Home
Jobs

201 Pam Jobs - Page 7

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10 - 15 years

30 - 40 Lacs

Pune, Bengaluru

Hybrid

Naukri logo

Greetings from Northern Trust. Northern Trust is looking to hire a Lead, Cyber Sec Eng position for Pune/Bangalore location. Company Details - Northern Trust, a Fortune 500 company, is a globally recognized, award-winning financial institution that has been in continuous operation since 1889. Northern Trust is proud to provide innovative financial services and guidance to the world's most successful individuals, families, and institutions by remaining true to our enduring principles of service, expertise, and integrity. With more than 130 years of financial experience and over 22,000 partners, we serve the worlds most sophisticated clients using leading technology and exceptional service. Job Description Job Role: Lead, Cyber Security Engineer Job Location: Pune OR Bangalore Experience: 10+ years Skills: Cyber Security (CyberArk), Privilege Access Management (PAM), Central Credential Provider, AAM Integration, Conjur Summary This position is responsible for managing the activities of the Privileged Access Management (PAM) team in India, working closely with many different global teams to ensure all aspects of privileged access are maintained according to organizational standards and controls. This position will play a key role in managing the CyberArk product suite, including implementations, integrations, and remediation activities. Primary Duties and Responsibilities: To perform this job successfully, an individual must be able to perform each primary duty satisfactorily: Line Management experience: overseeing, developing, and driving the delivery of a team of technical specialists Assist driving the Privileged Access Management (PAM) strategy and roadmap Manage and maintain the firms CyberArk solution Manage and lead CyberArk AAM integrations (including Conjur) Manage Privileged Session Management, Privileged Threat Analytics, Endpoint Privilege Manager and Business Secrets Management solutions Provide subject matter expertise across CyberArk scope to PAM engineering and support teams and technology stakeholders across the enterprise Provide cross functional and global technical leadership to help drive adoption and understanding of PAM across the enterprise. Assist with the management of PAM-related audit or other security findings. Qualifications: The requirements listed are representative of the knowledge, skill, and/or ability required: Extensive knowledge in CyberArk and PAM architecture, functionality and administration. Ability to manage multiple intricate projects with strict deadlines while maintaining best in class work. Ability to functionally serve as a primary point of contact across multiple teams within the organization and to lead program delivery requirements. Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Effective oral and written communication, analytical, judgment and collaboration skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong organization skills. Technical Skills: 5+ Years CyberArk experience 2+ Years Cloud Services Implementation (Azure) Strong CyberArk hands-on experience including advanced CyberArk modules like PSM, PSMP, and AIM/AAM/Conjur, EPM. Strong experience with CyberArk utilities and their usage PUU, PACLI and EVD. Experience in working with CPM plugins & custom PSM connectors. Familiarity with CyberArk configuration files, logs files, access control and user management. Experience in working with CyberArk support. Good knowledge of Microsoft AD (Active Directory) knowledge and experience. Strong Privileged Access Management solutions knowledge and experience. Good knowledge of Identity and Access Management technology solutions and processes. Basic understanding of the main network protocols (IPv4/IPv6/TCP/UDP/DNS/SMPT). A good knowledge of Azure environment for managing/troubleshooting CyberArk components on Azure Education and/or Experience: 5+ years Privileged Account Management Experience utilizing current methodologies Bachelors Degree or higher in Computer Science or related security field 5+ years experience working directly with CyberArk 12+ years total experience Certificates or Licenses: CyberArk PAM Certified Delivery Engineer (CDE-PAM) is required Cloud practitioner for Azure/AWS If you are interested in this job opportunity, please share your updated resume to take your candidature forward. Regards, Northern Trust Recruitment Team

Posted 2 months ago

Apply

10 - 20 years

25 - 30 Lacs

Rajkot

Work from Office

Naukri logo

Job Role : Senior IT Consultant Shift Timing: 2pm to 11pm IST Duration: 6-12 months (C2H; fulltime 40 hours/week) Overview We are seeking a skilled, adaptable, and teamwork-oriented Systems Administrator to assist with several ongoing IT and cybersecurity initiatives. Projects include: Planning, building, and testing DLP policy both in O365 and on user workstations Testing and implementing PAM solution (Delinea) Creating patching and reboot schedules for production Windows servers The successful candidate will be responsible for working with our Operations and Cyber Security teams to implement PAM and DLP solutions throughout the organization. This role will also assist with our MDM environment to deploy applications and policies to end user workstations, Windows and Mac. Creating patching windows for our production servers will require close partnership with various stakeholders to ensure maintenance downtime does not negatively impact the business. Responsibilities Design, test, and implement PAM solution alongside cybersecurity team. Strategize and test DLP policies to protect our data in the cloud and on end-user workstations. Create and enforce mobile device policies and procedures via JAMF and InTune. Experience with Windows patch management, preferably Automox. Collaborate with various teams to test new application builds before deploying through MDM. Perform advanced level troubleshooting and remediation of issues with endpoints devices and deployed applications. Create and audit data leak protection rules for BYOD devices via InTune (both laptop and mobile). Collaborate with the Cyber Security team to ensure all security protocols are being met by our various MDM solutions and deployments. Experience & Qualifications Minimum 3-5 years of relevant work experience with Endpoint Security, MDM, O365 Knowledge in managing both Windows and Apple devices. Knowledge in managing Apple Business Manager and DEP. Previous experience building and working with PAM solutions. (Delinea preferred) Previous experience building and working with DLP policies. Previous experience supporting workstations via InTune and JAMF Required Knowledge, Skills, and Abilities Ability to effectively contribute to multiple projects simultaneously. Strong understanding and background of working with large endpoint device management environments. Knowledge in MDM architecture and infrastructure. Excellent teamwork, time-management, and organizational skills. Excellent communication skills. Regularly work with multiple departments to accomplish changing business needs. Proven analytical and problem-solving ability. Demonstrated leadership and personal project management skills. Ability to act as an individual contributor as well as part of a larger team. Locations : Mumbai, Delhi / NCR, Bengaluru , Kolkata, Chennai, Hyderabad, Ahmedabad, Pune, Remote

Posted 2 months ago

Apply

5 - 8 years

20 - 25 Lacs

Coimbatore

Work from Office

Naukri logo

Overview We are seeking a skilled, adaptable, and teamwork-oriented Systems Administrator to assist with several ongoing IT and cybersecurity initiatives. Projects include: *Planning, building, and testing DLP policy both in O365 and on user workstations * Testing and implementing PAM solution (Delinea) * Creating patching and reboot schedules for production Windows servers The successful candidate will be responsible for working with our Operations and Cyber Security teams to implement PAM and DLP solutions throughout the organization. This role will also assist with our MDM environment to deploy applications and policies to end user workstations, Windows and Mac. Creating patching windows for our production servers will require close partnership with various stakeholders to ensure maintenance downtime does not negatively impact the business. Responsibilities * Design, test, and implement PAM solution alongside cybersecurity team. * Strategize and test DLP policies to protect our data in the cloud and on end-user workstations. * Create and enforce mobile device policies and procedures via JAMF and InTune. * Experience with Windows patch management, preferably Automox. * Collaborate with various teams to test new application builds before deploying through MDM. * Perform advanced level troubleshooting and remediation of issues with endpoints devices and deployed applications. * Create and audit data leak protection rules for BYOD devices via InTune (both laptop and mobile). * Collaborate with the Cyber Security team to ensure all security protocols are being met by our various MDM solutions and deployments. Experience & Qualifications * Minimum 3-5 years of relevant work experience with Endpoint Security, MDM, O365 * Knowledge in managing both Windows and Apple devices. * Knowledge in managing Apple Business Manager and DEP. * Previous experience building and working with PAM solutions. (Delinea preferred) * Previous experience building and working with DLP policies. * Previous experience supporting workstations via InTune and JAMF Required Knowledge, Skills, and Abilities * Ability to effectively contribute to multiple projects simultaneously. * Strong understanding and background of working with large endpoint device management environments. * Knowledge in MDM architecture and infrastructure. * Excellent teamwork, time-management, and organizational skills. * Excellent communication skills. * Regularly work with multiple departments to accomplish changing business needs. * Proven analytical and problem-solving ability. * Demonstrated leadership and personal project management skills. * Ability to act as an individual contributor as well as part of a larger team.

Posted 2 months ago

Apply

5 - 10 years

25 - 40 Lacs

Nasik

Work from Office

Naukri logo

WHAT YOU WILL BE DOING Work with the PAM enablement leader to create collateral and materials for training and enablement. Responsible for setting up and managing labs for hands-on activities as part of training and enablement. Review existing PAM implementations for alignment with recommended approaches. Assist Doc team to keep the Product Documentation accurate. Provide Level 4 support for PAM issues that require deeper understanding of the product. Work closely with Product, CloudOps and InfraOps teams to understand and document PAM Processes and operating procedures. Provide daily/weekly report for overall health of existing PAM implementations. Work closely with the Training team to keep the self-paced training material up to date and accurate. Assist POC team in setting up use cases that require deeper knowledge of PAM and the product. WHAT YOU WILL BRING Bachelors/equivalent in Engineering Experience with ticketing systems, monitoring and automation platforms ex: Freshdesk, Datadog, Prometheus, Grafana, RunDeck Understanding of SLAs and the importance of being within SLAs Ability to provide 24/7 on-call support as an SME (on a rotational basis) 8+ years of industry experience in design, development, customization, configuration, deployment of cloud platforms, automation frameworks, database systems.

Posted 2 months ago

Apply

10 - 20 years

45 - 60 Lacs

Chandigarh

Work from Office

Naukri logo

Responsibilities Be an authority within the IAM organization with the expectation to represent IAM outside the IAM domain Act as a subject matter expert on IAM-related matters, providing advice and support to stakeholders across the organization Acts as the principal advisor to upper management in Cybersecurity matters Conduct regular audits and assessments to ensure IAM systems comply with regulatory requirements and industry standards. Demonstrate strong background in engineering best practices, including analysis, design, development, deployment, and support of software solutions and infrastructure Drive continual improvement processes to enhance the end-user experience, increase technology value, and improve the security posture. Support IAM technology stack included but not limited to SailPoint, CyberArk, Azure, AWS and adhere to top-tier security practices, encompassing architecture, implementation, monitoring, maintenance, enhancements, and related tasks. Explores and assesses the latest technology trends, disruptions and security/IT service business models to ensure Business Technology maintains, and improves, organization cyber competitive edge Identify security gaps, develop tailored solutions, and align with business objectives and industry best practices to enhance overall security posture Works closely with management to define and promote the strategic direction of the IAM team Work in an environment using the Agile methodology. Qualifications Bachelor's Degree from an accredited college or university with a major in Cybersecurity or Computer Information Systems or related field with minimum of 10 years of technology experience. Minimum 8+ years of experience working with an IAM platforms such as ForgeRock, Okta, Ping Identity, Oracle Access Manager, Cognito, AWS IAM, Azure, Delinea/Thycotic, CyberArk, BeyondTrust, SailPoint, Saviynt, and NetIQ/MicroFocus Working knowledge of industry best Access Controls practices, including the Center for Internet Security (CIS) Controls and NIST guidelines. Broad understanding of the IAM cybersecurity landscape including identity stores, authentication / authorization, strong authentication, & privileged access management capabilities and methodologies

Posted 2 months ago

Apply

5 - 9 years

7 - 11 Lacs

Pune

Work from Office

Naukri logo

Experience: 5+ Years Responsibilities: Provide Level 3 engineering support for CyberArk PAM, addressing complex issues and advanced troubleshooting. Configure PAM policies, manage vault and session management setup, and maintain secure access controls. Perform system upgrades, patches, and customizations to enhance functionality. Conduct root cause analysis for high impact incidents and collaborate with IT security teams for solution enhancements. Requirements: 5+ years of hands on experience with CyberArk PAM, including vault configuration, policy creation, and session management. Strong troubleshooting skills with expertise in privilege management and security practices.

Posted 2 months ago

Apply

8 - 11 years

16 - 25 Lacs

Pune

Work from Office

Naukri logo

Responsibilities Lead architecture, design, and implementation of Privilege Access Management (PAM) technologies and standards to support complex enterprise solutions. Create detailed documentation and provide input on PAM technology standards, and information security and risk practices. Optimize PAM approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and IT strategies. Develop internal and external checks and controls to ensure proper governance, security and quality of information assets. Communicate effectively with clients, colleagues, vendors, senior management and translate complex technical solutions into non-technical requirements documents. Qualifications: 8-10 years of experience leading/engineering enterprise level Privileged Access Management projects. Bachelors degree in computer science, Information Systems or other related field, or equivalent work experience. Expert knowledge in Privileged Access Management (preferably in BeyondTrust suite of PAM products) and other IAM domains. Understanding of Active Directory and core functions. Understanding of Windows/Linux server configuration/architecture. Strong knowledge of Linux operating systems and security standards. If you are interested for this position you can send me your updated resume : nidhi.upadhyay@varite.com

Posted 2 months ago

Apply

8 - 11 years

16 - 25 Lacs

Pune

Hybrid

Naukri logo

Responsibilities Lead architecture, design, and implementation of Privilege Access Management (PAM) technologies and standards to support complex enterprise solutions. Create detailed documentation and provide input on PAM technology standards, and information security and risk practices. Optimize PAM approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and IT strategies. Develop internal and external checks and controls to ensure proper governance, security and quality of information assets. Communicate effectively with clients, colleagues, vendors, senior management and translate complex technical solutions into non-technical requirements documents. Qualifications: 8-10 years of experience leading/engineering enterprise level Privileged Access Management projects. Bachelors degree in computer science, Information Systems or other related field, or equivalent work experience. Expert knowledge in Privileged Access Management (preferably in BeyondTrust suite of PAM products) and other IAM domains. Understanding of Active Directory and core functions. Understanding of Windows/Linux server configuration/architecture. Strong knowledge of Linux operating systems and security standards. If you are interested for this position you can send me your updated resume : nidhi.upadhyay@varite.com

Posted 2 months ago

Apply

7 - 12 years

10 - 20 Lacs

Pune

Hybrid

Naukri logo

Role & responsibilities - Lead architecture, design, and implementation of Privilege Access Management (PAM) technologies and standards to support complex enterprise solutions with a focus on BeyondTrust PasswordSafe. Create detailed documentation and provide input on PAM technology standards, and information security and risk practices. Optimize PAM approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and IT strategies. Develop internal and external checks and controls to ensure proper governance, security and quality of information assets. Communicate effectively with clients, colleagues, vendors, senior management and translate complex technical solutions into non-technical requirements documents. Qualifications: 5-7 years of experience leading/engineering enterprise level Privileged Access Management projects. Bachelors degree in computer science, Information Systems or other related field, or equivalent work experience. Expert knowledge in Privileged Access Management (preferably in BeyondTrust suite of PAM products) and other IAM domains. Understanding of Active Directory and core functions. Understanding of Windows/Linux server configuration/architecture.

Posted 2 months ago

Apply

7 - 9 years

25 - 27 Lacs

Delhi NCR, Bengaluru, Noida

Work from Office

Naukri logo

Dear Candidate, We are looking for a skilled IAM Engineer to design and manage IAM frameworks, ensuring secure access controls across enterprise systems. Key Responsibilities: Design, implement, and manage IAM solutions for enterprise security. Implement MFA, SSO, and Privileged Access Management (PAM) strategies. Manage identity lifecycle, role-based access control (RBAC), and least privilege policies. Conduct IAM audits and compliance assessments to meet regulatory standards. Automate IAM processes and integrate with security tools. Work with cloud IAM solutions (AWS IAM, Azure AD, Okta, Ping Identity). Required Skills & Qualifications: Expertise in IAM platforms (Okta, CyberArk, ForgeRock, Microsoft Entra ID). Strong knowledge of authentication protocols (OAuth, SAML, Kerberos, LDAP). Experience with directory services, federated identity management, and IAM governance. Familiarity with identity analytics, anomaly detection, and fraud prevention techniques. Soft Skills: Strong problem-solving and analytical skills. Excellent communication skills to work with cross-functional teams. Ability to work independently and as part of a team. Detail-oriented with a focus on delivering high-quality solutions Note: If you are interested, please share your updated resume and suggest the best number & time to connect with you. If your resume is shortlisted, one of the HR from my team will contact you as soon as possible. Srinivasa Reddy Kandi Delivery Manager Integra Technologies

Posted 2 months ago

Apply

8 - 11 years

25 - 35 Lacs

Hyderabad

Hybrid

Naukri logo

Role & responsibilities : Our CISO team is looking for IAM Engineer who has good experience and exposure on IAM and it tools which not limiting to Implementation and support. Need to have 8+ years of experience in IAM. Good hands on experience in Okta, Auth0 and basic understanding on ForgeRock AM and IDM. • Develop and Implementing IAM solutions. Deep understanding of LDAP, Active Directory, OAuth, SAML, and OpenID Connect. Experience in designing and implementing RBAC and ABAC models. Excellent troubleshooting skills and ability to work under pressure. Lead IAM migration projects from legacy systems to modern platforms like Okta and Auth0. • Create and automate IAM workflows using scripting language like PowerShell or NodeJS Good exposure and experience in okta workflows to fulfill the business requirement. Collaborate with cross-functional teams, including security, infrastructure, and application teams, to align IAM solutions with business goals Develop and Implement PAM solution using Beyond trust Password safe. Preferred candidate profile Certification in Okta, (Preferred) ForgeRock, or Auth0. • Hands on experience on Implementation and Migration from legacy IAM solution to Okta or Auth0 • Experience with Privileged Access Management (PAM) • Experience with CI/CD tools for automation and deployment. • Knowledge of Zero Trust frameworks and policies. • Familiarity with RESTful APIs and microservices-based architectures. EXP: 8 10 Years Location : Hyderabad Notice Period : Immediate to 25 days

Posted 2 months ago

Apply

5 - 9 years

15 - 30 Lacs

Chennai

Hybrid

Naukri logo

*Java, core Java (primary), Python* Hands-on experience in CPM plugins & PSM session connectors. Strong knowledge of RBAC, PIM/PAM, MFA, SSO, SAML, OAUTH, NTLM, LDAP, Kerberos, PKI. Certified-CyberArk Defender & CyberArk Sentry Required Candidate profile Experience with SailPoint, OKTA, Azure AD, Active Directory. Proficiency in Oracle, MSSQL, MySQL, LDAP. Experience with SSL certificate creation, deployment, renewal. SAFe Agile Methodology

Posted 2 months ago

Apply

5 - 9 years

15 - 20 Lacs

Hyderabad

Remote

Naukri logo

Job Description: 5+ years of relevant Security Engineering, Systems Engineering or Software Engineering experience 5+ years of experience administering a Secrets Management solution ( HashiCorp Vault, Conjur, AWS Secrets Manager or Azure Key Vault) 3+ years of experience with scripting to help automate processes (example python, bash, terraform) 2+ Years cloud services implementation in AWS Experience in API development Experience with Windows/*NIX platforms in large heterogeneous environment. Excellent understanding of authentication, authorization, role-based access, least privilege and segregation of duties access control concepts. Proven experience leading troubleshooting and solving issues related to identities, access, accounts, authentication, authorization, entitlements, and permissions. Ability to perform duties with minimal supervision Bachelors degree in computer science/engineering or related field Experience with PAM, IGA or PKI (Required) Relevant industry training and/or certification (Required) Proven track record of successful technical project implementations and support of those applications. (Required) Thorough, detail-oriented and quality-driven with excellent communication and inter-personal skills (Required) Role & responsibilities

Posted 2 months ago

Apply

2 - 3 years

5 - 8 Lacs

Mumbai Suburbs, Mumbai, Mumbai (All Areas)

Work from Office

Naukri logo

Role & responsibilities Security Operations & Threat Management Monitor, analyze, and respond to security alerts and incidents using SIEM (Security Information and Event Management) tools . Implement and manage intrusion detection/prevention systems (IDS/IPS) and endpoint security solutions. Assist in conducting regular vulnerability assessments and penetration testing (VAPT) in compliance with SEBI requirements. Manage security patches, updates, and hardening of critical IT infrastructure. Address SOC & DWM incidents response procedures. Maintain log management and auditing practices as per SEBI cybersecurity guidelines. Maintain firewalls, endpoint security, and network security controls . Managing Web Proxy and ZTNA . Help implement security configurations for IT assets. Identity & Access Management (IAM) Oversee privileged access management (PAM) and ensure secure authentication mechanisms (MFA, SSO). Regularly review and update user access policies in compliance with SEBI guidelines. Risk Management & Data Security Conduct risk assessments and security posture reviews for IT assets and applications. Implement data encryption, DLP (Data Loss Prevention), and secure file transfer mechanisms . Ensure protection of client data and financial transactions from cyber threats. Compliance & Regulatory Adherence (SEBI & Industry Standards) Ensure adherence to SEBI (Cyber Security & Cyber Resilience Framework) for regulated entities. Implement and maintain security controls in line with SEBI cybersecurity mandates . Assist in internal and external security audits , ensuring compliance with regulatory bodies. Preferred candidate profile Bachelors degree in Computer Science, Information Security, or related field. 2-3 years of experience in Security Operations, or IT Security. Strong understanding of Cybersecurity & Cyber Resilience Framework . Proficiency in SIEM, firewalls, IDS/IPS, endpoint security, and cloud security tools . Perks and benefits

Posted 2 months ago

Apply

8 - 13 years

25 - 35 Lacs

Bengaluru

Work from Office

Naukri logo

A Global MNC is looking for presales consultant who has hands on experience in PAM (Privileged Access Management). Good at Server, security and networking products. Multiple client handling experience is required..ct 9940085723

Posted 2 months ago

Apply

8 - 10 years

6 - 10 Lacs

Chennai, Noida

Work from Office

Naukri logo

Company Website : https://www.yotta.com/ Work Mode- Work from Office. Job Location Chennai, Noida. Rotational Shift - 5 Days working. Job Scope: Security L2. The Team Member Security L2 will be expected to work in multi-vendor network security infrastructure specifically on Data Center infrastructure environment. The desired candidate should have proficiency in managing runtime environment of Data center security infrastructure. Job Responsibilities Manage runtime environment of Data center security infrastructures comprises of Firewall, IDS/IPS, AV, Patch Management, WAF Configurations of Firewall/IPS Rules and Policies Management. Configuration of NAT/PAT, IPSEC and SSL VPN. Taking backup of Security devices Updating IPS signature as guided by security L3, blocking of unwanted traffic, Antivirus updates, Patch updates. Managing day to day run time security infrastructure. Required to support for Problem and Change Management Process. Troubleshoot and fix issues, execute regular changes on security infrastructure. Health and alert monitoring for security devices Follow & commit with Yotta’s Policy statements (eg. QMS/EMS/OHS/ISMS/PIMS/ITSM etc) Undertake applicable training as communicated from time to time. Participation in Risk assessment process, contribute in achieving departmental & management system objectives & Assist in maintaining PIMS controls throughout personal data lifecycle. Must Have Skill: Good Hands-on Experience on perimeter firewall like Checkpoint, Cisco ASA/Firepower, Fortinet, Palo Alto, etc. Experience with IDS/IPS, DDOS and WAF technologies Experience in IPsec Site to Site/Client to site and SSL VPN configuration and troubleshooting. Experience in working antivirus technologies like Symantec, MacAfee, TrendMicro etc. Strong understanding of network (LAN and WAN, routing and switching etc.) Knowledge on Routing (RIP, EIGRP, OSPF, MPLS and BGP) Conceptual knowledge on Cloud security Awareness on Environmental, Health and Safety, Energy, Information Security, Quality, Service Management, Business continuity and other management systems of the organization Firewall : Checkpoint, FortiGate & Palo Alto Monitoring : AlgoSec & Forti Analyzer Proxy: Zscaler & Netskope LB: Radware, F5 & Array Ddos WAF Firewall EDR PAM Good to Have Skill: Cloud Security VA/PT and security hardening Strategic planning & Management capabilities Good analytical and problem-solving skills Excellent communication & interpersonal skills Ability to handle high pressure situations A formal security industry accreditation would be an advantage e.g., CISSP, CISM, CEH, SABSA SCF, etc. Awareness on Environmental, Health and Safety, Energy, Information Security, Quality, Service Management, Business continuity and other management systems of the organization Behavioral Attributes: Action Orientation & Accountability Art of Skillful Conversation Creativity & Problem Solving Business Acumen Dealing with ambiguity Learning on the fly Building Trust Customer Focus Intellectual Horsepower Prioritizing, Planning & Organizing Process–Quality Excellence Listening, Sensing, Observing Building Collaborative Relationships Qualification and Experience: Relevant bachelor’s degree Minimum 5-8 years of experience covering enterprise IT security and Data Center company CCNA/CCSA, SANS or any other relevant network security certification

Posted 2 months ago

Apply

10 - 15 years

35 - 40 Lacs

Hyderabad

Work from Office

Naukri logo

The impact you will have in this role: In this role, you will be responsible for the functional and technical design of business systems; integration of business services & information security; driving industry-specific best practices & standards; understanding regulatory compliance needs; coordinating test planning & execution; providing leadership to AD teams and acting as technology liaison to all IT areas within DTCC, to the business partners, and to the industry. Leading projects, teams, code reviews are required to be able to lead by example. Your Primary Responsibilities: As an expert solutions engineer and senior software engineer, mission is to help lead our team of innovators and technologists toward crafting next-generation solutions that improve the way our business is run. Taking part in the development and deployment of Cyberark solution. Create and enforce Cyberark PAM policies and procedures, ensuring adherence to industry best practices and regulatory requirements. Develop and manage the PAM roadmap, including technology upgrades, new features, and integrations. Manage and maintain the CyberArk PAM platform, including Privileged Session Manager (PSM), Central Policy Manager (CPM), Password Vault Web Access (PVWA), and Vault. Defines and factors in performance, scalability, availability, resiliency, security, maintainability, support, testing and cost requirements when making technology selection and application design decisions. Define approaches for modernizing legacy applications including migration to public or private cloud infrastructure. Own the engineering design practices of our software development organization. Lead design reviews session. Collaborate with Infrastructure and Solution Architecture to choose efficient hosting environment. Focus on industry practices such as lose coupling of applications, standardization, APIs, reusability, concepts of isolation, extensibility, extendibility, and consistency of solutions while proposing and reviewing architectures. Identify and solve for non-functional requirements for the platform consumers. Ensures solutions adhere to security policies and standards of firm and industry. Conduct POCs for tools as seen fit for the area. **NOTE: The Primary Responsibilities of this role are not limited to the details above. ** Qualifications: Minimum of 10+ years of experience in Information Security with at least 5 years in Privileged Access Management Bachelors degree in Computer Science, Information Systems or a related field and/or equivalent experience Talents Needed for Success: Extensive experience with CyberArk PAM platform, including PSM, CPM, PVWA, and Vault. Ability to understand architectural diagrams and design Advanced understanding of privileged user life cycle management and controls around privileged access. Experience with AWS, Azure, and/or GCP IAM and PAM concepts Experience with troubleshooting issues with PAM solutions and applications. Sound understanding of regulatory requirements and standards such as GDPR, FISMA, PCI, HIPAA, SOX, FICA, etc Ability to guide teams through sophisticated issues and drive resolution for issues that arise within sophisticated and high-risk applications Ability to effectively translate technical information between vendors, IT management and other internal and external IT teams Ability to work with all levels of management to define requirements associated with PAM services, incorporating security standard processes.

Posted 2 months ago

Apply

4 - 8 years

6 - 10 Lacs

Maharashtra

Work from Office

Naukri logo

Description: Grade D1 PAM Engineer Developer Job description A skilled CyberArk Developer with expertise in onpremises and cloudbased CyberArk implementations This role is instrumental in designing developing and implementing solutions within the CyberArk ecosystem ensuring effective privileged access management The ideal candidate will bring handson experience in CyberArk development migration customization and integration across diverse environments Primary Skills Design develop and implement solutions within the CyberArk ecosystem to secure and manage privileged access across onpremises and cloud environments Utilize specific experience in transitioning from onpremises to cloud environments such as implementing P Cloud solutions Customise and extend CyberArk functionalities to meet specific business and security requirements ensuring adaptability in diverse scenarios Collaborate closely with security architects SMEs operations teams and other stakeholders to integrate CyberArk solutions seamlessly into hybrid infrastructures Implement and maintain CyberArk Privileged Cloud components including Vaults Central Policy Manager CPM Privileged Session Manager PSM and others ensuring optimal performance and reliability Implement and maintain CyberArk advanced module like EPM DPA Secret Hub and credential provider Develop and automate workflows scripts and connectors to streamline and enhance privileged access management processes within the CyberArk framework Collaborate with crossfunctional teams to understand business needs and translate them into effective CyberArk solutions considering both onpremises and cloudbased contexts Stay updated on the latest CyberArk features best practices and industry trends applying this knowledge to continually optimise and enhance privileged access security Conduct testing debugging and troubleshooting of CyberArk components addressing issues promptly and ensuring a robust and secure privileged access environment Drive documentation of CyberArk development processes including code configurations and integrations ensuring clarity and knowledge transfer within the team Mentor and collaborate with other developers and team members fostering a culture of continuous learning and improvement in CyberArk development practices Effectively communicate technical concepts to both technical and nontechnical stakeholders ensuring a clear understanding of CyberArk implementations in hybrid environments Proactively contribute to the resolution of technical issues minimizing impact on business operations and maintaining a secure privileged access environment across diverse platforms Other skills CyberArk Proficiency Indepth knowledge of CyberArk PAS and P Cloud components and functionalities CyberArk CDE certification preferred Cloud Integration Skills Familiarity with private cloud platforms and integration mechanisms Scripting and Automation Proficiency in scripting languages like PowerShell and automation tools such as Ansible IAM Principles Understanding of Identity and Access Management principles Troubleshooting and Debugging Strong diagnostic skills for problem resolution within CyberArk components Security Awareness Adherence to security best practices and compliance requirements Communication and Collaboration Effective communication with stakeholders and collaborative teamwork Transition Planning and Execution Experience in planning and executing transitions with minimal disruption

Posted 2 months ago

Apply

3 - 6 years

3 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Application Support Engineer Project Role Description : Act as software detectives, provide a dynamic service identifying and solving issues within multiple components of critical business systems. Must have skills : Red Hat OS Administration, Design, build and configure ap Good to have skills : SUSE Linux Administration, Microsoft Azure IaaS, AWS Architecture, Google cloud Platform Minimum 3 year(s) of experience is required Educational Qualification : 15 Years of full time education Role Description:Manage the cloud infrastructure environment through cross technology administration (OS, virtual networks, Security, Monitoring and Backup), Development and execution of script and automations. Manage the environment incidents with a focus on service restoration. Act as operations support for all AWS hosted Virtual Machines, PaaS services, network, storage and security.Job Requirements:Minimum 4 years of experience in RedHat, SUSE and AWSKey Responsibilities:-Provide L2/L3 support on Linux (RHEL & SUSE) servers hosted on AWS infrastructure.-Installation, Configuration and administration of SLES 12 for SAP Applications and RHEL servers.-Cluster configuration, management and troubleshooting.-Performance tuning and storage optimization.-SUSE/RHEL OS upgrade, RedHat satellite server or SUSE manger configuration and administration. -Licensing knowledge and good understanding of patch and package management. -Incident and Change management, Health and performance Monitoring - Check server health, performance and capacity alerts, take preventive and remedial action.-Design, build and configure AWS Services to meet business process and application requirements. -Execution and documentation of infrastructure changes and preparing work instructions.-Reporting and participating in governance and audit activities. Technical Experience:-Experience in operating system level troubleshooting, resolving system boot issues, Kernel bugs and server log analysis. -Experience in regular operating system Patching and vulnerability remediations. -Experience in Linux System hardening and Non-Compliance remediation. -Clustering knowledge on Linux / SUSE GPFS or HA configuration. Knowledge of SAP HANA appliances is added advantage. -Hands on Experience in Samba, CIFS, LDAP, PAM, SSSD, user authentication using username/password pair, Kerberos, certificates or a combination of methods.-sshd, Openssl, Squid proxy, NGINIX, Antivirus, Syslog, VSFTP, NTP, Bash scripting, -Hands on experience in filesystem configuration with RAID and LVM. -Hands on experience on EC2, EBS, NSG, VPC, S3, ASG, ELB, Route53, CloudWatch, CloudFormation. -Knowledge on Ticketing tools preferably Service Now. Professional Attributes:Good analytical and troubleshooting skills with the ability to think logically through a problem. Must have the initiative, tenacity and commitment to see problems through to resolution, Ability to work in shift patterns and provide out of hours On-Call support. collaborate with other team members to develop automation strategies and deployment processes.Education Qualification:GraduateMandatory Certification:RHEL or SUSE,Optional Certification: ITIL, AWS, Virtualization, Networking, Azure, Microsoft or any other Qualification 15 Years of full time education

Posted 2 months ago

Apply

2 - 7 years

5 - 12 Lacs

Mumbai, Thane

Work from Office

Naukri logo

PAM Admin Required Technical Skill Set : Hands on experience on PAM/IAM tool Experience : 2-8 Years Location : Thane Walk-in interview date : 29th March (saturday) Desired Competencies (Technical/Behavioral Competency) 1. Analytical capability to understand different server access mechnaism, role based access control. 2. Good understanding of Java script/API. 3. Good networking knowledge for leveraging device integration and Load Balancing. 4. Sound knowledge on security solutions like firewall, web security, endpoint security etc. 5. Managing server configuration like Memory, CPU, tempdb etc., 6. Creating logins and users, managing permissions to users, Troubleshooting ,managing Password vaults. 7. Deep skill in CyberArk PAM tool Good to have 1.Working of PAM or IAM technology 2. Should have basic knowledge on various security technologies like Antivirus, URL content filtering Proxy, IPS/IDS, SIEM, VA/PT, Data Leakage Prevention 3.Good understanding of information risk with respect to business infrastructure 4. Certifications like CISSP, CEH, etc. would be an added advantage 5.Expertise on Linux Administration. Responsibility of / Expectations from the Role Need to handle different teams access management requirement and manage Password vault. skills Writing advance query for scripting, rule creation, reporting and alerting Cross-functional analysis of processes to reduce redundancy, better synchronization and streamlining Problem solving capabilities based on security guidelines and overall organization practices Should have visions for adopting and implementing new technologies. Providing significant factual reports with meaningful insights for various audience Infrastructure review for sustainable framework Excellent verbal and written communication, team management

Posted 2 months ago

Apply

5 - 10 years

10 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

As a Senior System Specialist at Novo Nordisk, you will: Support PAM/IAM Architects in requirement analysis, technical design, implementation planning and documentation. Deploy and configure PAM solutions, ensuring they meet security requirements and business needs. Monitor and maintain PAM systems, ensuring their availability, performance, and security. Identify and resolve issues related to PAM systems, providing technical support as needed. Manage privileged access accounts, ensuring appropriate access controls and monitoring are in place. Conduct regular audits and reviews of privileged access to ensure compliance with policies and regulations. Work with stakeholders to gather, refine, and document business requirements for PAM projects. Analyse incoming ideas for similarities of requirements, groom and batch requirements for further processing of capability leads. Monitor trends of requests to allow more efficient assessments on the intake process. Create detailed documentation, including requirements, process flows, and functional specifications. Qualifications We are looking for a candidate with the following qualifications: Over 5 years of experience in IAM, including hands-on work with PAM solutions. Comprehensive knowledge of PAM principles and technologies such as CyberArk, Beyond Trust, and Entra Privileged Identity Management. Proficiency in Identity and Access Management (IAM) principles and technologies. Effective communication, presentation, and interpersonal skills for managing both internal stakeholders and external suppliers, with the ability to explain complex PAM concepts to non-technical audiences. Strong documentation and process mapping skills. Thorough understanding of Active Directory (AD) and Azure AD. Familiarity with security protocols and technologies, including SAML, OAuth, OpenID Connect, and LDAP. In-depth knowledge of security best practices and regulatory requirements related to privileged access management. Strong analytical and problem-solving skills, with the capability to troubleshoot and resolve complex PAM issue.

Posted 2 months ago

Apply

2 - 7 years

4 - 9 Lacs

Maharashtra

Work from Office

Naukri logo

Description Key ResponsibilitiesA skilled SailPoint/IAM Developer with expertise in on-premises and cloud-based SailPoint implementations. This role is instrumental in designing, developing, and implementing solutions within the IAM/SailPoint ecosystem, ensuring effective Identity access management. The ideal candidate will bring hands-on experience in SailPoint development, migration, customization, and integration across diverse environments. Primary Skills Design, develop, and implement solutions within the SailPoint ecosystem to secure and manage access across on-premises and cloud environments. Utilize specific experience in transitioning from on-premises to cloud environments, such as implementing P Cloud solutions. Customise and extend SailPoint functionalities to meet specific business and security requirements, ensuring adaptability in diverse scenarios. Collaborate closely with security architects, SMEs, operations teams, and other stakeholders to integrate SailPoint solutions seamlessly into hybrid infrastructures. Implement and maintain SailPoint advanced capabilities Develop and automate workflows, scripts, and connectors to streamline and enhance IAM Collaborate with cross-functional teams to understand business needs and translate them into effective SailPoint solutions, considering both on-premises and cloud-based contexts. Stay updated on the latest SailPoint features, best practices, and industry trends, applying this knowledge to continually optimise and enhance identity access security. Conduct testing, debugging, and troubleshooting of SailPoint components, addressing issues promptly and ensuring a robust and secure identity access environment. Drive documentation of SailPoint development processes, including code, configurations, and integrations, ensuring clarity and knowledge transfer within the team. Effectively communicate technical concepts to both technical and non-technical stakeholders, ensuring a clear understanding of SailPoint implementations in hybrid environments. Proactively contribute to the resolution of technical issues, minimizing impact on business operations and maintaining a secure identity access environment across diverse platforms. Other skills Cloud Integration Skills: Familiarity with private cloud platforms and integration mechanisms. Scripting and AutomationProficiency in scripting languages like PowerShell and automation tools such as Ansible. IAM PrinciplesUnderstanding of Identity and Access Management principles. Troubleshooting and DebuggingStrong diagnostic skills for problem resolution within SailPoint components. Security AwarenessAdherence to security best practices and compliance requirements. Communication and CollaborationEffective communication with stakeholders and collaborative teamwork. Transition Planning and ExecutionExperience in planning and executing transitions with minimal disruption. IAM/PAM/IGA Strategy and Architecture for Migration Projects Define and implement IAM, PAM, and IGA strategies tailored to the requirements of application migration, ensuring robust access management during and after migration. Assess current access controls and recommend improvements to align with security best practices and compliance standards during migration. Design and oversee secure frameworks for identity management, privilege escalation, and governance in new application environments. Access Control Implementation and Management Deploy and configure IAM/PAM/IGA solutions (such as Okta, CyberArk, SailPoint) within sprint cycles, ensuring seamless integration with migrated applications. Develop and enforce role-based access control (RBAC), least privilege principles, and secure access protocols across applications and data assets. Manage privileged accounts by implementing PAM practices that protect critical resources during migration to cloud or hybrid environments. Application Migration Support within Agile Sprints Work closely with Agile teams to ensure IAM/PAM/IGA requirements are integrated into sprint planning, execution, and testing phases. Provide expertise on managing access controls and governance requirements in short sprint cycles, ensuring they align with migration milestones. Act as an advisor to development teams, ensuring that IAM/PAM/IGA practices are consistently implemented in each sprint and across each application migration. Risk Mitigation and Compliance Ensure that access management processes adhere to regulatory requirements (e.g., SOX, GDPR) and industry standards, such as NIST and ISO. Conduct risk assessments specific to access management within the migration project, identifying vulnerabilities and implementing controls. Document IAM/PAM/IGA configurations and processes, providing reports to support audits and compliance verifications. Cross-Functional Collaboration and Training Collaborate with cybersecurity, application, and infrastructure teams to align IAM/PAM/IGA solutions with broader security requirements. Train team members and stakeholders on IAM/PAM/IGA best practices, tools, and configurations specific to migration and Agile environments. Serve as a subject matter expert, offering guidance on IAM/PAM/IGA issues related to application migration projects and Agile sprint schedules. Continuous Improvement and Incident Management Regularly evaluate IAM/PAM/IGA solutions to ensure they are up-to-date and capable of addressing new security risks and compliance needs. Respond to security incidents related to access management, working with incident response teams to mitigate impacts and prevent future occurrences. Support continuous improvement initiatives by refining access management policies and processes, leveraging lessons learned from previous sprints and migrations. Required Skills and QualificationsEducational BackgroundBachelors degree in Cybersecurity, Information Technology, Computer Science, or a related field. Advanced certifications such as CISSP, CISM, CISA, or specific IAM/PAM/IGA certifications (e.g., CyberArk, SailPoint) are preferred. ExperienceMinimum of 7-10 years of experience in IAM/PAM/IGA roles, with a strong focus on application migration and Agile sprint cycles. Technical ProficiencyIn-depth knowledge of IAM/PAM/IGA tools (e.g., Okta, CyberArk, SailPoint, ForgeRock) and hands-on experience with implementing these tools in cloud and hybrid environments. Knowledge of Agile and DevOpsExperience working within Agile sprint cycles and knowledge of DevOps practices related to secure access management during application migration. Preferred CompetenciesProblem-Solving and Analytical Skills: Ability to assess security needs, identify risks, and recommend effective access management controls. Communication Skills: Strong communication skills for interacting with technical and non-technical stakeholders, conveying complex IAM/PAM/IGA concepts clearly. Attention to DetailPrecision in configuring and managing access controls to prevent unauthorized access and ensure compliance. Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility Yes Global Role Family To be defined Local Role Name To be defined Local Skills Agile methodology;ServiceNow Release Management;release management;cybersecurity;PAM Languages RequiredENGLISH Role Rarity To Be Defined

Posted 2 months ago

Apply

2 - 7 years

4 - 9 Lacs

Karnataka

Work from Office

Naukri logo

"Experience5+ Years Responsibilities Provide Level 3 engineering support for CyberArk PAM, addressing complex issues and advanced troubleshooting. Configure PAM policies, manage vault and session management setup, and maintain secure access controls. Perform system upgrades, patches, and customizations to enhance functionality. Conduct root cause analysis for high impact incidents and collaborate with IT security teams for solution enhancements. Requirements 5+ years of hands on experience with CyberArk PAM, including vault configuration, policy creation, and session management. Strong troubleshooting skills with expertise in privilege management and security practices."

Posted 2 months ago

Apply

2 - 7 years

4 - 9 Lacs

Maharashtra

Work from Office

Naukri logo

Description Key ResponsibilitiesA skilled SailPoint/IAM Developer with expertise in on-premises and cloud-based SailPoint implementations. This role is instrumental in designing, developing, and implementing solutions within the IAM/SailPoint ecosystem, ensuring effective Identity access management. The ideal candidate will bring hands-on experience in SailPoint development, migration, customization, and integration across diverse environments. Primary Skills Design, develop, and implement solutions within the SailPoint ecosystem to secure and manage access across on-premises and cloud environments. Utilize specific experience in transitioning from on-premises to cloud environments, such as implementing P Cloud solutions. Customise and extend SailPoint functionalities to meet specific business and security requirements, ensuring adaptability in diverse scenarios. Collaborate closely with security architects, SMEs, operations teams, and other stakeholders to integrate SailPoint solutions seamlessly into hybrid infrastructures. Implement and maintain SailPoint advanced capabilities Develop and automate workflows, scripts, and connectors to streamline and enhance IAM Collaborate with cross-functional teams to understand business needs and translate them into effective SailPoint solutions, considering both on-premises and cloud-based contexts. Stay updated on the latest SailPoint features, best practices, and industry trends, applying this knowledge to continually optimise and enhance identity access security. Conduct testing, debugging, and troubleshooting of SailPoint components, addressing issues promptly and ensuring a robust and secure identity access environment. Drive documentation of SailPoint development processes, including code, configurations, and integrations, ensuring clarity and knowledge transfer within the team. Effectively communicate technical concepts to both technical and non-technical stakeholders, ensuring a clear understanding of SailPoint implementations in hybrid environments. Proactively contribute to the resolution of technical issues, minimizing impact on business operations and maintaining a secure identity access environment across diverse platforms. Other skills Cloud Integration Skills: Familiarity with private cloud platforms and integration mechanisms. Scripting and AutomationProficiency in scripting languages like PowerShell and automation tools such as Ansible. IAM PrinciplesUnderstanding of Identity and Access Management principles. Troubleshooting and DebuggingStrong diagnostic skills for problem resolution within SailPoint components. Security AwarenessAdherence to security best practices and compliance requirements. Communication and CollaborationEffective communication with stakeholders and collaborative teamwork. Transition Planning and ExecutionExperience in planning and executing transitions with minimal disruption. IAM/PAM/IGA Strategy and Architecture for Migration Projects Define and implement IAM, PAM, and IGA strategies tailored to the requirements of application migration, ensuring robust access management during and after migration. Assess current access controls and recommend improvements to align with security best practices and compliance standards during migration. Design and oversee secure frameworks for identity management, privilege escalation, and governance in new application environments. Access Control Implementation and Management Deploy and configure IAM/PAM/IGA solutions (such as Okta, CyberArk, SailPoint) within sprint cycles, ensuring seamless integration with migrated applications. Develop and enforce role-based access control (RBAC), least privilege principles, and secure access protocols across applications and data assets. Manage privileged accounts by implementing PAM practices that protect critical resources during migration to cloud or hybrid environments. Application Migration Support within Agile Sprints Work closely with Agile teams to ensure IAM/PAM/IGA requirements are integrated into sprint planning, execution, and testing phases. Provide expertise on managing access controls and governance requirements in short sprint cycles, ensuring they align with migration milestones. Act as an advisor to development teams, ensuring that IAM/PAM/IGA practices are consistently implemented in each sprint and across each application migration. Risk Mitigation and Compliance Ensure that access management processes adhere to regulatory requirements (e.g., SOX, GDPR) and industry standards, such as NIST and ISO. Conduct risk assessments specific to access management within the migration project, identifying vulnerabilities and implementing controls. Document IAM/PAM/IGA configurations and processes, providing reports to support audits and compliance verifications. Cross-Functional Collaboration and Training Collaborate with cybersecurity, application, and infrastructure teams to align IAM/PAM/IGA solutions with broader security requirements. Train team members and stakeholders on IAM/PAM/IGA best practices, tools, and configurations specific to migration and Agile environments. Serve as a subject matter expert, offering guidance on IAM/PAM/IGA issues related to application migration projects and Agile sprint schedules. Continuous Improvement and Incident Management Regularly evaluate IAM/PAM/IGA solutions to ensure they are up-to-date and capable of addressing new security risks and compliance needs. Respond to security incidents related to access management, working with incident response teams to mitigate impacts and prevent future occurrences. Support continuous improvement initiatives by refining access management policies and processes, leveraging lessons learned from previous sprints and migrations. Required Skills and QualificationsEducational BackgroundBachelors degree in Cybersecurity, Information Technology, Computer Science, or a related field. Advanced certifications such as CISSP, CISM, CISA, or specific IAM/PAM/IGA certifications (e.g., CyberArk, SailPoint) are preferred. ExperienceMinimum of 7-10 years of experience in IAM/PAM/IGA roles, with a strong focus on application migration and Agile sprint cycles. Technical ProficiencyIn-depth knowledge of IAM/PAM/IGA tools (e.g., Okta, CyberArk, SailPoint, ForgeRock) and hands-on experience with implementing these tools in cloud and hybrid environments. Knowledge of Agile and DevOpsExperience working within Agile sprint cycles and knowledge of DevOps practices related to secure access management during application migration. Preferred CompetenciesProblem-Solving and Analytical Skills: Ability to assess security needs, identify risks, and recommend effective access management controls. Communication Skills: Strong communication skills for interacting with technical and non-technical stakeholders, conveying complex IAM/PAM/IGA concepts clearly. Attention to DetailPrecision in configuring and managing access controls to prevent unauthorized access and ensure compliance. Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility Yes Global Role Family To be defined Local Role Name To be defined Local Skills Agile methodology;ServiceNow Release Management;SailPoint IdentityIQ;CyberArk Languages RequiredENGLISH Role Rarity To Be Defined

Posted 2 months ago

Apply

2 - 7 years

4 - 9 Lacs

Maharashtra

Work from Office

Naukri logo

Description Key ResponsibilitiesA skilled SailPoint/IAM Developer with expertise in on-premises and cloud-based SailPoint implementations. This role is instrumental in designing, developing, and implementing solutions within the IAM/SailPoint ecosystem, ensuring effective Identity access management. The ideal candidate will bring hands-on experience in SailPoint development, migration, customization, and integration across diverse environments. Primary Skills Design, develop, and implement solutions within the SailPoint ecosystem to secure and manage access across on-premises and cloud environments. Utilize specific experience in transitioning from on-premises to cloud environments, such as implementing P Cloud solutions. Customise and extend SailPoint functionalities to meet specific business and security requirements, ensuring adaptability in diverse scenarios. Collaborate closely with security architects, SMEs, operations teams, and other stakeholders to integrate SailPoint solutions seamlessly into hybrid infrastructures. Implement and maintain SailPoint advanced capabilities Develop and automate workflows, scripts, and connectors to streamline and enhance IAM Collaborate with cross-functional teams to understand business needs and translate them into effective SailPoint solutions, considering both on-premises and cloud-based contexts. Stay updated on the latest SailPoint features, best practices, and industry trends, applying this knowledge to continually optimise and enhance identity access security. Conduct testing, debugging, and troubleshooting of SailPoint components, addressing issues promptly and ensuring a robust and secure identity access environment. Drive documentation of SailPoint development processes, including code, configurations, and integrations, ensuring clarity and knowledge transfer within the team. Effectively communicate technical concepts to both technical and non-technical stakeholders, ensuring a clear understanding of SailPoint implementations in hybrid environments. Proactively contribute to the resolution of technical issues, minimizing impact on business operations and maintaining a secure identity access environment across diverse platforms. Other skills Cloud Integration Skills: Familiarity with private cloud platforms and integration mechanisms. Scripting and AutomationProficiency in scripting languages like PowerShell and automation tools such as Ansible. IAM PrinciplesUnderstanding of Identity and Access Management principles. Troubleshooting and DebuggingStrong diagnostic skills for problem resolution within SailPoint components. Security AwarenessAdherence to security best practices and compliance requirements. Communication and CollaborationEffective communication with stakeholders and collaborative teamwork. Transition Planning and ExecutionExperience in planning and executing transitions with minimal disruption. IAM/PAM/IGA Strategy and Architecture for Migration Projects Define and implement IAM, PAM, and IGA strategies tailored to the requirements of application migration, ensuring robust access management during and after migration. Assess current access controls and recommend improvements to align with security best practices and compliance standards during migration. Design and oversee secure frameworks for identity management, privilege escalation, and governance in new application environments. Access Control Implementation and Management Deploy and configure IAM/PAM/IGA solutions (such as Okta, CyberArk, SailPoint) within sprint cycles, ensuring seamless integration with migrated applications. Develop and enforce role-based access control (RBAC), least privilege principles, and secure access protocols across applications and data assets. Manage privileged accounts by implementing PAM practices that protect critical resources during migration to cloud or hybrid environments. Application Migration Support within Agile Sprints Work closely with Agile teams to ensure IAM/PAM/IGA requirements are integrated into sprint planning, execution, and testing phases. Provide expertise on managing access controls and governance requirements in short sprint cycles, ensuring they align with migration milestones. Act as an advisor to development teams, ensuring that IAM/PAM/IGA practices are consistently implemented in each sprint and across each application migration. Risk Mitigation and Compliance Ensure that access management processes adhere to regulatory requirements (e.g., SOX, GDPR) and industry standards, such as NIST and ISO. Conduct risk assessments specific to access management within the migration project, identifying vulnerabilities and implementing controls. Document IAM/PAM/IGA configurations and processes, providing reports to support audits and compliance verifications. Cross-Functional Collaboration and Training Collaborate with cybersecurity, application, and infrastructure teams to align IAM/PAM/IGA solutions with broader security requirements. Train team members and stakeholders on IAM/PAM/IGA best practices, tools, and configurations specific to migration and Agile environments. Serve as a subject matter expert, offering guidance on IAM/PAM/IGA issues related to application migration projects and Agile sprint schedules. Continuous Improvement and Incident Management Regularly evaluate IAM/PAM/IGA solutions to ensure they are up-to-date and capable of addressing new security risks and compliance needs. Respond to security incidents related to access management, working with incident response teams to mitigate impacts and prevent future occurrences. Support continuous improvement initiatives by refining access management policies and processes, leveraging lessons learned from previous sprints and migrations. Required Skills and QualificationsEducational BackgroundBachelors degree in Cybersecurity, Information Technology, Computer Science, or a related field. Advanced certifications such as CISSP, CISM, CISA, or specific IAM/PAM/IGA certifications (e.g., CyberArk, SailPoint) are preferred. ExperienceMinimum of 7-10 years of experience in IAM/PAM/IGA roles, with a strong focus on application migration and Agile sprint cycles. Technical ProficiencyIn-depth knowledge of IAM/PAM/IGA tools (e.g., Okta, CyberArk, SailPoint, ForgeRock) and hands-on experience with implementing these tools in cloud and hybrid environments. Knowledge of Agile and DevOpsExperience working within Agile sprint cycles and knowledge of DevOps practices related to secure access management during application migration. Preferred CompetenciesProblem-Solving and Analytical Skills: Ability to assess security needs, identify risks, and recommend effective access management controls. Communication Skills: Strong communication skills for interacting with technical and non-technical stakeholders, conveying complex IAM/PAM/IGA concepts clearly. Attention to DetailPrecision in configuring and managing access controls to prevent unauthorized access and ensure compliance. Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility Yes Global Role Family To be defined Local Role Name To be defined Local Skills Agile methodology;ServiceNow Release Management;release management Languages RequiredENGLISH Role Rarity To Be Defined

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies