Jobs
Interviews

21 Pingdirectory Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0 years

0 Lacs

India

On-site

About Allica Bank Allica is the UK’s fastest growing company - and the fastest-growing financial technology (Fintech) firm ever. Our purpose is to help established SMEs, one of the last major underserved opportunities in Fintech. Established SMEs are the backbone of local communities - representing over a third of our economy - yet have been largely neglected both by traditional high street banks and modern fintech providers. Department Description The Allica Security team play a key role in protecting the bank and are responsible for all aspects of security surrounding Applications, Infrastructure and Security Operational Policy. Our mission is to provide the best-in-class security to protect the bank. We live and breathe the Allica values and deliver services intelligently using automation, intelligence, and innovation. Role Description We are looking for an experienced Identity and Access Management SME to join our security team to help reduce security risks by improving IAM infrastructure and controls. The person we are looking for would work closely with the engineering teams and will require a mix of technical knowledge and collaborative skills. As part of the Information Security team, you will be supporting Allica’s fast growth momentum with the design, implementation and maintenance of the tools which help to support out internal employees, as well as Allica’s customers. You will work with stakeholders across the business to support Information Security objectives, as well as those related to the wider bank. Principal Accountabilities Operate and maintain the identity platform – Ensure continuous, secure operation of PingFederate, PingAccess, PingDirectory and PingOne MFA across two Azure regions, achieving a minimum 99.95 percent service availability. Architect and deliver integrations – Define, document and govern reusable patterns for OIDC/OAuth 2.0, SAML 2.0, SCIM, FIDO2/WebAuthn and mTLS to support customer-facing applications, APIs and third-party SaaS. Automate infrastructure and configuration – Implement infrastructure-as-code (Terraform) and Git-based CI/CD pipelines; enforce zero-touch certificate and secret management via Azure Key Vault. Execute hardening and lifecycle management – Plan, test and deploy product upgrades, schema modifications and security patches, maintaining the estate at N-1 or later for all Ping components. Design, perform regular chaos and fail-over exercises, and maintain disaster-recovery artefacts that meet stated RTO/RPO targets. Provide observability and incident response – Develop telemetry dashboards configure actionable alerts and lead incident triage with Security Operations and Incident response team. Produce documentation and knowledge transfer – Maintain comprehensive runbooks, architecture artefacts and compliance evidence, mentor platform and development teams in secure integration practices. Attributes Specialised Ping expertise – Minimum five years’ production experience administering and upgrading PingFederate, PingAccess and PingDirectory in multi-region environments. Microsoft Entra proficiency – Demonstrable capability with Conditional Access, Identity Governance, External ID and Graph-based automation. Protocol depth – Advanced knowledge of OAuth 2.0/OIDC, SAML 2.0, SCIM, LDAP, mTLS and FIDO2/WebAuthn, including packet-level troubleshooting. Infrastructure-as-code discipline – Proven use of Terraform or Bicep, with CI/CD pipelines in Azure DevOps or GitHub Actions, and scripting fluency in PowerShell, Bash or Python. Security and regulatory acumen – Working understanding of PSD2/Open Banking, PCI-DSS, ISO 27001, PRA/FCA operational-resilience expectations and NIST 800-207 zero-trust principles. Having expertise in SailPoint would be a valuable addition, particularly given its relevance to current and upcoming IAM-related initiatives. Reliability engineering mindset – Experience defining SLOs, managing error budgets, conducting chaos engineering and producing rigorous root-cause analyses. Analytical and sceptical approach – Ability to challenge architectural assumptions, facilitate threat-modelling workshops and substantiate recommendations with empirical data. Exceptional communication skills – Adept at translating complex identity concepts for technical and executive audiences and influencing stakeholders across the organisation. Commitment to continuous improvement – Evidenced engagement with the Ping and broader IAM community, proactive adoption of emerging features and tools that materially enhance security or efficiency. Working at Allica Bank At Allica Bank we want to ensure our employees have the right tools and environment in which to succeed in their role and in support of our customers. Our employees are at the heart of everything we do, so our benefits are designed with you in mind: Full onboarding support and continued development opportunities Options for flexible working Regular social activities Pension contributions Discretionary bonus scheme Private health cover Life assurance Family friendly policies including enhanced Maternity & Paternity leave Don’t tick every box? Don’t worry if you don’t have all the skills or requirements listed on the job description. If you think you’ll be a good fit, we’d still love to hear from you! Flexible working We know the ‘9-to-5’ isn’t right for everyone. That’s why Allica Bank is fully committed to flexible and hybrid working. Please let us know what is best for you and, if we can, we will do our best to accommodate. Diversity We’re a diverse bunch here at Allica, with all kinds of experiences, backgrounds and lifestyles. Our openness and differences make us stronger, and we want everybody to feel comfortable bringing as much of themselves to work with them as they like.

Posted 1 week ago

Apply

0.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Inviting applications for the role of - Consultant Identity and Access Management (IAM) Engineer We are seeking a highly skilled IAM Engineer with strong experience in implementing and supporting enterprise Identity and Access Management solutions. The ideal candidate will have hands-on expertise in identity integrations, SSO and MFA configurations, identity provider (IdP) migrations, and knowledge of IAM tools like PingFederate, FreeRADIUS, and PingDirectory. Responsibilities: Design, implement, and support IAM solutions across various platforms and applications. Lead or support migration efforts between identity providers (e.g., Okta to PingFederate or ADFS to Azure AD) or any other one IDP to another IDP Configure and manage SSO (Single Sign-On) and MFA (Multi-Factor Authentication) solutions using industry-standard tools. Integrate enterprise applications with identity providers using SAML, OAuth, OIDC, and LDAP protocols. Maintain and manage directory services including PingFederate, FreeRadius, AD, VDS, PingDirectory Develop and maintain IAM documentation, runbooks, and technical guides. Collaborate with application teams to troubleshoot IAM integration issues and improve user experience. Perform regular audits, reviews, and reporting for identity-related compliance. Qualifications we seek in you! Minimum qualifications / Skills Bachelor&rsquos degree in computer science, Information Technology, or related field. Good hands-on experience with IAM platforms and tools. Experience with IAM products such as PingFederate, FreeRADIUS, PingDirectory , Okta, Azure AD, or similar. Strong knowledge of authentication and authorization protocols : SAML, OAuth 2.0, OpenID Connect, RADIUS, LDAP, and Kerberos. Experience with IdP migration projects involving planning, execution, and troubleshooting. Expertise in SSO and MFA setup and administration. Familiarity with IAM lifecycle processes: provisioning, de-provisioning, and access certification. Scripting experience (PowerShell, Python, or Bash) for automation tasks is a plus. Security-first mindset with understanding of IAM-related risks and compliance requirements. Preferred qualifications / Skills Experience with DevOps integration for IAM automation (CI/CD). Certifications such as CISSP, CIAM, or Ping Identity certifications . Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and in a team-oriented, collaborative environment. Strong project documentation and presentation abilities.

Posted 1 week ago

Apply

5.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM – Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy andstandards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For Hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 2 weeks ago

Apply

6.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Summary Kaiser Permanente is seeking a Sr. IT Engineer – Identity and Access Management (Ping Identity) to join our IAM engineering team in Pune (hybrid work model). In this role, you will design, build, and support secure, scalable IAM solutions using Ping Identity technologies including PingFederate, PingAccess, and PingID. You’ll work across environments to manage deployments, automate processes, and resolve complex integration issues contributing to our broader identity strategy in collaboration with infrastructure, security, and application teams. Role Description This is a full-time role for a Sr. IT Engineer – Identity and Access Management (Ping Identity) to join our IAM Engineering team in Pune, with flexibility for hybrid work. The working hours for this role are aligned to the US shift: 2:00 PM to 11:00 PM IST . This role involves designing, building, deploying, and supporting IAM solutions leveraging Ping Identity technologies such as PingFederate, PingAccess, PingDirectory, PingID, and PingOne . The engineer will be responsible for end-to-end implementation, upgrades, patching, and automation of IAM components across non-production and production environments. This includes collaborating with cross-functional teams (infrastructure, security, risk, and app owners), resolving complex issues, ensuring secure integration patterns, and contributing to the broader IAM strategy through process improvement and technical innovation. Responsibilities Build, configure, and deploy Ping Identity solutions across environments Troubleshoot and resolve complex IAM integration and support issues Participate in IAM solution upgrades, patching, and performance tuning Work closely with internal and external stakeholders to translate business requirements into secure technical designs Develop and maintain automation scripts for improving process efficiency Contribute to best practices, documentation, and knowledge sharing across the team Support compliance, security audits, and remediation efforts where required Qualifications Minimum 6 years of hands-on experience with Ping Identity components (PingFederate, PingAccess, PingDirectory, PingID, PingOne) OR 4+ years in Ping Identity with other IAM platform exposure Strong understanding of Access Management, SSO, OAuth2, SAML , and session security Experience working in an Agile delivery model and DevSecOps environment Solid knowledge of Windows, Linux, AD, LDAP, APIs , and web application architectures Scripting/Programming skills in Java, Python, PowerShell, or Shell scripting Familiarity with build tools (Git, Maven) and CI/CD pipelines Strong analytical and troubleshooting skills with a proactive approach Good interpersonal and communication skills Bachelor's degree in Computer Science, IT, or a related field Experience in Identity Management or Privileged Access Management (PAM) or certificate management is a plus

Posted 2 weeks ago

Apply

6.0 - 8.0 years

5 - 10 Lacs

Chennai, Tamil Nadu, India

On-site

The ideal Ping Developer will have hands-on experience with Ping Identity solutions, including PingAccess, PingFederate, and PingDirectory. You will be responsible for the configuration, setup, and upgrades of these systems, ensuring they are optimized for performance and security. Key responsibilities: Configuration and Management: Configure and manage PingAccess, PingFederate, and PingDirectory systems. Implement and maintain secure and scalable identity and access management (IAM) solutions. Perform routine maintenance, including patching and upgrades, to ensure system stability and security. Development and Integration: Develop and integrate IAM solutions using Ping products to meet business requirements. Work closely with application teams to integrate applications with Ping Identity solutions. Design and implement Single Sign-On (SSO), Multi-Factor Authentication (MFA), and federation services. Required Skill Set: Experience: Proven experience with PingAccess, PingFederate, and PingDirectory. Hands-on experience in the configuration, setup, and upgrades of Ping Identity solutions. Strong understanding of IAM concepts and protocols (e.g., SAML, OAuth, OpenID Connect). Technical Skills: Proficiency in programming and scripting languages (e.g., Java, JavaScript, Python). Experience with API integration and web services. Familiarity with cloud-based IAM solutions and infrastructure. Certifications: Ping Identity certification (e.g., PingFederate, PingAccess) is preferred.

Posted 2 weeks ago

Apply

15.0 years

0 Lacs

Bengaluru

On-site

Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Ping Identity Good to have skills : Microsoft Active Directory Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Project Role : Security Senior Analyst Project Role Description : Access management SME, responsible for overseeing the implementation, operations and delivery of Access Management (SSO and MFA) projects Must have skills : Ping Identity Good to have skills : Radiant Logic VDS, Entrust Password management Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary: As an Access management SME, you will be responsible for overseeing the implementation, operations and delivery of Access Management (SSO and MFA) projects. A typical day involves coordinating with various teams, ensuring that projects are on track, and leveraging global delivery capabilities to enhance service quality. You will engage with stakeholders to understand their needs and provide effective solutions, while also mentoring team members to foster a collaborative environment. Your role will require you to adapt to changing project requirements and maintain a focus on delivering exceptional security services to clients. Roles & Responsibilities: - Expected to be an SME. - Responsible for team decisions. - Engage with multiple teams and contribute on key decisions. - Provide solutions to problems for their immediate team and across multiple teams. - Facilitate training sessions to enhance team skills and knowledge. - Monitor SLA/KPI's and ensure to take adequate measures to meet the delivery timelines. - Provide expert troubleshooting and resolution of issues related to Access Management Operations. - Proactively troubleshoot and support existing applications integrated within SSO and MFA. - Champion continuous improvement initiatives to enhance efficiency, reduce risk, and promote automation within the IAM domain. Professional & Technical Skills: - Must Have Skills: Proficiency in Ping Suite of Products primarily Ping Federate, PingID, PingRisk, Ping Da Vinci - Design, develop, and implement access management solutions using Ping Identity products such as PingFederate, Ping One and PingDirectory. - Well versed with SSO protocols such as SAML, OAuth, OIDC etc. - Well versed with application onboarding for enabling SSO through Ping Federate or PingAccess - Strong understanding of Access management solutions like SSO, MFA, Password management, Federation etc. - Strong understanding of LDAP solutions like Active Directory, Radiant Logic VDS, Password management, Federation etc. - Familiarity with security frameworks and best practices. - Ability to analyze and resolve complex security issues. - Proven expertise with PowerShell, Java, XML, SQL, LDAP, REST APIs, and SCIM. - Solid understanding of IAM best practices, implementation methodologies, and industry standards. - Hands-on experience working with Active Directory, LDAP, and other data sources. -Leads the implementation, operations and delivery of Access Management (SSO and MFA) projects, leveraging our global delivery capability (method, tools, training, assets). -Exp in Ping Federate, Ping Access, PingID, PingRisk, Entrust Password management Additional Information: - The candidate should have a minimum of 3 years of experience in Ping Identity Suite of Products. - This position is based out of Accenture office across India. - A 15 years full time education is required. 15 years full time education

Posted 4 weeks ago

Apply

7.0 years

0 Lacs

Greater Kolkata Area

On-site

Position Title : Ping Developer Location : Sydney, Australia (Hybrid) Employment Type : Full-time / Contract Visa Sponsorship provided Experience Level : 7+ Years in IAM- Ping Identity Solutions Job Overview We are looking for a highly skilled Ping Developer to join our Identity and Access Management (IAM) team. The role involves designing, implementing, and maintaining identity solutions using Ping Identity products, including PingFederate, PingAccess, and PingDirectory. The ideal candidate will have strong experience in federation protocols, SSO, MFA, and integrating enterprise applications with Ping Identity solutions. Key Responsibilities Design, configure, and implement identity federation and SSO using PingFederate. Develop and manage access control policies using PingAccess. Support directory services using PingDirectory and integrate with identity stores. Integrate Ping Identity solutions with AD, LDAP, Azure AD, and cloud apps. Build and maintain custom adapters, authentication policies, and scripts. Collaborate with cross-functional teams on security and compliance requirements. Troubleshoot issues and provide ongoing support and enhancements to IAM services. Participate in solution design, testing, documentation, and deployment processes. Required Skills & Experience 5+ years of experience working with Ping Identity products (PingFederate, PingAccess, PingDirectory). Strong understanding of IAM protocols: SAML, OAuth, OpenID Connect, and SCIM. Hands-on experience in SSO, MFA, and identity federation. Proficiency in Java, Groovy, PowerShell, or other scripting languages. Experience integrating enterprise apps (e.g., Salesforce, SAP, ServiceNow) with Ping. Familiarity with certificate management, token services, and authentication flows. Solid grasp of security best practices and compliance standards (e.g., OWASP, NIST). Excellent communication and documentation skills. (ref:hirist.tech)

Posted 4 weeks ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Ping Identity Good to have skills : NA Minimum 5 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and transitioning to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. Roles & Responsibilities: -Designing and Implementing IAM Solutions: -Utilizing PingOne DaVinci to design, implement, and maintain secure identity and access management solutions. -Creating and configuring applications within PingOne DaVinci. -Configuring flow policies for applications. -Designing and implementing authentication, registration, MFA, and password reset flows. -Integrating PingOne DaVinci flows into web applications using various methods (widget, API calls, OIDC, SAML). -Integrating PingOne SSO and identities within DaVinci flows. -Working with OAuth, OIDC, SAML, and Header-based authentication. -PingOne DaVinci Management and Development: -Managing PingOne DaVinci environments and connectors. -Creating, maintaining, testing, troubleshooting, and implementing identity orchestration flows. -Importing and exporting flows and creating/using subflows to manage complexity. -Configuring input and output schemas. -Expanding flow functionality with custom JavaScript. -Managing multiple flow versions. -Creating and configuring connector instances (e.g., HTTP, Challenge, Flow Conductor, Function, Code Snippet). -Building basic user interactions with DaVinci flows and customizing HTML templates for user experience. -Providing L1/L2 daily run support for PingOne CIAM platform, including user provisioning, authentication flows, and policy enforcement. -Monitoring platform health and performance, responding to alerts. -Troubleshooting and resolving incidents related to SSO, MFA, token exchanges, and directory syncs. -Supporting application onboarding and integration with PingOne. -Performing routine access reviews, audit log reviews, and user lifecycle management tasks. -Maintaining and updating runbooks, knowledge articles, and SOPs. -Collaborating with engineering and IAM architecture teams for issue escalation and permanent fixes. -Collaboration and Testing: -Participating in Scrum calls and other agile ceremonies. -Performing application unit and smoke testing. -Conducting A/B testing for user journey optimization. Professional & Technical Skills: -Strong expertise in PingOne DaVinci: In-depth understanding of its features, flow building, connector functionality, and application integration. -Identity and Access Management (IAM) Concepts: Solid understanding of federation, single sign-on (SSO), OAuth, OpenID Connect (OIDC), SAML, MFA, and related protocols. -Ping Identity Products: Experience with other Ping Identity products such as Ping Access, Ping Federate, Ping Directory, PingID, and PingOne for Customers/Workforce. -Directory Services: Experience with LDAP, Azure AD, and other cloud directories. -Programming/Scripting: Proficiency in JavaScript for custom flow functionality. Familiarity with API tools (e.g., Postman) and basic scripting (Shell, Python) for automation and diagnostics is often a plus. -API Integration: Experience with REST APIs and JSON. -Cloud Environments: Familiarity with IaaS and PaaS cloud environments (e.g., AWS, Azure). -Strong analytical and troubleshooting abilities to identify and resolve complex IAM issues. -Ability to design optimal solutions based on customer requirements. -Experience working in Agile/Scrum environments. -Understanding of ITIL-based environments (Incident, Change, Problem Management) is often preferred. -Certifications (Desired, not always mandatory): -Ping Identity Certified Professional – PingOne DaVinci. -Other Ping Identity certifications (e.g., PingFederate, PingAccess, PingDirectory). -CompTIA Security+, Certified Identity and Access Manager (CIAM), or equivalent. -This type of role is crucial for organizations looking to build seamless, secure, and optimized user experiences through intelligent identity orchestration. Additional Information: - The candidate should have minimum 5 years of experience in Ping Identity. - This position is based at our Gurugram office. - A 15 years full time education is required.

Posted 1 month ago

Apply

5.0 years

0 Lacs

Kanayannur, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM–Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What we look for Has hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

Coimbatore, Tamil Nadu, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM – Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For Is hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

Kanayannur, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM–Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What we look for Has hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 month ago

Apply

5.0 - 10.0 years

5 - 10 Lacs

Hyderabad / Secunderabad, Telangana, Telangana, India

On-site

Ping Directory Job Description : The cyber risk servicesIAM practice helps organizations in designing, developing, and implementing industry-leading IAM solutions to protect their information and confidential data, as well as help them build their businesses and supporting technologies to be more secure, vigilant, and resilient. The cyber risk servicesIAM team delivers service to clients through following key areas of IAM: LDAP Directory services User provisioning Privilege Identity Management Access certification Access management and federation Entitlements management Role management Strategy and road map for Identity & Access Management Strong authentication Responsibilities: Monitor alerts and perform routine health check of services. Troubleshoot technical issues and support incident management as per applicable SLA, provide root cause analysis and support problem management. Service request management according to processes and SLA Must have experience with Unix, Linux Windows Server 2008/2012/2016. Good understanding of overall configuration, troubleshooting, patch application, configuring replication, schema management, ACI management, encryption etc. of Directory server solution. Familiarity with password policy configuration in LDAP Directory server implementations. Experience on performance/tuning recommendations for Directory products and ability to document procedures for other engineers to follow. Ability to make SOX/audit-related assessments, document changes needed, deploy feasible changes. Good knowledge & experience in user administration, certificate management, group management. Administrative scripting experience using any scripting language- PowerShell, Perl, shell. Support multi-domain environment which may include hybrid setups like Active Directory and AzureAD. Good analytical & problem-solving skills, proficient communication, and leadership skills to drive client conversation. Willing to work in 24x7 shifts and provide weekend on-call support. Monitor service mailbox and support end user queries Generate reports for daily/periodic PAM administration or processes Support IT Risk or audit teams with reports, evidence, and process walkthroughs Support change documentation, change deployment and post-change validations Document and update Standard Operating Procedures (SOP) and operational runbooks Identify opportunities to improve process efficiencies and effectiveness. Qualifications and experience Required: 4+ years of experience managing PingDirectory, UnboundID, Oracle Unified Directory (OUD), Sun Directory or any combination of above. Have worked on rotational shift mode Preferred: Having experience on other IAM tools like CyberArk, Sailpoint, Okta, Quest, AzureAD will be a plus IAM technology certifications Exposure to other security domains other than Identity & Access Management

Posted 1 month ago

Apply

5.0 years

0 Lacs

Cochin

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM–Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your key responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills and attributes for success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What we look for Has hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What working at EY offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 month ago

Apply

5.0 years

0 Lacs

Kochi, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM – Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy andstandards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For Hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM – Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy andstandards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For Hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM – Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy andstandards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For Hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 month ago

Apply

7.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

About Ping Identity: At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. We call this digital freedom. And it's not just something we provide our customers. It's something that inspires our company. People don't come here to join a culture that's built on digital freedom. They come to cultivate it. Our intelligent, cloud identity platform lets people shop, work, bank, and interact wherever and however they want. Without friction. Without fear. While protecting digital identities is at the core of our technology, protecting individual identities is at the core of our culture. We champion every identity. One of our core values, Respect Individuality, reminds us to celebrate differences so you are empowered to bring your authentic self to work. We're headquartered in Denver, Colorado and we have offices and employees around the globe. We serve the largest, most demanding enterprises worldwide, including more than half of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital experiences, and identity and access management. Ping Identity has an industry-leading suite of products centred around industry standards such as SAML, OAuth, OIDC, WS-Trust, FIDO, LDAP etc. Our products include SSO, IDAAS, Directory, MFA, CIAM and cloud identity solutions. We are looking for a Sr.Technical Support Engineer with excellent troubleshooting skills to join the Global Support Organization at PingIdentity. Reporting to the technical support manager, you will be responsible for executing service requests and providing product support to customers on cloud environments. You will work closely with platform engineering in ensuring that customer inquiries are addressed, and that the products running in the cloud environment are well-maintained, while being exposed to several technologies and practices, such as AWS, Kubernetes, and devops. You will: Deliver excellent customer experience and exceed customer expectations on high-quality solutions, response and resolution times. Manage and execute service requests for customers on PingOne cloud platform. Monitor and Administer PingDirectory, PingFederate, and PingAccess in a devops environment Provide communication with and between customers and other supporting teams across the organization Contribute to knowledge resources, including creation, maintenance and enhancements of knowledge articles/documentation/solution guides (internal/external). Assist in coordinating and diagnosing issues with third-party tools used in customer environments Initiate and participate in incidents and root cause analyses as a product SME You have: 7 years related experience providing technical support at an Enterprise level. Advanced Certification or minimum 2 years experience supporting at least 2 of the following: PingDirectory PingFederate PingAccess Experience in Public Key Infrastructure (PKI), X.509 certificates, SSL/TLS. Experience working in a kubernetes environment Proficient in querying with tools like ElasticSearch/Kibana, Cloudwatch, Jira, etc. Experience with REST APIs, SCIM and debugging tools like PostMan, Fiddler, Wireshark etc. Troubleshooting web-based applications (through HTTP Tracing tools and log analysis) in browsers and applications servers. Proficient understanding of change management Excellent team player, actively participating in a collaborative environment, assisting colleagues with complex queries and sharing knowledge with global team members. Advanced troubleshooting skills in a technical environment. Life at Ping: We believe in and facilitate a flexible, collaborative work environment. We’re growing quickly, but remain true to the innovative, can-do startup values that got us here. Most importantly, we keep hiring talented, smart, fun, and genuinely nice people because that’s who we want to succeed with every day. Here are just a few of the things that make Ping special: A company culture that empowers you to do your best work. Employee Resource Groups that create a sense of belonging for everyone. Regular company and team bonding events. Competitive benefits and perks. Global volunteering and community initiatives Our Benefits: Generous PTO & Holiday Schedule Parental Leave Progressive Healthcare Options Retirement Programs Opportunity for Education Reimbursement Commuter Offset (Specific locations) Ping is the collective sum of all our individual experiences, backgrounds and influences and we pride ourselves in growing and learning together. We are committed to building an inclusive and diverse environment where everyone’s individuality is respected and everyone has an Identity. In recruiting for new colleagues, we welcome the unique contributions you can bring and encourage you to be your best self. We are an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex including sexual orientation and gender identity, national origin, disability, protected Veteran Status, or any other characteristic protected by applicable federal, state, or local law. Show more Show less

Posted 2 months ago

Apply

5.0 years

0 Lacs

Coimbatore, Tamil Nadu, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM–Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team.In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most criticallythe OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 5 – 8 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For Who has hands on experience in setting up the Identity and Access Management environment in standalone and cluster environment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 months ago

Apply

5.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM–Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification : Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 months ago

Apply

4.0 - 9.0 years

6 - 12 Lacs

Chennai

Work from Office

Job Summary: Seeking an experienced Ping Directory Specialist to manage directory services and IAM solutions. Key Responsibilities: Deploy, configure, and manage PingDirectory and associated IAM tools. Ensure system scalability and high availability. Implement security best practices in identity access management. Troubleshoot and resolve directory-related issues. Qualifications: Bachelor's in Computer Science/Engineering. Minimum 3 years of experience in PingDirectory. Familiarity with LDAP, SSO, and authentication protocols.

Posted 2 months ago

Apply

5.0 years

0 Lacs

Kanayannur, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM–Consulting- Risk As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy and standards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment of PingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. Skills And Attributes For Success Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most critically the OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider – Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products – Ping Federate, Ping Access. To qualify for the role, you must have. B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years’ Work Experience. Certification: Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification. What We Look For hands on experience in setting up the Identity and Access Management environment in standalone and cluster onment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies