Jobs
Interviews

242 Pam Jobs - Page 10

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

1 - 3 years

3 - 5 Lacs

Chennai, Telangana

Work from Office

1) Meeting all existing ITL Customer & update their details in App 2) Weekly planning on day wise village coverage- Visible to PAM (Product Application Manager) 3) Meeting new and existing Customers - 4) Addressing Service concerns - immediate closure through Job card opening 5) Lead Generation - unique leads from each village - Lead source will be Customer Referral 6) If needed CRE will connect to concerned PCH for audio call with leads for better understanding 7) Visiting and connecting with 3 hot enquiries along with CH under consultation of PAM

Posted 2 months ago

Apply

1 - 3 years

3 - 5 Lacs

Bihariganj, Telangana

Work from Office

1) Meeting all existing ITL Customer & update their details in App 2) Weekly planning on day wise village coverage- Visible to PAM (Product Application Manager) 3) Meeting new and existing Customers - 4) Addressing Service concerns - immediate closure through Job card opening 5) Lead Generation - unique leads from each village - Lead source will be Customer Referral 6) If needed CRE will connect to concerned PCH for audio call with leads for better understanding 7) Visiting and connecting with 3 hot enquiries along with CH under consultation of PAM

Posted 2 months ago

Apply

1 - 3 years

3 - 5 Lacs

Bhopal, Telangana

Work from Office

1) Meeting all existing ITL Customer & update their details in App 2) Weekly planning on day wise village coverage- Visible to PAM (Product Application Manager) 3) Meeting new and existing Customers - 4) Addressing Service concerns - immediate closure through Job card opening 5) Lead Generation - unique leads from each village - Lead source will be Customer Referral 6) If needed CRE will connect to concerned PCH for audio call with leads for better understanding 7) Visiting and connecting with 3 hot enquiries along with CH under consultation of PAM

Posted 2 months ago

Apply

1 - 3 years

3 - 5 Lacs

Jaipur, Telangana

Work from Office

1) Meeting all existing ITL Customer & update their details in App 2) Weekly planning on day wise village coverage- Visible to PAM (Product Application Manager) 3) Meeting new and existing Customers - 4) Addressing Service concerns - immediate closure through Job card opening 5) Lead Generation - unique leads from each village - Lead source will be Customer Referral 6) If needed CRE will connect to concerned PCH for audio call with leads for better understanding 7) Visiting and connecting with 3 hot enquiries along with CH under consultation of PAM

Posted 2 months ago

Apply

1 - 3 years

3 - 5 Lacs

Telangana

Work from Office

1) Meeting all existing ITL Customer & update their details in App 2) Weekly planning on day wise village coverage- Visible to PAM (Product Application Manager) 3) Meeting new and existing Customers - 4) Addressing Service concerns - immediate closure through Job card opening 5) Lead Generation - unique leads from each village - Lead source will be Customer Referral 6) If needed CRE will connect to concerned PCH for audio call with leads for better understanding 7) Visiting and connecting with 3 hot enquiries along with CH under consultation of PAM

Posted 2 months ago

Apply

1 - 3 years

3 - 5 Lacs

Assam

Work from Office

1) Meeting all existing ITL Customer & update their details in App 2) Weekly planning on day wise village coverage- Visible to PAM (Product Application Manager) 3) Meeting new and existing Customers - 4) Addressing Service concerns - immediate closure through Job card opening 5) Lead Generation - unique leads from each village - Lead source will be Customer Referral 6) If needed CRE will connect to concerned PCH for audio call with leads for better understanding 7) Visiting and connecting with 3 hot enquiries along with CH under consultation of PAM

Posted 2 months ago

Apply

6 - 10 years

15 - 25 Lacs

Bengaluru

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all – at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science – taking information that has been gathered and looking for areas to have that “Ah Ha” moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity – governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience Experience: Minimum of 4-6 years of relevant experience in CyberArk administration and cybersecurity practices, with proven hands-on experience in Privileged Access Management (PAM) using PSM/PSMP. CyberArk Privilege Cloud Management : Proven experience managing CyberArk SaaS Privilege Cloud and its associated components infrastructure. Tenant Management and Cloud Connectors: Strong understanding of Tenant Management, Secure Tunnel, and Cloud Connectors within CyberArk. CyberArk Onboarding : Experience managing CyberArk onboarding activities, including onboarding accounts via RESTAPI, manual onboarding, and bulk onboarding processes. Platform and Safe Creation: Ability to create new safes, accounts, and platforms in CyberArk and link new platforms to the CyberArk environment. Privileged Account Management: Securely managing and monitoring privileged account access to target hosts using Privileged Session Manager (PSM) and Privileged Session Manager Proxy (PSMP). LDAP & AD Federation : Strong knowledge of LDAP and AD Federation. Familiarity with secure integrations with external services such as LDAP/S and RADIUS. CyberArk PAS Components Knowledge: Familiarity with various CyberArk PAS components, including: Privilege Access Suite (PAS) Secure Password Vault and Safes Password Vault Web Access (PVWA) Central Policy Manager (CPM) Privileged Session Manager (PSM & PSMP) Application Identity Manager (AIM), Central Policy (CP), and Central Credential Provider (CCP). Password Management & Compliance: Experience managing privileged account passwords, including verification, change, and reconciliation, ensuring compliance with organizational policies. Session Management: Understanding of user sessions directed through PSM and PSMP for monitoring and auditing. Policy and Reporting: Experience in creating/modifying master policies, and generating reports on safes and user activity. Health Checks & Monitoring: Performing health checks on CyberArk infrastructure and monitoring various components to ensure system integrity and uptime. Troubleshooting & Configuration: Ability to troubleshoot configuration and connectivity issues related to PAM services and components, including network connectivity issues and load balancing. Server Administration: Proficient in Linux Red Hat 7/8, Windows Server 2016/2019/2022 administration. Database and Directory Services: Knowledge of managing database targets, LDAP, AD, and IAM systems. PowerShell & Python Knowledge: Basic knowledge of PowerShell and Python scripting for automation and system integration is a strong advantage. Networking Concepts: Understanding of networking concepts, including firewalls, routing, and load balancing. Disaster Recovery & Failover: Solid knowledge of CyberArk disaster recovery, failover, and failback mechanisms to ensure availability and business continuity. Vault Data Backup: Experience in Vault Data Backup processes for ensuring critical data is securely backed up and protected. Change Management: Proven experience in managing change processes, including preparing and executing delivery plans during Change Advisory Board (CAB) reviews. Incident Handling: Responsible for managing complex and escalated incidents and requests with a focus on resolving issues efficiently. KPI Compliance: Ensuring adherence to KPI metrics for incident and service request resolution, including timely communication and escalation procedures. Stakeholder Communication: Providing input and updates to stakeholders involved in critical incidents, particularly during outages or system failures. Preferred Technical and Professional Experience CyberArk Certifications: Certification as CyberArk Defender, Sentry, or CPC-PAM would be a plus. Troubleshooting Expertise: Advanced troubleshooting skills for identifying and resolving configuration, connectivity, and system performance issues related to PAM services. Report Generation: Experience using CyberArk’s PAS Reporter and Telemetry tools to generate and analyze operational reports. Team Collaboration: Ability to work as a key team player, participating in regular team reviews and contributing to continuous improvement. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 2 months ago

Apply

4 - 7 years

6 - 16 Lacs

Mumbai

Work from Office

The Information Security program protects Burns & McDonnell data, systems, and employees from evolving cyber threats with focus on continually reducing cybersecurity risk for the company. The Senior Information Security Analyst functions as a subject matter expert in evaluating the overall security posture. They will assess and identify vulnerabilities, analyze risks, and recommend solutions to mitigate these risks. Responsibilities : Risk Assessment: Conduct regular assessments of the organization's cybersecurity measures to identify vulnerabilities and risks. Monitoring and Analysis: Use various tools to monitor networks and systems for security breaches or intrusions. Analyze security breaches to understand their root causes. Incident Response: Play a key role in responding to security incidents and breaches, including assisting with investigations and remediation efforts. Reporting: Prepare detailed reports on security issues, such as breach incidents, current risk status, and improvement recommendations. Policy Development Support: Assist in developing and updating the organization's security policies and procedures based on the findings and evolving threat landscape. Training: Perform security awareness training program related to phishing campaigns. All other duties as assigned. - Bachelor's degree in Information Security, Computer Science, Computer Engineering, Information Technology, or related field. Minimum 8 years of experience in Information Security. Information Security certification (CISSP, GSEC, Security+) Demonstrated expert knowledge with two or more Information Security technologies such as EDR, IPS, SIEM, SOAR, CASB, CAASM, IAM, PAM, NAC, MFA, and DLP Broad understanding of network and security protocols such as, DNS, SPF/DKIM/DMARC, SSL/TLS, TCP/UDP, IPSec. Experience with CIS Critical Security Controls, OWASP Top 10, and MITRE ATT&CK framework. Demonstrated knowledge and experience of securing cloud environments such as Azure, AWS, and GCP. Broad experience and familiarity with Information Technology such as routers, load balancers, web application gateways, PKI, and Active Directory. Demonstrated knowledge of compliance frameworks (ISO 27001, SOC 2, NIST, FedRAMP, etc.). Demonstrated ability to evaluate cybersecurity risk and propose risk mitigations to technical and non-technical audiences. Highly effective oral and written communication skills with ability to convey security concepts and risks to non-technical personnel.

Posted 2 months ago

Apply

3 - 7 years

5 - 9 Lacs

Gurugram

Work from Office

AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. Requirements: Proficient with Active Directory and related concepts Familiar with access control methods (RBAC/ABAC) Working knowledge of identity lifecycle management processes and challenges Hands-on experience with cybersecurity tools that function in the following spacesPAM / PIM / IAM, DLP, SOAR (XSIAM), Microsoft Security, AWS Security, Red Teaming / AppSec, Isolated Recovery Environments (IREs) Experience with identity federation and SSO solutions PAM experience or familiarity with specific vendor tools Able to speak to PAM best practices Understanding of the principle of least privilege, separation of duties Experience with REST API and app integration Experience configuring, guiding, or overseeing access review and certification, role management Past participation in identity steering committee Understanding of PIM, JIT, conditional access Familiarity with US compliance and regulatory frameworks that inform identity requirements Qualifications: 6+ years of working knowledge of one or more Identity-Based Security SolutionsOkta, Sailpoint, Delinea, BeyondTrust, CyberArk, etc. Any of the following preferred but not required Security+, CISSP, any vendor-specific certifications related to Identity products Willingness to travel to support client projects and shadowing opportunities (50+ % of the time) Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (OTE) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.

Posted 2 months ago

Apply

4 - 9 years

4 - 7 Lacs

Hyderabad, Chennai, Coimbatore

Work from Office

Sales Manager Premium Acquisition-CASA Role & responsibilities The incumbent will be responsible for acquiring high-value CASA accounts along with Trade, Forex & CMS relationship potential. He should be a self-driven and motivated individual with a zeal to outperform in ambiguous environment and thrive under pressure. He should understand banking products and have flair for sales and relationship management. To acquire new YFB Product/program CA customer in the identified segment and reference generation from the specified catchment • To achieve daily/weekly/monthly customer acquisition target • To ensure initial customer handholding & M+1 activation (Right advice to customer for product and documentation, opening a/c within TAT, familiarize customers with branch service RM and processes, monitor welcome kit delivery and follow up for repeat funding and use of account for business transactions) • To attract new-to-bank qualified customers in consistence with the Banks business strategy • To assist the Business Relationship Leader in catchment mapping & scoping exercise and provide regular feedback to BRL / BBL on opportunities / customer needs / competition benchmarking • To ensure required level of service for in-coming customers, to consult customers on credit and banking products • To ask for referrals and recommendations from existing customers on new customers • To cross sell credit and banking products to eligible customers

Posted 2 months ago

Apply

8 - 12 years

20 - 35 Lacs

Chennai, Bengaluru, Mumbai (All Areas)

Work from Office

Preferred candidate profile End Point Security Defender , Trend Micro - Server Identity and Access Management Sailpoint , Dilenea PAM , Microsoft PKI , Active directory Data Security Data Classification , DLP - MS pureview ,Imperva - Database activitiy monitoring , Data encryiption and clous app security

Posted 2 months ago

Apply

2 - 7 years

4 - 9 Lacs

Pune, Bengaluru

Work from Office

Job Title: Conjur Admin Secrets Management & DevSecOps Location: Pune / Bangalore Experience: 2–8 Years Employment Type: Full-Time Job Description We are looking for a skilled and motivated Conjur Admin to join our cybersecurity and DevSecOps team. In this role, you will be responsible for implementing and managing CyberArk Conjur solutions to secure and automate secrets management across our cloud infrastructure, CI/CD pipelines, and application environments. You will work closely with security, DevOps, and cloud engineering teams to design scalable and compliant secret access solutions, ensuring secure credential storage and governance throughout the development lifecycle. Key Responsibilities Deploy, configure, and manage CyberArk Conjur (Open Source or Enterprise). Implement secure secret injection for applications, services, and pipelines. Create and manage policies, roles, authentication layers (LDAP, Kubernetes, AWS IAM, etc.). Automate secret lifecycle: generation, rotation, expiration, and revocation. Integrate Conjur with CI/CD tools (Jenkins, GitLab, GitHub Actions). Secure cloud-native and containerized environments (AWS, Azure, GCP, Kubernetes, OpenShift). Support audits, compliance reviews, and security assessments. Enforce least-privilege and Zero Trust principles. Required Skills Hands-on experience with CyberArk Conjur (Open Source or Enterprise). Strong Linux/Unix administration and scripting skills. Familiarity with IAM, TLS/SSL, PKI, and REST APIs. Experience with DevOps and automation tools (Docker, Kubernetes, Terraform, Ansible, Jenkins). Solid understanding of secrets management and application security best practices. Preferred Qualifications CyberArk or relevant security certifications. Experience with other secret management tools (Vault, AWS Secrets Manager, etc.). Familiarity with compliance standards like SOC 2, HIPAA, ISO 27001. Why Join Us? Work on cutting-edge DevSecOps and cloud security initiatives. Collaborate in a high-impact, security-first engineering culture. Competitive salary, flexible work environment, and professional growth opportunities.

Posted 2 months ago

Apply

5 - 8 years

10 - 14 Lacs

Kolkata

Work from Office

Project Role : Application Lead Project Role Description : Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have skills : Informatica Product 360 (PIM) Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : a:Should have excellent communication and presentation skills b:Should be a good team player/lead c: Project Role :Application Lead Project Role Description :Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have Skills :Informatica Product 360 (PIM), SSI:No Technology Specialization NON SSI:Good to Have Skills :SSI: NON SSI:Job Requirements :Key Responsibilities :a:Testing source code and debugging code b:Writing high-quality code to complete application development on schedule c:Strong analytical and problem-solving skills d:Possessing specialist knowledge of operating systems, devices, applications and software e:Manage all production system and recommend ways to optimize performance and provide solution to problems and prepare reports for all problems f:Administer and resolve applications issues, provide updates and perform root cause analysis Technical Experience :a:Experience with Informatica MDM and PIM Implementation b:In-depth understanding of PIM features and capabilities, propose solutions based on Informatica P360 platform capabilities c:Create end-to-end specifications for PIM solutions Lead project team members through the activities required to implement Informatica PIM solution make specific recommendations to bring the PIM implementation into conformance with best practices Informatica P360 PIM Certification is recommended Professional Attributes :a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:Strong articulation skills are mandatory Educational Qualification:a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:Additional Info : Qualification a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:

Posted 2 months ago

Apply

3 - 6 years

5 - 8 Lacs

Mumbai

Work from Office

Due to recent international acquisitions, our business has seen great growth, and as a result, we are now seeking a driven and engaging IAM Analyst Identity & Access Management to join our team. This is a key position that will have you managing and truly partnering with a portfolio of our current clients. This is a fantastic opportunity for an experienced IAM Analyst who wants to engage with their customer; youll become a part of their business and provide high-quality, market-leading advice and value-added service. So, whats the job? You will assist in the User Access Review (UAR) process, including setup, execution, and follow-up. This role will specifically focus on Privileged User Access Management. You'll maintain identity governance controls for timely access provisioning and de-provisioning. You'll assist with privileged access management for critical systems and infrastructure. You'll implement and manage role-based access control (RBAC) across systems. You'll resolve access-related issues in a compliant and timely manner. You'll maintain documentation of access controls, roles, and workflows. You'll collaborate with audit, compliance, and IT security teams on access inquiries. You'll assist in onboarding applications into identity governance. You'll contribute to continuous IAM process, control, and reporting improvements. You'll track IAM operations with access metrics and dashboards. You'll perform periodic certifications of accounts and entitlements for compliance. You'll support access recertification automation and process improvements. You'll monitor IAM systems for anomalous activity and escalate incidents. You'll promote user education on access control best practices. You'll contribute to risk assessments and control gap analysis. You'll liaise with stakeholders to define access requirements and segregation of duties. You'll assist in developing and testing IAM disaster recovery plans. You'll evaluate and provide feedback on new IAM tools and features. And what are we looking for? You'll have 3+ years of experience in IAM, access control, or IT security operations. You'll possess knowledge of IAM concepts, including UAR, RBAC, PAM, and least-privilege access. You'll have experience with identity governance platforms (e.g., SailPoint, Saviynt, or similar). You'll be familiar with Active Directory, Azure AD, and enterprise authentication systems. You'll understand compliance and audit requirements related to access management. You'll demonstrate strong analytical skills and attention to detail. You'll be able to work both independently and collaboratively in a global team environment. You'll have effective communication skills, both written and verbal.

Posted 2 months ago

Apply

4 - 7 years

0 - 0 Lacs

Pune

Hybrid

Role We are seeking a skilled Privileged Access Management (PAM) /Identity and Access Management (IAM) Engineer to design, implement, and maintain our organization's PAM solutions. The ideal candidate will have a strong background in engineering, with specific expertise in PAM solutions and best security practices. Responsibilities: - Design and deploy robust PAM/Beyontrust solutions - Integrate PAM systems with existing infrastructure and applications - Develop scripts and utilize Beyondtrust APIs to automate PAM processes and workflows - Troubleshoot and resolve issues related to PAM systems and privileged access and accounts. - Implement and maintain secure password policies and rotation schedules - Monitor and report on privileged account usage and potential security risks - Continuously improve PAM systems and processes for enhanced security and efficiency Requirements - Bachelor's degree in Computer Science, Information Technology, or related field - 3+ years of experience in IT or Security, with a focus on privileged access management - Design and Hands-on experience with BeyondTrust SaaS products: SaaS PasswordSafe and Privilege Endpoint Management. - Strong knowledge of identity and access management principles and best practices - Proficiency in one of these programing languages: Java/C/C#, web development, - Familiarity with one of these scripting languages :PowerShell/ Python/Ruby) for automation Preferred Qualifications - Experience with migrating from BeyondTrust Privileged Identity Management solution to PasswordSafe. - Experience with Identity Governance And Administration(IGA) or Sailpoint IdentityNow solutions and integrations Skills and Attributes - Excellent problem-solving and analytical skills - Ability to work independently and as part of a team - Attention to detail and commitment to maintaining high security standards - Willingness to stay updated on emerging technologies and security leading practice

Posted 2 months ago

Apply

3 - 8 years

4 - 9 Lacs

Pune, Bengaluru, Hyderabad

Hybrid

Hands-on experience in Installing/Upgrading and Setting up CyberArk Components (EPV, PWV, EPM, CPM, PVWA, PSM, PSMP, AIM) to customizing/configuring it for given Policies and procedures. Design, architecture, and migration experience on CyberArk. Provisioning, creating workflows, custom connectors and policies. Integrating various platforms with CyberArk, such as different LDAP providers, Windows servers, UNIX servers, databases and networking devices. Creation of automation scripts using PACLI and REST API. Experience on customization of CyberArk Platforms. Custom PSM Connectors/CPM Plugins (with AutoIT/Shell Scripting) and good knowledge on auto-detection configuration and usage of Discovery Scanning tools. Experience on AIM (CP and CCP) Credential Provider agents installation/upgradation. Experience on CyberArk version upgrade. Experience on DR Drill activities. Knowledge on HSM and PTA integration would be an added advantage. Exposure to CyberArk Pcloud is an added advantage. Primary skills: CyberArk PAM/Pcloud design and implementation CyberArk Sentry/Defender certification is good to have. Preferably CyberArk PAM experience is preferred else good to have PAM experience in any of these platforms viz. StrongDM/OneIdentityLLC/BeyondTrust/ManageEngine/Foxpass/ JumpCloud/ARCON/ Centrify/Microsoft Purview Experience Required: 5-8 Years in CyberArk PAM and EPM deployment preferred or candidates who have worked on similar solutions from other OEMs with overall 10-13 years of IT experience.

Posted 2 months ago

Apply

5 - 10 years

10 - 20 Lacs

Bengaluru

Work from Office

Job Role: IT Infrastructure Security Engineer . Location: Bangalore. Notice Period: Immediate to 30 days. Responsible for designing, implementing, and maintaining security measures to protect an organizations IT infrastructure. This role involves securing networks, servers, cloud environments, and other critical IT systems against cyber threats. The engineer works closely with IT, security, and compliance teams to ensure a robust security posture and adherence to industry standards. Key Responsibilities Infrastructure Security & Compliance Design and implement security controls to protect IT infrastructure, including servers, networks, databases, and cloud environments. Conduct security assessments, vulnerability scans, and penetration tests to identify weaknesses and recommend mitigation strategies. Ensure compliance with industry standards such as ISO 27001, NIST, CIS, GDPR, HIPAA, PCI-DSS, and SOC 2 . Develop and enforce security policies, procedures, and best practices for IT infrastructure. Monitor system logs, network traffic, and security alerts to detect and respond to threats in real-time. Network & Cloud Security Secure on-premises and cloud environments (AWS, Azure, Google Cloud) using security best practices. Implement firewalls, IDS/IPS, VPNs, and Zero Trust architectures to safeguard enterprise networks. Configure and manage endpoint security solutions, SIEM, EDR, XDR , and other security tools. Implement identity and access management (IAM) solutions, including privileged access management (PAM). Incident Response & Threat Management Investigate and respond to security incidents, breaches, and anomalies in coordination with SOC teams. Develop incident response plans (IRP) and lead forensic analysis for security events. Work closely with security operations teams to automate threat detection and response processes. Security Automation & Infrastructure Hardening Use Infrastructure as Code (IaC) to automate security configurations (e.g., Terraform, Ansible). Implement patch management, vulnerability management, and endpoint security policies . Secure containers and Kubernetes environments in DevOps pipelines. Harden operating systems (Windows, Linux) and cloud environments against cyber threats. Collaboration & Continuous Improvement Provide security training and awareness to IT teams. Collaborate with DevOps, IT, and compliance teams to integrate security in CI/CD pipelines. Stay up to date with emerging cyber threats and recommend new security technologies. Qualifications & Skills Technical Skills Strong knowledge of network security, cloud security, and endpoint security . Experience with firewalls, IDS/IPS, SIEM, EDR/XDR, and encryption . Hands-on experience with AWS Security, Azure Security Center, Google Cloud Security, and IAM solutions . Familiarity with scripting and automation (Python, Bash, PowerShell). Expertise in Active Directory (AD), Zero Trust security, and PKI . Knowledge of compliance frameworks like ISO 27001, NIST, CIS, GDPR, PCI-DSS . Soft Skills Strong analytical and problem-solving skills. Excellent communication and teamwork abilities. Ability to work under pressure and manage multiple security tasks. Detail-oriented with a proactive security mindset. Certifications (Preferred but Not Mandatory) CEH (Certified Ethical Hacker) CISM (Certified Information Security Manager) CCSP (Certified Cloud Security Professional) AWS Security Specialty, Azure Security Engineer, or Google Cloud Security Certifications CISSP (Certified Information Systems Security Professional) Work Environment & Tools Security tools: Wazuh SIEM, Splunk, Palo Alto, Fortinet, CrowdStrike, SentinelOne, Qualys, Tenable, Nessus Cloud platforms: AWS, Azure, Google Cloud . Operating systems: Windows, Linux, macOS . Automation: Python, Terraform, Ansible, PowerShell.

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies