Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
5.0 years
0 Lacs
Kanayannur, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM–Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What we look for Has hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 5 days ago
5.0 - 10.0 years
5 - 10 Lacs
Hyderabad / Secunderabad, Telangana, Telangana, India
On-site
Ping Directory Job Description : The cyber risk servicesIAM practice helps organizations in designing, developing, and implementing industry-leading IAM solutions to protect their information and confidential data, as well as help them build their businesses and supporting technologies to be more secure, vigilant, and resilient. The cyber risk servicesIAM team delivers service to clients through following key areas of IAM: LDAP Directory services User provisioning Privilege Identity Management Access certification Access management and federation Entitlements management Role management Strategy and road map for Identity & Access Management Strong authentication Responsibilities: Monitor alerts and perform routine health check of services. Troubleshoot technical issues and support incident management as per applicable SLA, provide root cause analysis and support problem management. Service request management according to processes and SLA Must have experience with Unix, Linux Windows Server 2008/2012/2016. Good understanding of overall configuration, troubleshooting, patch application, configuring replication, schema management, ACI management, encryption etc. of Directory server solution. Familiarity with password policy configuration in LDAP Directory server implementations. Experience on performance/tuning recommendations for Directory products and ability to document procedures for other engineers to follow. Ability to make SOX/audit-related assessments, document changes needed, deploy feasible changes. Good knowledge & experience in user administration, certificate management, group management. Administrative scripting experience using any scripting language- PowerShell, Perl, shell. Support multi-domain environment which may include hybrid setups like Active Directory and AzureAD. Good analytical & problem-solving skills, proficient communication, and leadership skills to drive client conversation. Willing to work in 24x7 shifts and provide weekend on-call support. Monitor service mailbox and support end user queries Generate reports for daily/periodic PAM administration or processes Support IT Risk or audit teams with reports, evidence, and process walkthroughs Support change documentation, change deployment and post-change validations Document and update Standard Operating Procedures (SOP) and operational runbooks Identify opportunities to improve process efficiencies and effectiveness. Qualifications and experience Required: 4+ years of experience managing PingDirectory, UnboundID, Oracle Unified Directory (OUD), Sun Directory or any combination of above. Have worked on rotational shift mode Preferred: Having experience on other IAM tools like CyberArk, Sailpoint, Okta, Quest, AzureAD will be a plus IAM technology certifications Exposure to other security domains other than Identity & Access Management
Posted 6 days ago
5.0 years
0 Lacs
Cochin
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM–Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your key responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills and attributes for success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What we look for Has hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What working at EY offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 week ago
5.0 years
0 Lacs
Kochi, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM – Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy andstandards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For Hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM – Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy andstandards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For Hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Kolkata, West Bengal, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM – Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy andstandards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For Hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Coimbatore, Tamil Nadu, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM – Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For Is hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
7.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
About Ping Identity: At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. People don't come here to join a culture that's built on digital freedom. They come to cultivate it. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. While protecting digital identities is at the core of our technology, protecting individual identities is at the core of our culture. We champion every identity. One of our core values, Respect Individuality, reminds us to celebrate differences so you are empowered to bring your authentic self to work. We're headquartered in Denver, Colorado and we have offices and employees around the globe. We serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, and identity and access management. Ping Identity has an industry-leading suite of products centred around industry standards such as SAML, OAuth, OIDC, WS-Trust, FIDO, LDAP etc. Our products include SSO, IDAAS, Directory, MFA, CIAM and cloud identity solutions. We are looking for a Sr.Technical Support Engineer with excellent troubleshooting skills to join the Global Support Organization at PingIdentity. Reporting to the technical support manager, you will be responsible for executing service requests and providing product support to customers on cloud environments. You will work closely with platform engineering in ensuring that customer inquiries are addressed, and that the products running in the cloud environment are well-maintained, while being exposed to several technologies and practices, such as AWS, Kubernetes, and devops. You will: Deliver excellent customer experience and exceed customer expectations on high-quality solutions, response and resolution times. Manage and execute service requests for customers on PingOne cloud platform. Monitor and Administer PingDirectory, PingFederate, and PingAccess in a devops environment Provide communication with and between customers and other supporting teams across the organization Contribute to knowledge resources, including creation, maintenance and enhancements of knowledge articles/documentation/solution guides (internal/external). Assist in coordinating and diagnosing issues with third-party tools used in customer environments Initiate and participate in incidents and root cause analyses as a product SME You have: 7 years related experience providing technical support at an Enterprise level. Advanced Certification or minimum 2 years experience supporting at least 2 of the following: PingDirectory PingFederate PingAccess Experience in Public Key Infrastructure (PKI), X.509 certificates, SSL/TLS. Experience working in a kubernetes environment Proficient in querying with tools like ElasticSearch/Kibana, Cloudwatch, Jira, etc. Experience with REST APIs, SCIM and debugging tools like PostMan, Fiddler, Wireshark etc. Troubleshooting web-based applications (through HTTP Tracing tools and log analysis) in browsers and applications servers. Proficient understanding of change management Excellent team player, actively participating in a collaborative environment, assisting colleagues with complex queries and sharing knowledge with global team members. Advanced troubleshooting skills in a technical environment. Life at Ping: We believe in and facilitate a flexible, collaborative work environment. We’re growing quickly, but remain true to the innovative, can-do startup values that got us here. Most importantly, we keep hiring talented, smart, fun, and genuinely nice people because that’s who we want to succeed with every day. Here are just a few of the things that make Ping special: A company culture that empowers you to do your best work. Employee Resource Groups that create a sense of belonging for everyone. Regular company and team bonding events. Competitive benefits and perks. Global volunteering and community initiatives Our Benefits: Generous PTO & Holiday Schedule Parental Leave Progressive Healthcare Options Retirement Programs Opportunity for Education Reimbursement Commuter Offset (Specific locations) Ping is the collective sum of all our individual experiences, backgrounds and influences and we pride ourselves in growing and learning together. We are committed to building an inclusive and diverse environment where everyone’s individuality is respected and everyone has an Identity. In recruiting for new colleagues, we welcome the unique contributions you can bring and encourage you to be your best self. We are an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex including sexual orientation and gender identity, national origin, disability, protected Veteran Status, or any other characteristic protected by applicable federal, state, or local law. Show more Show less
Posted 2 weeks ago
7.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
About Ping Identity: At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. People don't come here to join a culture that's built on digital freedom. They come to cultivate it. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. While protecting digital identities is at the core of our technology, protecting individual identities is at the core of our culture. We champion every identity. One of our core values, Respect Individuality, reminds us to celebrate differences so you are empowered to bring your authentic self to work. We're headquartered in Denver, Colorado and we have offices and employees around the globe. We serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, and identity and access management. Ping Identity has an industry-leading suite of products centred around industry standards such as SAML, OAuth, OIDC, WS-Trust, FIDO, LDAP etc. Our products include SSO, IDAAS, Directory, MFA, CIAM and cloud identity solutions. We are looking for a Sr.Technical Support Engineer with excellent troubleshooting skills to join the Global Support Organization at PingIdentity. Reporting to the technical support manager, you will be responsible for executing service requests and providing product support to customers on cloud environments. You will work closely with platform engineering in ensuring that customer inquiries are addressed, and that the products running in the cloud environment are well-maintained, while being exposed to several technologies and practices, such as AWS, Kubernetes, and devops. You will: Deliver excellent customer experience and exceed customer expectations on high-quality solutions, response and resolution times. Manage and execute service requests for customers on PingOne cloud platform. Monitor and Administer PingDirectory, PingFederate, and PingAccess in a devops environment Provide communication with and between customers and other supporting teams across the organization Contribute to knowledge resources, including creation, maintenance and enhancements of knowledge articles/documentation/solution guides (internal/external). Assist in coordinating and diagnosing issues with third-party tools used in customer environments Initiate and participate in incidents and root cause analyses as a product SME You have: 7 years related experience providing technical support at an Enterprise level. Advanced Certification or minimum 2 years experience supporting at least 2 of the following: PingDirectory PingFederate PingAccess Experience in Public Key Infrastructure (PKI), X.509 certificates, SSL/TLS. Experience working in a kubernetes environment Proficient in querying with tools like ElasticSearch/Kibana, Cloudwatch, Jira, etc. Experience with REST APIs, SCIM and debugging tools like PostMan, Fiddler, Wireshark etc. Troubleshooting web-based applications (through HTTP Tracing tools and log analysis) in browsers and applications servers. Proficient understanding of change management Excellent team player, actively participating in a collaborative environment, assisting colleagues with complex queries and sharing knowledge with global team members. Advanced troubleshooting skills in a technical environment. Life at Ping: We believe in and facilitate a flexible, collaborative work environment. We’re growing quickly, but remain true to the innovative, can-do startup values that got us here. Most importantly, we keep hiring talented, smart, fun, and genuinely nice people because that’s who we want to succeed with every day. Here are just a few of the things that make Ping special: A company culture that empowers you to do your best work. Employee Resource Groups that create a sense of belonging for everyone. Regular company and team bonding events. Competitive benefits and perks. Global volunteering and community initiatives Our Benefits: Generous PTO & Holiday Schedule Parental Leave Progressive Healthcare Options Retirement Programs Opportunity for Education Reimbursement Commuter Offset (Specific locations) Ping is the collective sum of all our individual experiences, backgrounds and influences and we pride ourselves in growing and learning together. We are committed to building an inclusive and diverse environment where everyone’s individuality is respected and everyone has an Identity. In recruiting for new colleagues, we welcome the unique contributions you can bring and encourage you to be your best self. We are an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex including sexual orientation and gender identity, national origin, disability, protected Veteran Status, or any other characteristic protected by applicable federal, state, or local law. Show more Show less
Posted 2 weeks ago
7.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
About Ping Identity: At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. People don't come here to join a culture that's built on digital freedom. They come to cultivate it. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. While protecting digital identities is at the core of our technology, protecting individual identities is at the core of our culture. We champion every identity. One of our core values, Respect Individuality, reminds us to celebrate differences so you are empowered to bring your authentic self to work. We're headquartered in Denver, Colorado and we have offices and employees around the globe. We serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, and identity and access management. Ping Identity has an industry-leading suite of products centred around industry standards such as SAML, OAuth, OIDC, WS-Trust, FIDO, LDAP etc. Our products include SSO, IDAAS, Directory, MFA, CIAM and cloud identity solutions. We are looking for a Sr.Technical Support Engineer with excellent troubleshooting skills to join the Global Support Organization at PingIdentity. Reporting to the technical support manager, you will be responsible for executing service requests and providing product support to customers on cloud environments. You will work closely with platform engineering in ensuring that customer inquiries are addressed, and that the products running in the cloud environment are well-maintained, while being exposed to several technologies and practices, such as AWS, Kubernetes, and devops. You will: Deliver excellent customer experience and exceed customer expectations on high-quality solutions, response and resolution times. Manage and execute service requests for customers on PingOne cloud platform. Monitor and Administer PingDirectory, PingFederate, and PingAccess in a devops environment Provide communication with and between customers and other supporting teams across the organization Contribute to knowledge resources, including creation, maintenance and enhancements of knowledge articles/documentation/solution guides (internal/external). Assist in coordinating and diagnosing issues with third-party tools used in customer environments Initiate and participate in incidents and root cause analyses as a product SME You have: 7 years related experience providing technical support at an Enterprise level. Advanced Certification or minimum 2 years experience supporting at least 2 of the following: PingDirectory PingFederate PingAccess Experience in Public Key Infrastructure (PKI), X.509 certificates, SSL/TLS. Experience working in a kubernetes environment Proficient in querying with tools like ElasticSearch/Kibana, Cloudwatch, Jira, etc. Experience with REST APIs, SCIM and debugging tools like PostMan, Fiddler, Wireshark etc. Troubleshooting web-based applications (through HTTP Tracing tools and log analysis) in browsers and applications servers. Proficient understanding of change management Excellent team player, actively participating in a collaborative environment, assisting colleagues with complex queries and sharing knowledge with global team members. Advanced troubleshooting skills in a technical environment. Life at Ping: We believe in and facilitate a flexible, collaborative work environment. We’re growing quickly, but remain true to the innovative, can-do startup values that got us here. Most importantly, we keep hiring talented, smart, fun, and genuinely nice people because that’s who we want to succeed with every day. Here are just a few of the things that make Ping special: A company culture that empowers you to do your best work. Employee Resource Groups that create a sense of belonging for everyone. Regular company and team bonding events. Competitive benefits and perks. Global volunteering and community initiatives Our Benefits: Generous PTO & Holiday Schedule Parental Leave Progressive Healthcare Options Retirement Programs Opportunity for Education Reimbursement Commuter Offset (Specific locations) Ping is the collective sum of all our individual experiences, backgrounds and influences and we pride ourselves in growing and learning together. We are committed to building an inclusive and diverse environment where everyone’s individuality is respected and everyone has an Identity. In recruiting for new colleagues, we welcome the unique contributions you can bring and encourage you to be your best self. We are an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex including sexual orientation and gender identity, national origin, disability, protected Veteran Status, or any other characteristic protected by applicable federal, state, or local law. Show more Show less
Posted 2 weeks ago
5.0 years
0 Lacs
Coimbatore, Tamil Nadu, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM – Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For Is hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
5.0 years
0 Lacs
Coimbatore, Tamil Nadu, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM–Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team.In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most criticallythe OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 5 – 8 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For Who has hands on experience in setting up the Identity and Access Management environment in standalone and cluster environment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
5.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM–Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification : Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 3 weeks ago
4.0 - 9.0 years
6 - 12 Lacs
Chennai
Work from Office
Job Summary: Seeking an experienced Ping Directory Specialist to manage directory services and IAM solutions. Key Responsibilities: Deploy, configure, and manage PingDirectory and associated IAM tools. Ensure system scalability and high availability. Implement security best practices in identity access management. Troubleshoot and resolve directory-related issues. Qualifications: Bachelor's in Computer Science/Engineering. Minimum 3 years of experience in PingDirectory. Familiarity with LDAP, SSO, and authentication protocols.
Posted 3 weeks ago
5.0 years
0 Lacs
Kanayannur, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM–Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2