Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
1 - 3 years
3 - 5 Lacs
Telangana
Work from Office
1) Meeting all existing ITL Customer & update their details in App 2) Weekly planning on day wise village coverage- Visible to PAM (Product Application Manager) 3) Meeting new and existing Customers - 4) Addressing Service concerns - immediate closure through Job card opening 5) Lead Generation - unique leads from each village - Lead source will be Customer Referral 6) If needed CRE will connect to concerned PCH for audio call with leads for better understanding 7) Visiting and connecting with 3 hot enquiries along with CH under consultation of PAM
Posted 1 month ago
1 - 3 years
3 - 5 Lacs
Assam
Work from Office
1) Meeting all existing ITL Customer & update their details in App 2) Weekly planning on day wise village coverage- Visible to PAM (Product Application Manager) 3) Meeting new and existing Customers - 4) Addressing Service concerns - immediate closure through Job card opening 5) Lead Generation - unique leads from each village - Lead source will be Customer Referral 6) If needed CRE will connect to concerned PCH for audio call with leads for better understanding 7) Visiting and connecting with 3 hot enquiries along with CH under consultation of PAM
Posted 1 month ago
6 - 10 years
15 - 25 Lacs
Bengaluru
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all – at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science – taking information that has been gathered and looking for areas to have that “Ah Ha” moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity – governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience Experience: Minimum of 4-6 years of relevant experience in CyberArk administration and cybersecurity practices, with proven hands-on experience in Privileged Access Management (PAM) using PSM/PSMP. CyberArk Privilege Cloud Management : Proven experience managing CyberArk SaaS Privilege Cloud and its associated components infrastructure. Tenant Management and Cloud Connectors: Strong understanding of Tenant Management, Secure Tunnel, and Cloud Connectors within CyberArk. CyberArk Onboarding : Experience managing CyberArk onboarding activities, including onboarding accounts via RESTAPI, manual onboarding, and bulk onboarding processes. Platform and Safe Creation: Ability to create new safes, accounts, and platforms in CyberArk and link new platforms to the CyberArk environment. Privileged Account Management: Securely managing and monitoring privileged account access to target hosts using Privileged Session Manager (PSM) and Privileged Session Manager Proxy (PSMP). LDAP & AD Federation : Strong knowledge of LDAP and AD Federation. Familiarity with secure integrations with external services such as LDAP/S and RADIUS. CyberArk PAS Components Knowledge: Familiarity with various CyberArk PAS components, including: Privilege Access Suite (PAS) Secure Password Vault and Safes Password Vault Web Access (PVWA) Central Policy Manager (CPM) Privileged Session Manager (PSM & PSMP) Application Identity Manager (AIM), Central Policy (CP), and Central Credential Provider (CCP). Password Management & Compliance: Experience managing privileged account passwords, including verification, change, and reconciliation, ensuring compliance with organizational policies. Session Management: Understanding of user sessions directed through PSM and PSMP for monitoring and auditing. Policy and Reporting: Experience in creating/modifying master policies, and generating reports on safes and user activity. Health Checks & Monitoring: Performing health checks on CyberArk infrastructure and monitoring various components to ensure system integrity and uptime. Troubleshooting & Configuration: Ability to troubleshoot configuration and connectivity issues related to PAM services and components, including network connectivity issues and load balancing. Server Administration: Proficient in Linux Red Hat 7/8, Windows Server 2016/2019/2022 administration. Database and Directory Services: Knowledge of managing database targets, LDAP, AD, and IAM systems. PowerShell & Python Knowledge: Basic knowledge of PowerShell and Python scripting for automation and system integration is a strong advantage. Networking Concepts: Understanding of networking concepts, including firewalls, routing, and load balancing. Disaster Recovery & Failover: Solid knowledge of CyberArk disaster recovery, failover, and failback mechanisms to ensure availability and business continuity. Vault Data Backup: Experience in Vault Data Backup processes for ensuring critical data is securely backed up and protected. Change Management: Proven experience in managing change processes, including preparing and executing delivery plans during Change Advisory Board (CAB) reviews. Incident Handling: Responsible for managing complex and escalated incidents and requests with a focus on resolving issues efficiently. KPI Compliance: Ensuring adherence to KPI metrics for incident and service request resolution, including timely communication and escalation procedures. Stakeholder Communication: Providing input and updates to stakeholders involved in critical incidents, particularly during outages or system failures. Preferred Technical and Professional Experience CyberArk Certifications: Certification as CyberArk Defender, Sentry, or CPC-PAM would be a plus. Troubleshooting Expertise: Advanced troubleshooting skills for identifying and resolving configuration, connectivity, and system performance issues related to PAM services. Report Generation: Experience using CyberArk’s PAS Reporter and Telemetry tools to generate and analyze operational reports. Team Collaboration: Ability to work as a key team player, participating in regular team reviews and contributing to continuous improvement. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 1 month ago
4 - 7 years
6 - 16 Lacs
Mumbai
Work from Office
The Information Security program protects Burns & McDonnell data, systems, and employees from evolving cyber threats with focus on continually reducing cybersecurity risk for the company. The Senior Information Security Analyst functions as a subject matter expert in evaluating the overall security posture. They will assess and identify vulnerabilities, analyze risks, and recommend solutions to mitigate these risks. Responsibilities : Risk Assessment: Conduct regular assessments of the organization's cybersecurity measures to identify vulnerabilities and risks. Monitoring and Analysis: Use various tools to monitor networks and systems for security breaches or intrusions. Analyze security breaches to understand their root causes. Incident Response: Play a key role in responding to security incidents and breaches, including assisting with investigations and remediation efforts. Reporting: Prepare detailed reports on security issues, such as breach incidents, current risk status, and improvement recommendations. Policy Development Support: Assist in developing and updating the organization's security policies and procedures based on the findings and evolving threat landscape. Training: Perform security awareness training program related to phishing campaigns. All other duties as assigned. - Bachelor's degree in Information Security, Computer Science, Computer Engineering, Information Technology, or related field. Minimum 8 years of experience in Information Security. Information Security certification (CISSP, GSEC, Security+) Demonstrated expert knowledge with two or more Information Security technologies such as EDR, IPS, SIEM, SOAR, CASB, CAASM, IAM, PAM, NAC, MFA, and DLP Broad understanding of network and security protocols such as, DNS, SPF/DKIM/DMARC, SSL/TLS, TCP/UDP, IPSec. Experience with CIS Critical Security Controls, OWASP Top 10, and MITRE ATT&CK framework. Demonstrated knowledge and experience of securing cloud environments such as Azure, AWS, and GCP. Broad experience and familiarity with Information Technology such as routers, load balancers, web application gateways, PKI, and Active Directory. Demonstrated knowledge of compliance frameworks (ISO 27001, SOC 2, NIST, FedRAMP, etc.). Demonstrated ability to evaluate cybersecurity risk and propose risk mitigations to technical and non-technical audiences. Highly effective oral and written communication skills with ability to convey security concepts and risks to non-technical personnel.
Posted 1 month ago
3 - 7 years
5 - 9 Lacs
Gurugram
Work from Office
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. Requirements: Proficient with Active Directory and related concepts Familiar with access control methods (RBAC/ABAC) Working knowledge of identity lifecycle management processes and challenges Hands-on experience with cybersecurity tools that function in the following spacesPAM / PIM / IAM, DLP, SOAR (XSIAM), Microsoft Security, AWS Security, Red Teaming / AppSec, Isolated Recovery Environments (IREs) Experience with identity federation and SSO solutions PAM experience or familiarity with specific vendor tools Able to speak to PAM best practices Understanding of the principle of least privilege, separation of duties Experience with REST API and app integration Experience configuring, guiding, or overseeing access review and certification, role management Past participation in identity steering committee Understanding of PIM, JIT, conditional access Familiarity with US compliance and regulatory frameworks that inform identity requirements Qualifications: 6+ years of working knowledge of one or more Identity-Based Security SolutionsOkta, Sailpoint, Delinea, BeyondTrust, CyberArk, etc. Any of the following preferred but not required Security+, CISSP, any vendor-specific certifications related to Identity products Willingness to travel to support client projects and shadowing opportunities (50+ % of the time) Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (OTE) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.
Posted 1 month ago
4 - 9 years
4 - 7 Lacs
Hyderabad, Chennai, Coimbatore
Work from Office
Sales Manager Premium Acquisition-CASA Role & responsibilities The incumbent will be responsible for acquiring high-value CASA accounts along with Trade, Forex & CMS relationship potential. He should be a self-driven and motivated individual with a zeal to outperform in ambiguous environment and thrive under pressure. He should understand banking products and have flair for sales and relationship management. To acquire new YFB Product/program CA customer in the identified segment and reference generation from the specified catchment • To achieve daily/weekly/monthly customer acquisition target • To ensure initial customer handholding & M+1 activation (Right advice to customer for product and documentation, opening a/c within TAT, familiarize customers with branch service RM and processes, monitor welcome kit delivery and follow up for repeat funding and use of account for business transactions) • To attract new-to-bank qualified customers in consistence with the Banks business strategy • To assist the Business Relationship Leader in catchment mapping & scoping exercise and provide regular feedback to BRL / BBL on opportunities / customer needs / competition benchmarking • To ensure required level of service for in-coming customers, to consult customers on credit and banking products • To ask for referrals and recommendations from existing customers on new customers • To cross sell credit and banking products to eligible customers
Posted 1 month ago
8 - 12 years
20 - 35 Lacs
Chennai, Bengaluru, Mumbai (All Areas)
Work from Office
Preferred candidate profile End Point Security Defender , Trend Micro - Server Identity and Access Management Sailpoint , Dilenea PAM , Microsoft PKI , Active directory Data Security Data Classification , DLP - MS pureview ,Imperva - Database activitiy monitoring , Data encryiption and clous app security
Posted 1 month ago
2 - 7 years
4 - 9 Lacs
Pune, Bengaluru
Work from Office
Job Title: Conjur Admin Secrets Management & DevSecOps Location: Pune / Bangalore Experience: 2–8 Years Employment Type: Full-Time Job Description We are looking for a skilled and motivated Conjur Admin to join our cybersecurity and DevSecOps team. In this role, you will be responsible for implementing and managing CyberArk Conjur solutions to secure and automate secrets management across our cloud infrastructure, CI/CD pipelines, and application environments. You will work closely with security, DevOps, and cloud engineering teams to design scalable and compliant secret access solutions, ensuring secure credential storage and governance throughout the development lifecycle. Key Responsibilities Deploy, configure, and manage CyberArk Conjur (Open Source or Enterprise). Implement secure secret injection for applications, services, and pipelines. Create and manage policies, roles, authentication layers (LDAP, Kubernetes, AWS IAM, etc.). Automate secret lifecycle: generation, rotation, expiration, and revocation. Integrate Conjur with CI/CD tools (Jenkins, GitLab, GitHub Actions). Secure cloud-native and containerized environments (AWS, Azure, GCP, Kubernetes, OpenShift). Support audits, compliance reviews, and security assessments. Enforce least-privilege and Zero Trust principles. Required Skills Hands-on experience with CyberArk Conjur (Open Source or Enterprise). Strong Linux/Unix administration and scripting skills. Familiarity with IAM, TLS/SSL, PKI, and REST APIs. Experience with DevOps and automation tools (Docker, Kubernetes, Terraform, Ansible, Jenkins). Solid understanding of secrets management and application security best practices. Preferred Qualifications CyberArk or relevant security certifications. Experience with other secret management tools (Vault, AWS Secrets Manager, etc.). Familiarity with compliance standards like SOC 2, HIPAA, ISO 27001. Why Join Us? Work on cutting-edge DevSecOps and cloud security initiatives. Collaborate in a high-impact, security-first engineering culture. Competitive salary, flexible work environment, and professional growth opportunities.
Posted 1 month ago
5 - 8 years
10 - 14 Lacs
Kolkata
Work from Office
Project Role : Application Lead Project Role Description : Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have skills : Informatica Product 360 (PIM) Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : a:Should have excellent communication and presentation skills b:Should be a good team player/lead c: Project Role :Application Lead Project Role Description :Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have Skills :Informatica Product 360 (PIM), SSI:No Technology Specialization NON SSI:Good to Have Skills :SSI: NON SSI:Job Requirements :Key Responsibilities :a:Testing source code and debugging code b:Writing high-quality code to complete application development on schedule c:Strong analytical and problem-solving skills d:Possessing specialist knowledge of operating systems, devices, applications and software e:Manage all production system and recommend ways to optimize performance and provide solution to problems and prepare reports for all problems f:Administer and resolve applications issues, provide updates and perform root cause analysis Technical Experience :a:Experience with Informatica MDM and PIM Implementation b:In-depth understanding of PIM features and capabilities, propose solutions based on Informatica P360 platform capabilities c:Create end-to-end specifications for PIM solutions Lead project team members through the activities required to implement Informatica PIM solution make specific recommendations to bring the PIM implementation into conformance with best practices Informatica P360 PIM Certification is recommended Professional Attributes :a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:Strong articulation skills are mandatory Educational Qualification:a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:Additional Info : Qualification a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:
Posted 1 month ago
3 - 6 years
5 - 8 Lacs
Mumbai
Work from Office
Due to recent international acquisitions, our business has seen great growth, and as a result, we are now seeking a driven and engaging IAM Analyst Identity & Access Management to join our team. This is a key position that will have you managing and truly partnering with a portfolio of our current clients. This is a fantastic opportunity for an experienced IAM Analyst who wants to engage with their customer; youll become a part of their business and provide high-quality, market-leading advice and value-added service. So, whats the job? You will assist in the User Access Review (UAR) process, including setup, execution, and follow-up. This role will specifically focus on Privileged User Access Management. You'll maintain identity governance controls for timely access provisioning and de-provisioning. You'll assist with privileged access management for critical systems and infrastructure. You'll implement and manage role-based access control (RBAC) across systems. You'll resolve access-related issues in a compliant and timely manner. You'll maintain documentation of access controls, roles, and workflows. You'll collaborate with audit, compliance, and IT security teams on access inquiries. You'll assist in onboarding applications into identity governance. You'll contribute to continuous IAM process, control, and reporting improvements. You'll track IAM operations with access metrics and dashboards. You'll perform periodic certifications of accounts and entitlements for compliance. You'll support access recertification automation and process improvements. You'll monitor IAM systems for anomalous activity and escalate incidents. You'll promote user education on access control best practices. You'll contribute to risk assessments and control gap analysis. You'll liaise with stakeholders to define access requirements and segregation of duties. You'll assist in developing and testing IAM disaster recovery plans. You'll evaluate and provide feedback on new IAM tools and features. And what are we looking for? You'll have 3+ years of experience in IAM, access control, or IT security operations. You'll possess knowledge of IAM concepts, including UAR, RBAC, PAM, and least-privilege access. You'll have experience with identity governance platforms (e.g., SailPoint, Saviynt, or similar). You'll be familiar with Active Directory, Azure AD, and enterprise authentication systems. You'll understand compliance and audit requirements related to access management. You'll demonstrate strong analytical skills and attention to detail. You'll be able to work both independently and collaboratively in a global team environment. You'll have effective communication skills, both written and verbal.
Posted 1 month ago
4 - 7 years
0 - 0 Lacs
Pune
Hybrid
Role We are seeking a skilled Privileged Access Management (PAM) /Identity and Access Management (IAM) Engineer to design, implement, and maintain our organization's PAM solutions. The ideal candidate will have a strong background in engineering, with specific expertise in PAM solutions and best security practices. Responsibilities: - Design and deploy robust PAM/Beyontrust solutions - Integrate PAM systems with existing infrastructure and applications - Develop scripts and utilize Beyondtrust APIs to automate PAM processes and workflows - Troubleshoot and resolve issues related to PAM systems and privileged access and accounts. - Implement and maintain secure password policies and rotation schedules - Monitor and report on privileged account usage and potential security risks - Continuously improve PAM systems and processes for enhanced security and efficiency Requirements - Bachelor's degree in Computer Science, Information Technology, or related field - 3+ years of experience in IT or Security, with a focus on privileged access management - Design and Hands-on experience with BeyondTrust SaaS products: SaaS PasswordSafe and Privilege Endpoint Management. - Strong knowledge of identity and access management principles and best practices - Proficiency in one of these programing languages: Java/C/C#, web development, - Familiarity with one of these scripting languages :PowerShell/ Python/Ruby) for automation Preferred Qualifications - Experience with migrating from BeyondTrust Privileged Identity Management solution to PasswordSafe. - Experience with Identity Governance And Administration(IGA) or Sailpoint IdentityNow solutions and integrations Skills and Attributes - Excellent problem-solving and analytical skills - Ability to work independently and as part of a team - Attention to detail and commitment to maintaining high security standards - Willingness to stay updated on emerging technologies and security leading practice
Posted 1 month ago
3 - 8 years
4 - 9 Lacs
Pune, Bengaluru, Hyderabad
Hybrid
Hands-on experience in Installing/Upgrading and Setting up CyberArk Components (EPV, PWV, EPM, CPM, PVWA, PSM, PSMP, AIM) to customizing/configuring it for given Policies and procedures. Design, architecture, and migration experience on CyberArk. Provisioning, creating workflows, custom connectors and policies. Integrating various platforms with CyberArk, such as different LDAP providers, Windows servers, UNIX servers, databases and networking devices. Creation of automation scripts using PACLI and REST API. Experience on customization of CyberArk Platforms. Custom PSM Connectors/CPM Plugins (with AutoIT/Shell Scripting) and good knowledge on auto-detection configuration and usage of Discovery Scanning tools. Experience on AIM (CP and CCP) Credential Provider agents installation/upgradation. Experience on CyberArk version upgrade. Experience on DR Drill activities. Knowledge on HSM and PTA integration would be an added advantage. Exposure to CyberArk Pcloud is an added advantage. Primary skills: CyberArk PAM/Pcloud design and implementation CyberArk Sentry/Defender certification is good to have. Preferably CyberArk PAM experience is preferred else good to have PAM experience in any of these platforms viz. StrongDM/OneIdentityLLC/BeyondTrust/ManageEngine/Foxpass/ JumpCloud/ARCON/ Centrify/Microsoft Purview Experience Required: 5-8 Years in CyberArk PAM and EPM deployment preferred or candidates who have worked on similar solutions from other OEMs with overall 10-13 years of IT experience.
Posted 1 month ago
5 - 10 years
10 - 20 Lacs
Bengaluru
Work from Office
Job Role: IT Infrastructure Security Engineer . Location: Bangalore. Notice Period: Immediate to 30 days. Responsible for designing, implementing, and maintaining security measures to protect an organizations IT infrastructure. This role involves securing networks, servers, cloud environments, and other critical IT systems against cyber threats. The engineer works closely with IT, security, and compliance teams to ensure a robust security posture and adherence to industry standards. Key Responsibilities Infrastructure Security & Compliance Design and implement security controls to protect IT infrastructure, including servers, networks, databases, and cloud environments. Conduct security assessments, vulnerability scans, and penetration tests to identify weaknesses and recommend mitigation strategies. Ensure compliance with industry standards such as ISO 27001, NIST, CIS, GDPR, HIPAA, PCI-DSS, and SOC 2 . Develop and enforce security policies, procedures, and best practices for IT infrastructure. Monitor system logs, network traffic, and security alerts to detect and respond to threats in real-time. Network & Cloud Security Secure on-premises and cloud environments (AWS, Azure, Google Cloud) using security best practices. Implement firewalls, IDS/IPS, VPNs, and Zero Trust architectures to safeguard enterprise networks. Configure and manage endpoint security solutions, SIEM, EDR, XDR , and other security tools. Implement identity and access management (IAM) solutions, including privileged access management (PAM). Incident Response & Threat Management Investigate and respond to security incidents, breaches, and anomalies in coordination with SOC teams. Develop incident response plans (IRP) and lead forensic analysis for security events. Work closely with security operations teams to automate threat detection and response processes. Security Automation & Infrastructure Hardening Use Infrastructure as Code (IaC) to automate security configurations (e.g., Terraform, Ansible). Implement patch management, vulnerability management, and endpoint security policies . Secure containers and Kubernetes environments in DevOps pipelines. Harden operating systems (Windows, Linux) and cloud environments against cyber threats. Collaboration & Continuous Improvement Provide security training and awareness to IT teams. Collaborate with DevOps, IT, and compliance teams to integrate security in CI/CD pipelines. Stay up to date with emerging cyber threats and recommend new security technologies. Qualifications & Skills Technical Skills Strong knowledge of network security, cloud security, and endpoint security . Experience with firewalls, IDS/IPS, SIEM, EDR/XDR, and encryption . Hands-on experience with AWS Security, Azure Security Center, Google Cloud Security, and IAM solutions . Familiarity with scripting and automation (Python, Bash, PowerShell). Expertise in Active Directory (AD), Zero Trust security, and PKI . Knowledge of compliance frameworks like ISO 27001, NIST, CIS, GDPR, PCI-DSS . Soft Skills Strong analytical and problem-solving skills. Excellent communication and teamwork abilities. Ability to work under pressure and manage multiple security tasks. Detail-oriented with a proactive security mindset. Certifications (Preferred but Not Mandatory) CEH (Certified Ethical Hacker) CISM (Certified Information Security Manager) CCSP (Certified Cloud Security Professional) AWS Security Specialty, Azure Security Engineer, or Google Cloud Security Certifications CISSP (Certified Information Systems Security Professional) Work Environment & Tools Security tools: Wazuh SIEM, Splunk, Palo Alto, Fortinet, CrowdStrike, SentinelOne, Qualys, Tenable, Nessus Cloud platforms: AWS, Azure, Google Cloud . Operating systems: Windows, Linux, macOS . Automation: Python, Terraform, Ansible, PowerShell.
Posted 1 month ago
4 - 7 years
10 - 15 Lacs
Thane
Work from Office
Job Summary : The Cloud Network Security Administrator shall have strong technical knowledge of perimeter, networking and security practices of key public cloud offerings such as Microsoft Azure and Amazon Web Services to build and administer cloud infrastructure platform. The Cloud Network Security Admin is expected to individually solve problems of higher complexity. The Cloud Network Security Admin shall also participate in the development and enhancement of the information security solutions and to ensure it maintains relevancy with prevalent threats and industry changes. Work Location: Mumbai. Roles and Responsibilities : Must understand various types of attacks like Cross site scripting, SQL Injection, Cookie Poisoning, DDoS attacks, Web scraping, brute force, etc. Must define, administer and manage policies accordingly. Creates WAF rules/signatures to mitigate threats and implements best practices Creation and implementation of custom alerting dashboards in SIEM for investigations Works extensively with different stakeholders for tuning WAF policies or creating custom signatures Design and Develop Cloud-specific security policies, standards and procedures e.g. Identity and Access Management (SSO, SAML), and Privilege Access Management (PAM), Firewall management, SSL/IPSec, Encryption Key Management (BYOK), Security incident and event management (SIEM), Data protection (DLP, encryption), Vulnerability Management in partnership with Infrastructure Services, and Application Development. Orchestrate & Automate security control (guardrails) in Azure and AWS compute &/or Container services. Follows automate-first automate-everything philosophy with use of technologies like Terraform. Focus on Platform Governance & Security and automating operational tasks wherever possible. Requirements : Bachelor's Degree in Computer Science, Software Development or related field. Working knowledge of AWS WAF administration and management, associated policy management, Ingress Egress rules, VPC setup and administration. Must understand and have working knowledge of AWS Landing Zone and Control Tower. Experience with Container technologies (Docker, Kubernetes) Experience with Vulnerability Management and Privilege Account management Strong understanding of TCP/IP, web protocols and networking concepts Excellent understanding of OWASP Risks, Vulnerabilities and Mitigation Mechanisms Experience with Web Application Firewall management and rules Well versed in system exploits (e.g. Buffer Overflows, PTH attacks, windows authentication framework etc.) Excellent understanding of DDoS techniques and mitigation mechanisms Ability to manage and prioritize tasks efficiently Solid resource planning and problem-solving skills Readiness to demonstrate a proactive attitude Excellent verbal and written communication skills Technologies : AWS WAF, VPC, related.
Posted 2 months ago
3 - 7 years
7 - 14 Lacs
Pune, Bengaluru
Work from Office
Hiring for an MNC/ Big 4 Company based in Pune & Bangalore Primary Skills Conjour mandate Educational qualifications Graduation degree in any stream or equivalent / post-graduation degree/diploma, Certification in any IAM product would be an added advantage. Work experience We are looking for a of IAM resource with 3+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts The ideal candidate will: At least 36 months of Privileged Access Management domain experience with expertise in Conjur as the primary skill and CyberArk administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Notice period: Immediate or 30 to 60 days official Technical Skills Required: 36 months of experience in Conjur product Conjur Administration: Serve as the primary administrator for Conjur, overseeing the installation, configuration, and maintenance of the Conjur environment. •Manage secrets within Conjur, ensuring their protection and access control according to organizational policies. •Monitor system performance, perform regular health checks, and ensure high availability and reliability of Conjur services. •Troubleshoot and resolve issues related to Conjur infrastructure and performance. •Implement Conjur best practices, including role-based access control (RBAC), policy management, and integration with other systems. CyberArk Administration: Act as the secondary support for CyberArk administration, including managing and maintaining the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and other related components. •Assist in the provision, rotation, and de-provision of privileged credentials within CyberArk. •Support day-to-day operations, monitoring, and maintenance of the CyberArk environment. •Collaborate with the primary CyberArk administrators to ensure alignment with organizational security policies and best practices. Support and Troubleshooting: Serve as the Level 2 support contact for Conjur and CyberArk-related issues, escalating complex issues to Level 3 support as needed. •Respond to and resolve support tickets, incidents, and requests in a timely and efficient manner, documenting steps and solutions. •Perform root cause analysis for recurring issues and provide recommendations for resolution and improvement. • Understanding of ITIL processes •Ability to work with multiple stake holders from Security, Operations, Application Owners and Service Providers on deployment activities and enhancing the IAM solution. •Knowledge of Operating systems, Database concepts and others potential targets or endpoints for a typical IAM Solution. •Good presentation and documentation skills Behavioral / team skills Excellent communication (written and verbal) and interpersonal skills •Ready to work in Shifts (on 3 shift rotation pattern) •Flexibility to adapt to a variety of engagement types, working hours and work environments and locations •Proven ability to work creatively and analytically in a problem-solving environment •Desire to learn and contribute •Focused and self-motivated approach to work •Personal drive and positive work ethic to deliver results within tight deadlines and in demanding situations Interested Candidates Please share your resume at meghna@jobpoint.co.in or Whtsup on 8976993400
Posted 2 months ago
10 - 20 years
12 - 22 Lacs
Pune, Mumbai, Bengaluru
Work from Office
Skills : Cloud Security (GCP & AWS), Identity & Access Management (CIAM, EIAM, PAM), and access governance solutions (Forgerock, Sailpoint) , DevSecOps practices Notice Period: 0- 45 days
Posted 2 months ago
7 - 9 years
10 - 12 Lacs
Bengaluru
Hybrid
The Platform Operations Engineers are responsible of the deployment and management of internal platforms and tools used by NTT Managed Services teams to provide service to all their customers. They are multidisciplinary technical profile focused in engineering, development of products and services, deployment and operations tasks. They deliver high quality services, following industry best practices, with embedded automation and security processes. They are in contact with leading technologies in a multinational and multicultural environment, working in interesting projects and providing support to other areas in the company. The main areas of knowledge that are required are: - Systems and application administration - Cloud and virtualization - Scripting and automation - Security What you'll be doing Key Responsibilities: Develop, maintain and enhance frameworks, tools, services and platforms that enable the company to build, deliver, operate and orchestrate infrastructure and applications. Participate on technical design of new platforms. Creation and maintenance of technical product documentation. Day-to-day systems administration, management, design and deployment of core infrastructure and services. Automation of operations which introduce efficiencies in central services/servers administration. Provide expert advice to all support tiers, operations teams, product management, procurement, local sales and sales consultants. Sponsor improvement plans in tools and services. Personal Skills: High resolution and troubleshooting ability Ability to transfer knowledge across technologies, excellent learning ability Good organization and prioritization skills Excellent communication skills and good team player Passion for lifelong learning and personal and professional development Ability to work under pressure and work in different projects at a time High sense of responsibility and ownership. Self-Direction and Self-Management skills Knowledge of ITIL and industry management processes Interest on methodology, tasks/activities coordination, as well as experience with Agile. DevOps and Automation culture, interest on optimizing and maximize efficiencies. Interest in security standards and best practices. Technical Skills: Mandatory requirements Expert in Windows OS Expert in some of the following MS products: Active Directory, SQL Server, Remote Desktop Services, or MS Cluster. Expert in Microsoft Azure (IaaS and PaaS) Experience with virtualization stack, mainly with Vmware products. Knowledge of TCP/IP, firewalls, DNS, HTTP, IP and routing. Experience with Linux and related technologies. Experience with web and middleware applications and databases. Experience with HA and DR technologies. Experience with Powershell scripting. Experience with Infrastructure as Code. Experience with Monitoring tools and log/event management. Experience with automation tools like Ansible, SaltStack or Puppet. Experience on testing and delivery frameworks (CD/CI). Optional requirements Experience with other public cloud providers (AWS or Google Cloud) Experience with some security tools (vulnerability management, PAM, MFA) Experience with other scripting languages like Bash, Python or Perl. Academic Qualifications and Certifications: Required written and spoken English (fluent or native), B2 or equivalent. BSc degree in Computer Science, Software Engineering, MIS or equivalent will be appreciated. Technical certifications in different technologies will be appreciated, specially in Microsoft related technologies. Required Experience: Required seven or more years of experience with management of systems and infrastructure. Required Experience with enterprise environments and critical-mission platforms. Experience with telco, hosting providers or big corporations will be appreciated.
Posted 2 months ago
5 - 10 years
5 - 10 Lacs
Bengaluru
Work from Office
IT Security - Team Lead - Bengaluru - Work from office Proven experience (5+ years) in IT security with team lead role experience. Deep knowledge of Security Technologies (like., Active Directory, Endpoint Protection, Web Gateway, DLP, firewalls, SIEM, IDS/IPS, Encryption, PAM, WAF, Vulnerability Assessment and Patch Management). Experience with Vulnerability Scanning Tools and Risk Assessment methodologies. Lead and mentor a team of Cyber Security Professionals, ensuring a high level of motivation, performance and continuous professional development. Manage Team workload, prioritize tasks and allocate resources effectively to meet security goals. Oversee day-to-day security operations, including security monitoring, incident detection and incident response. Analyse security logs and data to identify threats, vulnerabilities and anomalies and escalate issues as needed. Collaborate with IT and Development teams to integrate Security Best Practices into system architecture, network design and application development. Continuously evaluate and improve the company's security policies, procedures and controls. Foster a collaborative environment, providing support and guidance to junior and mid-level team members. Provide regular reports to Senior Management and Stakeholders on the Security Reports & Posture of the organization. Maintain clear and effective communication during security incidents and with other departments, ensuring timely resolution of issues. Conduct Security Awareness training for employees to promote security best practices. Ensure compliance with relevant industry regulations (e.g., GDPR, HIPAA, NIST, FDA). Stay current with the latest trends, tools and technologies in cyber security and bring innovation to the security program. Coordination with Vendor for Improvements and Deployment of new technology. ********************************************************************************* If interested with this opportunity, Kindly - do share your updated Resume along with below required details to devaraj.v@valuepointsystems.com OR WhatsApp to 8867682884 Notice Period: Total Experience: Relevant Experience: Current Location: Preferred Location: Current CTC: Expected CTC:
Posted 2 months ago
5 - 8 years
12 - 20 Lacs
Chennai
Work from Office
Maintain security architecture frameworks for enterprise systems/networks/cloud environments Design secure solutions as per NIST/ISO 27001 Implement secure cloud solutions for AWS/Azure environments & Zero Trust security models Required Candidate profile 5+ yrs exp Expert in NIST, MITRE ATT&CK CISSP/CISM/CCSP/AWS/Azure Speciality Research emerging technologies-PSM/MDM/MFA/DLP/CSPM/Disk Encryption Develop PoCs for new security tools
Posted 2 months ago
7 - 10 years
12 - 15 Lacs
Pune, Mumbai, Bengaluru
Work from Office
Experience as a Solution Architect with knowledge of identity & access management, and especially PAM, working with PAM solutions such as CyberArk, Centrify,Delinea / Thycotic and OneIdentity,BizzDesign, Archi, or generic UML visualization Required Candidate profile proficiency in Jira, Confluence.Notice Period: 0- 30 days. Education BE, B.Tech, ME, M.TechLocationBangalore, Pune, Mumbai, Hyderabad, Chennai, Gurgaon, Noida
Posted 2 months ago
5 - 8 years
10 - 14 Lacs
Kolkata
Work from Office
Project Role : Application Lead Project Role Description : Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have skills : Informatica Product 360 (PIM) Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : a:Should have excellent communication and presentation skills b:Should be a good team player/lead c: Project Role :Application Lead Project Role Description :Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have Skills :Informatica Product 360 (PIM), SSI:No Technology Specialization NON SSI:Good to Have Skills :SSI: NON SSI:Job Requirements :Key Responsibilities :a:Testing source code and debugging code b:Writing high-quality code to complete application development on schedule c:Strong analytical and problem-solving skills d:Possessing specialist knowledge of operating systems, devices, applications and software e:Manage all production system and recommend ways to optimize performance and provide solution to problems and prepare reports for all problems f:Administer and resolve applications issues, provide updates and perform root cause analysis Technical Experience :a:Experience with Informatica MDM and PIM Implementation b:In-depth understanding of PIM features and capabilities, propose solutions based on Informatica P360 platform capabilities c:Create end-to-end specifications for PIM solutions Lead project team members through the activities required to implement Informatica PIM solution make specific recommendations to bring the PIM implementation into conformance with best practices Informatica P360 PIM Certification is recommended Professional Attributes :a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:Strong articulation skills are mandatory Educational Qualification:a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:Additional Info : Qualification a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:
Posted 2 months ago
7 - 11 years
7 - 13 Lacs
Pune, Bengaluru
Work from Office
Greetings from Teamware Solutions a division of Quantum Leap Consulting Pvt. Ltd We are hiring a Centrify Admin Work Mode: 24/7 Rotational Shifts and 5 days working from an office. (Shift allowance will be provided) Locations: Bengaluru, Pune Experience: 7 -10 Years Notice Period: Immediate to currently serving and 30-35 days max only. Job Title: KGS Cyber MSS (IDM Team)- Consultant Educational qualifications •Graduation degree in any stream or equivalent / post-graduation degree/diploma, Certification in any IAM product would be an added advantage. Work experience •We are looking for a of IAM resource with 3+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts The ideal candidate will: •At least 36 months of Privileged Access Management domain experience with expertise in Centrify as the primary skill and Conjur administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: •36 months of experience in Centrify product Centrify Administration: Serve as the primary administrator for Centrify, overseeing the deployment, configuration, and maintenance of the Centrify environment. Manage privileged access and ensure secure authentication and authorization using Centrifys tools and solutions. Perform regular system checks, monitor performance, and ensure the high availability and reliability of Centrify services. Troubleshoot and resolve issues related to the Centrify infrastructure, including connectivity, policy enforcement, and access issues. Implement Centrify best practices and ensure compliance with organizational security policies and standards. Conjur Administration: Act as the secondary support for Conjur administration, including the installation, configuration, and maintenance of the Conjur environment. Manage secrets within Conjur, ensuring their protection and appropriate access control. Support daily operations, monitoring, and health checks of the Conjur system to ensure it is running optimally. Assist in troubleshooting and resolving Conjur-related issues and work collaboratively with other teams to integrate Conjur with other systems. Support and Troubleshooting: Serve as the Level 2 support contact for Centrify and Conjur-related issues, addressing escalations from Level 1 support and involving Level 3 support when necessary. Respond to and resolve support tickets, incidents, and requests efficiently, ensuring thorough documentation of issues and solutions. Conduct root cause analysis for recurring issues and recommend improvements to enhance system reliability and performance. Please let me know if you are interested in this position and send me the resumes to netra.s@twsol.com
Posted 2 months ago
8 - 10 years
27 - 32 Lacs
Mumbai
Work from Office
The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science taking information that has been gathered and looking for areas to have that Ah Ha moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Who You Are Youre good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others. Required Technical and Professional Expertise 8-10 years of experience in Security BSc BCA BE Diploma MCA MSc or equivalent Min 10 years of relevant experience as a Security engineer for troubleshooting security devices & BAU support. Good understanding on Next Generation Firewalls (Cisco, Palo Alto Networks, Fortinet) and experience in handling security concepts (Rule ADD/ Modify Delete, Nat, Faulty Firewall replacement, High Availability setup, packet capture, log analysis etc.) Advanced knowledge on Daily tickets & issues for security devices like Firewall, WAF, DDoS Protection, DLP, PIM/PAM, SOC EDR solution and their monitoring, troubleshooting & firmware upgrade Troubleshoot and fix high priority issues related to Firewall, Anti-Virus, WAF, EDR, DDOS, PIM & PAM, DLP, SASE, SOC issues is added advantage. Work with the HW Vendors/TAC for the SW/HW related issues and providing the fix. Involve in change management process for HW replacement/ IOS upgrade/ Config change/ BW upgrade/ Whitelisting or Blacklist URLs & FW Rule addition etc. Knowledge and experience in Incident, Change, Problem, Service request and Configuration Management Processes Monitor the queue and maintain regular updates on the Tickets as per agreed timeline, providing the detailed closure summary on the tickets. Detailed Root cause summary to be documented for the Problem tickets. Document Pre & Post implementation logs & Script for change. Network Diagram updates. Working on the assigned tickets within the agreed Timeline/SLA as per the Ticket Priority/Severity and Adhere to the ITIL process with zero noncompliance. Upskilling the technical knowledge by learning new Technology and doing relevant technical certifications Preferred Technical and Professional Expertise. At least 5 years experience in managing security domain.
Posted 2 months ago
6 - 10 years
8 - 12 Lacs
Gurgaon
Work from Office
Requirements: Proficient with Active Directory and related concepts Familiar with access control methods (RBAC/ABAC) Working knowledge of identity lifecycle management processes and challenges Hands-on experience with cybersecurity tools that function in the following spaces: PAM / PIM / IAM, DLP, SOAR (XSIAM), Microsoft Security, AWS Security, Red Teaming / AppSec, Isolated Recovery Environments (IREs) Experience with identity federation and SSO solutions PAM experience or familiarity with specific vendor tools Able to speak to PAM best practices Understanding of the principle of least privilege, separation of duties Experience with REST API and app integration Experience configuring, guiding, or overseeing access review and certification, role management Past participation in identity steering committee Understanding of PIM, JIT, conditional access Familiarity with US compliance and regulatory frameworks that inform identity requirements Qualifications: 6+ years of working knowledge of one or more Identity-Based Security Solutions: Okta, Sailpoint, Delinea, BeyondTrust, CyberArk, etc. Any of the following preferred but not required: Security+, CISSP, any vendor-specific certifications related to Identity products Willingness to travel to support client projects and shadowing opportunities (50+ % of the time)
Posted 2 months ago
9 - 14 years
20 - 35 Lacs
Pune, Bengaluru, Hyderabad
Hybrid
CyberArk Certified Delivery Engineer or equivalent demonstrable experience and proven skills such as Defender Sentry. Experience managing or developing within the Cyber Ark toolset Managing secure administration and password management
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2