Jobs
Interviews

241 Pam Jobs - Page 2

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 6.0 years

4 - 9 Lacs

Navi Mumbai

Work from Office

We are seeking a skilled and proactive Network Security Engineer with strong expertise in managing and implementing Netskope Proxy Solutions. The ideal candidate will have a solid background in network security, hands-on experience with various proxy tools and protocols, and a proven track record of maintaining, analyzing, and troubleshooting network security environments in complex setups. Key Responsibilities: Manage and maintain Netskope Proxy solutions across enterprise environments including DC, DR, Cloud, and Branch offices. Commission, implement, and integrate Proxy with authentication and authorization systems (AD, IAM, Email, SIEM, etc.). Automate routine processes using scripting/configuration tools and integrate with SOAR platforms. Manage proxy policies, access rules, and exception handling. Perform packet capture analysis and in-depth troubleshooting (OSI Layers 1-7). Respond to and investigate Proxy-related incidents, outages, and compliance findings. Coordinate with users and cross-functional teams for issue resolution and change implementations. Ensure adherence to network security policies, standards, and procedures. Create and maintain technical documentation including SOPs, network diagrams, and audit reports. Monitor network health using tools and proactively identify potential service degradations. Provide mentorship and guidance to L1 and L2 engineers. Ensure timely ticket resolution and SLA compliance. Coordinate with OEMs for RMA, TAC support, firmware upgrades, and patching. Collaborate with helpdesk and IT teams during major incident handling and resolution. Report and track SLA performance and RCA documentation. Required Candidate Profile: Experience: 36 years in network security with minimum 3 years in managing Proxy solutions. Skills: Hands-on with Proxy solutions (deployment, management, policy design) Strong scripting/configuration experience (for automation/SOAR) Expertise in network troubleshooting (Wireshark/PCAP analysis) Good understanding of security integrations (AD, IDAM, PAM, SIEM, SOAR) Experience with incident/problem/change/configuration management practices SLA-based support handling and compliance closures Strong documentation and communication skills Leadership capabilities to manage and mentor junior engineers High level of accountability and ownership of assigned technologies

Posted 2 weeks ago

Apply

3.0 - 8.0 years

9 - 17 Lacs

Hyderabad

Hybrid

a)Experience in CyberArk Privileged Cloud b) Onboard domain, window, Linux, cloud, database administrator target systems to CyberArk c) Bulk account onboarding of privileged accounts d) Onboard and manage application service accounts and other privileged accounts that may impact applications when credentials are rotated via Central Credential Provider e) Onboard secrets in Secrets Hub, create sync policies etc. f) Maintain the underlying infrastructure high-availability, disaster recovery, network management & patching and upgrading the underlying infrastructure. g) Troubleshoot third party-integrations such as Active Directory, SIEM, SMTP. h) Troubleshoot password and session management issues i) Generate reports for password compliance and access certification j) Experience in configuring new load balancer for PSM and CCP k) Provide guidance on configuring master and password policy for password vaulting/rotation, session recording, and whitelist/blacklist commands. l) Train end user administrators on procedures to access PAM tool. m) Document known issues, administrator guide, SOPs for patching, upgrade activities.

Posted 2 weeks ago

Apply

4.0 - 7.0 years

5 - 10 Lacs

Pune

Work from Office

At Capgemini Invent, we believe difference drives change. As inventive transformation consultants, we blend our strategic, creative and scientific capabilities,collaborating closely with clients to deliver cutting-edge solutions. Join us to drive transformation tailored to our client"s challenges of today and tomorrow.Informed and validated by science and data. Superpowered by creativity and design. All underpinned by technology created with purpose. Your Role Drive and ensure business, IT and Security teams are compliant to applicable IAM policy, IAM .standards and instructions. Work closely with IAM team ( Run and Project) to design and deploy monitoring and control systems based on IAM policy and instructions. Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction. Develop and maintain measurable IAM security metrics; ensure metrics provide actionable insights to the applicable stakeholders. Maintain IAM policy & instruction awareness of business, technical, architecture, infrastructure, and end user support Develop and maintain measurable KPIs to showcase IAM governance performance Analyse internal and external threats and recommend remediation actions based on IAM capability. Perform IAM audit / gap assessments of internal systems and processes and provide recommendations to mitigate the same Your Profile Deliverables PAM Audit compliance Dashboard, reporting Analysis, Identity Health Check & governance What you will love about working here We recognize the significance of flexible work arrangements to provide support. Be it remote work, or flexible work hours, you will get an environment to maintain healthy work life balance. At the heart of our mission is your career growth. Our array of career growth programs and diverse professions are crafted to support you in exploring a world of opportunities. Equip yourself with valuable certifications in the latest technologies such as Generative AI.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

3 - 8 Lacs

Bengaluru

Work from Office

Role & responsibilities: Outline the day-to-day responsibilities for this role. Preferred candidate profile: Specify required role expertise, previous job experience, or relevant certifications. Perks and benefits: Mention available facilities and benefits the company is offering with this job.

Posted 2 weeks ago

Apply

6.0 - 11.0 years

18 - 33 Lacs

Hyderabad

Hybrid

Job Description Summary: To coordinate a critical team responsible for the security and smooth operation of our Identity and Access Management (IAM) environment. This leader will be responsible for a team that tackles incidents, problems, tasks, and patching for a diverse set of IAM services, including SailPoint, Active Directory, Azure AD, certificate management, and Privileged Access Management (PAM). The ideal candidate possesses a deep understanding of IAM principles, extensive experience in security operations, and the leadership skills to navigate complex technical challenges. Responsibilities: Incident Response & Security: Lead the team in responding to security incidents related to IAM systems, including user access issues, suspicious activity, and potential breaches. Conduct thorough investigations to identify root causes and implement corrective actions to prevent future incidents. Develop and maintain an effective incident response plan for IAM systems. Stay informed about emerging IAM security threats and vulnerabilities, implementing necessary security patches and updates promptly. Operations & Problem Solving: Manage a team of IAM specialists responsible for day-to-day operations, problem resolution, and task fulfillment within SailPoint, Active Directory, Azure AD, certificate management, and PAM systems. Ensure the team has the understanding of the comprehensive procedures for IAM operations, ensuring efficient user provisioning, access management, and lifecycle processes. Monitor and analyze IAM system performance metrics, identifying and resolving operational issues. Ensure adherence to established IAM policies, standards, and compliance requirements. IAM Process Governance: Through the feedback of incidents & problem cases provide visibility to the IAM & MyAccess teams where processes have issues or can be improved. Ensure the team is supporting the MyAccess project in defining test cases for newly onboarded applications Providing resources from the team to support application onboarding testing and reporting results. With the team, drive the engagement of identity standardization, central processes, and the adoption of concepts such as least privilege and zero trust in the organization Technical Expertise: Possess a strong understanding of IAM best practices, frameworks, and methodologies (e.g., NIST 800-53). Have in-depth knowledge of SailPoint, Active Directory, Azure AD, certificate management solutions, and PAM systems. Stay current on the latest security vulnerabilities and patches related to these IAM services. Work collaboratively with other security teams to ensure comprehensive security controls for user access and entitlements. Leadership & Communication: Foster a high-performing team environment that prioritizes security and operational efficiency. Provide clear direction and guidance to team members, ensuring they have the knowledge and resources to excel in their roles. Communicate effectively with stakeholders at all levels, including business leaders, IT operations, and security teams. Develop and deliver training programs to educate users and team members on IAM processes and security best practices. Qualifications: Bachelor's degree in information technology, Cybersecurity, or a related field (or equivalent experience). Minimum 7 years of experience in IAM operations, with at least 3 years in a leadership role. Proven experience in security operations, including incident response, investigation, and vulnerability management. In-depth knowledge of SailPoint, Active Directory, Azure AD, certificate management solutions, and PAM systems. Strong understanding of IAM best practices and frameworks. Excellent communication, collaboration, problem-solving, and analytical skills. Ability to work independently, manage multiple priorities, and lead a team in a fast-paced environment.

Posted 2 weeks ago

Apply

3.0 - 8.0 years

15 - 30 Lacs

Kolkata, Hyderabad, Bengaluru

Work from Office

Role & responsibilities 1. Strong experience in Cyberark 2. Experiecne PAM Implemetation 3 Certification Mandatory (Defender OR PAM)

Posted 2 weeks ago

Apply

15.0 - 19.0 years

0 Lacs

ahmedabad, gujarat

On-site

As an IDAM Strategy & Solution Delivery professional, you will be responsible for developing and implementing scalable, secure, and compliance-driven frameworks tailored to client needs. Your role will involve leading end-to-end execution of IDAM projects, from requirements gathering to deployment and post-implementation support, ensuring alignment with industry best practices, regulatory requirements, and cybersecurity trends. In client engagement and advisory capacity, you will act as a trusted advisor to clients, understanding their security needs and recommending appropriate IDAM strategies. Collaboration with CISOs, CIOs, and security teams will be essential to design customized access control solutions and drive long-term client relationships through high-quality service delivery. Operational excellence and service delivery will be a key focus area where you will establish efficient workflows, processes, and governance models for seamless IDAM implementation and management. Continuous improvement initiatives will be implemented to enhance service quality, scalability, and automation in IDAM solutions, while monitoring KPIs, SLAs, and compliance adherence to maintain high standards of delivery. Your role will also encompass engineering and technical leadership responsibilities, including leading and mentoring IDAM engineering teams, overseeing integration of various architectures into client environments, and providing technical leadership on complex IDAM challenges for risk mitigation and security compliance. Cross-functional collaboration will be crucial as you work closely with cybersecurity, cloud, IT infrastructure, and compliance teams to ensure seamless IDAM integration. Collaboration with sales and business development teams will be required to support pre-sales activities, RFPs, and solution proposals for clients. Furthermore, staying updated on evolving cybersecurity threats and driving innovation in IDAM service offerings will be expected. To excel in this role, you should possess a Bachelor's degree in IT, Cybersecurity, Engineering, or a related field, with relevant certifications such as CISSP, CISM, or IAM-related certifications preferred. You should have over 15 years of experience in IDAM service delivery, cybersecurity consulting, or enterprise security architecture, with a strong focus on OT/IT environments. Deep expertise in IAM, PAM, MFA, SSO, Zero Trust, and regulatory compliance frameworks, along with a proven track record of delivering large-scale IDAM projects for enterprise clients, will be essential. Strong leadership, client management, and strategic problem-solving abilities are also required for success in this role.,

Posted 2 weeks ago

Apply

8.0 - 12.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Security Architect & Engineer, you will play a crucial role in designing secure architectures, implementing effective security controls, and supporting security operations across IT and cloud environments. Your responsibilities will involve creating long-term security strategies aligned with business goals, evaluating security technologies, and ensuring compliance with regulatory requirements. In the realm of Security Architecture, you will be tasked with designing secure and scalable architectures that seamlessly integrate with existing IT systems. Your role will also involve recommending security technologies, frameworks, and practices across IT, OT, and cloud environments. Implementing access control and identity management measures will be essential, including least privilege, RBAC, MFA, and SSO controls. In terms of Security Engineering, you will apply secure configuration baselines and automation across operating systems, databases, and cloud environments. Supporting security and vulnerability assessments, assisting in patch implementations, and promoting infrastructure-as-code and DevSecOps practices will also fall under your purview. Your involvement in Security Operations will require collaboration with SOC and IT teams to detect, investigate, and respond to security incidents. To enhance security measures, you will support threat hunting, root cause analysis, and the evolution of incident response and disaster recovery plans. Regarding Risk, Compliance & Governance, you will be responsible for identifying and mitigating security risks associated with IT systems. Developing security policies, conducting risk assessments, ensuring compliance with frameworks and regulations, and providing security input into vendor assessments will be crucial aspects of your role. In terms of Collaboration & Communication, you will act as a trusted advisor to internal teams on security best practices and secure solution design. Your ability to translate complex security topics into actionable guidance for technical and business stakeholders will be paramount. To qualify for this role, you should hold a Bachelor's degree in Information Security, Computer Science, or a related field, along with 8-12 years of cybersecurity experience. Strong knowledge of cloud security services, regulatory compliance requirements, IAM concepts, and relevant certifications are required. Additionally, experience with SIEM, EDR, vulnerability scanners, and cloud-native controls is essential. While not mandatory, advanced knowledge in cloud security architecture, experience with automation tools, and relevant certifications like CISSP, CISM, or CEH would be advantageous. This position may offer remote work options and will involve collaboration with diverse teams in a dynamic environment, providing you with the opportunity to contribute to critical security initiatives.,

Posted 2 weeks ago

Apply

17.0 - 20.0 years

35 - 55 Lacs

Hyderabad

Work from Office

Job Title: Head of Identity and Access Management (Healthcare / Pharma industry experience Must) Department: Global Identity & Directory Solutions Reports To: Head of Global IT Infrastructure Technical Skills: (Mandatory Technical & Functional Requirements) SailPoint IdentityIQ / IdentityNow Implementation, governance, policy enforcement, and lifecycle automation. Privileged Access Management (PAM) Hands-on experience with tools like Delinea or CyberArk . Active Directory (AD) & Entra ID (Azure AD) Deep technical understanding of hybrid identity, group policies, federation services (ADFS), and cloud directory management. Authentication Protocols Proficient in OAuth2 , SAML , OpenID Connect , and MFA solutions. Certificate Lifecycle Management (CLM) In-depth experience with PKI , SSL/TLS certificate management , and basic cryptography principles . Integration with Cloud IAM Experience with Azure , AWS , Kubernetes RBAC , DevOps CI/CD tools . ITSM Integration Familiarity with ServiceNow for IAM workflow automation. Security Frameworks Knowledge of NIST 800-53 , ISO 27001 , GDPR , SoD , RBAC policies. Key Responsibilities Define and implement the global IAM strategy, roadmap, and governance model. Lead IAM operations, engineering, and governance teams to deliver secure and scalable IAM services. Ensure operational excellence across IAM services including performance monitoring, incident response, patching, and upgrades. Oversee IAM program compliance with internal controls and external regulations. Drive automation across identity lifecycle processes (Joiner-Mover-Leaver). Foster collaboration with IT, HR, Legal, Compliance, and business units. Own IAM controls during audits and drive timely remediation. Lead IAM-related risk assessments and integrate findings into business planning. Act as the subject matter expert (SME) on identity security in digital transformation initiatives. Education & Certifications Required : Bachelors degree in Computer Science, Cybersecurity, or equivalent. Preferred : Masters degree, CISSP, CISM, or equivalent IAM/security certifications. Experience Minimum 16 years in IT Security or IAM, with 5+ years in IAM leadership roles - Healthcare and pharma industry experience preferred . Demonstrated success managing global IAM programs and operational teams. Proven expertise in handling IAM audits, compliance, and regulatory frameworks. People & Budget Responsibilities Team Size : 7- 14 direct/indirect reports Budget : Responsible for cost planning and financial oversight of IAM services

Posted 2 weeks ago

Apply

6.0 - 11.0 years

25 - 32 Lacs

Noida, Hyderabad

Work from Office

Experience Required: 7+ years in Privileged Access Management (PAM), specifically with BeyondTrust solutions Key Responsibilities: Implementation & Configuration • Gather and analyze requirements for BeyondTrust PAM solutions. • Design, install, configure, and integrate BeyondTrust Password Safe across enterprise environments. • Lead deployment, upgrades, and validation activities to ensure system integrity. Privileged Access Governance • Define and enforce privileged account lifecycle policies. • Automate password rotation and credential management across diverse systems. Integration & Customization • Integrate BeyondTrust with Active Directory, LDAP, SIEM, IAM, DevOps, and cloud platforms. • Develop custom plugins and automation using REST APIs, PowerShell, or Python. • Enhance authentication with MFA and integrate with SSO tools. Security Compliance & Risk Management • Ensure compliance with standards like ISO 27001, NIST, and PCI-DSS. • Conduct security assessments and risk analysis for PAM implementations. Operations & Support • Manage day-to-day operations, upgrades, patching, and backup strategies. • Monitor system health using logs, dashboards, and alert mechanisms. Training & Documentation • Provide user documentation, update runbooks, and deliver knowledge transfer. • Report progress and system status to project leadership. Required Skills: • Strong hands-on experience with BeyondTrust Password Safe and other PAM tools. • Proficiency in PowerShell, Python, and REST API integrations. • Deep understanding of privileged access governance, identity lifecycle, and security compliance. • Experience with SIEM, IAM, and cloud security integrations.

Posted 2 weeks ago

Apply

8.0 - 13.0 years

25 - 32 Lacs

Noida, Hyderabad

Work from Office

Experience Required: 510+ years in Identity and Access Management (IAM), with deep expertise in CyberArk PAM and EPM Key Responsibilities: Architecture & Strategy • Lead the design and implementation of CyberArk PAM and EPM solutions. • Define privileged access policies, least privilege strategies, and endpoint security controls. • Align PAM/EPM architecture with organizational security goals and compliance requirements. Implementation & Integration • Deploy and configure CyberArk components including Vault, PVWA, PSM, CPM, and EPM. • Integrate CyberArk with Active Directory, LDAP, SIEM, cloud platforms, and DevOps pipelines. • Customize policies and workflows to meet specific business and security needs. Endpoint Privilege Management (EPM) • Implement EPM to manage and restrict endpoint privileges across Windows and macOS environments. • Develop policies to prevent privilege escalation and enforce application control. • Monitor endpoint activity and respond to suspicious behavior or policy violations. Operations & Support • Maintain and optimize CyberArk environments, ensuring high availability and performance. • Apply patches, upgrades, and backups regularly. • Troubleshoot issues related to privileged access and endpoint controls. Security & Compliance • Ensure CyberArk implementations comply with standards like ISO 27001, NIST, HIPAA, and PCI-DSS. • Conduct audits, access reviews, and risk assessments. • Generate reports for internal and external compliance requirements. Training & Documentation • Provide training and knowledge transfer to internal teams. • Maintain detailed documentation for configurations, policies, and procedures. Required Skills: • Hands-on experience with CyberArk PAM and EPM modules. • Proficiency in PowerShell, REST APIs, and scripting for automation. • Strong understanding of privileged access governance, endpoint security, and identity lifecycle management. • Familiarity with SIEM, IAM, and cloud security integrations. Preferred Qualifications: • Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field. • Certifications such as CyberArk Defender PAM (PAM-DEF) and CyberArk Defender EPM (EPM-DEF) • Experience with other PAM tools (BeyondTrust, Thycotic) is a plus

Posted 2 weeks ago

Apply

1.0 - 6.0 years

3 - 8 Lacs

Udaipur, Ajmer, Jaipur

Work from Office

Any Sales Experience BFSI/NBFC Managing the banking and investments relationship Customer-service orientation Negotiation and Persuasion skills & Relationship building CASA & Asset Insurance Fintech any financial product sales exp Required Candidate profile Understanding of KYC, AML guidelines and complying with Bank policies for the role and responsibilities Client Handling Ensuring timely opening of accounts and giving smooth on boarding experience Perks and benefits Best In BFSI*

Posted 2 weeks ago

Apply

7.0 - 12.0 years

30 - 35 Lacs

Noida, Chennai, Bengaluru

Hybrid

Must Have Skills: 5 to 7 years of experience in deployment & implementation of Privileged Identity Management using CyberArk solution for large scale customers across various industry verticals Play active role in the execution of the project and demonstrate strong technical leadership Have a strong knowledge of the CyberArk privileged account security suite CyberArkversion 7.x, 8.x, 9.x and 10.x . Experience in the use of CyberArk PACLI to automate tasks related to user and safe management. Good understating of CyberArk components like EPM, OPM, AIM, etc. Capture detailed requirements for the CyberArk solution based on input from platform owners, eco-system owners, the target architecture and high-level requirements. Design and Architecture of the overall CyberArk implementation. Performing compliance checks on CyberArk for IT security safes and to Provide alerts and reports appropriately. Investigate, Provide RCA and resolve Incidents. Open to travel as and when required for deployment at customer sites Be a strong team player Advanced knowledge of windows/VMware administration. Advanced knowledge of Windows Cluster Server Strong grasp of network design, application/infrastructure security concepts, techniques, technologies, and tools Experience in working in an on/offshore environment and proven track record of delivering quality outcomes Customer service background – able to empathize with customer and own the issues raised to resolution Leading team contribution to any queries requiring technical specialist input Other Required Skills: Experience in deployment and implementation of anyof the other PIM tools: CA PAM (Xceedium) BeyondTrust Quest / OneIdentity Thycotic ERPM Good understanding of LDAP concepts and working experience with at least few of the following directories: Oracle Internet Directory/Oracle Virtual Directory Sun Directory Server Active Directory Tivoli Directory Server Novell Directory Server CA Directory Experience in using database client tools like Toad, etc. Experience in using standard protocols like SSH, Telnet, RDP, etc. and related tools like Putty. Experience in working with the Network devices like firewalls, routers, etc. Should have the ability to understand customer scenario and requirements (may include customized integration situations) and be capable of suggesting solutions. Excellent communication skills and ability to work with global counterparts. Knowledge of basic networking Experience in Windows and Linux operating systems from PIM integration and debugging perspective Exposure to virtual environments with experience in integrating ESX, ESX(i) hosts with the PIM solution. Good troubleshooting skills Runbook documentation Qualifications: 5-7 years of strong PAM implementation experience Strong oral and written communications skills Customer Facing Exposure is must Open to travel requirements

Posted 2 weeks ago

Apply

6.0 - 11.0 years

10 - 15 Lacs

Mumbai

Work from Office

Experience with Network Architecture Review and Firewall Rule-base Audit. Strong understanding of OWASP top 10 and SANS top 25 programming errors.Threat Hunting, attack identification, investigation, correlation and suggesting mitigation measures. Required Candidate profile Experience on Vulnerability Assessment and Penetration Testing for Infrastructure / network / web application / databases.Propose, plan, & execute Red Team operations based on threats to organization.

Posted 3 weeks ago

Apply

4.0 - 8.0 years

13 - 17 Lacs

Pune

Work from Office

Project description Are you a DeveloperDo you enjoy writing all sorts of source code (from simple scripts to fully fledged applications and frameworks)Do you like scripting and process automationAre you looking to specialize in IT Security We're looking for software engineers to: providing technical expertise and recommendations in assessing new software projects and initiatives to support and enhance our existing applications produce secure and clean code that is stable, operational, consistent, and well-performing conduct code reviews and test software as needed, along with participating in application architecture and design and other phases of SDLC see that proper operational controls and procedures are implemented in production reduce as much as possible the overhead and manual activities by enhancements and automation Your team Identity and Access Management ('IAM') is a global security organization within Technology Services. As an expert in IAM security and internet technologies, you'll be part of our team working closely with the internal project team. We provide the privileged access invocation solutions. Our team is global, diverse, and collaborative as we work across organizations to keep our technology, applications, and the businesses they support secure. Responsibilities What you'll be doing development of privileged access solution for Linux and mainframe Work within Azure leveraging Azure Resource Manager templates, databases and Load balancing to provide a Privileged Access Management (PAM) solution Build and deploy components leveraging automation, such as CICD pipelines, to create a scalable environment Work within a global team to build a solution that meets the banks security requirements Partner with other teams, including the PAM Operations, to deploy, design and maintain and the PAM environment Skills Must have Experience with Microsoft Azure and application infrastructure related activities including cloud pipelines Git/Gitlab (CI/CD) Linux shell scripting, PowerShell, Bash and Perl/Python scripting/debugging and modifying (on the server) skills Linux basics Package management, service management, network configuration Cronjobs setup File system setup and permissions Code logging/monitoring Oracle & Postgres DB Web Development Nice to have Previous experience with / knowledge of PAM (privileged access management)

Posted 3 weeks ago

Apply

10.0 - 14.0 years

0 Lacs

pune, maharashtra

On-site

As a seasoned PAM (Privileged Access Management) expert with over 10-12 years of experience, you will be responsible for designing and configuring various PAM use cases to enhance the security and efficiency of the organization. Your primary tasks will include setting up PSM (Privileged Session Management) and CPM (Credentials Provider Management), including the establishment of secure tunnels for Active Directory. You will also play a crucial role in onboarding privileged accounts for both Windows and Linux platforms, ensuring a seamless and secure process. Your deep understanding of privileged accounts in Windows and Linux environments will be instrumental in implementing effective PAM solutions. Collaborating with cross-functional teams will be essential to integrate privileged access management solutions successfully. Additionally, your expertise in running DNA scans and analyzing the results will contribute to the continuous improvement of security measures within the organization. To excel in this role, you must demonstrate proficiency in designing and configuring PAM use cases, particularly focusing on password management, session recording, workflow, and safe assignment. Your knowledge and hands-on experience in setting up PSM and CPM, specifically in the context of Active Directory security tunnel setup, will be valuable assets. Strong communication skills are vital for effective collaboration with team members and stakeholders to ensure the successful implementation of PAM solutions.,

Posted 3 weeks ago

Apply

3.0 - 5.0 years

8 - 12 Lacs

Pune, Bengaluru

Work from Office

Technical Skills Required: CyberArk Administration: Act as the secondary support for CyberArk administration, including managing and maintaining the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and other related components. Assist in the provision, rotation, and de-provision of privileged credentials within CyberArk. Support day-to-day operations, monitoring, and maintenance of the CyberArk environment. Collaborate with the primary CyberArk administrators to ensure alignment with organizational security policies and best practices. Support and Troubleshooting: Respond to and resolve support tickets, incidents, and requests in a timely and efficient manner, documenting steps and solutions. Perform root cause analysis for recurring issues and provide recommendations for resolution and improvement. Understanding of ITIL processes Ability to work with multiple stakeholders from Security, Operations, Application Owners and Service Providers on deployment activities and enhancing the IAM solution. Knowledge of Operating systems, Database concepts and other potential targets or endpoints for a typical IAM Solution. Good presentation and documentation skills

Posted 3 weeks ago

Apply

7.0 - 10.0 years

20 - 25 Lacs

Pune, Bengaluru

Work from Office

Centrify Administration : Serve as the primary administrator for Centrify, overseeing the deployment, configuration, and maintenance of the Centrify environment. Manage privileged access and ensure secure authentication and authorization using Centrifys tools and solutions. Perform regular system checks, monitor performance, and ensure the high availability and reliability of Centrify services. Troubleshoot and resolve issues related to the Centrify infrastructure, including connectivity, policy enforcement, and access issues. Implement Centrify best practices and ensure compliance with organizational security policies and standards. Work closely with cross-functional teams, including IT, security, and compliance, to ensure a cohesive approach to security and privileged access management. Participate in project planning and execution for initiatives related to Centrify and Conjur, providing expert insights and technical expertise. Provide mentorship and advanced training to junior support specialists and other team members on best practices and emerging technologies. Documentation and Reporting: Maintain comprehensive and up-to-date documentation of Centrify and Conjur configurations, policies, and procedures. Generate and distribute detailed reports on system health, performance, and compliance to relevant stakeholders. Ensure that all access and activity logs are accurately maintained and securely stored for audit and compliance purposes. Understanding of ITIL processes Ability to work with multiple stakeholders from Security, Operations, Application Owners and Service Providers on deployment activities and enhancing the IAM solution. Knowledge of Operating systems, Database concepts and other potential targets or endpoints for a typical IAM Solution. Good presentation and documentation skills

Posted 3 weeks ago

Apply

7.0 - 10.0 years

7 - 10 Lacs

Noida

Work from Office

Job Title: Sr. Office 365 Support Specialist Business Function/Sub Function: IT Infra & Operation Location: Noida, India Position Overview: We are looking for a highly accomplished IT Infrastructure, Operations, and ITSM Specialist to join the GEDU IT Infra & Operations Team at our Noida office. This role requires a dynamic professional with expertise in IT infrastructure, operations, network support, and IT service management, along with hands-on experience in Microsoft Azure, Office 365, and endpoint security solutions. The ideal candidate should have a strong technical background, proven leadership skills, and a user-centric approach. They will be responsible for leading IT support teams, ensuring the stability and security of IT infrastructure, and driving operational excellence. Working across multiple time zones as per business needs, they will collaborate with product managers, architects, and R&D teams to enhance IT services and align technology strategies with business objectives. This role demands a proactive mindset, the ability to manage critical IT projects, and a focus on continuous improvement, automation, and security compliance. If you are passionate about delivering seamless IT experiences, driving innovation, and building robust IT operations, we encourage you to apply. Key Responsibilities: IT Operations Management Oversee the design, implementation, and maintenance of IT infrastructure, including cloud, on-premises and hybrid environments. Manage Azure Active Directory, Entra ID, Office 365, and endpoint security solutions to ensure seamless IT operations. Monitor system performance, availability, and security to proactively address potential risks and minimize downtime. Ensure effective backup, disaster recovery, and business continuity planning for IT services. IT Service Management (ITSM) & Support Lead incident, problem, change, and service request management in alignment with ITIL best practices. Establish and enforce ITSM processes and SLAs to ensure prompt and effective resolution of IT issues. Maintain and update ITSM documentation, including SOPs, knowledge base articles, and system documentation. Collaborate with cross-functional teams to enhance service efficiency and user experience. Security, Compliance & Identity Management Implement and manage security baselines, compliance policies, and endpoint security solutions (e.g., Microsoft Defender, Purview). Oversee Multi-Factor Authentication (MFA), Single Sign-On (SSO), and Privileged Identity Management (PIM) for enhanced security. Ensure compliance with global security standards and regulatory requirements. Manage Zero Trust principles and enforce security hardening practices. Team Leadership & Vendor Management Lead and mentor a team of IT support engineers, ensuring high performance and continuous skill development. Manage relationships with third-party vendors and service providers, ensuring SLA adherence and prompt resolution of escalations. Drive collaborative problem-solving and knowledge sharing across the IT team. Automation & Process Optimization Develop and automate IT workflows using PowerShell scripting and Microsoft Graph API. Continuously optimize IT processes and drive innovation to improve operational efficiency. Identify opportunities to reduce manual effort and enhance self-service capabilities. Project & Stakeholder Management Manage IT infrastructure projects, upgrades, and migrations based on business requirements. Collaborate with business leaders, product managers, and R&D teams to align IT strategies with organizational goals. Provide regular reports and insights on IT performance, risks, and improvement plans. Qualifications: Bachelors degree in computer science, Information Technology, Engineering, or a related field. Masters degree in IT Management or related disciplines is a plus. Professional Certifications (Preferred but not mandatory): Microsoft Certifications : Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Identity and Access Administrator (SC-300) Microsoft 365 Certified: Modern Desktop Administrator Associate IT Service Management (ITSM) & Security Certifications : ITIL v4 Foundation (or higher) for ITSM best practices CompTIA Security+ or CISSP for security management Networking Certifications : Cisco CCNA/CCNP, Aruba, or Arista networking certifications are a plus Work Experience: 7 to 10 years of experience in Office 365 Administrator, Operations, ITSM, and Cloud Administration. Hands-on experience in Microsoft Azure, Office 365, Entra ID, Intune, and Endpoint Security. Strong knowledge of ITIL processes, service management tools, automation, and PowerShell scripting. Proven experience in leading IT support teams, managing IT projects, and collaborating with cross-functional teams. Key Skills & Competencies: Deep expertise in cloud, hybrid IT environments, and IT service management. Strong problem-solving skills and the ability to troubleshoot complex technical issues. Excellent communication, leadership, and stakeholder management skills. Ability to work across different time zones as per business needs. Strong analytical mindset, with a focus on continuous improvement and automation.

Posted 3 weeks ago

Apply

5.0 - 10.0 years

9 - 18 Lacs

Chennai

Work from Office

Responsibilities: * Collaborate with sales team on proposal development * Conduct risk assessments using NIST framework * Present solutions at customer meetings * Manage presales process from demo to close Health insurance

Posted 3 weeks ago

Apply

6.0 - 10.0 years

14 - 19 Lacs

Noida, Hyderabad

Work from Office

R1 RCM Inc. is a leading provider of technology-enabled revenue cycle management services that transform and solve challenges across health systems, hospitals, and physician practices. Headquartered in Chicago, R1 is a publicly traded organization with employees throughout the US and other international locations. Our mission is to be the one trusted partner to manage revenue, so providers and patients can focus on what matters most. Our priority is to always do what is best for our clients, patients, our employees, and the communities we operate in. With our proven and scalable operating model, we complement a healthcare organizations infrastructure. quickly driving sustainable improvements to net patient revenue and cash flows. while reducing operating costs and enhancing the patient experience. Our approach to building software is disciplined and quality-focused with an emphasis on creativity, craftsmanship and commitment. We are looking for smart, quality-minded individuals who want to be a part of a high functioning, dynamic global team. Position Summary A PAM Engineer plays a critical role in managing and configuring R1s Privileged Access Management (PAM) platform and workflows. As a subject matter expert on PAM systems and workflows, a PAM Engineer ensures continued function and inter-operability between PAM systems and identity providers within the environment. Additionally, the PAM Engineer plans, coordinates, and executes new PAM implementations throughout the organization with both organic and non-organic growth. Essential Responsibilities Interface with the organization to manage intake projects for new PAM implementations, including adding new environments or domains, adding controls to existing resources, and expanding the scope of users within PAM controls. Document all new processes, including developing SOPs for UAA and product documentation for the IAM Platform team, continually ensuring accurate and up-to-date information is available for all target audiences. Managing configuration of PAM systems and monitoring their usages and effectiveness. Coordinate with vendors as needed to expedite solutions, issues, or projects. Providing Tier 1 & Tier 2 troubleshooting for issues with PAM Systems and workflows. Continually analyze data from multiple sources to identify efficiencies or issues with data, workflows, and processes. Interface with the UAA team to transfer knowledge and transition new workflows. Interface with IAM Platform team to communicate/translate business needs into actions for the Platform Team to manage. Skills Excellent communication skills, both oral and written, with the ability to communicate effectively to customers, peers, and organizational leaders especially in communicating technical concepts. Demonstrated logical thought processes must have the ability to quickly learn new technologies, systems, concepts and procedures, and ability to utilize reports and data to improve operational results. Experience in merging normalized and non-normalized data from multiple sources for analytical and targeted review. Experience in configuring and installing vault technologies such as Delinea secret server, Thycotic Experience with Privileged Access Management concepts, controls, and best practices. Knowledge of data processing systems, concepts, and methodologies. Highly motivated and able to work autonomously as well as a part of a team. Other Qualifications Proficient computer skills (including, but not limited to, spreadsheets, Internet, and email) are required. Associate or bachelors Degree or equivalent professional experience preferred. Strong knowledge of Windows/Linux administration. Understanding incident and change management process Demonstrated understanding of scripting and automation with PowerShell/Python a plus r1rcm.com Facebook

Posted 3 weeks ago

Apply

4.0 - 8.0 years

0 - 1 Lacs

Kolkata, Hyderabad

Work from Office

Role & responsibilities Monitoring , administration & operational support of Oracle IDCS applications and its components on daily basis. Provisioning/de provisioning of user access as per approved service request. Troubleshooting and diagnosing any issues IDCS SSO application reported by business users. Patching/Upgrades of IDCS components to address any bugs or issue encountered with IDCS application. Integration of new applications with IDCS Single sign-on to enrich end user experience. Access Policy Management Authentication and Single Sign-On (SSO) Identity Governance Cloud Identity and Access Management (IAM) Privileged Access Management (PAM) Identity Federation and SSO

Posted 3 weeks ago

Apply

2.0 - 5.0 years

5 - 8 Lacs

Bengaluru

Work from Office

Educational Bachelor of Engineering,BTech,BSc,BCA,Master Of Engineering,MTech,MSc,MCA Service Line Cyber Security Responsibilities As part of the Infosys consulting team, your primary role would be to actively aid the consulting team in different phases of the project including problem definition, effort estimation, diagnosis, solution generation and design and deployment Technical and Professional : Primary skills:AWS DevOps,Cloud Security-AWS Security,Cloud Security-Azure Security,Devops-Google Cloud Ptatform (GCP),GRC,GRC-RSA Archer(e-GRC),IDAM-Cyberark,IDAM-IBM Security Identity manager(ISIM),IDAM-Okta,IDAM-Oracle Identity Manager(OIM),IDAM-Ping/Federate,IDAM-Sailpoint,Infrastructure Security-Email Security,Network Security,Network Security-Firewalls-Checkpoint,Network Security-Firewalls-Juniper-Firewalls,Network Security-Firewalls-Palo Alto,Network Security-Firewalls-Web Application Firewall(WAF),Network Security-Load Balancer-F5,Technology-Identity Management-IDAM-Design , work flow , Implementation,Technology-Identity Management-Identity Governance Framework, Attestation,Access Cert, Role Mgmt,Auditing,Entitlement Mgmt, XACML,Technology-Identity Management-Identity,Account Provisioning and Reconciliation, SPML,Tools-Splunk Preferred Skills: Technology-Identity Management-Identity Management - ALL Technology-Identity Management-Privileged User Management-Novell NetIQ Privilege User Manager Technology-Enterprise Mobility Solution-MS Azure AD MS Azure RMS MS Intune

Posted 3 weeks ago

Apply

4.0 - 6.0 years

4 - 9 Lacs

Kolkata, Hyderabad

Work from Office

Monitoring , administration & operational support of Oracle IDCS applications and its components on daily basis. Provisioning/de provisioning of user access as per approved service request. Troubleshooting and diagnosing any issues IDCS SSO application reported by business users. Patching/Upgrades of IDCS components to address any bugs or issue encountered with IDCS application. Integration of new applications with IDCS Single sign-on to enrich end user experience. Access Policy Management Authentication and Single Sign-On (SSO) Identity Governance Cloud Identity and Access Management (IAM) Privileged Access Management (PAM) Identity Federation and SSO

Posted 3 weeks ago

Apply

4.0 - 7.0 years

8 - 13 Lacs

Navi Mumbai

Work from Office

Role & responsibilities Cyber Security Engineer Preferred candidate profile EDR /XDR , PAM , VA Specialist , MDM would be added advantage , Good knowledge of SIEM.

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies