Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 7.0 years
0 Lacs
hyderabad, telangana
On-site
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. We're looking for a Consultant in the Cyber Team to work in IAM Operations support. The candidate should have experience with PAM Technologies such as CyberArk, AWS Secrets Manager, Azure Key Vault and possess strong troubleshooting skills. This role requires the candidate to work out of the office for all working days as an in-office requirement and be willing to work in a 24X7 rotational shift model, based in the Hyderabad office for all 5 days. Key Requirements: - Performs identity and access provisioning, authentication, and oversight activities adhering to established guidelines and internal policies. - Assumes ownership of operational issues and/or process defects that have resulted in the disruption of access to understand both root cause and resolve the underlying issue. - Creates and maintains all related standards and procedural documentation, supporting end-to-end process assessments, future-state process ideation sessions, and access control redesigns. - Provides advanced level technical support for issues related to technology, platforms, environments, or access administration. - Leverages key metrics and business data to drive continuous process improvement, enhance the end-user experience, increase technology value, and improve IAM's overall security posture. - Has awareness of all control-related activities and effectively performs necessary attestations both accurately and timely. - Experience with PAM technologies like CyberArk, AWS Secrets Manager, Azure Key Vault. - Experience with PAM lifecycle processes including Discovery, vaulting, password management, secrets management. - Experience managing privileged accounts in platforms such as AWS, Azure, GCP, Windows, Linux, Mainframes, Databases. Minimum Qualifications: - B. Tech./ B.E./MCA/Computer Science Degrees with sound technical skills. - Strong command of verbal and written English language. - Good soft skills including verbal & written communication, technical document writing, etc. - Understanding of IAM/IGA/SSO/PAM concepts. Work Requirements: - Should be willing to work out of the office for all working days as this is an in-office requirement. - Should be willing to work in a 24X7 rotational shift model. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people, and society, and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate. Working across assurance, consulting, law, strategy, tax, and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.,
Posted 1 day ago
1.0 - 3.0 years
2 - 2 Lacs
Chennai
Work from Office
Responsibilities: * Digital Asset Guardianship * Web & Infrastructure Management * Ensure system security & compliance * Social Media & Online Presence * Subscription & Asset Oversight * Proactive Security & Backups * Manage Digital Assets Health insurance Annual bonus
Posted 3 days ago
1.0 - 3.0 years
3 - 5 Lacs
Hyderabad
Work from Office
Job Description Seeking a motivated and technically skilled First Level Help Desk Technician to provide front-line support for end-users across the organization. The candidate will be responsible for diagnosing and resolving issues related to Windows operating systems, laptops, basic networking, and software installation. The role also includes handling support tickets, remote troubleshooting, and escalating issues as needed. Responsibilities Serve as the first point of contact for end-users seeking technical support via phone, email, or ticketing system. Troubleshoot and resolve hardware and software issues on Windows laptops and desktops. Support software installations, upgrades, and basic configuration using remote desktop tools. Perform basic network troubleshooting, including issues with connectivity, VPN, DNS, and Wi-Fi. Use remote access tools (e.g., AnyDesk, TeamViewer, RDP) to assist users with technical issues. Log, categorize, prioritize, and assign tickets within the IT ticketing system. Escalate unresolved problems to higher-level support as per escalation matrix. Document all support interactions, resolutions, and troubleshooting steps accurately. Support user onboarding/offboarding, including laptop setup, user account provisioning, and basic access rights. Adhere to internal SLAs and follow IT service management best practices. Participate in rotational shifts , including coverage for weekends and holidays if required. Essential Skills Job Windows OS and hardware/software troubleshooting Networking fundamentals (IP, DNS, DHCP, VPN) Remote support tools and ticketing systems Software installation and system configuration Documentation and ticket updates Prioritizing multiple technical issues under pressure Personal Ability to clearly explain technical issues to non-technical users. Analytical thinker who can troubleshoot under time pressure and find effective solutions. Able to handle multiple tasks, prioritize tickets, and meet SLAs Flexible and able to adjust to new technologies, processes, or shift schedules. Takes ownership of tasks, follows through, and ensures timely resolution of issues. Preferred Skills Job Troubleshooting Outlook, OneDrive, Teams, SharePoint, etc Basic troubleshooting for iOS and Android in a corporate environment. Familiarity with tools like Windows Defender Handling common issues related to printers User account creation, password resets, and group membership changes. Personal Clear verbal and written skills to explain issues and solutions Accurately logs tickets, documents solutions, and avoids mistakes. Adjusts easily to new technologies, changes in processes, or shift schedules Eager to learn and grow with evolving IT tools and environments. Maintains a positive and composed attitude even in high-pressure situations.
Posted 4 days ago
3.0 - 7.0 years
0 Lacs
haryana
On-site
As a Security Engineer at Expedia Group, you will be part of the Security Solutions Engineering team responsible for designing and implementing critical security systems and services. Your role will involve working on key initiatives from conceptualization to deployment, requiring a deep understanding of complex technical environments and the ability to develop effective security solutions. Your responsibilities will include: - Implementing Endpoint Detection and Response (EDR) solutions such as Anti-malware Agents and Data Loss Prevention - Managing Web Content Filtering for seamless Internet protection using on-premise and cloud-based web proxies - Overseeing Vulnerability Management for DC and cloud assets, including patching and compliance - Utilizing Threat Intelligence feeds from sources like Recorded Future - Conducting Threat detection through User Behavior Analysis and investigation - Integrating SIEM & SOAR solutions and managing Container security - Implementing Network security measures including Web Application Firewall, Intrusion Prevention, and Anti-malware detection - Maintaining, monitoring, and enhancing systems and security posture with a focus on service excellence - Collaborating with cross-functional teams to solve complex problems and influence engineering practices To qualify for this role, you should have: - A Bachelor's or Master's degree in a Technical field or equivalent professional experience - At least 3 years of experience in security engineering and operations support in a mission-critical environment - Hands-on experience with AWS Cloud services and security - Proficiency in various security technologies such as Web Content Filtering, Web Application Firewalls, Intrusion Detection Systems, and SIEM - Strong analytical skills and the ability to correlate and analyze security-related data - Programming experience in languages like Java, Python, Perl, or C++ - Excellent organizational and communication skills - A proactive and innovation-driven mindset with the ability to thrive in a fast-paced environment If you require any accommodations during the application process, please contact our Recruiting Accommodations Team. Join us at Expedia Group and be part of a diverse and inclusive community that values your contribution to shaping the future of travel.,
Posted 1 week ago
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do: Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk Experience : 5-8 Years.
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.: Experience: 5-8 Years.
Posted 2 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.: Experience: 3-5 Years.
Posted 2 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.: Experience: 3-5 Years.
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years.
Posted 2 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years.
Posted 2 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years. >
Posted 2 weeks ago
1.0 - 6.0 years
3 - 4 Lacs
Bengaluru
Work from Office
Were hiring an IT System Admin/Support Manager with 15+ yrs exp. Must have M365 admin skills; bonus if certified in Fortinet, CISM, ITIL, CISSP. Hands-on with firewall, backups, SEO, digital tools, and full-stack IT support.
Posted 2 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: : Privilege Password Management CyberArk Experience: 5-8 Years
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: : Privilege Password Management CyberArk Experience: 5-8 Years
Posted 3 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 3-5 Years.
Posted 3 weeks ago
10.0 - 14.0 years
0 Lacs
pune, maharashtra
On-site
As a seasoned PAM (Privileged Access Management) expert with over 10-12 years of experience, you will be responsible for designing and configuring various PAM use cases to enhance the security and efficiency of the organization. Your primary tasks will include setting up PSM (Privileged Session Management) and CPM (Credentials Provider Management), including the establishment of secure tunnels for Active Directory. You will also play a crucial role in onboarding privileged accounts for both Windows and Linux platforms, ensuring a seamless and secure process. Your deep understanding of privileged accounts in Windows and Linux environments will be instrumental in implementing effective PAM solutions. Collaborating with cross-functional teams will be essential to integrate privileged access management solutions successfully. Additionally, your expertise in running DNA scans and analyzing the results will contribute to the continuous improvement of security measures within the organization. To excel in this role, you must demonstrate proficiency in designing and configuring PAM use cases, particularly focusing on password management, session recording, workflow, and safe assignment. Your knowledge and hands-on experience in setting up PSM and CPM, specifically in the context of Active Directory security tunnel setup, will be valuable assets. Strong communication skills are vital for effective collaboration with team members and stakeholders to ensure the successful implementation of PAM solutions.,
Posted 3 weeks ago
3.0 - 8.0 years
4 - 8 Lacs
Bengaluru
Work from Office
About The Role Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Ping Identity Good to have skills : Microsoft Active DirectoryMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Project Role :Security Senior Analyst Project Role Description :Access management SME, responsible for overseeing the implementation, operations and delivery of Access Management (SSO and MFA) projects Must have skills :Ping Identity Good to have skills :Radiant Logic VDS, Entrust Password managementMinimum 3 year(s) of experience is required Educational Qualification :15 years full time education Summary :As an Access management SME, you will be responsible for overseeing the implementation, operations and delivery of Access Management (SSO and MFA) projects. A typical day involves coordinating with various teams, ensuring that projects are on track, and leveraging global delivery capabilities to enhance service quality. You will engage with stakeholders to understand their needs and provide effective solutions, while also mentoring team members to foster a collaborative environment. Your role will require you to adapt to changing project requirements and maintain a focus on delivering exceptional security services to clients. Roles & Responsibilities:- Expected to be an SME.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team skills and knowledge.- Monitor SLA/KPI's and ensure to take adequate measures to meet the delivery timelines.- Provide expert troubleshooting and resolution of issues related to Access Management Operations.- Proactively troubleshoot and support existing applications integrated within SSO and MFA.- Champion continuous improvement initiatives to enhance efficiency, reduce risk, and promote automation within the IAM domain. Professional & Technical Skills: - Must Have Skills: Proficiency in Ping Suite of Products primarily Ping Federate, PingID, PingRisk, Ping Da Vinci- Design, develop, and implement access management solutions using Ping Identity products such as PingFederate, Ping One and PingDirectory.- Well versed with SSO protocols such as SAML, OAuth, OIDC etc.- Well versed with application onboarding for enabling SSO through Ping Federate or PingAccess- Strong understanding of Access management solutions like SSO, MFA, Password management, Federation etc.- Strong understanding of LDAP solutions like Active Directory, Radiant Logic VDS, Password management, Federation etc.- Familiarity with security frameworks and best practices.- Ability to analyze and resolve complex security issues.- Proven expertise with PowerShell, Java, XML, SQL, LDAP, REST APIs, and SCIM.- Solid understanding of IAM best practices, implementation methodologies, and industry standards.- Hands-on experience working with Active Directory, LDAP, and other data sources.-Leads the implementation, operations and delivery of Access Management (SSO and MFA) projects, leveraging our global delivery capability (method, tools, training, assets). -Exp in Ping Federate, Ping Access, PingID, PingRisk, Entrust Password management Additional Information:- The candidate should have a minimum of 3 years of experience in Ping Identity Suite of Products.- This position is based out of Accenture office across India.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
5.0 - 8.0 years
8 - 12 Lacs
Hyderabad
Work from Office
Be responsible for maintaining, and uplifting IAM PAM control Collaborate with business units and IT teams, to gather requirements and ensure smooth project execution. Experience of working in a regulated environment with exposure to global regulatory requirements, including GDPR, SOX, PCI DSS, and ISO 27001. Lead cross-functional teams, work alongside project managers, control owners, business analysts, and technical specialists. Foster collaboration and resolve conflicts to maintain project momentum. Continuously evaluate processes and propose enhancements to improve efficiency, scalability, and security.. Identify, assess, and mitigate risks throughout the project lifecycle. Project initiation, planning, execution, monitoring, and closure documentation including but not limit project charter, project plan, various status report, performance report and project closeout report. Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years.
Posted 3 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Coimbatore
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.
Posted 3 weeks ago
5.0 - 10.0 years
7 - 10 Lacs
Bengaluru
Hybrid
Person should be at least 4 to 5 years of Experience into CyberArk.Person must have hands on experience in below concepts 1.Onboarding of Accounts. 2.Offboarding of Accounts 3.Reports generation and preparation 4.Safe creation and access provision 5.Platform duplication and customization.Strong problem solving skills(Password management and session management issues)Person should know about master policy and how it works.person must have knowledge on DR drill process in CyberArk environment.Person should know how to install and upgrade our CyberArk Components((EPV,PVWA,CPM,PSM,PSMP, etc) Preferred Knowledge/experience on vulnerability management and ITGC controls
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience3-5 Years.
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years.
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience3-5 Years.
Posted 1 month ago
8.0 - 10.0 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough