Jobs
Interviews

56 Password Management Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 7.0 years

0 Lacs

bengaluru, karnataka, india

Remote

Job Description Who we are looking for: Strong understanding of how to implement concepts such as password less authentication, zero trust model, SASE, etc. Strong technical skills and experience in architecting and implementing at least one or more solutions such as SailPoint IIQ, SailPoint IdentityNow, One Identity, IBM IGI, Saviynt, ForgeRock, Okta, Microsoft Entra ID, Ping Identity, etc. Strong technical skills and experience in architecting and implementing at least one or more PAM solutions such as Beyond Trust PasswordSafe, Beyond Trust Privileged Remote Access, CyberArk, CyberArk Secrets Manager, Delinea, etc. What you will be responsible for: 5+ Years of IT experience with minimum 4 years experience with CA PAM Privileged Access Management (PAM) Architecture, Design and Server onboarding. Strong working knowledge of CA PAM core architecture, vault management, password management, policy management, integrating Servers, application password management using CA PAM Experience of CA PAM solution architecture, solution build, deployment, and ongoing Server onboarding process Should have deep knowledge of CA PAM deployment in DR environment and experience of onboarding. Excellent communication and presentation skills Participate in security incident response activities related to privileged access. Investigate security incidents involving privileged accounts, coordinate response efforts, and implement necessary remediation measures. Develop and maintain PAM policies, standards, and procedures. Stay up to date with evolving PAM technologies, industry trends, and regulatory requirements related to privileged access. Why this role is important to us Our technology function, Global Technology Services (GTS), is vital to State Street and is the key enabler for our business to deliver data and insights to our clients. We're driving the company's digital transformation and expanding business capabilities using industry best practices and advanced technologies such as cloud, artificial intelligence and robotics process automation. We offer a collaborative environment where technology skills and innovation are valued in a global organization. We're looking for top technical talent to join our team and deliver creative technology solutions that help us become an end-to-end, next-generation financial services company. Join us if you want to grow your technical skills, solve real problems and make your mark on our industry. About State Street What we do. State Street is one of the largest custodian banks, asset managers and asset intelligence companies in the world. From technology to product innovation, we're making our mark on the financial services industry. For more than two centuries, we've been helping our clients safeguard and steward the investments of millions of people. We provide investment servicing, data & analytics, investment research & trading and investment management to institutional clients. Work, Live and Grow. We make all efforts to create a great work environment. Our benefits packages are competitive and comprehensive. Details vary by location, but you may expect generous medical care, insurance and savings plans, among other perks. You'll have access to flexible Work Programs to help you match your needs. And our wealth of development programs and educational support will help you reach your full potential. Inclusion, Diversity and Social Responsibility. We truly believe our employees diverse backgrounds, experiences and perspectives are a powerful contributor to creating an inclusive environment where everyone can thrive and reach their maximum potential while adding value to both our organization and our clients. We warmly welcome candidates of diverse origin, background, ability, age, sexual orientation, gender identity and personality. Another fundamental value at State Street is active engagement with our communities around the world, both as a partner and a leader. You will have tools to help balance your professional and personal life, paid volunteer days, matching gift programs and access to employee networks that help you stay connected to what matters to you. State Street is an equal opportunity and affirmative action employer. Discover more at StateStreet.com/careers

Posted 3 days ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

noida

Work from Office

> Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years.

Posted 5 days ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.Experience: 5-8 Years.

Posted 5 days ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

coimbatore

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk . Experience: 8-10 Years .

Posted 1 week ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk . Experience: 5-8 Years .

Posted 1 week ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk . Experience: 5-8 Years .

Posted 1 week ago

Apply

2.0 - 6.0 years

0 Lacs

karnataka

On-site

As a System Administrator, your primary responsibilities will include access and password management, enforcing secure credential policies, and implementing Access Control Management systems to ensure proper authorization and secure access to systems and data. You will also manage Password Management tools and practices to support secure credential lifecycle and compliance. Additionally, you will be the first line of IT support for all internal technical queries related to hardware, software, and network issues. In this role, you will be responsible for configuring, installing, and maintaining laptops, desktops, workstations, printers, and mobile devices. You will provide tech support for system provisioning, credential management, and access control during onboarding and offboarding processes. Furthermore, you will assist with network configuration and basic troubleshooting tasks, such as Wi-Fi, LAN, and IPs, and ensure that antivirus and system updates are regularly applied across all endpoints. Your duties will also involve helping to maintain and audit IT inventory, software licenses, and asset tagging. You will coordinate with external vendors for hardware servicing and procurement and assist in setting up conference rooms, AV equipment, and internal events as required. Moreover, you will support the IT team in internal security best practices, backup processes, and infrastructure health. **Required Skills and Qualifications:** - Bachelor's degree in Computer Science, Information Technology, or related discipline. - Basic understanding of OS platforms such as Windows, macOS, and Linux. - Familiarity with networking concepts including IP, DNS, DHCP, and troubleshooting. - Excellent communication and documentation skills. - Passion for IT infrastructure and a strong desire to pursue a career in system administration. **Nice-to-Have:** - Exposure to tools like Google Workspace, MDM solutions, remote desktop tools, and IT ticketing systems. - Certifications such as CompTIA A+/N+, CCNA, or Microsoft Fundamentals. **Educational Qualifications:** - Bachelor's degree in Computer Science, Information Technology, or related discipline. **Job Types:** Full-time, Permanent **Benefits:** - Provident Fund **Schedule:** - Monday to Friday - Performance bonus **Experience:** - System administration: 2 years (Preferred) - MDM solutions: 2 years (Preferred) **License/Certification:** - CCNA (Required) - CompTIA A+ (Required) **Work Location:** In person,

Posted 2 weeks ago

Apply

8.0 - 10.0 years

0 Lacs

hyderabad, telangana, india

On-site

Job Title: Senior Cyber Security Delivery Specialist Job Location: Hyderabad Experience: 8+ years Responsibilities : Implement data classification and labelling to categorise and protect sensitive information using Microsoft Purview Define, design and implement data governance policies using Microsoft Purview Review policies, generate insights and ensure that data governance practices are effective prior to making recommendation for policy enforcement Support training of SecOps, GRC and Pilot users as required Collaborate with cross-functional teams within and outside of technology Provide guidance on data protection, privacy, and security best practices Stay up to date with the latest security trends, threats, and technologies to continuously improve the organisation&aposs security posture Development of project documentation and handover to operations teams Assist in the evaluation of solutions or security tools and technologies for projects assigned Experience: Minimum of 8 years work experience in a Security Analyst/ Delivery role A minimum of 2-3 years of work experience delivering Cyber projects Experience implementing MS Purview from end to end (labelling, policy design, policy enforcement) Ability to think laterally and strategically with a solution focused approach Ability to deliver to scope, schedule and budget Experience managing own work and prioritising workload to meet deliverables Experience working with both technical and non-technical stakeholders An understanding of how data is protected at rest and in transit Knowledge of information security frameworks (NIST, ISO27001, PCI-DSS, SOC) Experience implementing or operating Password Management, API Observability, Honey Tokens or Application Whitelisting tools will be highly regarded About Softobiz: Innovation begins with like-minded people aiming to transform the world together. At Softobiz, we invite you to become a part of an organization that has been helping clients transform their business by fusing insights, creativity, and technology. With a team of 300+ technology enthusiasts, we have been trusted by leading enterprises around the globe for over 12+ years. At Softobiz, we foster a culture of equality, learning, collaboration, and creative freedom, empowering our employees to grow and excel in their careers. Our technical craftsmen are pioneers in the latest technologies like AI, machine learning, and product development. Why Should You Join Softobiz - Work with technical craftsmen who are pioneers in the latest technologies. - Access training sessions and skill-enhancement courses for personal and professional growth. - Be rewarded for exceptional performance and celebrate success through engaging parties. - Experience a culture that embraces diversity and creates an inclusive environment for all employees. Softobiz is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. All qualified applicants will be afforded equal employment opportunities without discrimination based on race, creed, color, national origin, sex, age, disability, or marital status. For more information about our solutions and organization, visit www.softobiz.com, Follow us on LinkedIn, Twitter , and Facebook for more updates. Show more Show less

Posted 2 weeks ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

kochi

Work from Office

PAM SME/Admin (B2/B3) 4+ years of experience in PAM Administration Location: Kochi Required skills: 4+ Years of hands on experience in Arcos / Any other OEM PAM administration Must be well trained PAM admin activities Excellent technical skills in Arcos / other OEM PAM troubleshooting Security related certifications in PAM (added advantage) Excellent troubleshooting skills in PAM. Willingness to work from customer site at Cochin Willingness to work in 24/7 mode as per requirements. Excellent communication skills Should be a good team leader and good customer management skills. Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years.

Posted 3 weeks ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.Experience: 3-5 Years.

Posted 3 weeks ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.Experience: 3-5 Years.

Posted 3 weeks ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

hyderabad

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.Experience: 5-8 Years.

Posted 3 weeks ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 8-10 Years.

Posted 4 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

hyderabad, telangana

On-site

You should have experience with Data Transfer tools and methods, including the ability to create and process change requests for new and existing clients. This includes expertise in GlobalScape, NDM (including Secure+), AWS S3/AWS CLI, GCP, Azure Blob, WinSCP/Putty. Additionally, you should have proficiency in certificate management and application license management. Experience with server patching, maintenance, vulnerability remediation, and server monitoring is essential. Familiarity with system diagnostic tools and maintenance reports such as Rapid7 and Brinqa is required. You should also possess expertise in file server management, Active Directory, and DNS management. Extensive knowledge of AWS services is a must, including VPC, EC2 EMR, S3 Fargate, Load balancers, EFX, EBS, AWS Workspaces. You should be able to install and configure software according to organizational guidelines and plans, including system configuration and default user settings. Managing server access requests, system accounts, password management, Instance/EBS snapshots, server decommissions, and change control processes will be part of your responsibilities. You should also have experience in setting up and configuring user tools like Dbeaver, Excel Macro functionality, Vedit, and troubleshooting any related issues. This position was posted by Hymavati Sarojini from Softility.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

hyderabad, telangana

On-site

At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. We're looking for a Consultant in the Cyber Team to work in IAM Operations support. The candidate should have experience with PAM Technologies such as CyberArk, AWS Secrets Manager, Azure Key Vault and possess strong troubleshooting skills. This role requires the candidate to work out of the office for all working days as an in-office requirement and be willing to work in a 24X7 rotational shift model, based in the Hyderabad office for all 5 days. Key Requirements: - Performs identity and access provisioning, authentication, and oversight activities adhering to established guidelines and internal policies. - Assumes ownership of operational issues and/or process defects that have resulted in the disruption of access to understand both root cause and resolve the underlying issue. - Creates and maintains all related standards and procedural documentation, supporting end-to-end process assessments, future-state process ideation sessions, and access control redesigns. - Provides advanced level technical support for issues related to technology, platforms, environments, or access administration. - Leverages key metrics and business data to drive continuous process improvement, enhance the end-user experience, increase technology value, and improve IAM's overall security posture. - Has awareness of all control-related activities and effectively performs necessary attestations both accurately and timely. - Experience with PAM technologies like CyberArk, AWS Secrets Manager, Azure Key Vault. - Experience with PAM lifecycle processes including Discovery, vaulting, password management, secrets management. - Experience managing privileged accounts in platforms such as AWS, Azure, GCP, Windows, Linux, Mainframes, Databases. Minimum Qualifications: - B. Tech./ B.E./MCA/Computer Science Degrees with sound technical skills. - Strong command of verbal and written English language. - Good soft skills including verbal & written communication, technical document writing, etc. - Understanding of IAM/IGA/SSO/PAM concepts. Work Requirements: - Should be willing to work out of the office for all working days as this is an in-office requirement. - Should be willing to work in a 24X7 rotational shift model. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people, and society, and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate. Working across assurance, consulting, law, strategy, tax, and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.,

Posted 1 month ago

Apply

1.0 - 3.0 years

2 - 2 Lacs

Chennai

Work from Office

Responsibilities: * Digital Asset Guardianship * Web & Infrastructure Management * Ensure system security & compliance * Social Media & Online Presence * Subscription & Asset Oversight * Proactive Security & Backups * Manage Digital Assets Health insurance Annual bonus

Posted 1 month ago

Apply

1.0 - 3.0 years

3 - 5 Lacs

Hyderabad

Work from Office

Job Description Seeking a motivated and technically skilled First Level Help Desk Technician to provide front-line support for end-users across the organization. The candidate will be responsible for diagnosing and resolving issues related to Windows operating systems, laptops, basic networking, and software installation. The role also includes handling support tickets, remote troubleshooting, and escalating issues as needed. Responsibilities Serve as the first point of contact for end-users seeking technical support via phone, email, or ticketing system. Troubleshoot and resolve hardware and software issues on Windows laptops and desktops. Support software installations, upgrades, and basic configuration using remote desktop tools. Perform basic network troubleshooting, including issues with connectivity, VPN, DNS, and Wi-Fi. Use remote access tools (e.g., AnyDesk, TeamViewer, RDP) to assist users with technical issues. Log, categorize, prioritize, and assign tickets within the IT ticketing system. Escalate unresolved problems to higher-level support as per escalation matrix. Document all support interactions, resolutions, and troubleshooting steps accurately. Support user onboarding/offboarding, including laptop setup, user account provisioning, and basic access rights. Adhere to internal SLAs and follow IT service management best practices. Participate in rotational shifts , including coverage for weekends and holidays if required. Essential Skills Job Windows OS and hardware/software troubleshooting Networking fundamentals (IP, DNS, DHCP, VPN) Remote support tools and ticketing systems Software installation and system configuration Documentation and ticket updates Prioritizing multiple technical issues under pressure Personal Ability to clearly explain technical issues to non-technical users. Analytical thinker who can troubleshoot under time pressure and find effective solutions. Able to handle multiple tasks, prioritize tickets, and meet SLAs Flexible and able to adjust to new technologies, processes, or shift schedules. Takes ownership of tasks, follows through, and ensures timely resolution of issues. Preferred Skills Job Troubleshooting Outlook, OneDrive, Teams, SharePoint, etc Basic troubleshooting for iOS and Android in a corporate environment. Familiarity with tools like Windows Defender Handling common issues related to printers User account creation, password resets, and group membership changes. Personal Clear verbal and written skills to explain issues and solutions Accurately logs tickets, documents solutions, and avoids mistakes. Adjusts easily to new technologies, changes in processes, or shift schedules Eager to learn and grow with evolving IT tools and environments. Maintains a positive and composed attitude even in high-pressure situations.

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

haryana

On-site

As a Security Engineer at Expedia Group, you will be part of the Security Solutions Engineering team responsible for designing and implementing critical security systems and services. Your role will involve working on key initiatives from conceptualization to deployment, requiring a deep understanding of complex technical environments and the ability to develop effective security solutions. Your responsibilities will include: - Implementing Endpoint Detection and Response (EDR) solutions such as Anti-malware Agents and Data Loss Prevention - Managing Web Content Filtering for seamless Internet protection using on-premise and cloud-based web proxies - Overseeing Vulnerability Management for DC and cloud assets, including patching and compliance - Utilizing Threat Intelligence feeds from sources like Recorded Future - Conducting Threat detection through User Behavior Analysis and investigation - Integrating SIEM & SOAR solutions and managing Container security - Implementing Network security measures including Web Application Firewall, Intrusion Prevention, and Anti-malware detection - Maintaining, monitoring, and enhancing systems and security posture with a focus on service excellence - Collaborating with cross-functional teams to solve complex problems and influence engineering practices To qualify for this role, you should have: - A Bachelor's or Master's degree in a Technical field or equivalent professional experience - At least 3 years of experience in security engineering and operations support in a mission-critical environment - Hands-on experience with AWS Cloud services and security - Proficiency in various security technologies such as Web Content Filtering, Web Application Firewalls, Intrusion Detection Systems, and SIEM - Strong analytical skills and the ability to correlate and analyze security-related data - Programming experience in languages like Java, Python, Perl, or C++ - Excellent organizational and communication skills - A proactive and innovation-driven mindset with the ability to thrive in a fast-paced environment If you require any accommodations during the application process, please contact our Recruiting Accommodations Team. Join us at Expedia Group and be part of a diverse and inclusive community that values your contribution to shaping the future of travel.,

Posted 1 month ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do: Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk Experience : 5-8 Years.

Posted 2 months ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.: Experience: 5-8 Years.

Posted 2 months ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.: Experience: 3-5 Years.

Posted 2 months ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk.: Experience: 3-5 Years.

Posted 2 months ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years.

Posted 2 months ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Kochi

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years.

Posted 2 months ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years. >

Posted 2 months ago

Apply
Page 1 of 3
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies