relevant industry experience preferably in SIEM Experience with large scale log aggregation/SIEM systems like SumoLogic, Splunk, Exabeam, LogRhythm, etc. Good written and verbal communication skills Experience working in site-reliability engineering, cloud security, system engineering, or similar positions Demonstrated experience with running systems at scale Proficiency to communicate over a text-based medium (Slack, GitLab Issues, Email) and can succinctly document technical details A Computer Science or Engineering degree is preferred, but not required AutomationProficiency in scripting language such as Python or Bash. Experience with log identifications and analysis withing GCP, AWS, Azure, or other cloud provider. Bonus Points: Experience analysing and interpreting large volumes of data to identify potential threats and security incidents Nice to haveExperience implementing Data Engineering patterns with Spark, Databricks, pandas, or SQL Nice to haveAn understanding of attacker exploit and evasion techniques Nice to have competency in BigQuery, Athena, or any cloud provider query language. Nice to have familiarity with regex SANS (GCFR, GMON, or other related certifications )

Posted 2 weeks ago

Apply

6.0 - 11.0 years

7 - 11 Lacs

Hyderabad

Work from Office

Position Summary The F5 Global Cyber Defense and Intelligence team within the Office of the CISO is seeking hard-working and versatile Security Logging Engineers who will focus on updating, maintaining, and creating data pipelines fundamental to security services at F5. You will play a key role in protecting F5 and translating residual risk from critical application deployment into our logging and event platform to ensure data is flowing smoothly and consistently. Success in this role requires individuals to possess a blend of profound technical expertise, extensive knowledge in security, and substantial experience with logging. You'll be working with teams around the world in this position, so flexibility and excellent communication is key to excel in this role. Responsibilities Be part of the architectural direction, administration, maintenance, documentation, and oversight of the event logger and Security information and event management (SIEM) solution Analyze threat models and work with partner teams to ingest logging into the security event monitoring tool. Create and maintain integrations and solutions for the log collection, aggregation, indexing, search, alerting Manage implementation, enhancement and adoption of the solutions built by the team into operations Utilize log ingestion platform for security analytics and identification of tactics, techniques and patterns of attackers Collect and review security logs from all systems (Cloud Providers, GitLab, OS, G-Suite, OKTA, IDS, etc.) to ensure they can be used by the detection engineering team Ensure compliance with internal policies, standards, and regulatory requirements Contribute to creation of security operation runbooks, threat hunting run books Required Skills & Knowledge Requires at least 6+ years of relevant industry experience preferably in SIEM Experience with large scale log aggregation/SIEM systems like SumoLogic, Splunk, Exabeam, LogRhythm, etc. Good written and verbal communication skills Experience working in site-reliability engineering, cloud security, system engineering, or similar positions Demonstrated experience with running systems at scale Proficiency to communicate over a text-based medium (Slack, GitLab Issues, Email) and can succinctly document technical details A Computer Science or Engineering degree is preferred, but not required AutomationProficiency in scripting language such as Python or Bash. Experience with log identifications and analysis withing GCP, AWS, Azure, or other cloud provider. Bonus Points: Experience analysing and interpreting large volumes of data to identify potential threats and security incidents Nice to haveExperience implementing Data Engineering patterns with Spark, Databricks, pandas, or SQL Nice to haveAn understanding of attacker exploit and evasion techniques Nice to have competency in BigQuery, Athena, or any cloud provider query language. Nice to have familiarity with regex SANS (GCFR, GMON, or other related certifications )

Posted 2 weeks ago

Apply

6.0 - 11.0 years

7 - 11 Lacs

Vijayawada

Work from Office

Position Summary The F5 Global Cyber Defense and Intelligence team within the Office of the CISO is seeking hard-working and versatile Security Logging Engineers who will focus on updating, maintaining, and creating data pipelines fundamental to security services at F5. You will play a key role in protecting F5 and translating residual risk from critical application deployment into our logging and event platform to ensure data is flowing smoothly and consistently. Success in this role requires individuals to possess a blend of profound technical expertise, extensive knowledge in security, and substantial experience with logging. You'll be working with teams around the world in this position, so flexibility and excellent communication is key to excel in this role. Responsibilities Be part of the architectural direction, administration, maintenance, documentation, and oversight of the event logger and Security information and event management (SIEM) solution Analyze threat models and work with partner teams to ingest logging into the security event monitoring tool. Create and maintain integrations and solutions for the log collection, aggregation, indexing, search, alerting Manage implementation, enhancement and adoption of the solutions built by the team into operations Utilize log ingestion platform for security analytics and identification of tactics, techniques and patterns of attackers Collect and review security logs from all systems (Cloud Providers, GitLab, OS, G-Suite, OKTA, IDS, etc.) to ensure they can be used by the detection engineering team Ensure compliance with internal policies, standards, and regulatory requirements Contribute to creation of security operation runbooks, threat hunting run books Required Skills & Knowledge Requires at least 6+ years of relevant industry experience preferably in SIEM Experience with large scale log aggregation/SIEM systems like SumoLogic, Splunk, Exabeam, LogRhythm, etc. Good written and verbal communication skills Experience working in site-reliability engineering, cloud security, system engineering, or similar positions Demonstrated experience with running systems at scale Proficiency to communicate over a text-based medium (Slack, GitLab Issues, Email) and can succinctly document technical details A Computer Science or Engineering degree is preferred, but not required AutomationProficiency in scripting language such as Python or Bash. Experience with log identifications and analysis withing GCP, AWS, Azure, or other cloud provider. Bonus Points: Experience analysing and interpreting large volumes of data to identify potential threats and security incidents Nice to haveExperience implementing Data Engineering patterns with Spark, Databricks, pandas, or SQL Nice to haveAn understanding of attacker exploit and evasion techniques Nice to have competency in BigQuery, Athena, or any cloud provider query language. Nice to have familiarity with regex SANS (GCFR, GMON, or other related certifications )

Posted 2 weeks ago

Apply

6.0 - 11.0 years

7 - 11 Lacs

Mumbai

Work from Office

Position Summary The F5 Global Cyber Defense and Intelligence team within the Office of the CISO is seeking hard-working and versatile Security Logging Engineers who will focus on updating, maintaining, and creating data pipelines fundamental to security services at F5. You will play a key role in protecting F5 and translating residual risk from critical application deployment into our logging and event platform to ensure data is flowing smoothly and consistently. Success in this role requires individuals to possess a blend of profound technical expertise, extensive knowledge in security, and substantial experience with logging. You'll be working with teams around the world in this position, so flexibility and excellent communication is key to excel in this role. Responsibilities Be part of the architectural direction, administration, maintenance, documentation, and oversight of the event logger and Security information and event management (SIEM) solution Analyze threat models and work with partner teams to ingest logging into the security event monitoring tool. Create and maintain integrations and solutions for the log collection, aggregation, indexing, search, alerting Manage implementation, enhancement and adoption of the solutions built by the team into operations Utilize log ingestion platform for security analytics and identification of tactics, techniques and patterns of attackers Collect and review security logs from all systems (Cloud Providers, GitLab, OS, G-Suite, OKTA, IDS, etc.) to ensure they can be used by the detection engineering team Ensure compliance with internal policies, standards, and regulatory requirements Contribute to creation of security operation runbooks, threat hunting run books Required Skills & Knowledge Requires at least 6+ years of relevant industry experience preferably in SIEM Experience with large scale log aggregation/SIEM systems like SumoLogic, Splunk, Exabeam, LogRhythm, etc. Good written and verbal communication skills Experience working in site-reliability engineering, cloud security, system engineering, or similar positions Demonstrated experience with running systems at scale Proficiency to communicate over a text-based medium (Slack, GitLab Issues, Email) and can succinctly document technical details A Computer Science or Engineering degree is preferred, but not required AutomationProficiency in scripting language such as Python or Bash. Experience with log identifications and analysis withing GCP, AWS, Azure, or other cloud provider. Bonus Points: Experience analysing and interpreting large volumes of data to identify potential threats and security incidents Nice to haveExperience implementing Data Engineering patterns with Spark, Databricks, pandas, or SQL Nice to haveAn understanding of attacker exploit and evasion techniques Nice to have competency in BigQuery, Athena, or any cloud provider query language. Nice to have familiarity with regex SANS (GCFR, GMON, or other related certifications )

Posted 2 weeks ago

Apply

6.0 - 11.0 years

7 - 11 Lacs

Warangal

Work from Office

Position Summary The F5 Global Cyber Defense and Intelligence team within the Office of the CISO is seeking hard-working and versatile Security Logging Engineers who will focus on updating, maintaining, and creating data pipelines fundamental to security services at F5. You will play a key role in protecting F5 and translating residual risk from critical application deployment into our logging and event platform to ensure data is flowing smoothly and consistently. Success in this role requires individuals to possess a blend of profound technical expertise, extensive knowledge in security, and substantial experience with logging. You'll be working with teams around the world in this position, so flexibility and excellent communication is key to excel in this role. Responsibilities Be part of the architectural direction, administration, maintenance, documentation, and oversight of the event logger and Security information and event management (SIEM) solution Analyze threat models and work with partner teams to ingest logging into the security event monitoring tool. Create and maintain integrations and solutions for the log collection, aggregation, indexing, search, alerting Manage implementation, enhancement and adoption of the solutions built by the team into operations Utilize log ingestion platform for security analytics and identification of tactics, techniques and patterns of attackers Collect and review security logs from all systems (Cloud Providers, GitLab, OS, G-Suite, OKTA, IDS, etc.) to ensure they can be used by the detection engineering team Ensure compliance with internal policies, standards, and regulatory requirements Contribute to creation of security operation runbooks, threat hunting run books Required Skills & Knowledge Requires at least 6+ years of relevant industry experience preferably in SIEM Experience with large scale log aggregation/SIEM systems like SumoLogic, Splunk, Exabeam, LogRhythm, etc. Good written and verbal communication skills Experience working in site-reliability engineering, cloud security, system engineering, or similar positions Demonstrated experience with running systems at scale Proficiency to communicate over a text-based medium (Slack, GitLab Issues, Email) and can succinctly document technical details A Computer Science or Engineering degree is preferred, but not required AutomationProficiency in scripting language such as Python or Bash. Experience with log identifications and analysis withing GCP, AWS, Azure, or other cloud provider. Bonus Points: Experience analysing and interpreting large volumes of data to identify potential threats and security incidents Nice to haveExperience implementing Data Engineering patterns with Spark, Databricks, pandas, or SQL Nice to haveAn understanding of attacker exploit and evasion techniques Nice to have competency in BigQuery, Athena, or any cloud provider query language. Nice to have familiarity with regex SANS (GCFR, GMON, or other related certifications )

Posted 2 weeks ago

Apply

6.0 - 11.0 years

7 - 11 Lacs

Thane

Work from Office

Position Summary The F5 Global Cyber Defense and Intelligence team within the Office of the CISO is seeking hard-working and versatile Security Logging Engineers who will focus on updating, maintaining, and creating data pipelines fundamental to security services at F5. You will play a key role in protecting F5 and translating residual risk from critical application deployment into our logging and event platform to ensure data is flowing smoothly and consistently. Success in this role requires individuals to possess a blend of profound technical expertise, extensive knowledge in security, and substantial experience with logging. You'll be working with teams around the world in this position, so flexibility and excellent communication is key to excel in this role. Responsibilities Be part of the architectural direction, administration, maintenance, documentation, and oversight of the event logger and Security information and event management (SIEM) solution Analyze threat models and work with partner teams to ingest logging into the security event monitoring tool. Create and maintain integrations and solutions for the log collection, aggregation, indexing, search, alerting Manage implementation, enhancement and adoption of the solutions built by the team into operations Utilize log ingestion platform for security analytics and identification of tactics, techniques and patterns of attackers Collect and review security logs from all systems (Cloud Providers, GitLab, OS, G-Suite, OKTA, IDS, etc.) to ensure they can be used by the detection engineering team Ensure compliance with internal policies, standards, and regulatory requirements Contribute to creation of security operation runbooks, threat hunting run books Required Skills & Knowledge Requires at least 6+ years of relevant industry experience preferably in SIEM Experience with large scale log aggregation/SIEM systems like SumoLogic, Splunk, Exabeam, LogRhythm, etc. Good written and verbal communication skills Experience working in site-reliability engineering, cloud security, system engineering, or similar positions Demonstrated experience with running systems at scale Proficiency to communicate over a text-based medium (Slack, GitLab Issues, Email) and can succinctly document technical details A Computer Science or Engineering degree is preferred, but not required AutomationProficiency in scripting language such as Python or Bash. Experience with log identifications and analysis withing GCP, AWS, Azure, or other cloud provider. Bonus Points: Experience analysing and interpreting large volumes of data to identify potential threats and security incidents Nice to haveExperience implementing Data Engineering patterns with Spark, Databricks, pandas, or SQL Nice to haveAn understanding of attacker exploit and evasion techniques Nice to have competency in BigQuery, Athena, or any cloud provider query language. Nice to have familiarity with regex SANS (GCFR, GMON, or other related certifications )

Posted 2 weeks ago

Apply

6.0 - 11.0 years

7 - 11 Lacs

Nashik

Work from Office

Position Summary The F5 Global Cyber Defense and Intelligence team within the Office of the CISO is seeking hard-working and versatile Security Logging Engineers who will focus on updating, maintaining, and creating data pipelines fundamental to security services at F5. You will play a key role in protecting F5 and translating residual risk from critical application deployment into our logging and event platform to ensure data is flowing smoothly and consistently. Success in this role requires individuals to possess a blend of profound technical expertise, extensive knowledge in security, and substantial experience with logging. You'll be working with teams around the world in this position, so flexibility and excellent communication is key to excel in this role. Responsibilities Be part of the architectural direction, administration, maintenance, documentation, and oversight of the event logger and Security information and event management (SIEM) solution Analyze threat models and work with partner teams to ingest logging into the security event monitoring tool. Create and maintain integrations and solutions for the log collection, aggregation, indexing, search, alerting Manage implementation, enhancement and adoption of the solutions built by the team into operations Utilize log ingestion platform for security analytics and identification of tactics, techniques and patterns of attackers Collect and review security logs from all systems (Cloud Providers, GitLab, OS, G-Suite, OKTA, IDS, etc.) to ensure they can be used by the detection engineering team Ensure compliance with internal policies, standards, and regulatory requirements Contribute to creation of security operation runbooks, threat hunting run books Required Skills & Knowledge Requires at least 6+ years of relevant industry experience preferably in SIEM Experience with large scale log aggregation/SIEM systems like SumoLogic, Splunk, Exabeam, LogRhythm, etc. Good written and verbal communication skills Experience working in site-reliability engineering, cloud security, system engineering, or similar positions Demonstrated experience with running systems at scale Proficiency to communicate over a text-based medium (Slack, GitLab Issues, Email) and can succinctly document technical details A Computer Science or Engineering degree is preferred, but not required AutomationProficiency in scripting language such as Python or Bash. Experience with log identifications and analysis withing GCP, AWS, Azure, or other cloud provider. Bonus Points: Experience analysing and interpreting large volumes of data to identify potential threats and security incidents Nice to haveExperience implementing Data Engineering patterns with Spark, Databricks, pandas, or SQL Nice to haveAn understanding of attacker exploit and evasion techniques Nice to have competency in BigQuery, Athena, or any cloud provider query language. Nice to have familiarity with regex SANS (GCFR, GMON, or other related certifications )

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Get to know Okta Okta is The World’s Identity Company. We free everyone to safely use any technology, anywhere, on any device or app. Our flexible and neutral products, Okta Platform and Auth0 Platform, provide secure access, authentication, and automation, placing identity at the core of business security and growth. At Okta, we celebrate a variety of perspectives and experiences. We are not looking for someone who checks every single box - we’re looking for lifelong learners and people who can make us better with their unique experiences. Join our team! We’re building a world where Identity belongs to you. Okta is looking for an experienced hands-on technical QA Manager to build and lead a test engineering team. The ideal candidate is passionate about building large-scale, mission-critical software in a fast-paced agile environment. Our elite team is fast, innovative and flexible; with a weekly release cycle and individual ownership we expect great things from our engineers and their leaders and reward them with stimulating new projects, emerging technologies and the chance to have significant equity in a company that is about to change the cloud computing landscape forever. The ideal candidate is passionate about leading quality strategy for large-scale, mission-critical client applications on Apple, Google and Windows platforms.This is a great opportunity to work in an environment of scale, lead a very talented organization, build processes, and be front and center in Okta’s vision of passwordless access to any application. The role gives the candidate an excellent opportunity to learn about interesting problems in security and identity space. It also has a lot of visibility within Okta and has great growth potential. Job Duties and Responsibilities: Major areas of responsibility include: Manage day to day activities of test engineers within an Agile/Scrum environment Drive the building of world-class test automation with your technical expertise and leadership Drive standard methodologies in the areas of development testing, functional testing, automation, performance, and resiliency testing with best in class quality practices. Hire and nurture top-shelf staff Work with Product Management and Development Management to define requirements and schedules and then drive delivery. Be a bridge between Quality and Customer First teams to incorporate end to end customer flows in testing strategy Partner with Customer Support and field teams to understand customer use cases Minimum REQUIRED Knowledge, Skills, and Abilities: 5+ years of people management experience 10+ years experience in test engineering for software products Experience in mobile, desktop and/or client facing application testing and automation Experience in building healthy Continuous Deployment pipelines with robust Test Automation practices (e.g. Integration, E2E, Performance) in an agile environment. Broad knowledge and hands-on technical experience in test methodologies and automation development Ability to optimally prioritize and complete tasks in a high-pressure fast paced environment Education and Training: B.S. or M.S. in Computer Science or related field What you can look forward to as a Full-Time Okta employee! Amazing Benefits Making Social Impact Developing Talent and Fostering Connection + Community at Okta Okta cultivates a dynamic work environment, providing the best tools, technology and benefits to empower our employees to work productively in a setting that best and uniquely suits their needs. Each organization is unique in the degree of flexibility and mobility in which they work so that all employees are enabled to be their most creative and successful versions of themselves, regardless of where they live. Find your place at Okta today! https://www.okta.com/company/careers/. Some roles may require travel to one of our office locations for in-person onboarding. Okta is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, ancestry, marital status, age, physical or mental disability, or status as a protected veteran. We also consider for employment qualified applicants with arrest and convictions records, consistent with applicable laws. If reasonable accommodation is needed to complete any part of the job application, interview process, or onboarding please use this Form to request an accommodation. Okta is committed to complying with applicable data privacy and security laws and regulations. For more information, please see our Privacy Policy at https://www.okta.com/privacy-policy/.

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

chennai, tamil nadu

On-site

Are you ready to be at the forefront of cybersecurity innovation As a talented Senior IAM Developer, you will play a crucial role in driving the development, implementation, and maintenance of secure authentication and access solutions. Your primary responsibility will be fortifying our cybersecurity posture by ensuring that access to critical systems and data is properly governed, audited, and compliant. By collaborating across teams, you will design scalable IAM solutions that reduce risk and enable secure digital transformation. In this role, you will collaborate with internal stakeholders across various technical functions to create a comprehensive technical roadmap for core enterprise Identity and Access Management (IAM) solutions. Serving as the senior subject matter expert for IAM within the organization, you will define policies and procedures related to IAM functions and take ownership of complex program design, testing, debugging, and documentation. It will be essential to integrate user experience considerations into the program design and final solution while offering recommendations on IAM and Public Key Infrastructure (PKI) best practices. Leading proof of concept initiatives, product selection, and deployment of IAM and PKI-related solutions will be part of your responsibilities. You will identify opportunities for technical consolidation, define IAM governance requirements for non-centralized functions, and provide escalated administrative support for IAM systems when required. Collaborating with peer groups to facilitate the adoption of the latest authentication and authorization protocols is crucial, along with establishing and managing relationships with key technical vendors to deliver IAM capabilities and services. To qualify for this role, you should have 8+ years of relevant experience in Identity and Access Management, along with expertise in multi-factor authentication platforms and various authentication and authorization solutions. A Bachelor's degree in computer science/engineering or a related field is preferred. You should possess strong multitasking skills, excellent communication and interpersonal skills, and the ability to deliver high-quality results in a high-energy environment following Agile Practices. Extensive experience in designing and configuring third-party integrations using SAML/OAUTH, in-depth understanding of authentication, authorization, role-based access, least privilege, and segregation of duties access control concepts, and a proven track record of troubleshooting and resolving issues related to identities, access, accounts, authentication, authorization, entitlements, and permissions are must-have skills for this role. In addition to competitive compensation, we offer benefits such as 401(k), dental insurance, health insurance, and vision insurance. As an equal-opportunity employer, we value diversity, equality, inclusion, and respect for people. The salary for this position will be determined based on factors including location, relevant education, qualifications, experience, technical skills, and business needs. If you are a dynamic, creative thinker passionate about doing quality work in the cybersecurity field, we invite you to join our team at OP. As a technology consulting and solutions company, we provide advisory and managed services, innovative platforms, and staffing solutions across various fields, including AI, cybersecurity, and enterprise architecture. As a member of the OP team, you will have access to industry-leading consulting practices, strategies, technologies, innovative training, and education. If you are a technology leader with a proven track record of technical excellence and a strong focus on process and methodology, we look forward to having you on board.,

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Gurugram, Haryana, India

On-site

This role is for one of the Weekday's clients Min Experience: 3 years Location: Gurugram JobType: full-time We are seeking an experienced and customer-focused Triage Support Specialist to join our IT Service Desk team. This individual will play a key role in delivering exceptional end-user support across multiple platforms, ensuring that employees are empowered to perform at their best through efficient use of technology. Requirements Key Responsibilities: Serve as the first point of contact for technical support via tickets, in-person, chat, email, video, and phone. Provide timely investigation and resolution of issues; escalate complex problems to the appropriate teams when needed. Lead IT onboarding sessions for new hires and assist with Day 1 setup logistics. Maintain clear and comprehensive documentation of support cases and solutions. Create and maintain self-service knowledge bases and user guides to reduce recurring support requests. Manage software license request workflows, including approvals and compliance tracking. Conduct end-user training sessions and develop documentation to empower employees to resolve minor issues independently. Participate in on-call support rotations and offer flexibility to work evenings, nights, or holidays based on business needs. Preferred Experience & Skills: 3+ years of experience in an end-user IT support or helpdesk role. Proficient with macOS and Apple hardware, including JAMF for administration. Strong working knowledge of Windows 10/PC environments. Demonstrated diagnostic and troubleshooting skills with a methodical approach to problem-solving. Clear and effective communication skills for explaining technical issues to both technical and non-technical users. Calm and empathetic demeanor, particularly under pressure or during urgent technical incidents. Familiarity with the following technologies and tools is highly desirable: Operating Systems & Hardware: macOS, Windows 10, Apple devices Collaboration & Communication: Slack, Zoom, VoIP IT Tools: JIRA, Confluence, Okta, Google Workspace, Meraki, Oomnitza Personal Attributes: Self-motivated with a strong desire for continuous technical growth. Strong organizational and multitasking abilities. A collaborative team player who thrives in both independent and team settings. Customer-first mindset with a dedication to providing excellent service

Posted 2 weeks ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

About Client: Our Client is a global IT services company headquartered in Southborough, Massachusetts, USA. Founded in 1996, with a revenue of $1.8B, with 35,000+ associates worldwide, specializes in digital engineering, and IT services company helping clients modernize their technology infrastructure, adopt cloud and AI solutions, and accelerate innovation. It partners with major firms in banking, healthcare, telecom, and media. Our Client is known for combining deep industry expertise with agile development practices, enabling scalable and cost-effective digital transformation. The company operates in over 50 locations across more than 25 countries, has delivery centers in Asia, Europe, and North America and is backed by Baring Private Equity Asia. Hi....! We are hiring for below Positions Job Title: CyberArk Developer + Beyond Trust Key Skills: CyberArk , Beyond Trust , PAM , LDAP ,Privileged Identity Management Job Locations: Hyderabad Experience: 6-10Yrs Budget: 15LPA Education Qualification : Any Graduation Work Mode: Hybrid Employment Type: Contract Notice Period: Immediate - 15 Days Interview Mode: 2 Rounds of Technical Interview Job Description: CyberArk Developer Solid understanding of CyberArk with BeyondTrust , PAM and its components including EPV, PSM, CPM, PSMP, AIM) Experience in Installing and Setting up CyberArk and customizing/configuring it for given Policies and procedures. Integrating various platforms with Cyber Ark, such as different LDAP providers, Windows servers, UNIX servers, Databases and networking devices Experience in using PACLI, and scripting languages like PowerShell for automation and customization Strong problem-solving, communication, and leadership abilities, Prior experience with Agile practices such as Kanban or Scrum Roles and Responsibilities: Deployment & implementation of Privileged Identity Management using CyberArk solution for large scale customers Privileged User account administration of various Windows and UNIX accounts using CyberArk components. Ensure BeyondTrust deployments align with security best practices, compliance requirements (e.g., SOC 2, NIST, Zero Trust), and organizational policies. Deeply understand and manage integrations between BeyondTrust products and other critical enterprise systems. Troubleshoot complex integration issues with Identity Providers (IdPs) like Active Directory, Azure AD (Entra ID), Okta, Ping Identity, and other LDAP sources. Integrating various platforms with Cyber-Ark, such as Windows servers, UNIX servers, Databases and networking Devices. Creating and Managing Safes, platforms and Owners. CPM policies management or redistribution. Implementing the Password Upload Utility Knowledge on CPM and PSM connector customization Perform health check monitoring on all CyberArk severs to ensure consistent availability of system to end user. Monitor logs and events for Windows, UNIX and User identity management platforms to provide views of misuse or malicious activities. Interested Candidates please share your CV to sushma.n@people-prime.com

Posted 2 weeks ago

Apply

12.0 years

0 Lacs

Pune/Pimpri-Chinchwad Area

On-site

Job Description NielsenIQ is seeking a skilled and driven Customer Identity and Access Management (CIAM) Sr. Principal Engineer to support modernization of our global customer identity platform and advance maturity of CIAM program. The ideal candidate will define and champion the enterprise-wide Customer Identity Governance & Access Management vision by setting technical direction, architecting future-proof solutions, and driving transformational initiatives at scale. Acts as a strategic advisor across engineering, security, and business leadership, ensuring IAM solutions are aligned with enterprise goals, regulatory requirements and industry trends. This role requires a strong blend of business acumen, clear and effective communication, and the ability to collaborate across functions to champion secure yet seamless customer identity experiences. A focus on driving business outcomes is critical, along with exceptional interpersonal skills and fluency in written and spoken English. Responsibilities Shapes a culture of innovation, resilience, and engineering excellence across the CIAM function across B2B and B2C clients Design, architect, and guide the implementation of end-to-end CIAM solutions leveraging Okta Identity Cloud or equivalent platforms, with a strategic focus on enterprise-grade capabilities such as Single Sign-On (SSO), Adaptive Multi-Factor Authentication (MFA), Universal Directory, and Identity Lifecycle Management Serve as a subject matter expert in customer authentication and authorization standards, including OAuth 2.0, OIDC, SAML, FIDO2, SCIM, and JWT Drives transformational initiatives at scale, fosters engineering excellence, security by design and represents CIAM thought leadership within and beyond the organization Guides team to generate significant insights through a variety of tools and resources to uncover areas of opportunities and customer experience improvements; follows through to ensure applicable improvements are implemented Leads research and evaluation of industry best practices and emerging trends to enhance the effectiveness, scalability, and security of CIAM services and solutions Evaluate current processes against the defined industry leading practices including standards such as the National Institute for Standards and Technology (NIST) Special Publication (SP) 800-63; Digital Authentication, NIST Cybersecurity Framework (CSF) and NIST SP 800-53; Security and Privacy Controls Actively handles ambiguity, influences others to bring in “big picture” thinking and drives clarity, solutions, and execution plan among team and collaborators Partner with cross-functional stakeholders (customer success and support, application development) to deliver seamless and compliant customer identity journeys Qualifications Bachelor’s degree in Computer Science, Information Technology, or a related field Minimum of 12 years in IAM, with a minimum of 8 years focused specifically on Customer IAM (CIAM) Proven experience in architecting, engineering, and implementing CIAM platforms and solutions at enterprise scale Demonstrates strategic leadership, sets IAM technical vision, roadmaps, and standards Consistent track record to effectively develop, influence, present and communicate highly complex business, digital, or technology concepts to cross-functional teams, non-technical users and senior leadership Proficient in identity standards and protocols: OAuth 2.0, OIDC, SAML, SCIM, JWT, FIDO2, and WebAuthn Strong experience with leading CIAM platforms (e.g., ForgeRock, Okta CIAM, Ping Identity, Auth0, Microsoft Entra External ID, Azure B2C, B2B, and AWS Cognito) Experience with developing patterns on API security and creating CIAM capabilities as service-based architecture Excellent communication skills, with the ability to articulate complex technical concepts to business stakeholders along with strong spoken and written English Flexibility to accommodate working across different time-zones Additional Information Our Benefits Flexible working environment Volunteer time off LinkedIn Learning Employee-Assistance-Program (EAP) About NIQ NIQ is the world’s leading consumer intelligence company, delivering the most complete understanding of consumer buying behavior and revealing new pathways to growth. In 2023, NIQ combined with GfK, bringing together the two industry leaders with unparalleled global reach. With a holistic retail read and the most comprehensive consumer insights—delivered with advanced analytics through state-of-the-art platforms—NIQ delivers the Full View™. NIQ is an Advent International portfolio company with operations in 100+ markets, covering more than 90% of the world’s population. For more information, visit NIQ.com Want to keep up with our latest updates? Follow us on: LinkedIn | Instagram | Twitter | Facebook Our commitment to Diversity, Equity, and Inclusion NIQ is committed to reflecting the diversity of the clients, communities, and markets we measure within our own workforce. We exist to count everyone and are on a mission to systematically embed inclusion and diversity into all aspects of our workforce, measurement, and products. We enthusiastically invite candidates who share that mission to join us. We are proud to be an Equal Opportunity/Affirmative Action-Employer, making decisions without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability status, age, marital status, protected veteran status or any other protected class. Our global non-discrimination policy covers these protected classes in every market in which we do business worldwide. Learn more about how we are driving diversity and inclusion in everything we do by visiting the NIQ News Center: https://nielseniq.com/global/en/news-center/diversity-inclusion

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Description We are seeking a motivated and skilled L2 IT Engineer to join our team. The candidate will handle day-to-day IT troubleshooting tasks, manage endpoint protection, resolve tickets, and support network infrastructure. This is an excellent opportunity for an IT professional with a strong foundation in troubleshooting and network management. Key Responsibilities Provide L2 technical support for users on issues related to Windows/macOS, system access, and application setups. Administer and troubleshoot OKTA Identity Cloud including user provisioning, deprovisioning, MFA, and SSO configurations. Manage and support Microsoft Office 365, Active Directory (on-prem & Azure AD), and end-user access controls. Install, configure, and resolve issues related to desktops, laptops, printers, and other IT peripherals. Assist in the setup, monitoring, and troubleshooting of network devices including firewalls, switches, and routers. Collaborate with internal IT and InfoSec teams to support compliance with internal policies and audits. Maintain documentation for processes, known issues, and standard operating procedures. Handle escalations from L1 support and ensure timely resolution of issues within SLA. Participate in IT onboarding/offboarding processes and assist in asset management. Requirements 4+ years of hands-on experience in IT support, with at least 2+ years in L2-level troubleshooting. Proficiency in supporting and managing Microsoft Office 365, OKTA, and Active Directory. Strong experience in Windows and Mac OS installation and troubleshooting. Knowledge of endpoint protection tools (Sophos, Bitdefender, Quick Heal, etc. Familiarity with networking concepts and devices firewalls, switches, routers. Strong problem-solving skills and ability to manage multiple issues concurrently. Good communication skills with the ability to provide end-user training and guidance. Exposure to IT ticketing systems like JIRA, Zoho Desk, Freshservice, or ServiceNow is a plus. What We Offer A talented and dedicated team passionate about creating exceptional products. Competitive compensation, including benefits, and a culture that values work-life balance. Why Lognormal? Be part of a fast-scaling, tech-driven organization at the forefront of innovation. Opportunity to shape IT infrastructure and support frameworks across a global setup. Work with a talented, collaborative, and inclusive team that values ownership and continuous learning. Lead or contribute to critical technology projects that have real business impact. Attractive Compensation Competitive compensation tailored to experience and value. Comprehensive medical insurance benefits. A professional environment that values clarity, efficiency, and long-term thinking. (ref:hirist.tech)

Posted 2 weeks ago

Apply

2.0 - 6.0 years

0 Lacs

karnataka

On-site

As an Associate Manager II in IT Application Access Management based in Bangalore, you will be part of a high-ownership engineering team focused on developing scalable backend systems for Navis financial products. Your role will involve collaborating with various teams to address complex problems by writing efficient and maintainable code. Key Responsibilities: - Manage user access, entitlements, and life cycles across platforms such as G-Suite, Okta, Atlassian, Slack, and AWS - Implement identity and access management (IAM) principles and best practices - Ensure cloud-based application security and access control - Automate user provisioning and access management workflows - Configure and maintain secure access controls based on industry standards - Monitor user activity for potential access risks and security vulnerabilities - Collaborate with IT teams, application owners, and stakeholders to enforce access control policies - Communicate IAM concepts effectively to both technical and non-technical audiences Requirements: - Bachelor's degree in Information Technology, Computer Science, or related field - 2-4 years of experience in IT Access Management, Application Security, or similar role - Strong understanding of cloud-based application security and access control principles - Working knowledge of IAM concepts and best practices - Experience with cloud-based IAM platforms such as Okta, Azure AD, or similar tools - Proficiency in managing user access and entitlements in G-Suite, Atlassian, Slack, and other cloud applications - Analytical and problem-solving skills with attention to detail and accuracy - Effective communication and interpersonal skills - Ability to work independently and collaboratively in a team environment Certifications (a plus): - Okta Certified Administrator (OCA) - Atlassian Access Administration Certification - Google Workspace - AWS Join Navi, a fast-growing financial services organization founded in 2018 by Sachin Bansal & Ankit Agarwal. Be part of a culture that values ambition, perseverance, self-awareness, ownership, and integrity. Thrive at Navi by being impact-driven, striving for excellence, and embracing change to deliver real value to customers.,

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

kochi, kerala

On-site

As a Senior .NET Engineer at Milestone Technologies, you will be responsible for developing and maintaining enterprise applications on the Microsoft technology stack. Your role will involve integrating applications with Identity Providers (IDPs) such as Azure AD, Auth0, or Okta for Single Sign-On (SSO), Multi-Factor Authentication (MFA), and user authentication flows. You will work closely with a cross-functional team to design, develop, and maintain scalable applications while ensuring high-quality code. Your key responsibilities will include developing web applications using .NET Core/.NET 8, .NET Framework, C#, and ASP.NET MVC/Web API. You will be involved in requirement analysis, technical design, and estimation. Writing clean, testable, and efficient code following best practices and coding standards will be essential. Additionally, you will perform unit testing, support integration testing, troubleshoot technical issues, and collaborate with team members, QA, and business analysts to ensure seamless delivery. Key Skills required for this role include strong programming skills in C#, .NET Core/.NET 6/8, ASP.NET MVC/Web API, practical experience with IDP integration, and a good understanding of OAuth 2.0, OpenID Connect, and SAML. Experience with RESTful APIs, SQL Server/Entity Framework, frontend frameworks like Angular/React (preferred), Git, CI/CD pipelines, and basic Azure services would be beneficial. Strong analytical and debugging skills are also essential for success in this position. Milestone Technologies values diversity and inclusion in the workplace and is committed to creating a culture that champions equity and belonging. We encourage individuals from diverse backgrounds to bring their unique perspectives, experiences, and knowledge to our global community. If you are passionate about IT transformation and innovation, we look forward to welcoming you to our team.,

Posted 2 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

pune, maharashtra

On-site

Job Description: Stefanini Group is a multinational company with a global presence in 41 countries and 44 languages, specializing in technological solutions. The company is dedicated to digital innovation and agility to drive the transformation of businesses towards a better future. The diverse portfolio of Stefanini Group encompasses consulting, marketing, mobility, AI services, service desk, field service, and outsourcing solutions. As a part of this dynamic team, your key responsibilities will include leading the migration of the identity provider from a self-managed Okta environment to group-managed Microsoft Entra ID (Azure AD). You will also be tasked with consolidating the Atlassian suite by migrating from current self-managed Confluence and Jira cloud instances to Amdocs group-designated instances. Additionally, you will play a crucial role in migrating AWS, GCP, and Azure cloud environments to Microsoft Entra ID for Authorization and Authentication. Your role will involve developing and executing detailed project plans, timelines, and milestones. Collaboration with cross-functional teams will be essential to ensure seamless integration and minimal disruption to business operations. Providing technical guidance and support throughout the migration process will be a key aspect of your responsibilities. You will also conduct thorough testing and validation to ensure the successful migration and integration of systems. Documenting processes, configurations, and changes for future reference and compliance will be an integral part of your duties. Join Stefanini Group to be at the forefront of innovative technological solutions and contribute to the digital transformation journey for businesses worldwide.,

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

Remote

About the Role: We are looking for a Systems Administrator based in India to join our globally distributed IT infrastructure team. This individual will play a key role in supporting and managing our cloud infrastructure, enterprise endpoints, and security platforms. The role requires technical hands-on experience, a problem-solving mindset, and the ability to work collaboratively with teams across time zones. You’ll work in a modern, cloud-first environment using platforms such as AWS, Azure, GCP, and support a diverse endpoint environment of Windows, macOS, and Chrome OS. The ideal candidate brings attention to detail, ownership, and willingness to learn and grow with emerging technologies. Key Responsibilities: Cloud & Server Operations: Support provisioning and maintenance of resources in AWS, Azure, and GCP. Manage Windows Server and Linux-based systems in both cloud and on-premise environments. Assist with scripting and automation of infrastructure tasks using PowerShell, Bash, or Python. Endpoint Management: Configure and support end-user devices running Windows, macOS, and Chrome OS. Utilize tools like Microsoft Intune, Jamf, WorkspaceOne, Automox, and Google Admin Console to enforce policies, deploy applications, and manage compliance. SaaS & Identity Access Management: Administer SaaS platforms, including Google Workspace, Zoom, Slack, and internal tools. Support user access management using Entra ID, Okta, and Active Directory. Implement and support Single Sign-On (SSO), MFA, and access controls. Security & Patch Management: Apply patches and updates across endpoints and servers to ensure compliance and maintain system stability. Work closely with InfoSec to remediate vulnerabilities and establish secure configuration baselines. Maintain detailed system documentation and standard operating procedures. Incident Response & Support: Provide Level 2 and Level 3 support, resolving escalated issues related to infrastructure and systems. Participate in on-call rotation for global support coverage, including triage and incident response for critical systems. Follow defined SLAs and contribute to post-incident reviews and process improvements. Team Collaboration: Work closely with infrastructure teams in other regions (US, EMEA) and support cross-functional initiatives. Participate in global projects involving Networking, Security, and DevOps teams. Contribute to knowledge-sharing sessions and process standardization across regions. Qualifications: 3–5 years of experience in Systems Administration or IT Infrastructure roles. Strong experience in public cloud environments (Azure, AWS, or GCP). Hands-on with Windows/Linux servers, identity platforms, and enterprise endpoint management. Familiarity with scripting (PowerShell, Python, or Bash) and automation tools. Ability to troubleshoot complex technical issues across multiple platforms. Comfortable working in a remote and global team environment, with flexibility in work hours. Preferred (Not Mandatory): Experience with international enterprise environments. Exposure to security frameworks and compliance (ISO 27001, SOC 2, etc.). Certifications such as Microsoft Certified: Azure Administrator, AWS SysOps, or Google Associate Cloud Engineer. We have ambitious goals and need people that are dynamic, desire to be part of something greater than they are, and are passionate about having secure technology. You have a chance to be part of a company that is changing how people think about IT and security. Your creativity will be highly valued and your nerdiness will seem normal. If you want a place where you can grow and make an impact, this is it.

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Job Title: Network Engineer Location: Hybrid-Hyderabad/Mumbai/Pune/Bengaluru/Chennai About The Job The Network Engineer role focuses on managing hybrid cloud and on-premises network infrastructures. It requires advanced expertise in AWS VPC, routing protocols, firewalls (Checkpoint and Cisco ASA), Meraki Wi-Fi, Big-IP F5 LTM/APM appliances, and Single Sign-On (SSO) technologies. This role involves coordinating with department teams to build, manage, and optimize both cloud and on-premises network solutions to ensure scalability, security, and high performance. What you will do: AWS Cloud Network Architecture: Design, implement, and manage AWS VPC, including transitive VPC, Transit Gateway, Direct Connect, Virtual Private Gateway (VGW), VPN, IPSec, Security Groups, Network ACLs, and ASM for robust and secure cloud-based networking. Routing Protocols and Network Design: Configure and manage routing protocols such as OSPF, EIGRP, BGP, RIP, PBR (Policy-Based Routing), Route-Filtering, Redistribution, Summarization, and Multicast Routing to ensure optimized data flow within cloud and on-premises networks. Firewall Management: Manage and configure Checkpoint Firewalls for both cloud and on-premises environments, including policy management, traffic filtering, and security auditing. Implement AWS security best practices, including configuring security groups, NACLs, and AWS firewalls to enforce network security. AAA Architecture: Implement and manage AAA (Authentication, Authorization, and Accounting) services using RADIUS and TACACS for secure access control across network devices. Big-IP F5 LTM & APM Management: Configure and manage Big-IP F5 Local Traffic Manager (LTM) and Access Policy Management (APM) cloud edition appliances for load balancing, traffic management, and high availability of cloud-based applications. Network Protocols: Strong expertise in network protocols such as IP, TCP, UDP, ICMP, NAT, DNS, DHCP, SNMP, IPSec, SSL, HTTP, SSH, SIP, RTP, QoS, and AAA for robust network operations. Meraki Wi-Fi Deployment: Deploy and manage Meraki Wi-Fi solutions, configure 802.1x, EAP-PEAP for secure wireless authentication, and manage Meraki MS, MX, and MR devices for network access, security, and monitoring. Single Sign-On (SSO): Strong understanding and hands-on experience with Single Sign-On (SSO) architecture and protocols (e.g., SAML 2.0, OAuth 2.0, OpenID Connect). Implement and manage Okta for SSO integration across enterprise applications, ensuring seamless user authentication and access management. VPN & Secure Connectivity: Manage and optimize site-to-site VPNs and IPSec tunnels to securely connect cloud resources with on-premises infrastructures. Manage Cisco VPN solutions, ensuring reliable, secure connectivity between distributed networks. Network Monitoring & Troubleshooting: Monitor and troubleshoot network performance using AWS CloudWatch, Meraki Dashboard, SolarWinds OpManager and Wireshark to identify and resolve connectivity, performance, and security issues across the hybrid network environment. Network Vulnerability Mitigation: Identify , assess, and mitigate vulnerabilities in both cloud and on-premises networks to ensure security and compliance. Collaborate with security teams for penetration testing, risk assessments, and incident response. Audit/SIEM Solutions: Implement and manage IPS/IDS, Nessus, Anti-virus, and vulnerability management tools to monitor and respond to security incidents. Use SIEM tools for threat analysis, network monitoring, and compliance with security standards. Automation & Infrastructure as Code: Utilize Terraform, AWS CloudFormation, and other Infrastructure as Code ( IaC ) tools to automate the deployment of cloud and on-premises network resources, ensuring consistency and repeatability. Collaboration and Documentation: Collaborate with cross-functional teams to ensure network scalability, high availability, and disaster recovery. Maintain clear, comprehensive documentation for network configurations, security policies, troubleshooting guides, and architectural designs. Who You Are Education & Experience: Bachelor’s degree in computer science, Network Engineering, or a related field, or equivalent work experience. 5+ years of experience in AWS cloud networking, with a focus on VPC, Transit Gateway, Direct Connect, VGW, VPN configurations, and on-premises network switching and routing (Cisco, Meraki, etc.) . Technical Skills Strong experience with Checkpoint firewalls and Cisco ASA firewalls. Extensive knowledge and hands-on experience with routing protocols such as OSPF, EIGRP, BGP, RIP, and MPLS. In-depth experience with Meraki devices (MX, MS, MR), including Wi-Fi deployments, 802.1x, and EAP-PEAP. Experience with Big-IP F5 LTM/APM cloud edition for load balancing and application traffic management. Expertise in WAN technologies such as Ethernet, MPLS VPN, Frame Relay, T1/T3, and OC standards. Strong proficiency in networking protocols such as TCP/IP, DNS, DHCP, NAT, SNMP, SSL, HTTP, RTP, SIP, and QoS. Hands-on experience with AAA (RADIUS/TACACS) architecture and security protocols. Familiarity with WAN optimization technologies and best practices for optimizing network performance. Proficiency in VPN technologies (site-to-site and remote access) and secure network connectivity. Proficient in network vulnerability mitigation, including vulnerability assessment, patch management, and risk management. Strong experience with penetration testing, risk assessments, and incident response processes to identify and address security weaknesses in both cloud and on-premises environments. Experience with Audit/SIEM solutions (e.g., IPS/IDS, Nessus scanning, Anti-virus, vulnerability management) for real-time network monitoring and threat detection Cisco certifications such as CCNA, CCNP, or equivalent networking certifications are required AWS Certification (e.g., AWS Certified Advanced Networking – Specialty, AWS Certified Solutions Architect – Associate) is highly preferred. Soft Skills Able to assist non-technical users with technical issues and simplify complex concepts for both technical and non-technical stakeholders. Comfortable handling diverse tasks and adjusting priorities in a dynamic environment. English Language proficiency is required to effectively communicate in a professional environment. Excellent communication skills are a must . Strong problem-solving skills and a creative mindset to bring fresh ideas to the table. Should demonstrate confidence and self-assurance in their skills and expertise enabling them to contribute to team success and engage with colleagues and clients in a positive, assured manner. Should be accountable and responsible for deliverables and outcomes. Should demonstrate ownership of tasks, meet deadlines, and ensure high-quality results. Demonstrates strong collaboration skills by working effectively with cross-functional teams, sharing insights, and contributing to shared goals and solutions. Continuously explore emerging trends, technologies, and industry best practices to drive innovation and maintain a competitive edge.

Posted 2 weeks ago

Apply

10.0 - 17.0 years

20 - 30 Lacs

Thane

Work from Office

Role & responsibilities Implement and maintain the security policies and procedures for the complete Identity Management and Access Control life cycle, including the implementation of Access Control. Analyze ASLs business and systems and adopt the best use of Identity and Access Management infrastructure tools for overall business success. Support the evolution of the Identity and Access Management program by implementing and leading integration processes, framework, and activities. Collaborate with application and infrastructure teams to understand scope and requirements of the system to comply with Security process, procedures, policies and best practices. Create and develop standards, guidelines, workflow processes and participate in Access Management Compliance and internal audit exercises as required. Direct design and Implement web access management with single sign-on (SSO) access to multiple resources to create a more efficient and satisfying user experience. Design and implement services interfaces while applying technical standards that enable and protect API access which meets enterprise architecture, security, and privacy needs. Design and implement the Role Based Access Control (Matrix) across ASL systems and applications, enabling users to access resources based on assigned job role. Handle the deployment, configuration and on-going administration of Identity management and Authentication products on an enterprise scale while adhering to Group level Information Security standards and guidelines. Develop Identity Management Integration plan and framework for internal and external applications. Lead the planning and design of enterprise VPN solutions for secure authorization based on international standards and best practices. Implement, and provide continuous improvement by defining the business use of enabling IAM technologies such as Access Control, Multi-Factor Authentication, Privileged Access Management, Single Sign-On, and core Identity Management services. Configure and implement access and authorization controls and provide various security-related services related to Identity Management and Access Control to end users (answering questions, processing requests, and escalating issues as appropriate) and update authorization lists on a regular basis. Conduct security testing of information access systems to highlight security weaknesses and provide recommendations for the effective solution of those issues. Ensure the quality of deliverables and data security across multiple projects in terms of supporting requirements analysis and the technical architecture. Report the compliance level of SOD matrix for all key business applications. Preferred candidate profile Excellent understanding of authentication, authorization, role-based access, least privilege and segregation of duties access control concepts. Proven experience leading the troubleshooting and solving issues related to identities, access, accounts, authentication, authorization, entitlements, and permissions. Hand on experience in one or more IAM technologies such as Quest One Identity Manager, Okta, Thycotic (PAM), Multi-Factor Authentication (MFA), Active Directory etc. Understanding of Information Security principles and basics of Information Security policy, techniques and implications across computing platforms. Certifications on either CISA / CISSP/CISM preferable. Familiarity with compliance processes and standards. Strong analytical & problem-solving skills with ability to translate ideas into practical implementation. Ability to manage stakeholder relationships including team members, vendors and partners. Excellent leadership and communication skills with ability to present and communicate effectively with both technical and non-technical audience.

Posted 2 weeks ago

Apply

1.0 - 3.0 years

1 - 5 Lacs

Hyderabad, Coimbatore

Work from Office

Proficiency in at least 3 of the following IAM technologies o Active Directory o Identity and Access Management o Single Sign On (SSO) o Virtual Directories o PKI o Privileged Access Management o OKTA experience Mandatory Required Candidate profile *OKTA expert skills *Experience in IT regulation & compliance standards such as SOC1& 2 & ISO27001

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Cochin

On-site

Job Title - Adobe Experience Manager Specialist ACS Song Management Level: Level 9- Specialist Location: Kochi (Preferred), Coimbatore, Trivandrum Must have skills: Good to have skills: Job Summary We are looking for a skilled Technical Lead who has 5-8 years of hands-on experience in Adobe Experience Manager (AEM) development, with strong expertise in JavaScript and J2EE technologies. The ideal candidate will be responsible for designing, developing, and maintaining AEM components, templates, and services to deliver seamless digital experiences. You will collaborate closely with cross-functional teams including UX designers, backend developers, and project managers to build scalable and efficient web applications. As a Technical Lead, you will not only manage the AEM development lifecycle but also lead cross-functional integration with Adobe Experience Cloud products including RTCDP, Customer Journey Analytics, and Adobe Launch. You will oversee secure user access using Okta/Auth0 and enable data-driven experiences through Snowflake and Adobe I/O. A strong understanding of Edge Delivery Service performance optimization is critical to success in this role Roles and Responsibilities Develop and maintain reusable code libraries and custom solutions using AEM 6.x and above. Write efficient, modular, and maintainable code using JavaScript, Java, and J2EE technologies. Lead the triage , analysis and deploying solutions for the incidents, and defects reported on the platform, and business functionality in accordance with project requirements.CS1 Investigate and resolve issues reported in the integration of AEM with Adobe Experience Platform (RTCDP, Customer Journey Analytics), Adobe Launch, and Adobe I/O APIs for seamless data exchange and event tracking. Troubleshoot, debug, and resolve issues in existing AEM applications. Participate in code reviews, architecture discussions, and agile development processes. Evolve and fix issue in authentication flows using Okta/Auth0 for gated content, login areas, and user-specific experiences. Collaborate with data engineering and analytics teams to feed AEM-captured data into Snowflake for predictive modeling and reporting. Collaborate with business analysts and stakeholders to understand requirements and translate them into AEM Forms-based solutions. Integrate AEM Forms with external systems such as REST/SOAP services, databases, and third-party APIs. Optimize performance for global audiences by leveraging AEM on Edge Delivery Service, including caching strategies and CDN integration Manage and maintain AEM environments, including configuration, deployment, and performance tuning. Guide and mentor a team of developers, providing technical leadership, code reviews, and best practices. Create and maintain technical documentation, including design specs, deployment plans, and support documentation. Stay updated with AEM product updates, new features, and industry trends. Professional and Technical Skills 5-8 years of professional experience in AEM development (AEM 6.0+ preferred). Solid understanding of Java/J2EE, JavaScript - including frameworks/libraries such as JQuery, Angular, or React, HTML5, XML, and CSS. Experience in integrating AEM with RESTful/SOAP web services. Familiarity with version control tools (e.g., Git), build tools (e.g., Maven), and CI/CD pipelines. Experience with performance tuning and troubleshooting AEM-based applications. Strong problem-solving skills, attention to detail, and ability to work independently or as part of a team. Excellent communication skills and ability to interact with both technical and non-technical stakeholders. Experience: 5-8 years of experience is required Educational Qualification: Graduation (Accurate educational details should capture)

Posted 2 weeks ago

Apply

9.0 years

2 - 3 Lacs

Hyderābād

On-site

Overview: The Identity Access Management (IAM) Engineer will be the senior technical Sr. SME/Architect in the IAM organization and is responsible for architecting, design, implement and support access management solutions in distributed OnPrem & Cloud infrastructure. Skilled in troubleshooting complex technical issues. Works closely with enterprise architects to ensure adequate security solutions are in place to mitigate identified risks sufficiently, while meeting business objectives and regulatory requirements. Provides technical leadership and delivers complex projects. This role is based out of Hyderabad, India and requires coming into the office. Responsibilities: Provides subject matter expertise in architecting, solutioning and implementing access management requirements. Provides advanced architecture and engineering expertise to automate and administrator identity and compliance requirements. Drives planning and execution of identity management roadmaps and technology enhancements. Creates and maintains standards surrounding documentation related to identity processes, procedure, and infrastructure. Assesses current applications and architecture to ensure current implementations align with industry guidelines, best practices, and management approved standards. Contribute to the development of the workforce and customer identity and access management strategy. Collaborate with Enterprise Architects, application development teams, Cybersecurity staff, and the infrastructure team to define the enterprise IAM strategy. Provide level 3 production support to help diagnose and troubleshoot production issues. Adapt the architecture to evolving security conditions and support security guidelines. Develop and deliver applicable documentation, training, and knowledge transfer to both internal and external stakeholders. Champion and foster an Agile DevOps culture within the organization by promoting cross-functional collaboration, continuous integration, and continuous delivery practices. Qualifications: 9+ years of overall IT experience 7+ years of hands-on experience in authentication architecture, Solutioning and design roles 4+ years of scripting (power shell, Python) and development (Java, J2EE, JavaScript, React, Rest API) experience. 2+ years working with Agile and DevOps tools and methodologies. Minimum Okta Certified Administrator: Okta Certified Consultant and/or Okta Certified Developer preferred. BS/BA degree or equivalent experience CISSP / CIAM Certification is a plus.

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Senior Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In identity and access management at PwC, you will focus on confirming secure and efficient access to systems and data for employees and/or clients. Your work will involve the design and implementation of strategies to protect sensitive information and manage user identities. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. Job Description & Summary: As a Senior Associate in Identity & Access Management, you will play a critical role in the design, implementation, and management of IAM solutions for our clients. This is a hands-on technical role, requiring deep expertise in IAM technologies and the ability to work closely with clients to address their security challenges. Responsibilities: Key Responsibilities: · Assist in the design and implementation of IAM solutions tailored to client needs, focusing on identity governance, authentication, authorization, and access control. · Configure and deploy IAM technologies, such as Saviynt, Okta, Microsoft Entra, 1Kosmos or similar platforms, ensuring seamless integration with existing systems. · Conduct technical assessments and audits of clients’ IAM environments to identify vulnerabilities and areas for improvement. · Collaborate with client teams to troubleshoot and resolve IAM-related issues, providing technical support and guidance. · Develop and maintain documentation for IAM processes, configurations, and best practices. · Implement role-based access controls and identity lifecycle management processes to enhance security and compliance. · Support the development and execution of IAM strategies and roadmaps in alignment with business and regulatory requirements. · Stay up-to-date with the latest IAM trends, tools, and technologies to provide clients with innovative solutions. · Contribute to the creation of technical reports and presentations for clients, articulating IAM concepts and solutions clearly. · Work closely with cross-functional teams within the firm to deliver comprehensive cybersecurity solutions. · Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or a related field. Relevant certifications (e.g., CISSP, CISM, or similar) are a plus. · 5-7 years of experience in IAM, with hands-on experience in implementing and managing IAM technologies. · Strong technical expertise in IAM platforms such as Saviynt, Okta, Microsoft Entra, 1Kosmos or other similar technologies. · Proficient in identity lifecycle management, authentication protocols (e.g., SAML, OAuth, OpenID), and directory services. · Strong analytical and problem-solving skills, with attention to detail and a commitment to delivering high-quality work. · Excellent communication skills, with the ability to work collaboratively with clients and team members. · Self-motivated and capable of working independently in a fast-paced consulting environment. · Willingness to travel as required to meet client needs. Mandatory skill sets: · Strong technical expertise in IAM platforms such as Saviynt, Okta, Microsoft Entra, 1Kosmos or other similar technologies. Preferred skill sets: Identity Access Management Years of experience required: 5+ Education qualification: • BE • Btech • MBA • MCA Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Technology, Bachelor of Engineering, Master of Business Administration Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills IAM Tools Optional Skills Accepting Feedback, Accepting Feedback, Access Control Models, Access Control System, Access Management, Active Listening, Analytical Thinking, Authorization Compliance, Authorization Management Systems, Azure Active Directory, Cloud Identity and Access Management (IAM), Communication, Creativity, CyberArk Management, Cybersecurity, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Federated Identity Management, ForgeRock Identity Platform, Identity and Access Management (IAM), Identity-Based Encryption, Identity Federation, Identity Governance Framework (IGF) {+ 23 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies