Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
2 - 7 years
4 - 9 Lacs
Maharashtra
Work from Office
Description Key ResponsibilitiesIAM/PAM/IGA Strategy and Architecture for Migration Projects Define and implement IAM, PAM, and IGA strategies tailored to the requirements of application migration, ensuring robust access management during and after migration. Assess current access controls and recommend improvements to align with security best practices and compliance standards during migration. Design and oversee secure frameworks for identity management, privilege escalation, and governance in new application environments. Access Control Implementation and Management Deploy and configure IAM/PAM/IGA solutions (such as Okta, CyberArk, SailPoint) within sprint cycles, ensuring seamless integration with migrated applications. Develop and enforce role-based access control (RBAC), least privilege principles, and secure access protocols across applications and data assets. Manage privileged accounts by implementing PAM practices that protect critical resources during migration to cloud or hybrid environments. Application Migration Support within Agile Sprints Work closely with Agile teams to ensure IAM/PAM/IGA requirements are integrated into sprint planning, execution, and testing phases. Provide expertise on managing access controls and governance requirements in short sprint cycles, ensuring they align with migration milestones. Act as an advisor to development teams, ensuring that IAM/PAM/IGA practices are consistently implemented in each sprint and across each application migration. Risk Mitigation and Compliance Ensure that access management processes adhere to regulatory requirements (e.g., SOX, GDPR) and industry standards, such as NIST and ISO. Conduct risk assessments specific to access management within the migration project, identifying vulnerabilities and implementing controls. Document IAM/PAM/IGA configurations and processes, providing reports to support audits and compliance verifications. Cross-Functional Collaboration and Training Collaborate with cybersecurity, application, and infrastructure teams to align IAM/PAM/IGA solutions with broader security requirements. Train team members and stakeholders on IAM/PAM/IGA best practices, tools, and configurations specific to migration and Agile environments. Serve as a subject matter expert, offering guidance on IAM/PAM/IGA issues related to application migration projects and Agile sprint schedules. Continuous Improvement and Incident Management Regularly evaluate IAM/PAM/IGA solutions to ensure they are up-to-date and capable of addressing new security risks and compliance needs. Respond to security incidents related to access management, working with incident response teams to mitigate impacts and prevent future occurrences. Support continuous improvement initiatives by refining access management policies and processes, leveraging lessons learned from previous sprints and migrations. Required Skills and QualificationsEducational BackgroundBachelors degree in Cybersecurity, Information Technology, Computer Science, or a related field. Advanced certifications such as CISSP, CISM, CISA, or specific IAM/PAM/IGA certifications (e.g., CyberArk, SailPoint) are preferred. ExperienceMinimum of 7-10 years of experience in IAM/PAM/IGA roles, with a strong focus on application migration and Agile sprint cycles. Technical ProficiencyIn-depth knowledge of IAM/PAM/IGA tools (e.g., Okta, CyberArk, SailPoint, ForgeRock) and hands-on experience with implementing these tools in cloud and hybrid environments. Knowledge of Agile and DevOpsExperience working within Agile sprint cycles and knowledge of DevOps practices related to secure access management during application migration. Preferred CompetenciesProblem-Solving and Analytical Skills: Ability to assess security needs, identify risks, and recommend effective access management controls. Communication Skills: Strong communication skills for interacting with technical and non-technical stakeholders, conveying complex IAM/PAM/IGA concepts clearly. Attention to DetailPrecision in configuring and managing access controls to prevent unauthorized access and ensure compliance. Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility Yes Global Role Family To be defined Local Role Name To be defined Local Skills Agile methodology;ServiceNow Release Management;release management;cybersecurity Languages RequiredENGLISH Role Rarity To Be Defined
Posted 2 months ago
5 - 7 years
13 - 15 Lacs
Mumbai Suburbs, Mumbai, Mumbai (All Areas)
Work from Office
The Security Analyst serves as the core technical expert of all assurance activities related to the information security posture, compliance mitigation, integrity and confidentiality of customer, business partner, employee and business information in compliance with the organization's information security policies. Responsibilities: Technical documentation about the security breaches and the processes. Configuration reviews for implemented solutions like firewalls, WAF, PAM/PIM, DLP, SIEM. Data encryption programs to safeguard organization’s vital data. Red teaming, VA-PT, source code reviews, Mobile app reviews. Work directly with the ISG team and coordination with stakeholders. Risk assessment and risk management processes. Understand the processes and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services. Review and Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance. Coordinate, measure and report on the technical aspects of security posture. Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements. Manage and coordinate operational components of incident management, including detection, response, documentation and reporting. Maintain a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices, and laws and regulations. Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Mitigate the compliance requirements as per regulatory guidelines Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and follow policies and audit requirements. Design, coordinate and oversee security testing procedures to verify the security of systems, networks and applications, and manage the remediation of identified risks. Requirements: Diploma /Degree in a technology-related field required. Professional security analyst certification. Minimum of five to 7 years of hands on experience in VA-PT, configuration reviews and data protection. Knowledge of common information security management frameworks, such as ISO/IEC 27001, and NIST. Excellent written and verbal communication skills and high level of personal integrity. Experience with Cloud computing/Elastic computing across virtualized environments. Interested candidates can share their resume at shamli.kamble@hdfcsales.co.in
Posted 2 months ago
1 - 5 years
3 - 8 Lacs
Hyderabad
Work from Office
Job Title : CyberArk Support Engineer L2 Location : Hyderabad Position : Full Time Required Experience : 2+ Years. Timings : Rotational Job Summary: The essential duties and responsibilities can include the following but are not limited to: Respond to customer inquiries and technical problems through web portal, live sessions, and telephone. Address customer business needs and technical issues through diligent research, reproduction, and troubleshooting of issues while applying acquired knowledge. Document all technical inquiries and conversations. Must be able to work independently as well as with others, as part of a domestic and international team. Must display strong analytical and problem-solving abilities. Handle multiple technical issues in a fast-paced environment. Experience: At least 2 years experience in Technical Support with CyberArk solutions (Privileged Access Management). Experience in cybersecurity support, with a strong understanding of access control, authentication, encryption, and other security concepts. Experience as System Administrator in Windows Server environment. Experience supporting Linux systems is a plus. Familiarity with networking principles. Experience working in a SaaS or cyber security project is a plus. Capable of understanding the technical aspects of a complex system. Technical Skills: Proficiency in CyberArk components: Vault, CPM, PSM etc. Strong knowledge of security protocols. Experience with troubleshooting connectivity and network-related issues preferably on windows environment. Ability to work with Linux-based systems is a plus. Proficiency with AWS/Azure. Proficiency in Active Directory or another LDAP directory. Experience working with ticketing tools like Salesforce and ServiceNow Communication skills: Strong communication and interpersonal skills to interact effectively with customers and internal teams. Proficient in handling support calls through calling systems Desired Skills: Certifications in CyberArk (such as Defender or Trustee) are desirable. Any relevant cybersecurity certifications (e.g., CISSP, CompTIA Security+, etc.) will be considered an asset. Knowledge of other security technologies like SIEM, IAM, and MFA is a plus. Education & Certifications: Bachelor's degree in computer systems/networking or equivalent.
Posted 3 months ago
5 - 10 years
7 - 12 Lacs
Ahmedabad
Work from Office
Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : CyberArk Privileged Identity Access Management Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : Minimum 15 years of full time education Summary :As a Security Delivery Lead, you will be responsible for leading the implementation and delivery of Security Services projects, leveraging our global delivery capability. Your typical day will involve managing and overseeing the CyberArk Privileged Identity Access Management project, ensuring its successful delivery and implementation. Must have Skills :CyberArk Privileged Identity Access Management implementation experience(installation or upgradation) of CyberArk Core PAS components.Good to Have Skills :Thycotic (Delinea), Beyond Trust, HashiCorp Vault Job Requirements :Key Responsibilities :1. Responsible for Privileged User account administration of various target devices like Windows, UNIX, Databases, network and applications 2. Troubleshooting CyberArk Privileged Account Security PAS Components for operational issues3.Experience in using CyberArk Web Service APIs Application onboarding experience using AIM 4.Exposure to PAM process frameworks and methodologies5.Upgrade and Migration of CyberArk Privileged PAS Suite is desirable Technical Experience :1.Experience in deployment implementation of CyberArk Privileged Account Security infrastructure Enterprise Password Vault, Password Vault Web Access, Central Policy Manager, Privileged Session Manager, Application Identity Manager for large scale customers2.Should have good knowledge of CyberArk Disaster recovery and DNA 3.Strong knowledge on Integrating various platforms with CyberArk, such as Active Directory, ENE, SIEM and custom applications Professional Attributes :1.Quick learner, team player and self-starter 2.Good Articulation and presentation skills Additional Information: The candidate should have a minimum of 5 years of experience in CyberArk Privileged Identity Access Management. The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with a proven track record of delivering successful security projects. This position is based at our Chennai office. Qualifications Minimum 15 years of full time education
Posted 3 months ago
5 - 9 years
10 - 15 Lacs
Bengaluru
Work from Office
Req ID: 478161 At Alstom, we understand transport networks and what moves people From high-speed trains, metros, monorails, and trams, to turnkey systems, services, infrastructure, signalling and digital mobility, we offer our diverse customers the broadest portfolio in the industry Every day, more than 80 000 colleagues lead the way to greener and smarter mobility worldwide, connecting cities as we reduce carbon and replace cars Job Title: IAM Expert OVERALL PURPOSE OF THE ROLE: We are seeking an experienced resource who has expertise on Identity and Access Management topic for Alstom IS&T IAM Expert is the Subject Matter Expert (SME) in terms of identity and access management global topic The resource would be in charge of developing and provide strong expertise on identities and accesses operations and governance topic, in compliance with the IAM security policy This includes the definition of global processes to manage the lifecycle of usersaccounts and identity in the IT landscape The resource should coordinate and work with relevant stakeholders around IAM topics, including but not limited to HR, Sourcing, Master Data managers, IS&T, business representatives He or she designs the contribute to the IAM mechanisms design and implementation on tools and architectures to be implemented within the Alstom Information System He or she will be also in charge of participate strongly on the functional and technical roadmap He or she could leads the external resources team supporting Alstom IAM program and ensure the relation with external partners with the support of sourcing and legal teams Organisation structure (job belongs to ) Digital Services Reports directly to: IAM Operations & Governance Leader Roles and Responsibility: The IAM Expert has under his responsibility: Lead the IAM workshops on both functional and technical design Maintain and Improve IAM SOP, documentation and process Contribute on IAM standards and Security Policy Work actively on Governance of identities and accesses Perform Technical review and Impact assessment for all changes and new requirement Managing dashboards and reporting for leadership Support level 5 expertise for IAM platforms and topics Support to drive Critical Incidents towards resolution engaging relevant stakeholders Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction Leading upcoming new security solutions like B2B Operations and B2B SSO in IAM PAM Operations expertise Serve as a subject matter expert (SME) for Saviynt Responsible for troubleshooting and manage issues related to identities, authentication/authorization and access permissions Lead IAM operations and BAU activities Implementing the solutions for complex operational problems The IAM Expert contribute actively to the security aspects related to IAM in Alstoms IT projects ISSCQ produce all Information System Security and Compliance Questionnaire at the initial phase of all projects Risk analysis perform risk analysis and identify mitigation plan when relevant Security Insurance Plan make sure that all IT partners/providers respect the IAM policy when they deliver services (e g Cloud or SaaS provider) Security Acceptance make the right decision considering the residual risk and the asset value ISS Run Q&A and industrialization Experience Bachelors/Masters degree in Engineering/Technology or related field Minimum 8-10 years of relevant IAM Security Operation and governance experience Professional industry standard certifications like CISSP, CISA, CEH, GIAC, CISM, etc will be an added advantage Experience on IAM solutions within Saviynt AAG, Microsoft Azure or other IAG solution Experience on PAM (Privilege Access Management) solutions (eg Cyberark, BeyondTrust) Exposure and understanding of IAM Architecture Able to analyse risks and to design an appropriate IAM security pattern (provisioning, habitation workflow, authentication, master data authorities, segregation of duty, Privileged Access Management, federation) Subject-matter expertise across all IAM topics as it relates to both cloud and on-premises enterprise technology, and the relationship between the architectures Contribute to the adoption of Authentication and Authorization reference architectures for existing, new and emerging IAM technologies Lead effective design solutions that not only satisfy immediate project requirements but also deliver a coherent, reusable, reliable to help the business grow and change while aligning IAM security policy Knowledge of ISO 27002 and ISO 27005 Demonstrated drive for continuous learning, results-orientation, and teamwork Professional & concise communication (written & verbal) Ability and flexibility to adapt to change, including shifting and competing priorities Ability to work with functional as technical teams in a dynamic environment: Technical Competencies: Experience on operations IAM solutions: Level 3 Experience on IAM solutions within Saviynt AAG, Microsoft Azure or other IAG solution: Level 3 Very Good understanding of Identity & access governance, Multi-Factor authentication and Privileged Access Management: Level 4 Good understanding on technologies related to Identity and access management, such as e g API ,AD,LDAP,SQL : Level 4 Intimately familiar with IAM functional process and design (SOD, Workflow approval, MFA, ) : Level 4 Good understanding on functional concept of Identity and access management (workflows, SOD, recertification access, provisioning, auto-correlation access, ?): Level 4 Very good understanding on security IAM principals and design (e g network, ) Level 4 2-3 years of IAM Saviynt software experience is appreciated: Level 2 Behavioural Attributes Ability to work global with functional as well as technical teams in a dynamic environment Eye for details, structured and process oriented Influence stakeholders for improving and sustaining performance Demonstrate a positive mindset, high levels of character and integrity, and a keen awareness of continuous improvement Advise and collaborate with others to develop strong, positive working relationships across all levels of the organization to drive success of projects and efforts Offer creative, innovative, data-based solutions by focusing on forward progress and creativity, even when working through complex, often competing needs You dont need to be a train enthusiast to thrive with us We guarantee that when you step onto one of our trains with your friends or family, youll be proud If youre up for the challenge, wed love to hear from you! Important to note As a global business, were an equal-opportunity employer that celebrates diversity across the 63 countries we operate in Were committed to creating an inclusive workplace for everyone
Posted 3 months ago
5 - 10 years
20 - 30 Lacs
Chennai
Remote
Dear Candidates, We do have an excellent opportunity for Senior IAM Engineer role!! Exp : 6+ NP : Immediate to 20 days would be fine !! Permanent Work form Home !! Package: Negotiable ! Role & responsibilities The Senior IAM Engineer will be responsible for the design, implementation, and support of identity and access management solutions. This role requires a deep understanding of IAM principles, technologies, and best practices to ensure the security and integrity of the organizations information systems. You will work closely with IT, security, and business teams to ensure that the right individuals have access to the right resources at the right times for the right reasons. - Strong knowledge of directory services, LDAP, Active Directory, and other identity repositories. - Experience with scripting and automation to streamline IAM processes - Strong knowledge and experience on IT security and risk management practices. - Strong analytical and problem-solving skills. - Excellent communication and interpersonal abilities. - Be available to work on-call duties and provide out-of-hours support as needed. - Industry certifications such as CISSP or IAM-specific certifications are preferred. Please note : Strong background and experience in PAM, such as BeyondTrust in both their on-prem and Cloud solutions Experience in CyberArk would be a bonus. Strong background and experience in Customer Identity and Access Management, such as Auth0 and B2C If interested please share me your resume to abinayak@swordgroup.in or Contact: Abinaya/whatsup - 9500053608
Posted 3 months ago
4 - 8 years
10 - 20 Lacs
Pune, Bengaluru, Hyderabad
Work from Office
Security policy definition and detailing Knowledge of all CISSP domains Awareness of SOC1, SOC2 , FFIEC , GDPR and other key security regulatory standards from security point of view Execute security architectures for cloud cloud/hybrid systems
Posted 3 months ago
3 - 7 years
4 - 9 Lacs
Chennai, Pune, Bengaluru
Hybrid
Role & responsibilities - Cyberark PAM/PCloud Preferred candidate profile - Minimum 3 years work experience in the above field
Posted 3 months ago
7 - 12 years
9 - 14 Lacs
Mumbai
Work from Office
Your role Drive and ensure business, IT and Security teams are compliant to applicable IAM policy, IAM .standards and instructions. Work closely with IAM team ( Run and Project) to design and deploy monitoring and control systems based on IAM policy and instructions. Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction. Develop and maintain measurable IAM security metrics; ensure metrics provide actionable insights to the applicable stakeholders. Maintain IAM policy & instruction awareness of business, technical, architecture, infrastructure, and end user support Develop and maintain measurable KPIs to showcase IAM governance performance Analyse internal and external threats and recommend remediation actions based on IAM capability. Your profile Maintain IAM policy & instruction awareness of business, technical, architecture, infrastructure, and end user support Develop and maintain measurable KPIs to showcase IAM governance performance Analyse internal and external threats and recommend remediation actions based on IAM capability. Perform IAM audit / gap assessments of internal systems and processes and provide recommendations to mitigate the same Deliverables: PAM Audit compliance Dashboard, reporting Analysis, Identity Health Check & governance What you will love about working here We recognize the significance of flexible work arrangements to provide support. Be it remote work, or flexible work hours, you will get an environment to maintain healthy work life balance. At the heart of our mission is your career growth. Our array of career growth programs and diverse professions are crafted to support you in exploring a world of opportunities. Equip yourself with valuable certifications in the latest technologies such as Generative AI. Equal Opportunities at frog Frog and Capgemini Invent are Equal Opportunity Employers encouraging diversity in the workplace. All qualified applicants will receive consideration for employment without regard to race, national origin, gender identity/expression, age, religion, disability, sexual orientation, genetics, veteran status, marital status, or any other characteristic protected by law.
Posted 3 months ago
7 - 12 years
15 - 30 Lacs
Chennai, Pune, Bengaluru
Work from Office
Location: Pan India Role Description: The Privileged Access Management BA role is based within the Cyber Security Identity Access Management (IAM) PAM and Secrets Team. Key Responsibilities: Be responsible for maintaining, and uplifting IAM PAM control. Identify, investigate, and report potential Cybersecurity related exposures and recommend corrective action, maintaining SME support and/or ownership through to resolution. Work alongside the IDAM Control Owners to record, monitor, and publish MI / KCI reporting; dashboards; for the Cybersecurity management and other appropriate stakeholders. Stakeholder Engagement: Collaborate with business units and IT teams, to gather requirements and ensure smooth project execution. Provide regular updates to senior management and other stakeholders. Governance and Compliance: Experience of working in a regulated environment with exposure to global regulatory requirements, including GDPR, SOX, PCI DSS, and ISO 27001. Implement robust governance practices to manage risks and ensure compliance. Team Coordination and Leadership: Lead cross-functional teams, work alongside project managers, control owners, business analysts, and technical specialists. Foster collaboration and resolve conflicts to maintain project momentum. Proven track record of working with technical, cybersecurity and/or operations teams. Lead geographically disbursed team and pull them together to achieve common objectives. Excellent written and verbal communications Process Improvement: Continuously evaluate processes and propose enhancements to improve efficiency, scalability, and security. Develop and implement best practices for project delivery. Risk and Issue Management Identify, assess, and mitigate risks throughout the project lifecycle. Proactively manage issues and dependencies to avoid project delays. Documentation Project initiation, planning, execution, monitoring, and closure documentation including but not limit project charter, project plan, various status report, performance report and project closeout report. Experience: Knowledge & Experience of Identity & Access Management (IAM) Controls Technical background within security spaces- Privileged Access Management Extensive knowledge on managing compliance IAM Security Standards Able to understand Operating Effectiveness of IAM Secrets Controls, Identify Gaps and Remediate Manage & Govern KPIs / KCIs / KRIs Stakeholder Management Across all Lines of Defence Communication Skills for stakeholder collaboration on Standard Procedures and Best Practices Role relevant qualifications, i.e.CISSP/CISM is desirable but not essential Strong presentation and reporting skills.
Posted 3 months ago
2 - 4 years
4 - 6 Lacs
Pune
Work from Office
We are part of the Chief Security Office (CSO) responsible for providing technology application support for cyber and physical security platforms Our team provides an end-to-end follow the sun support service for multiple areas across Deutsche Bank Being at the forefront of supporting the applications the team members have high exposure to, and work with the front to back business teams on a daily basis within a fast-paced dynamic environment. Your key responsibilities Provide superior Level 2 app support for CSO Production Services across full spectrum of ITIL processes adhering to teams Key Operating Procedures (KOP), main focus being on stability. Diligently monitor incoming support tickets, e-mails, calls and chats, taking great care in responses and owning all items till resolution. Key focus on Knowledge and Training ensuring new and helpful information is continually captured, documented, and communicated benefiting the entire team. Gain detailed knowledge of all supported applications business/operations process flows, and an applications architecture and hardware configuration. Ensure timely delivery of key data feeds within SLAs. Consistently achieve maximum availability (up time) for critical application functionality. Understand Incident impact and urgency, putting together and delivering prompt detailed communications to key stakeholders on resolution progress. Managing Incident troubleshooting through to resolution, setting up and leading conference calls and group chats, escalating promptly where required pulling in all essential personnel. Conduct post-mortems of Incidents and track preventative measures through to implementation, ensuring lessons learnt are documented and adhered to going forward. Review Change Requests and understand their wider impact, ensuring all mandatory information is present and testing has been performed, and that suitable back out plans are in place. Put in place new and enhance existing monitoring using monitoring tools to proactively detect and alert to application issues. Work with Program managers and Engineering teams to onboard application support for new applications, estimating support work load and rolling out support services. Lead regular reviews of all open production issues with Engineering and Program teams and push for updates and resolutions to outstanding tasks and reoccurring issues. Mentor and guide L1 team members to develop and improve their capabilities. Approach support with a proactive attitude, working to proactively improve the environment before issues occur. Weekend coverage needs to be considered on a Rota basis. Your skills and experience 2-4+ years working experience in a financial institution providing IT support and dealing with business users Self-motivation and willingness to continual learn and improve both soft and technical skills Automation mindset, looking to continually reduce, automate, or eliminate all manual tasks and effort Getting things done in large organizations understanding of where to use processes and how to build and operate a network. "Change Agent", ability to obtain results through influence Work across countries, regions and time zones with a broad range of cultures and technical capability Good written and oral communication skills, including the ability to communicate technical information to a non-technical audience - Relationship management skills Experience working with virtual and global teams / Intercultural awareness Broad ITIL / best practice service context within a real time distributed environment (ITIL v3 foundation desired) Ability to manage ambiguity, risk, and changing direction of projects and strategies. Working experience in Cloud based platforms. Experience with using GCP, CyberArk, PAM, UNIX, Linux, Wintel, Python/Perl/Shell scripting, as well as ability to write SQL to extract data in Oracle/SQL Server databases. Experience (Recommended): Experience in IT in large corporate environments, specifically in the area of controlled production environments or in Financial Services Technology in a client-facing function Experience of end-to-end Level 2 production support and good overview of production support. Investment Banking Experience is preferable. Experience of run-book execution. Experience of supporting complex application and infrastructure domains IITIL / best practice service context Good analytical and problem solving skills Ability to work in virtual teams and in matrix structures Working knowledge of incident tracking tools (i.e. ServiceNow etc.) Working experience in Cloud based platforms. Must be hands on with technologies like UNIX (Linux/Solaris), Oracle SQL/ PL*SQL and will be required to login to the servers and perform troubleshooting issues. Understanding of application monitoring tools Education | Certification (Recommended): Bachelor Degree from an accredited college or university with a concentration in Computer Science or IT-related discipline (or equivalent work experience or diploma) ITIL Foundation Certificate
Posted 3 months ago
2 - 5 years
4 - 7 Lacs
Pune
Work from Office
We are part of the Chief Security Office (CSO) responsible for providing technology application support for cyber and physical security platforms Our team provides an end-to-end follow the sun support service for multiple areas across Deutsche Bank Being at the forefront of supporting the applications the team members have high exposure to, and work with the front to back business teams on a daily basis within a fast-paced dynamic environment. Your key responsibilities Provide superior Level 2 app support for CSO Production Services across full spectrum of ITIL processes adhering to teams Key Operating Procedures (KOP), main focus being on stability. Diligently monitor incoming support tickets, e-mails, calls and chats, taking great care in responses and owning all items till resolution. Key focus on Knowledge and Training ensuring new and helpful information is continually captured, documented, and communicated benefiting the entire team. Gain detailed knowledge of all supported applications business/operations process flows, and an applications architecture and hardware configuration. Ensure timely delivery of key data feeds within SLAs. Consistently achieve maximum availability (up time) for critical application functionality. Understand Incident impact and urgency, putting together and delivering prompt detailed communications to key stakeholders on resolution progress. Managing Incident troubleshooting through to resolution, setting up and leading conference calls and group chats, escalating promptly where required pulling in all essential personnel. Conduct post-mortems of Incidents and track preventative measures through to implementation, ensuring lessons learnt are documented and adhered to going forward. Review Change Requests and understand their wider impact, ensuring all mandatory information is present and testing has been performed, and that suitable back out plans are in place. Put in place new and enhance existing monitoring using monitoring tools to proactively detect and alert to application issues. Work with Program managers and Engineering teams to onboard application support for new applications, estimating support work load and rolling out support services. Lead regular reviews of all open production issues with Engineering and Program teams and push for updates and resolutions to outstanding tasks and reoccurring issues. Mentor and guide L1 team members to develop and improve their capabilities. Approach support with a proactive attitude, working to proactively improve the environment before issues occur. Weekend coverage needs to be considered on a Rota basis. Your skills and experience 2-4+ years working experience in a financial institution providing IT support and dealing with business users Self-motivation and willingness to continual learn and improve both soft and technical skills Automation mindset, looking to continually reduce, automate, or eliminate all manual tasks and effort Getting things done in large organizations understanding of where to use processes and how to build and operate a network. "Change Agent", ability to obtain results through influence Work across countries, regions and time zones with a broad range of cultures and technical capability Good written and oral communication skills, including the ability to communicate technical information to a non-technical audience - Relationship management skills Experience working with virtual and global teams / Intercultural awareness Broad ITIL / best practice service context within a real time distributed environment (ITIL v3 foundation desired) Ability to manage ambiguity, risk, and changing direction of projects and strategies. Working experience in Cloud based platforms. Experience with using GCP, CyberArk, PAM, UNIX, Linux, Wintel, Python/Perl/Shell scripting, as well as ability to write SQL to extract data in Oracle/SQL Server databases. Experience (Recommended): Experience in IT in large corporate environments, specifically in the area of controlled production environments or in Financial Services Technology in a client-facing function Experience of end-to-end Level 2 production support and good overview of production support. Investment Banking Experience is preferable. Experience of run-book execution. Experience of supporting complex application and infrastructure domains IITIL / best practice service context Good analytical and problem solving skills Ability to work in virtual teams and in matrix structures Working knowledge of incident tracking tools (i.e. ServiceNow etc.) Working experience in Cloud based platforms. Must be hands on with technologies like UNIX (Linux/Solaris), Oracle SQL/ PL*SQL and will be required to login to the servers and perform troubleshooting issues. Understanding of application monitoring tools Education | Certification (Recommended): Bachelor Degree from an accredited college or university with a concentration in Computer Science or IT-related discipline (or equivalent work experience or diploma) ITIL Foundation Certificate
Posted 3 months ago
5 - 10 years
7 - 12 Lacs
Bengaluru
Work from Office
Job Area: Information Technology Group, Information Technology Group > IT Engineering General Summary: Performs IT functions such as design, analysis, evaluation, testing, debugging and implementation of applications programs supporting company business processes and operations. Analyzes, installs, acquires, modifies and supports operating systems, database or utilities software. Plans, conducts and directs the analysis of business problems to be solved with automated systems. Analyzes, designs, acquires and implements projects for LAN and/or WAN systems. Plans, designs, acquires and implements telecommunications voice/wire systems. At higher job levels, may contribute to the development, testing, evaluation or design of system or infrastructure architecture used throughout the IT solution set. Minimum Qualifications: 3+ years of IT-related work experience with a Bachelor's degree. OR 5+ years of IT-related work experience without a Bachelors degree. Physical Requirements: Frequently transports and installs equipment up to 20 lbs. Privileged Access Management focusses on securing Privileged accounts across the company to protect our CCI information and heavily contributes to the IP Protection. PAM also helps to enforce Zero Trust security framework. This position supports the Privileged Access Management Capability in OneIT ISRM. Below are the job responsibilities, 1. Responsible for CyberArk/Hashicorp PAM installation/configuration, maintenance and monitor the PAM infra. 2. Collaborate with various internal and external teams to onboard privileged accounts and integrate with new applications. 3. Coordinate with vendor in troubleshooting issues and complete the new requirements. 4. Manage Vault Failover-Failback procedures and perform Disaster Recovery exercise. 5. Work with other support groups to resolve issues related to CyberArk PAM infrastructure 6. Vendor coordination, Application patch deployment and Application Stabilization7. Be part of a highly motivated Information Security team with a security-driven approach Min. Qualifications 1. Minimum 4 years of experience with CyberArk PAM-Self hosted tool / HashiCorp Vault. 2. Strong Knowledge on Privileged Access Management concepts. 3. Must be having Implementation and support experience of CyberArk PAM components such as CyberArk Vault, DR, CPM, PSM, PVWA,HTML5 GW, PTA. 4. Experience in onboarding and managing various types of privileged accounts such as Database, Cloud, Network accounts, etc 5. Scripting experience and knowledge of PowerShell; AutoIT is preferred. 6. Must be familiar with basics of Windows and Linux system administration. 7. Good to have CPM and PSM plugin development experience. 8. Strong knowledge of security principles, standards and techniques 9. Having knowledge on CyberArk secrets manager is a plus. 10. Having Scripting skils like Terraform,AutoIT, Powershell, Selenium is a plus. 11. Must be a good team player with strong analytical and communication skills 12. Excellent written and verbal communication skills required as well as analytical/problem solving ability. 13. Ability and desire to learn new skills quickly Applicants :Qualcomm is an equal opportunity employer. If you are an individual with a disability and need an accommodation during the application/hiring process, rest assured that Qualcomm is committed to providing an accessible process. You may e-mail disability-accomodations@qualcomm.com or call Qualcomm's toll-free number found here. Upon request, Qualcomm will provide reasonable accommodations to support individuals with disabilities to be able participate in the hiring process. Qualcomm is also committed to making our workplace accessible for individuals with disabilities. (Keep in mind that this email address is used to provide reasonable accommodations for individuals with disabilities. We will not respond here to requests for updates on applications or resume inquiries). Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law. To all Staffing and Recruiting Agencies :Our Careers Site is only for individuals seeking a job at Qualcomm. Staffing and recruiting agencies and individuals being represented by an agency are not authorized to use this site or to submit profiles, applications or resumes, and any such submissions will be considered unsolicited. Qualcomm does not accept unsolicited resumes or applications from agencies. Please do not forward resumes to our jobs alias, Qualcomm employees or any other company location. Qualcomm is not responsible for any fees related to unsolicited resumes/applications. If you would like more information about this role, please contact Qualcomm Careers.
Posted 3 months ago
7 - 12 years
17 - 32 Lacs
Chennai, Bengaluru, Hyderabad
Hybrid
Role & responsibilities Cyberark Implementation and developing PSM and CPM Plugins. Design, Develop and Integrate CyberArk Privilege Cloud or on-prem solution Work on CyberArk Privileged Cloud SaaS or on-prem platform. Work remotely and collaborate with teams across various locations HLD & LLD Documentation. CyberArk Upgrade & Migration to higher versions. Preferred candidate profile 7-12 years of total experience with 5+ years in Cyberark Development and implementation. Privileged Access Management tool technical certification and or hands-on experience in the tools CyberArk Conjur CyberArk Credential Manager Strong project management and communication skills. Experience on CyberArk Upgradation & Migration to higher version. Working with CyberArk version 14.x is good to have. Perks and benefits
Posted 3 months ago
18 - 22 years
50 - 100 Lacs
Bengaluru
Work from Office
Hiring, Head of Information Security Job Purpose The Head of Information Security is tasked with creating and sustaining the enterprise vision, strategy, and program to safeguard the integrity, availability, and confidentiality of the organization's information assets. This involves implementing and maintaining comprehensive security measures and practices. This leadership position includes overseeing the development and execution of a strong cybersecurity framework, leading a team of security professionals, and working collaboratively with other departments to mitigate risks. Roles and responsibilities Strategy & Governance Development and implement a comprehensive information security strategy aligned with the organization goals and leading industry practices. Establish and maintain information security policies, standards and procedures to ensure compliance with relevant regulations and frameworks. Manage budget for IT security related activities and initiatives, ensure ROI on the same. Establish IT security governance frameworks, policies and procedures to ensure integrity and availability of information assets. Security Architecture Design Oversee design and implementation of a robust and resilient security architecture including network security, infrastructure and information security, and application security. Evaluate and select appropriate security technologies, tools and vendors to protect the organizations information assets. Review and assess the security controls and configurations of existing systems and applications and provide recommendations for improvement. Collaborate with enterprise architects/ technology partners to ensure security is integrated into the design and development of new systems and applications. Security Operations & Incident response Oversee the day-to-day operations of the organizations security infrastructure and develop incident response plans to address and mitigate security incidents effectively. Drive regular security, risk & vulnerability assessments to identify vulnerabilities and weaknesses in the organizations systems and infrastructure. Manage and resolve security incidents and lead incident response efforts, including investigations, containment, eradication and recovery in case of cyber attack Security incident & Threat Intelligence Stay updated on the latest security threats, vulnerabilities, and industry trends through continuous benchmarking and research. Proactively identify emerging threats and vulnerabilities and develop strategies to mitigate their impact. Collaborate with internal and external stakeholders to conduct penetration testing, vulnerability assessment and security audits. Develop standard operating procedures for incident response during ransomware attacks Vendor & Third-Party Risk Management Assess and manage security risks associated with third-party vendors and service providers. Provide input during vendor evaluation and selection based on their security capabilities and compliances with security standards. Compliance & Regulatory Requirements Ensure organization’s compliance with relevant laws, regulations and industry standards pertaining to information security. Monitor and interpret changes in security regulations and standards and assess their impact on the IT landscape. Lead and coordinate audits, assessments and certification processes related to information security. Collaboration Work closely with IT, legal, compliance, and business units to integrate security practices into daily operations. Act as the primary point of contact for security-related matters with external partners, vendors, and regulatory bodies Security awareness and Training Collaborate with learning & development team to implement security awareness and training programs about information security risks, leading practices and policies. Conduct regular security awareness campaigns, monitor and evaluate the effectiveness of security awareness efforts. Conduct Cyber War game drills with business users to enhance preparedness for handling ransomware attacks. People Management Provide direction and guidance to the team and foster a collaborative and high-performance environment. Qualification and Experience : A post-graduate or bachelor's degree in engineering with 18-22 years of work experience, including 7-10 years in leading a cybersecurity organization, is required. The role demands extensive experience in identifying and mitigating information & cyber security risks and a comprehensive understanding of regulatory requirements. Professional security certifications like CISA, CISSP, CISM, ISO 27001:2013 LA, etc., are highly desirable. Familiarity with security technologies is crucial, including firewalls, network access control, IDAM & ITDR, EDR, secure web gateways, email security gateways, data leak prevention (DLP), MFA, WAF, DDoS, PAM, SIEM & SOAR, and micro-segmentation. Other Skills: Excellent Communication, Presentation & inter-personal Skills Should possess knowledge of various Security Solutions (Endpoint Protection, Advanced Threat Protection, Data Leak Prevention), Network Security, Databases, OS, etc. Knowledge of the industry's standards and regulations in the Healthcare or Pharma industry is preferred.
Posted 3 months ago
1 - 6 years
1 - 4 Lacs
Chennai
Work from Office
Roles and Responsibilities Manage premium acquisition for retail liabilities products such as Current Account, Saving Account, and CASA. Identify new business opportunities through various channels (Bancassurance, Agency, Direct) to drive revenue growth. Develop strong relationships with existing customers to increase cross-selling potential and customer satisfaction. Collaborate with internal teams to resolve customer queries and issues related to product offerings. Analyze market trends and competitor activity to stay ahead in the competitive landscape. Desired Candidate Profile 1-6 years of experience in sales or business development role within banking industry. Strong understanding of retail liabilities products including Current Account, Saving Account, CASA etc. . Excellent communication skills with ability to build rapport with customers at all levels. Ability to work independently with minimal supervision while meeting targets set by management. Immediate Joiners are Preferred For more details Contact: Sravani Talent acquisition HR 72079 68297 saisravani.t@vipanyglobal.com
Posted 3 months ago
3 - 8 years
7 - 13 Lacs
Pune, Bengaluru
Work from Office
Greetings from Teamware Solutions a division of Quantum Leap Consulting Pvt. Ltd We are hiring a Centrify Admin Work Mode: 24/7 Rotational Shifts and 5 days working from an office. (Shift allowance will be provided) Locations: Bengaluru, Pune Experience: 2 -7 Years Notice Period: Immediate to currently serving and 30-35 days max only. Job Title: KGS Cyber MSS (IDM Team)- Consultant Educational qualifications •Graduation degree in any stream or equivalent / post-graduation degree/diploma, Certification in any IAM product would be an added advantage. Work experience •We are looking for a of IAM resource with 3+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts The ideal candidate will: •At least 36 months of Privileged Access Management domain experience with expertise in Centrify as the primary skill and Conjur administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: •36 months of experience in Centrify product Centrify Administration: Serve as the primary administrator for Centrify, overseeing the deployment, configuration, and maintenance of the Centrify environment. Manage privileged access and ensure secure authentication and authorization using Centrifys tools and solutions. Perform regular system checks, monitor performance, and ensure the high availability and reliability of Centrify services. Troubleshoot and resolve issues related to the Centrify infrastructure, including connectivity, policy enforcement, and access issues. Implement Centrify best practices and ensure compliance with organizational security policies and standards. Conjur Administration: Act as the secondary support for Conjur administration, including the installation, configuration, and maintenance of the Conjur environment. Manage secrets within Conjur, ensuring their protection and appropriate access control. Support daily operations, monitoring, and health checks of the Conjur system to ensure it is running optimally. Assist in troubleshooting and resolving Conjur-related issues and work collaboratively with other teams to integrate Conjur with other systems. Support and Troubleshooting: Serve as the Level 2 support contact for Centrify and Conjur-related issues, addressing escalations from Level 1 support and involving Level 3 support when necessary. Respond to and resolve support tickets, incidents, and requests efficiently, ensuring thorough documentation of issues and solutions. Conduct root cause analysis for recurring issues and recommend improvements to enhance system reliability and performance. Please let me know if you are interested in this position and send me the resumes to netra.s@twsol.com
Posted 3 months ago
4 - 8 years
0 - 3 Lacs
Bengaluru
Work from Office
Roles and Responsibilities Job Role: Consultant Cloud Operations Experience: 4-8 Years Design and plan a cloud solution architecture. Implement and monitor cloud infrastructure. Understand the requirements from project team and prepare estimate. Managing cloud infrastructure in accordance with company security guidelines. Hands-on experience using compute, networking, storage, database, and analytics services in GCP, Azure and AWS. Knowledge of recommended best practices for building secure and reliable applications on the cloud platform. Knowledge of technology solutions and ability to learn and work with emerging technologies, methodologies, and solutions in the Cloud/IT technology space. Define and document best practices and strategies regarding deployment and infrastructure maintenance. Troubleshoot incidents, identify root cause, fix, and document problems, and implement preventive measures. Certification in any of the cloud platforms Azure, GCP or AWS is preferred. Need to work on cloud cost optimization. Proficiency knowledge on Linux (Red Hat & Ubuntu). Basic knowledge on automation tools such as Terraform, Ansible and PowerShell scripting. Key Competencies: 1. Azure VNet, Analytical tools (Databricks, Data factory etc.) 2. Azure DevOps 3. Infrastructure Automation tools ( Preferred : Terraform) 4. Database (MSSQL, MYSQL and etc) 5. Linux knowledge – Mandatory 6. Kubernetes (Containerization) 7. Basic PowerShell and scripting knowledge 8. Basic networking (DNS, DHCP, Firewall, WAF) 9. Azure IAM/PIM/PAM 10. Basic knowledge on other Cloud platforms (AWS and GCP) 11. Cost Management
Posted 3 months ago
2 - 4 years
5 - 6 Lacs
Nasik, Pune, Nagpur
Work from Office
Minimum experience of 2 years on any PAM solution like Arcon, Delinea, BeyondTrust, CyberArk, Sectona. Hands on experience in troubleshooting PAM issues. Handson or atleast Knowledge in deployment of any PAM solution. Handson or atleast knowledge in integration with AD, SIEM, MFA Ticketing tool. Handson for Onboarding Windows Linux assets in any PAM solution. Handson or atleast knowledge Onboarding DB Applications in any PAM solution.
Posted 3 months ago
5 - 10 years
3 - 8 Lacs
Devanahalli, Bengaluru
Work from Office
Role & responsibilities: Outline the day-to-day responsibilities for this role. Preferred candidate profile: Specify required role expertise, previous job experience, or relevant certifications. Perks and benefits: Mention available facilities and benefits the company is offering with this job.
Posted 3 months ago
7 - 12 years
13 - 22 Lacs
India, Hyderabad
Hybrid
Department: G&A Operations Employment Type: Full Time Location: India Reporting To: Shibanarayan Behera Description At Vitech, we believe in the power of technology to simplify complex business processes. Our mission is to bring better software solutions to market, addressing the intricacies of the insurance and retirement industries. We combine deep domain expertise with the latest technological advancements to deliver innovative, user-centric solutions that future-proof and empower our clients to thrive in an ever-changing landscape. With over 1,600 talented professionals on our team, our innovative solutions are recognized by industry leaders like Gartner, Celent, Aite-Novarica, and ISG. We offer a competitive compensation package along with comprehensive benefits that support your health, well-being, and financial security. Title: I AM & PAM Lead (Identity and Access Management & Privileged Access Management Lead) Location: Hyderabad (Hybrid Role) 3 Days in office Department: Information Security Reports To: Security G&A Manager The IAM & PAM Lead is a critical role responsible for the overall strategy, implementation, and management of the organization's combined Identity and Access Management (IAM) and Privileged Access Management (PAM) program. This role requires deep technical expertise in both IAM and PAM solutions, strong leadership skills, and a solid understanding of security best practices. The IAM & PAM Lead will ensuring secure and controlled access to all organizational resources, including privileged accounts. What you will do: Develop and maintain the organization's integrated IAM and PAM strategy, roadmap, and implementation plan, aligning it with business objectives and security best practices. This includes defining the future state of identity and access management and planning for its evolution. Oversee the selection, implementation, configuration, and ongoing management of IAM and PAM solutions, including identity governance, access management, directory services, multi-factor authentication (MFA), privileged access management, credential vaulting, session recording, and just-in-time access. Develop, implement, and enforce IAM and PAM policies, procedures, and standards to ensure consistent and secure access to all organizational resources, including privileged accounts. Manage the entire identity lifecycle, from onboarding to offboarding, for all users, including privileged users, encompassing provisioning, deprovisioning, and access certifications. Oversee the access control and governance processes for all accounts, ensuring appropriate access rights are granted, regularly reviewed, and aligned with the principle of least privilege. Implement and manage strong authentication and authorization mechanisms, including MFA, single sign-on (SSO), role-based access control (RBAC), and attribute-based access control (ABAC) for both standard and privileged users. Manage and maintain directory services (e.g., Active Directory, LDAP) to ensure accurate and up-to-date user and privileged account information. Implement and manage privileged credential vaulting and rotation. Control and monitor privileged sessions, including recording and auditing. Implement just-in-time (JIT) privileged access. Manage break-glass procedures for emergency access. Collaborate with vulnerability management teams to identify and remediate vulnerabilities related to IAM and PAM systems and processes. Participate in incident response activities related to identity and access, including investigating security incidents and implementing corrective actions. Develop and deliver training programs to educate users and administrators on IAM and PAM best practices and security policies. Ensure compliance with relevant regulations and industry standards related to identity and access, including those specific to privileged access, and support internal and external audits. Develop and maintain key performance indicators (KPIs) and metrics to track the effectiveness of the IAM and PAM program and provide regular reports to management. Foster a culture of collaboration and continuous improvement. Stay up-to-date with the latest IAM and PAM technologies, threats, and best practices, and continuously improve the organization's integrated IAM and PAM program. What We're Looking For: Bachelor's degree in Computer Science, Information Security, or a related field. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are highly desirable. Minimum of 7-10 years of experience in Information Security, with Minimum 4+ Years in Identity and Access Management and 2+ Years on Privileged Access Management. Experience leading IAM and PAM implementations and managing combined IAM/PAM teams is essential. Technical Skills: Deep understanding of IAM and PAM concepts, technologies, and best practices. Hands-on experience with leading IAM and PAM solutions (e.g., SailPoint, CyberArk, Delinea, Thycotic). Strong knowledge of directory services (e.g., Active Directory, LDAP). Experience with MFA, SSO, federation technologies, credential vaulting, and session recording. Familiarity with scripting languages (e.g., PowerShell, Python) is a plus. Knowledge of cloud security best practices related to IAM and PAM. Soft Skills: Excellent leadership, communication, and interpersonal skills. Strong analytical and problem-solving skills. Ability to work effectively in a team environment. Ability to communicate technical concepts to non-technical audiences. Strong organizational and time management skills. Join Us at Vitech! At Vitech, we believe in the power of technology to simplify complex business processes and enable innovation. As a trusted partner to some of the world’s most prestigious organizations, we are committed to delivering cutting-edge solutions in security and compliance. When you join us, you’ll be part of a collaborative, forward-thinking team that values: Innovation : Push the boundaries of what’s possible in compliance and risk management. Impact : Your expertise will directly influence the security and trustworthiness of our organization. Growth : With continuous learning opportunities and challenging projects, your professional development is a priority. Recognition : We celebrate excellence and reward contributions that drive meaningful outcomes.
Posted 3 months ago
7 - 10 years
12 - 17 Lacs
Chennai, Pune, Delhi
Work from Office
The IAM & PAM Lead is a critical role responsible for the overall strategy, implementation, and management of the organization's combined Identity and Access Management (IAM) and Privileged Access Management (PAM) program. This role requires deep technical expertise in both IAM and PAM solutions, strong leadership skills, and a solid understanding of security best practices. The IAM & PAM Lead will ensuring secure and controlled access to all organizational resources, including privileged accounts. What you will do: Develop and maintain the organization's integrated IAM and PAM strategy, roadmap, and implementation plan, aligning it with business objectives and security best practices. This includes defining the future state of identity and access management and planning for its evolution. Oversee the selection, implementation, configuration, and ongoing management of IAM and PAM solutions, including identity governance, access management, directory services, multi-factor authentication (MFA), privileged access management, credential vaulting, session recording, and just-in-time access. Develop, implement, and enforce IAM and PAM policies, procedures, and standards to ensure consistent and secure access to all organizational resources, including privileged accounts. Manage the entire identity lifecycle, from onboarding to offboarding, for all users, including privileged users, encompassing provisioning, deprovisioning, and access certifications. Oversee the access control and governance processes for all accounts, ensuring appropriate access rights are granted, regularly reviewed, and aligned with the principle of least privilege. Implement and manage strong authentication and authorization mechanisms, including MFA, single sign-on (SSO), role-based access control (RBAC), and attribute-based access control (ABAC) for both standard and privileged users. Manage and maintain directory services (e.g., Active Directory, LDAP) to ensure accurate and up-to-date user and privileged account information. Implement and manage privileged credential vaulting and rotation. Control and monitor privileged sessions, including recording and auditing. Implement just-in-time (JIT) privileged access. Manage break-glass procedures for emergency access. Collaborate with vulnerability management teams to identify and remediate vulnerabilities related to IAM and PAM systems and processes. Participate in incident response activities related to identity and access, including investigating security incidents and implementing corrective actions. Develop and deliver training programs to educate users and administrators on IAM and PAM best practices and security policies. Ensure compliance with relevant regulations and industry standards related to identity and access, including those specific to privileged access, and support internal and external audits. Develop and maintain key performance indicators (KPIs) and metrics to track the effectiveness of the IAM and PAM program and provide regular reports to management. Foster a culture of collaboration and continuous improvement. Stay up-to-date with the latest IAM and PAM technologies, threats, and best practices, and continuously improve the organization's integrated IAM and PAM program. What We're Looking For: Bachelor's degree in Computer Science, Information Security, or a related field. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are highly desirable. Minimum of 7-10 years of experience in Information Security, with Minimum 4+ Years in Identity and Access Management and 2+ Years on Privileged Access Management. Experience leading IAM and PAM implementations and managing combined IAM/PAM teams is essential. Technical Skills: Deep understanding of IAM and PAM concepts, technologies, and best practices. Hands-on experience with leading IAM and PAM solutions (e.g., SailPoint, CyberArk, Delinea, Thycotic). Strong knowledge of directory services (e.g., Active Directory, LDAP). Experience with MFA, SSO, federation technologies, credential vaulting, and session recording. Familiarity with scripting languages (e.g., PowerShell, Python) is a plus. Knowledge of cloud security best practices related to IAM and PAM. Soft Skills: Excellent leadership, communication, and interpersonal skills. Strong analytical and problem-solving skills. Ability to work effectively in a team environment. Ability to communicate technical concepts to non-technical audiences. Strong organizational and time management skills.
Posted 3 months ago
2 - 6 years
2 - 4 Lacs
Hyderabad
Work from Office
Role & responsibilities- Openings for Premium Acquisition Manager Preferred candidate profile To acquire new to Bank Clients in the High net worth segment and reference generation from the specified catchment Focus on NTB /Acquisition/Sales of HNI/UltraHNI/NRI Clients To achieve daily/weekly/monthly customer acquisition target Build and deepen relationships with existing Wealth Customers to achieve increase in share of wallet and revenues. Provide professional customer service to achieve a high percentage of customer satisfaction and retention. Ensure ongoing self-development. Manage the key performance indicators at the highest level. Have complete knowledge of the customer base in terms of the profile, demographics & psychographics and assets in the Bank and in other places. Interested candidates can share profile their profiles to mamatha.krishna@indusind.com
Posted 3 months ago
15 - 24 years
45 - 50 Lacs
Bengaluru
Work from Office
About the role: The IT Identity and Access Manager is responsible for safeguarding sensitive company data and systems by managing user identities, access permissions, and security protocols. Key Qualifications Minimum 15+ years of experience in Identity and access Management Minimum 5+ years of Experience in managing the IDAM platform for a global organization in the leadership role Experience in designing, implementing, and operating IDAM and PAM solutions within enterprise environments. Extensive knowledge of IDAM technologies such as IGA, RBAC, PAM, SSO, IDP and directory services Strong knowledge of security frameworks and security concepts such as defence-in-depth techniques, threat vectors, common exploits Knowledge of cybersecurity compliance frameworks such as CIS Controls, NIST, ISO 27001, GDPR, SOC2 Type2 Functional understanding of networking protocols, cloud, and server administration Knowledge of the network security, end point security, Cyber Threat, SOC and vulnerability management Demonstrate commitment to high standards of ethics and values, regulatory compliance, and business integrity. Excellent management and communication skills to drive growth of the team and individuals Strong decision-making, problem-solving abilities, and leadership abilities to manage multiple, often conflicting priorities to successful completion Industry standard security certifications like CISSP, CISA or CISM is a plus.
Posted 3 months ago
3 - 6 years
3 - 7 Lacs
Bengaluru
Work from Office
Project Role : Application Support Engineer Project Role Description : Act as software detectives, provide a dynamic service identifying and solving issues within multiple components of critical business systems. Must have skills : Red Hat OS Administration, Design, build and configure ap Good to have skills : SUSE Linux Administration, Microsoft Azure IaaS, AWS Architecture, Google cloud Platform Minimum 3 year(s) of experience is required Educational Qualification : 15 Years of full time education Role Description:Manage the cloud infrastructure environment through cross technology administration (OS, virtual networks, Security, Monitoring and Backup), Development and execution of script and automations. Manage the environment incidents with a focus on service restoration. Act as operations support for all AWS hosted Virtual Machines, PaaS services, network, storage and security.Job Requirements:Minimum 4 years of experience in RedHat, SUSE and AWSKey Responsibilities:-Provide L2/L3 support on Linux (RHEL & SUSE) servers hosted on AWS infrastructure.-Installation, Configuration and administration of SLES 12 for SAP Applications and RHEL servers.-Cluster configuration, management and troubleshooting.-Performance tuning and storage optimization.-SUSE/RHEL OS upgrade, RedHat satellite server or SUSE manger configuration and administration. -Licensing knowledge and good understanding of patch and package management. -Incident and Change management, Health and performance Monitoring - Check server health, performance and capacity alerts, take preventive and remedial action.-Design, build and configure AWS Services to meet business process and application requirements. -Execution and documentation of infrastructure changes and preparing work instructions.-Reporting and participating in governance and audit activities. Technical Experience:-Experience in operating system level troubleshooting, resolving system boot issues, Kernel bugs and server log analysis. -Experience in regular operating system Patching and vulnerability remediations. -Experience in Linux System hardening and Non-Compliance remediation. -Clustering knowledge on Linux / SUSE GPFS or HA configuration. Knowledge of SAP HANA appliances is added advantage. -Hands on Experience in Samba, CIFS, LDAP, PAM, SSSD, user authentication using username/password pair, Kerberos, certificates or a combination of methods.-sshd, Openssl, Squid proxy, NGINIX, Antivirus, Syslog, VSFTP, NTP, Bash scripting, -Hands on experience in filesystem configuration with RAID and LVM. -Hands on experience on EC2, EBS, NSG, VPC, S3, ASG, ELB, Route53, CloudWatch, CloudFormation. -Knowledge on Ticketing tools preferably Service Now. Professional Attributes:Good analytical and troubleshooting skills with the ability to think logically through a problem. Must have the initiative, tenacity and commitment to see problems through to resolution, Ability to work in shift patterns and provide out of hours On-Call support. collaborate with other team members to develop automation strategies and deployment processes.Education Qualification:GraduateMandatory Certification:RHEL or SUSE,Optional Certification: ITIL, AWS, Virtualization, Networking, Azure, Microsoft or any other Qualification 15 Years of full time education
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2