Jobs
Interviews

1305 Sailpoint Jobs - Page 40

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 7.0 years

4 - 9 Lacs

Chennai

Work from Office

Diverse Lynx is looking for Sailpoint IIQ Developer to join our dynamic team and embark on a rewarding career journey. Responsible for designing, developing, and implementing solutions using SailPoint IdentityIQ. Collaborating with clients to gather and understand business requirements for identity and access management (IAM) solutionsDesigning and implementing SailPoint IdentityIQ solutions that meet client needsDeveloping and customizing SailPoint workflows and connectorsIntegrating SailPoint solutions with client systems and applicationsParticipating in testing and quality assurance of SailPoint solutionsProviding technical support and troubleshooting for SailPoint solutionsStrong understanding of identity and access management principles. Strong problem-solving and analytical skills, excellent communication and collaboration skills.

Posted 2 months ago

Apply

7.0 - 10.0 years

9 - 12 Lacs

Gurugram

Work from Office

KeySkills: JAVA, PYTHON, PRIVILEGED ACCESS MANAGEMENT ARCHITECT, PRIVILEGE, IDENTITY ACCESS MANAGEMENT (PAM) SYSTEMS, ACTIVE DIRECTORY, MFA PROCESS, IAM PROTOCOLS, SAILPOINT, SAVIYNT, BEYONDTRUST, CYBERARK, DELINEA, THYCOTIC, ON-PREM, CLOUD BASED PAM SOLUTIONS, IDENTITY SECURITY DOMAIN, CYBERSECURITY CONTROLS, PAM INFRASTRUCTURE SYSTEMS, HLD, LLD, IMPLEMENTATION GUIDE, OPERATION MANUALS As a Privileged Access Management Architect, your role and responsibilities would include: Hands-on expertise on Designing, developing, testing, implementing, and integrating Privilege and Identity Access Management (PAM) systems with a large enterprise Expertise with Active Directory, MFA process and IAM protocols, etc. for authentication Experience with identity governance products like SailPoint, Saviynt, BeyondTrust etc Experience in Privilege Access Management products like CyberArk, Delinea, Thycotic Hands-On expertise for On-Prem as well as cloud based PAM solutions. Hands on experience in the Identity Security domain Assessing requirements for PAM solutions to meet stakeholders needs Designing technical cybersecurity controls and define standards and best practices in the application of PAM principles and best practices Driving requirements and design specifications for privileged access management solutions and collaborating with others in performing these activities Providing escalation support for production PAM infrastructure systems and processes where applicable Identifying and documenting privileged account management business and technical use cases Developing PAM best practices and solutions for common client problems Facilitating the continuous adoption, training, communication, and education of PAM capabilities, functions, and standards to our teams and clients. Very good with documentation of HLD, LLD, Implementation guide and Operation Manuals

Posted 2 months ago

Apply

3.0 - 4.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM–Consulting- Risk As part of our EY-cyber security team, you shall engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. You’ll also identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, you’ll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity We’re looking for Security Analyst / Consultant in the Risk Consulting team to work on various Identity and Access Management projects for our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EY’s commitment to quality, you’ll confirm that work is of the highest quality as per EY’s quality standards and is reviewed by the next-level reviewer. As an influential member of the team, you’ll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your Key Responsibilities Engage and contribute to the Identity & Access Management projects Work effectively as a team member, sharing responsibility, providing support, maintaining communication and updating senior team members on progress Execute the engagement requirements, along with review of work by junior team members Help prepare reports and schedules that will be delivered to clients and other interested parties Develop and maintain productive working relationships with client personnel Build strong internal relationships within EY Consulting Services and with other services across the organization Help senior team members in performance reviews and contribute to performance feedback for staff/junior level team members Contribute to people related initiatives including recruiting and retaining IAM professionals Maintain an educational program to continually develop personal skills Understand and follow workplace policies and procedures Building a quality culture at GTH Manage the performance management for the direct reportees, as per the organization policies Foster teamwork and lead by example Training and mentoring of project resources Participating in the organization-wide people initiatives Skills And Attributes For Success Hands-on experience on end to end implementation of Identity and Access Management tool. Completed at least 2-5 implementations. Good understanding of Identity Access Management solutions. Hands-on Java development and debugging experience. Strong Understanding of Java API’s, libraries, methods and good understanding of XML. Should be capable of dissecting large problems and designing modular, scalable solutions. Familiarity with any Java Framework (Struts/ Spring) is an additional advantage. Should be familiar with application servers such as Tomcat and WebLogic. Should have good understanding of RDMS and SQL queries. Hands-on experience in setting up the Identity and Access Management environment in standalone and cluster environment. Hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. Strong understanding of LDAP (Lightweight Directory Access Protocol). Capability of understanding the business requirements and converting that into design. Good knowledge of information security, standards and regulations. Should be flexible to work on new technologies in IAM domain. Worked in capacity of techno-functional role of Identity and Access Management Implementation. Worked in client facing role. Need to be thorough in their respective tool with hands-on experience involving configuration, implementation & customization. Deployment of web application & basic troubleshooting of web application issues. Need to liaise with Business stakeholders and seek requirement clarification. Should be able to map business requirements to technical specifications. Use case design, Solution Requirements Specification and mapping business requirements to technical requirements (Traceability Matrix). Architecture Design (optimising the resources made available – servers and load sharing etc.). Involvement in a successful pursuit of a potential client by being part of the RFP response team. To qualify for the role, you must have Bachelor or master’s degree in related field or equivalent work experience Strong command on verbal and written English language. Experience in HTML, JSP and JavaScript. Strong interpersonal and presentation skills. 3 - 4 Years relevant Work Experience Skills Expertise Experience in implementing at least two IAM engagements, including requirements gathering, analysis, design, development, testing, deployment, and application support (SailPoint/OIM/CyberArk/Beyond trust/Thycotic). Experience in carrying out advanced application integration with the IAM solution dealing with advanced provisioning (e.g., multilevel workflows), single sign-on (WIA, Forms, HTTP), and PKI concepts Experience in technologies, such as Java, LDAP, SSL RDBMS, and Linux Good knowledge of Web/application servers (IIS, WebSphere, WebLogic, JBoss, and Apache) Experience in development/configuration of standard/custom IAM integrations using Java, .Net, or other major scripting languages Experience in hands-on development, estimations, sizing, and custom IAM integrations Advanced documentation and presentation skills and well-versed with software development life cycle processes Ability to create, plan, and execute advanced IAM trainings and independently drive proof of concepts involving emerging IAM technologies Exposure to process frameworks and methodologies Excellent verbal and written communication Certifications (preferred): CyberArk Trustee, CyberArk Defender, CyberArk Sentry ITIL or equivalent Work Requirements: Willingness to travel as required Willingness to be on call support engineer and work occasional overtime as required Willingness to work in shifts as required What We Look For Who has hands on experience in setting up the Identity and Access Management environment in standalone and cluster environment. Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 months ago

Apply

1.0 - 6.0 years

6 - 10 Lacs

Pune

Work from Office

Job Role: Access management Location: Pune Experience: 1+ years Roles and responsibilities Information Security Analyst with demonstrated knowledge and experience in Access Management Operations specific to Active directory and Windows platform in terms of Provisioning and De Provisioning access as per the requirement. The Analyst should be able to work well with teams and work independently. Job Description: Provisioning and De Provisioning of access to users through Active Directory. Analyse and resolve tickets related to Security groups, Privileged accounts and Enterprise password vaulting. Should be able to work and resolve requests related to Service Accounts. Proactive in identifying gaps and helping the team in streamlining process Ability to identify and contribute towards mitigating risk. Collaborates with extended team for joint deliverables Good understanding on File share, permissions, DFS, namespace, and replication. Analyst will be part of on call support team on rotation Should be flexible to work in shifts(24*7)

Posted 2 months ago

Apply

6.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Overview We are looking for a skilled and motivated Full Stack Developer with 6+ years of experience and a strong background in Identity and Access Management (IAM) automation to join our dynamic IT Security team. In this role, you will play a key part in designing, developing, and implementing end-to-end automation solutions that support and enhance our IAM systems. Your full stack expertise will be instrumental in streamlining complex IAM processes, strengthening security, and driving operational efficiency across the organization. Responsibilities Full Stack Automation Development: Design, develop, and maintain end-to-end automation solutions for Identity and Access Management (IAM) processes such as user provisioning, de-provisioning, access reviews, and role-based access control. Technology Integration: Leverage scripting languages (e.g., Python, PowerShell), full stack development tools, and IAM platforms (e.g., SailPoint, Okta, Azure AD) to build scalable and secure automation solutions. API & Workflow Development: Build and integrate with RESTful APIs and third-party systems to streamline IAM workflows across the organization. Working knowledge on database, writing & tuning store procedures, preferably Oracle UI Development experience/ integrating services with UI using React Process Optimization: Evaluate existing IAM operations to identify automation opportunities, reduce manual intervention, and improve overall process efficiency. Security & Compliance: Implement solutions that align with security best practices and compliance requirements, ensuring confidentiality, integrity, and availability of sensitive identity data. Cross-Team Collaboration: Partner with IAM specialists, DevOps teams, and business stakeholders to gather requirements, prototype solutions, and drive project delivery. Documentation & Standards: Create clear and thorough technical documentation for developed code, workflows, and standard operating procedures. Issue Resolution: Monitor, debug, and resolve technical issues related to IAM systems and automation scripts. Continuous Innovation: Stay up to date with emerging technologies and trends in IAM, automation, and software development to propose and implement continuous improvements. Qualifications Experience: 7+ years of hands-on experience in Full stack and API development. Technical Skills: Strong scripting skills in Python or PowerShell. Experience with IAM tools such as Broadcom Identity Manager, Okta, or Azure AD. Knowledge of REST APIs and web services. IAM Knowledge: Solid understanding of IAM concepts, principles, and best practices. Problem-Solving: Excellent analytical and problem-solving skills. Communication: Strong verbal and written communication skills. Teamwork: Ability to work effectively in a collaborative team environment. Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Kanayannur, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Sailpoint JD :- Ability to drive IGA projects including project management, team management, client management. Should have experience in implementing at least one complete IAM SDLC engagements projects. This must include activities such as requirements gathering, analysis, design, development, testing, deployment and application support Must have experience in SailPoint IIQ & IDN architecture, design, development, configuration, testing, integration, and deployment. Must have experience in source/ Identity profile configuration, transform/rule development, workflow configuration, JML process and certification, Password sync. Must have experience in onboarding AD, JDBC and web service applications to IIQ/IDN Must have experience in deployment of virtual appliance, understanding different VA architecture, deploy rules in cloud/VA, High availability/DR configuration Configuration and deployment of IQService in cloud and on-prem environments Must have hands on experience in configuring quick link, custom work flow, reports, developing service account management modules, integration with other tools like Service Now, CyberArk etc and plugin development IIQ Installation, set up and initial configuration/ upgradation to different versions of IIQ, Standard service build set up and configuration Professional IT certifications are a plus. Excellent verbal and written communication skills. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

Exp 7 - 10 Y Job Posting Title Sr Sail Point Developer Job Profile Sr Sail Point Developer Description Seeking an experienced SailPoint Engineer. Must be skilled at: Strong IAM concepts Core Responsibilities Implementing/onboarding and supporting activities for applications in SailPoint. Supporting the full systems development life cycle (“SDLC”) (concept, requirements, design, development, testing, release, production support) Complying with development and Macquarie process standards during all stages in the systems development life cycle (“SDLC”) / Agile Methodology. Debugging issues to reduce orphan accounts count and making sure that the system is functioning as expected Producing and maintaining technical, business support confluences. Applying enhancements for applications on SailPoint. Business Responsibilities Seeking an experienced SailPoint Developer to join our Macquarie Asset Management (MAM) Technology team. The ideal candidate must be competent to operate as: JAVA Developer SailPoint Specialist Strong IAM concepts Business Responsibilities Planning, executing, and managing own tasks and responsibilities Developing and customizing solutions to meet Macquarie’s IAM requirements Understanding the business that the application supports Providing status updates regularly and proactively Identifying and escalating risks that may impact the application or project Being self-motivated, being proactive, and displaying drive to succeed Having an excellent client service attitude Skills Expertise in core Java development Good communication skills and ability to work with a geographically distributed team Ability to analyse functional requirements and translate into solution designs wherever possible. Open to suggest scalable approaches and callout inefficiencies Knowledge or experience with SailPoint IIQ is mandatory, specifically: Application onboarding Rule creation - build map, correlation, creation, pre-delegation, exclusion rules Creation and configuration of IIQ objects such as applications, certifications, policies, reports, roles, tasks, workflows, etc. Experience with API implementation through SCIM servers/webservices. Analysis, development of provisioning and service integrations such as Remedy/JIRA etc Role Mining and implementing RBAC Understanding conflicts and implementing SODs Developing customised forms for Access provisioning Having varied experienced with Sailpoint OOTB connectors Able to understand and analyse complex IAM domain Background Corporate Operations Group (COG) provides specialist professional services, human resources, workplace infrastructure, and technology and market operations to Macquarie's businesses. The primary purpose of COG is to support and enhance the value of Macquarie through the creation of an efficient, scalable operating model. This is evident across the activities of each of the divisions which comprises of Business Improvement and Strategy Division (BIS), Business Services Division (BSD), COG Business Management, Human Resources Division (HR), Market Operations and Technology. S YNECHRON’S DIVERSITY & INCLUSION STATEMENT Diversity & Inclusion are fundamental to our culture, and Synechron is proud to be an equal opportunity workplace and is an affirmative action employer. Our Diversity, Equity, and Inclusion (DEI) initiative ‘Same Difference’ is committed to fostering an inclusive culture – promoting equality, diversity and an environment that is respectful to all. We strongly believe that a diverse workforce helps build stronger, successful businesses as a global company. We encourage applicants from across diverse backgrounds, race, ethnicities, religion, age, marital status, gender, sexual orientations, or disabilities to apply. We empower our global workforce by offering flexible workplace arrangements, mentoring, internal mobility, learning and development programs, and more. All employment decisions at Synechron are based on business needs, job requirements and individual qualifications, without regard to the applicant’s gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. Candidate Application Notice Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Chennai

On-site

Job requisition ID :: 83726 Date: Jun 2, 2025 Location: Chennai Designation: Director Entity: Identity and Access Management Director: As a Director in our Cyber: Identity Team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - Lead end-to-end program delivery for large-scale IAM transformations (including IGA, CIAM, PAM, SSO, MFA) or Managed Service Develop and manage program plans, budgets, timelines, and stakeholder reporting. Coordinate cross-functional teams across business, IT, and third-party vendors. Identify and mitigate project risks and dependencies to ensure successful delivery. Manage service transition, SLAs and KPIs for operate engagement. Engage with business stakeholders and executives to align IAM roadmap with business needs. Define IAM architecture strategy, including integration with HR systems, directories, cloud platforms, and applications. Design scalable solutions for identity lifecycle management, access governance, privileged access, and authentication/authorization models. Evaluate and select IAM technologies (e.g., SailPoint, Saviynt, ForgeRock, Okta, Azure AD, Ping). Establish standards and patterns for IAM implementations aligned with Zero Trust and regulatory compliance. Define IAM governance models, policies, and controls. Drive access certification campaigns, role-based access control (RBAC), and segregation of duties (SoD) policies. Participate and manage proposal responses, provide solution, estimation and build client presentations. Desired qualifications Experience in cybersecurity and identity management, including hands-on and leadership roles. Proven experience delivering complex IAM programs across large enterprises. Strong understanding of IAM protocols and standards (SAML, OAuth2, OpenID Connect, SCIM, LDAP). Experience with identity platforms such as SailPoint, Saviynt, Okta, Azure AD, Ping Identity, or ForgeRock. Strong program management experience with PMP/Prince2/Agile/SAFe methodology. Support experience with understanding on ITIL. Excellent communication and stakeholder engagement skills.

Posted 2 months ago

Apply

4.0 years

0 Lacs

India

Remote

This Position essentially requires only SAILPOINT Experience Are you an IAM expert looking to elevate your career? Join Inspira Enterprise and be part of a global security powerhouse delivering transformative solutions across industries. 🔍 We are Hiring for: 👉 SailPoint Developer / Implementation / Operations Specialists 👉 Experience: 4+ years 👉 Skills: Hands-on with Java, Python, PowerShell, Beanshell scripting 🎓 Education: Open to any graduate 🌍 Location: Anywhere in India (Remote/Hybrid – as applicable) 💼 Why join us? ✅ Work on global IAM projects ✅ Collaborate with cross-functional security experts ✅ Thrive in a growth-driven, innovation-led environment If Selected in first round, candidate should be available for in-person interview (Across locations) Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Want to be on a team that full of results-driven individuals who are constantly seeking to innovate? Want to make an impact? At SailPoint, our Engineering team does just that. Our engineering is where high-quality professional engineering meets individual impact. Our team creates products are built on a mature, cloud-native event-driven microservices architecture hosted in AWS. This role is responsible for managing a team of very experienced software engineers who are responsible for the technical development of the SailPoint product, writing quality code and debugging tough problems. To lead this team, we are looking to bring on an experienced and motivational manager who will be responsible for leading all aspects of the design and development of our software. A background in Agile software development environment is preferred. Key Responsibilities: • Day-to-day leadership of the Engineering team. • Partnering with Product Management to ensure the team has a clear strategic direction and roadmap. • Resource allocation for key projects. • Coaching engineers to develop their full potential. • Project planning – identifying, scoping, prioritizing, tracking and reporting deliverables and milestones. • Managing risk and issues. Requirements: Good understanding of software development in Go /Java •Bachelors degree in Computer Science, Engineering, MIS or similar • Results focused with a track record of success working in an Agile environment. • Experience building and managing a team of Software Engineers • An exceptional mentor and leader with a passion for continuous improvement. • Excellent organization and communication skills. • Ability to pick up new technologies quickly. • Pro-active, flexible and a people person. Location: This position is based in Pune, India Education (preferred, not required): B.E / B.Tech or equivalent experience What success will look like in this role :- 30 days HR onboarding, Finance & IT team update on policies, Overview about the product Laptop setup, outlook/slack setup, get added to respective DLs Introduction with local team, meet and greet managers, meet US managers/Leaders/Product Manager Complete the compliance trainings & essentials Identity University courses Understand Tech stack, product architecture and work area (workflow & forms) 60 days Start setting up 1 on 1 with team members, understand team dynamics & WIP Start to review Quarterly OKRs/Roadmap, backlogs and challenges, Processes/Policies etc Understand what works, what does not, get to know about team retros DevOps and tech stack Have environment setup and code access to review those Continue learning and gaining knowledge on product/services/functionalities 90 days Smooth running team ceremonies - daily sync ups, grooming, retros, bug scrums Track the SAASTriage incidents and tech debts for the team Identity Security Cloud big picture and details on different microservices used for workflow/forms Work with US Managers to set direction for the team, OKRs Roll out changes you want to implement for short term and plan strategies for long term SailPoint is an equal opportunity employer and we welcome all qualified candidates to apply to join our team. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other category protected by applicable law. Alternative methods of applying for employment are available to individuals unable to submit an application through this site because of a disability. Contact hr@sailpoint.com or mail to 11120 Four Points Dr, Suite 100, Austin, TX 78726, to discuss reasonable accommodations. Show more Show less

Posted 2 months ago

Apply

56.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Join our global team and gain exposure to the technology stack across different Macquarie business groups, while maintaining a risk mindset and operational excellence to provide access to our people and protect our information assets. At Macquarie, our advantage is bringing together diverse people and empowering them to shape all kinds of possibilities. We are a global financial services group operating in 31 markets and with 56 years of unbroken profitability. You’ll be part of a friendly and supportive team where everyone - no matter what role - contributes ideas and drives outcomes. What role will you play? In this role, you will work with a collaborative and dynamic team. You will be able to maintain a level of ownership, access and accountability for the technology stack that will help you expand your skills and expertise in identity access management and cyber security. What You Offer Knowledge of Microsoft Active Directory, Database (Sybase/MS-SQL/Oracle), Microsoft Excel, SQL Workbench, Alteryx, and scripting languages like BeanShell and Java; substantial experience in the administration of SailPoint and the Joiner/Mover/Leaver process; Excellent verbal and written communication skills and strong analytical and troubleshooting skills; Possesses ability to remain calm under pressure whilst managing concerns and urgent issues; Demonstrates accountability and ownership of critical issues until they are resolved; Customer-focused and views opportunities for process improvement. We love hearing from anyone inspired to build a better future with us, if you're excited about the role or working at Macquarie we encourage you to apply. About Technology Technology enables every aspect of Macquarie, for our people, our customers and our communities. We’re a global team that is passionate about accelerating the digital enterprise, connecting people and data, building platforms and applications and designing tomorrow’s technology solutions. Our commitment to diversity, equity and inclusion We are committed to fostering a diverse, equitable and inclusive workplace. We encourage people from all backgrounds to apply and welcome all identities, including race, ethnicity, cultural identity, nationality, gender (including gender identity or expression), age, sexual orientation, marital or partnership status, parental, caregiving or family status, neurodiversity, religion or belief, disability, or socio-economic background. We welcome further discussions on how you can feel included and belong at Macquarie as you progress through our recruitment process. Our aim is to provide reasonable adjustments to individuals who may need support during the recruitment process and through working arrangements. If you require additional assistance, please let us know in the application process. Show more Show less

Posted 2 months ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

SailPoint is seeking a talented Recruiting Coordinator to join the People Operations team supporting our India team. The People Operations team is focused on supporting SailPoint’s global expansion and scale, through key recruiting programs, technology, processes and creating delivery services in support of the recruiting and onboarding. The Recruiting Coordinator is responsible for the administrative duties throughout the candidate/recruiting life cycle. The ideal candidate is self-directed, detail-oriented, and driven to contribute to the growth and success of the company. The right coordinator cares about the candidate’s experience, is attentive to their needs, and is always searching for new ways to make their experience better. You will support the Talent Acquisition team with the day-to-day recruiting functions such as scheduling interviews, corresponding with candidates, and facilitating candidate and new hire correspondence. Responsibilities: Coordinate all aspects of candidate interviews, including phone interviews, onsite and virtual interviews, confirming schedule with hiring managers, and arranging candidate travel (if applicable). Champion for candidate interview and pre-boarding experience by partnering closely with the Recruiter and Hiring Manager to help candidates through the interview process Attention to detail in a fast-paced, ever-changing work environment while driving the interview process from start to finish Support Talent Acquisition/HR/People Operation to ensure a seamless recruiting experience Maintain compliance with federal and state regulations concerning employment Assisting with or conducting various HR tasks. Requirements: 3+ year of successful experience within an administrative/support function in a similarly fast-paced or high-volume environment Ability to communicate with individuals at all levels of the organization and maintain positive relationships internally and externally. Track record of delivering extraordinary customer service Requires attention to detail and the ability to demonstrate a high degree of quality and accuracy in work Ability to multi-task and exercise sound judgment and make decisions Self-motivated and able to work with minimal supervision. Take ownership and pride in work. Ability to work well within time sensitive deadlines and under pressure. This position requires a high level of confidentiality and integrity What you’ll get: Experience in HR working with one of the hottest companies on the planet! Building a career, making an impact, and experiencing SailPoint People, Values, and Culture. What success looks like in the role Within 30 days: You will gain an understanding of our tech stack including Workday, Rooster, ServiceNow, and Slack. You will also start to build relationships within the People Ops and TA teams. You’ll soak up knowledge through our knowledge portal, employee handbook, and corporate policies. Within 90 days: You will be fluent in the systems and have built strong relationships with the team mentions above, along with hiring managers and other key stakeholders. You will be scheduling candidate interviews independently. Within 6 months: You will have all the knowledge necessary to independently schedule interviews and solve scheduling challenges and reschedules. You will understand basic recruiting operations and give recommendations for improvements in our processes. Within 1 year: You will be an expert in all of the above plus spearhead ad hoc requests and troubleshooting with recruiters, hiring teams, and candidates. You will be able to assist with employment agreements and administrative onboarding tasks as needed. SailPoint is an equal opportunity employer and we welcome all qualified candidates to apply to join our team. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other category protected by applicable law. Alternative methods of applying for employment are available to individuals unable to submit an application through this site because of a disability. Contact hr@sailpoint.com or mail to 11120 Four Points Dr, Suite 100, Austin, TX 78726, to discuss reasonable accommodations. Show more Show less

Posted 2 months ago

Apply

0.0 - 17.0 years

0 Lacs

Ahmedabad, Gujarat

On-site

Position Overview As a Senior Solution Architect, you will be a strategic leader, architecting and guiding the implementation of sophisticated technology solutions for both our innovative product development and critical client service engagements. Leveraging 12-17 years of deep experience, you will bridge business objectives with technological execution, ensuring robust, scalable, secure, and strategically aligned solutions our clients. This pivotal role demands a unique synthesis of profound technical expertise, sharp business acumen, and exceptional leadership to navigate the dual demands of product innovation and bespoke service delivery across diverse projects and technologies. You will define the technical vision and drive its uccessful realization. Key Responsibilities Your responsibilities will span strategic design, product and service lifecycle management, technical leadership, stakeholder engagement, and governance. Strategic Solution Design &Architecture  Translate complex business strategies, product requirements, and client needs into comprehensive architectural blueprints for both product offerings and customized service solutions. Lead architectural vision and strategy across internal product roadmaps and client projects, adapting fluidly to shifting contexts.  Ensure all solutions are inherently scalable, resilient, secure by design, and strategically aligned with our clients' enterprise architecture and business goals. This alignment is critical for long-term viability and maximizing technology investments.  Evaluate, select, and champion appropriate technologies, platforms, architectural patterns (e.g., microservices, serverless, EDA), and design principles tailored to each product feature or service engagement, profoundly influencing evolutionary capacity and deployment efficiency.  Develop, maintain, and enforce comprehensive architectural documentation (diagrams,standards, best practices) for clarity and consistency across product and service teams. Product & Service Lifecycle Management  Collaborate with product management to define and refine product architecture, influence roadmaps with technical insights, and ensure technical feasibility and architectural soundness of new features. Early involvement is crucial for preempting costly missteps.  Partner with service delivery and client engagement teams to design and customize solutions aligned with client expectations, contracts, and operations, requiring nuanced understanding of service design and adaptability.  Oversee architectural integrity during implementation, providing decisive technical leadership and mentorship to development and delivery teams across product and service projects.  Conduct rigorous architectural reviews and assessments, ensuring adherence to design principles, quality benchmarks, and non-functional requirements across all projects. Technical Leadership & Mentorship  Provide expert technical guidance, strategic advice, and dedicated mentorship to engineering teams and fellow architects, fostering continuous learning.  Champion architectural best practices, advocate for emerging technologies, and drive a culture of innovation and technical excellence.  Lead and oversee proof-of-concept (PoC) projects to evaluate new technologies and architectural approaches before wider adoption, de-risking innovation. Stakeholder Management & Communication  Serve as the primary technical liaison and trusted advisor, bridging communication between business leaders, product management, engineering, service delivery, and clients.  Clearly and persuasively articulate complex architectural concepts, strategic decisions, risks, and trade-offs to technical and non-technical audiences, including C-level executives.  Proactively manage stakeholder expectations, negotiate priorities, and resolve conflicts regarding architectural direction and technology choices. Governance & Continuous Improvement  Establish, implement, and manage robust architecture governance frameworks to ensure compliance with standards, best practices, and strategic objectives.  Conduct thorough feasibility studies, risk assessments, and cost-benefit analyses for proposed solutions and architectural changes.  Continuously evaluate and recommend strategic improvements to architectures, processes, and technology stacks to enhance efficiency, performance, scalability, and reduce TCO.  Stay abreast of the latest industry trends, emerging technologies, architectural paradigms, and best practices relevant to solution architecture, product development, and service delivery. Required Skills & Experience General Experience  Minimum 12-17 years in IT, with 8+ years in solution architecture, enterprise architecture, or senior technical leadership, significantly influencing large-scale technology outcomes.  Proven track record of successfully designing and delivering complex, large-scale technology solutions within both product development and client service delivery contexts. Technical Expertise  Cloud Platforms: Extensive hands-on experience architecting and deploying solutions on major public cloud platforms (AWS, Azure, GCP), including IaaS, PaaS, SaaS, cloud-native services, multi-cloud/hybrid-cloud strategies, cost optimization, and security best practices.  Modern Architectural Patterns: Expertise in designing and implementing solutions using microservices, serverless, EDA, API-driven design, and DDD.  DevOps & Automation: Strong understanding and experience with DevOps principles, CI/CD pipelines, IaC tools (e.g., Terraform), and containerization (Docker, Kubernetes).  Data & AI/ML: Solid experience with data architecture principles (big data, data lakes, data warehousing, real-time streaming) and familiarity with integrating AI/ML capabilities (LLMs, GPT, predictive analytics). A proven track record of leveraging AI-driven tools, such as GitHub Co-Pilot, OpenAI, and Gemini, in daily workflows to improve efficiency, refine project estimations, and drive substantial productivity gains.  Security Architecture: In-depth knowledge of security architecture principles, IAM solutions (e.g., SailPoint, Okta), threat modeling, data protection, and compliance (e.g., GDPR, HIPAA).  Integration Technologies: Proficiency in designing integration solutions using API-first design (REST, GraphQL), API management platforms, message queuing (e.g., Kafka), and EIP.  Software Development Background: Strong foundational understanding of software development principles and familiarity with common programming languages (e.g.,Java, Python, C#) and frameworks (e.g., Spring Boot, .NET Core).  Enterprise Systems: Experience with the architecture and integration of common enterprise systems (ERP, CRM, HRMS).  Interconnected Technical Skills: Ability to synthesize diverse domains (e.g., microservices on Kubernetes in AWS with CI/CD, real-time data for AI/ML, secured by IAM and APIs). Methodologies  Deep understanding and practical experience applying Agile methodologies (Scrum,Kanban) and principles, with Scaled Agile Framework (SAFe) experience highly desirable.  Familiarity with IT Service Management (ITSM) frameworks such as ITIL is advantageous.  Experience applying Agile and SAFe in a hybrid product development and client service delivery model. Business Acumen  Strong ability to understand business strategies, market dynamics, competitive landscapes, and client requirements, translating them into impactful technology solutions.  Proven experience in conducting feasibility studies, risk assessments, and TCO/ROI analyses.  Ability to think strategically and holistically, anticipate technology trends, and advise on long-term architectural roadmaps. Leadership & Influence  Proven ability to lead, mentor, coach, and inspire technical teams, fostering collaboration and innovation.  Demonstrated experience influencing senior management and C-level executives on strategic technology decisions.  Capacity to drive organizational change and champion new architectural paradigms.  Effective servant leadership style, providing vision and guardrails while empowering teams. Communication & Interpersonal Skills  Exceptional verbal, written, and presentation skills, articulating complex technical concepts to diverse audiences.  Excellent interpersonal skills, including negotiation, conflict resolution, and consensus building.  Proven stakeholder management capabilities, building trust and strong working relationships. Problem-Solving & Analytical Skills  Advanced analytical, critical thinking, and problem-solving abilities with a data-driven approach.  Proven capacity to analyze complex situations, identify root causes, and develop innovative solutions.  Keen attention to detail in architectural design, documentation, and review. Preferred Qualifications  Master's degree in Computer Science, IT, Software Engineering, or related field.  Relevant and current industry certifications (e.g., TOGAF, AWS/Azure/GCP Architect, SAFe for Architects, CISSP).  Demonstrable experience within relevant industry verticals.  Record of thought leadership (publications, presentations, open-source contributions). Job Type: Full-time Pay: ₹2,000,000.00 - ₹4,200,000.00 per year Schedule: Day shift Location: Ahmedabad, Gujarat (Required) Work Location: In person

Posted 2 months ago

Apply

8.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Entity: Technology Job Family Group: IT&S Group Job Description: You will work with This role collaborates closely with the Business Teams, ERP Sustain & Operations Team & the ERP Transformation Programme to design and implement best-in-class Identity solutions in SAP. You will work alongside business stakeholders, enterprise architects, functional consultants, and third-party vendors to develop and integrate the solution. This role will work within the Technology DevOps Team and is expected to work in close collaboration with geographically diverse stakeholders including Global Functional and Technical Product Managers and Owners and to collaborate with wider teams within Technology. Let Me Tell You About The Role As a Senior Enterprise Technology Engineer (Identity and Access Management) your responsibility will be to oversee the delivery and governance of the access security and compliance elements for core SAP ERP solutions, including ECC, S4HANA, HANA, SAP Ariba, SAP Fieldglass, SAP Analytics Cloud, SAP Fiori, GRC etc. This includes collaborating with stakeholders to articulate the vision for access control, along with the border roadmap and product strategy. Additionally, you will work with a team of highly skilled Enterprise Technology Engineers and Software Engineers to address pain points and develop scalable, secure, and dynamic access models across bp applications. You will play a critical part in the company’s digital transformation efforts to drive operational security and efficiency. What you will deliver: Develop and implement comprehensive security strategies for core SAP ERP solutions (e.g. ECC, S4HANA, HANA, SAP Ariba, SAP Fieldglass, SAP Analytics Cloud, SAP Fiori, GRC etc.) that align with organizational security policies and compliance requirements. Define, implement, and manage access controls and user permissions to ensure appropriate access levels are maintained. This includes overseeing the provisioning, modification, and deactivation of user access based on organizational changes and user role definitions. Conduct thorough risk assessments for the core SAP ERP solutions (e.g. ECC, S4HANA, HANA, SAP Ariba, SAP Fieldglass, SAP Analytics Cloud, SAP Fiori, GRC etc.), identifying potential vulnerabilities and implementing measures to mitigate risks. This also involves staying updated with the latest security trends and potential threats to the SAP system. Develops to become the subject matter expert helping to shape the future roadmap of access control by adopting the newest and latest technologies as they emerge. Works with the business to understand requirements and helps develop and quality assure standards ensuring robust security and development principal adoption. Contributes to bp’s broader Identity and Access Management products ensuring synergies in solution designs and deployment models. Ensure that the core SAP ERP solutions systems comply with legal, regulatory, and internal policies. This involves preparing for audits, facilitating the audit process, and implementing recommendations from audit findings. Respond to and investigate security incidents and breaches, including providing a rapid response to mitigate impacts. Document incidents and develop preventative measures to avoid future occurrences. Regularly up to date with industry security best practice and collaborate or share internally for improvement Continuously review and improve security policies, practices, and measures to enhance the security landscape of the SAP systems. This may involve implementing new technologies or processes to strengthen security. The safety of our people and our customers is our highest priority. The role will advocate and lead in this and promote a culture of security and safety in everything that we do. Work as part of evolving multi disciplinary teams which may include Software Engineers, Enterprise Technology Engineers, Designers, SecOps, and Product owners to deliver value through the application of specialist skills Support recommendation of the correct strategic platforms to solve a problem based on business requirements using your expertise Work with vendors and partners providing market solutions to optimize the usage and value which can be delivered from the appropriate technology platform Act as a thought leader in the areas of your technology specialism helping to shape forward roadmaps, upcoming features and opportunities to unlock future Ensure operational integrity of what you build, assuring operational compliance with architectural and security standards, as well as compliance and policy controls refined by Strategy. Mentor others and become a conduit to connect the broader organization. What you will need to be successful (experience and qualifications) Technical Skills We Need From You Experience working with at least one of RBAC/PBAC/ABAC concepts across multiple applications. Experience in understanding how to interpret and deploy compliance standards across an enterprise. Proven track record in implementing, configuring, and maintaining authorization security solutions for core SAP ERP solutions (e.g. ECC, S4HANA, HANA, SAP Ariba, SAP Fieldglass, SAP Analytics Cloud, SAP Fiori, GRC etc.). Experience should include security setup, integration with other enterprise systems, and ongoing management. Experience leading security deployment projects, especially for large-scale on core SAP ERP solutions (e.g. ECC, S4HANA, HANA, SAP Ariba, SAP Fieldglass, SAP Analytics Cloud, SAP Fiori, GRC etc.). Skills in project planning, resource allocation, and timeline management are crucial. Understanding of compliance requirements that impact the procurement and external workforce systems, ensuring that core SAP ERP solutions setups adhere to legal and regulatory standards. Understanding of Cloud IAM, IoT, Robotic Based Automation and best of bread Cloud based Enterprise Applications. Understanding of multifactor authentication, Microsoft Active Directory, Azure Active Directory. Ability to communicate effectively with stakeholders at all levels, including IT teams, security teams, and business unit leaders. This involves translating technical details into business language that is understandable to non-technical stakeholders. Team player who is willing to speak up and share what they have learned. Detail oriented self-starter with strong conceptual, analytical, decision making, planning, time management and prioritization skills. Ability to communicate oral and written ideas in a clear, concise manner, at all levels of the organization. Prior experience in planning, coordination and implementation and the ability to work across teams and functions to execute and deliver. Aptitude to upskill and learn new technologies based on dynamic requirements. Ideally has managed direct reports previously including graduates. Core Skills Expectations : Agile Core Practices - Understand and apply agile values and principles and core agility practices to the work of the team; including agile mindset and focus on customer, product and team to generate value. Technical Specialism - The development and exploitation of expertise in any specific area of information or communications technology, technique, method, product or application area. Configuration management and release - The lifecycle planning, control and management of the assets of an organization (such as documentation, software and service assets, including information relating to those assets and their relationships. This involves identification, classification and specification of all configuration items (CIs) and the interfaces to other processes and data. Documentation and knowledge sharing - The systematic management of vital knowledge to create value for the organization by capturing, sharing, developing and exploiting the collective knowledge of the organization to improve performance, support decision making and mitigate risks. The development of a supportive and collaborative knowledge sharing culture to drive the successful adoption of technology solutions for knowledge management. Providing access to informal, tacit knowledge as well as formal, documented, explicit knowledge by facilitating internal and external collaboration and communications. Information security - The selection, design, justification, implementation and operation of controls and management strategies to maintain the security, confidentiality, integrity, availability, accountability and relevant compliance of information systems with legislation, regulation and relevant standards. Metrics definition and Instrumentation - The development and operation of a measurement capability to support agreed organizational information needs. The planning, implementation, and control of activities to measure attributes of processes, products, and services in order to assess performance, progress, and provide indications and insights to actual or potential problems, issues, and risks. Service operations and resiliency - The ability to build and operate services and applications at scale with automation to maintain high levels of availability. To do this, a combination of activities are required from the initial design and sizing of the infrastructure, network, and constituent components to determine throughput (# of transactions/requests, users) through to service health metrics, monitoring, alarming, and remediation. Each of these areas will combine human effort (e.g., a human is paged) as well as automated steps and tools to reduce operational burden and overhead. Source control and code management - The practice of tracking and managing changes to code to help to resolve conflicts when merging contributions from multiple sources. This includes the use of best practices such as using pull requests and trunk based development, running automated testing and static analysis pre-commit, and preventing build breaks through automation/rollbacks. Testing and Quality Assurance - Measure and maintain a high level of code quality from development through deployment to production. This includes automated and manual testing, including but not limited to: unit testing, static analysis, functional testing, UI testing, load testing, chaos testing. Testing should be done throughout the development lifecycle (agile) rather than being reserved to a specific milestone (waterfall). Coaching - Uses a blend of formal and informal coaching to build the capability of the team to ensure that performance delivery is sustainable in the longer term and the team are motivated to continue to develop their capabilities. Collaboration - The ability to collaborate with teams internally and externally to drive activities that support the wider bp strategy. Collaborative leaders enable and empower others to cooperate willingly to achieve positive results. They navigate a varied network of people, inside and outside of bp, to gain insight and ideas. They co-create through collective curiosity, communities and new collaboration tools to discover possibilities so that digital transformation and high performance can thrive at pace. They focus on being customer and user-centric. Facilitation - Facilitates learning, group activities and group discussions. Uses a range of techniques to guide group sessions to appropriate and useful outcomes, in a constructive and timely manner Mentoring - Provides a reciprocal and collaborative at-will relationship for the purpose of the mentee’s growth, learning, and career development. Often there is an emphasis on organizational goals, culture, career goals, advice on professional development, and work-life balance. Essential Skills 8+ Years experience in technology specialism Demonstrable Knowledge in the application of modern Service Delivery methods - Site Reliability Engineering to traditional ITIL, and understanding of Product Based delivery Strong Communications skills and a high ‘EQ’ with the ability to operate across complex business environments and stakeholders up to senior executive level Skills That Set You Apart Knowledge of Identity Governance and Assurance solutions e.g. Saviynt, Sailpoint, Ping Identity etc Broader development experience in one or more object-oriented programming languages (e.g. Python, Go, Java, C/C++) Project Management experience delivering IT led projects Broad experience contributing and collaborating to assist design, plan, implement, maintain, and document services and solutions Travel Requirement No travel is expected with this role Relocation Assistance: This role is eligible for relocation within country Remote Type: This position is a hybrid of office/remote working Skills: Commercial Acumen, Communication, Data Analysis, Data cleansing and transformation, Data domain knowledge, Data Integration, Data Management, Data Manipulation, Data Sourcing, Data strategy and governance, Data Structures and Algorithms (Inactive), Data visualization and interpretation, Digital Security, Extract, transform and load, Group Problem Solving Legal Disclaimer: We are an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, sex, gender, gender expression, sexual orientation, age, marital status, socioeconomic status, neurodiversity/neurocognitive functioning, veteran status or disability status. Individuals with an accessibility need may request an adjustment/accommodation related to bp’s recruiting process (e.g., accessing the job application, completing required assessments, participating in telephone screenings or interviews, etc.). If you would like to request an adjustment/accommodation related to the recruitment process, please contact us. If you are selected for a position and depending upon your role, your employment may be contingent upon adherence to local policy. This may include pre-placement drug screening, medical review of physical fitness for the role, and background checks. Show more Show less

Posted 2 months ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver / No. / Performance Parameter / Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience: 5-8 Years.

Posted 2 months ago

Apply

10.0 - 12.0 years

0 Lacs

Noida, Uttar Pradesh, India

Remote

About Intellismith Intellismith, founded in 2019, is a dynamic HR service and technology startup. Our mission is to tackle India’s employability challenges head-on. We Specialize in scaling talent acquisition and technology resource outsourcing. We are also an implementation and reseller partners of IBM, enabling us to deliver enterprise-grade solutions with agility. As we chart our growth trajectory, we’re transitioning from a service-centric model to a product-focused company. Our journey involves building a cutting-edge skilling platform to empower Indian youth with domain-specific training, making them job-ready for the competitive market. Why Join Intellismith? Impactful Mission: Be part of a forward-thinking organisation committed to solving employability challenges. Your work directly contributes to bridging the skills gap and transforming lives. Innovation and Growth: Contribute to our exciting transition from services to products. Shape the future of our skilling platform and impact Indian youth positively. Collaborative Environment: Work alongside talented professionals across multiple locations. Our diverse teams foster creativity and learning. Entrepreneurial Spirit: Intellismith encourages fresh ideas and entrepreneurial thinking. Your voice matters here. As a leading outsourcing partners, we are hiring a Saviynt IAM Specialist to be deployed at our client site, which is a technology consulting and services company with over 11,800 employees in 33 locations worldwide. More than 130 leading enterprises depend on their expertise to become more innovative, agile, and competitive. They specialize in creating, designing, engineering, marketing, and managing digital products and experiences for fast-growing companies aiming to innovate quickly and effectively. Note: This is a C2H position Job Details Experience Required: 10-12 years of experience in IAM Solutions (Saviynt) Qualifications : BE/B.Tech/Graduation in computer science or related field. Location: Remote Salary Bracket : Max up to 38 LPA Notice Period: Immediate to 15 days (Candidates with a notice period of less than 30 days are preferred). Mandatory Skills: Must have experience of Designing and implementing IAM solutions using Saviynt. Must have experience of i nstallation of Saviynt Connect and configuration. Must have experience of JML processes ( Joiner, Mover, Leaver) Develop and document IAM policies, procedures, and standards. Responsibilities: Design and implement IAM solutions using Saviynt. Installation of Saviynt Connect and configuration Create custom rules and workflows related to Joiner, Mover, Leaver (JML) processes. Integrate Saviynt with HR systems, Active Directory, Azure AD, Exchange, ServiceNow, and other enterprise applications using out-of-the-box and custom connectors. Develop and document IAM policies, procedures, and standards. Ensure compliance with regulatory requirements and industry best practices. Strong understanding of IAM concepts and best practices. Build custom connectors for onboarding applications. Develop and manage REST API connectors for web applications and authoritative sources like SAP, PeopleSoft, and Workday. Develop and enforce security policies related to identity and access management. Implement periodic access reviews to ensure appropriate access levels. Automate access review processes to streamline compliance checks. Generate reports on access review findings and actions taken. Provide technical support and guidance to internal teams and stakeholders. Conduct training sessions for end-users and IT staff on Saviynt functionalities. Experience with other IAM tools like SailPoint, Okta, or CyberArk. Proficiency in Java and scripting languages (e.g., PowerShell, Python). Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. #Saviynt #IAM #JML #AzureDirectory #IAMpolicies #C2H #remote #immediatejoiner #career Show more Show less

Posted 2 months ago

Apply

25.0 years

0 Lacs

Gurgaon, Haryana, India

On-site

About The Job Tower Research Capital is a leading quantitative trading firm founded in 1998. Tower has built its business on a high-performance platform and independent trading teams. We have a 25+ year track record of innovation and a reputation for discovering unique market opportunities. Tower is home to some of the world’s best systematic trading and engineering talent. We empower portfolio managers to build their teams and strategies independently while providing the economies of scale that come from a large, global organization. Engineers thrive at Tower while developing electronic trading infrastructure at a world class level. Our engineers solve challenging problems in the realms of low-latency programming, FPGA technology, hardware acceleration and machine learning. Our ongoing investment in top engineering talent and technology ensures our platform remains unmatched in terms of functionality, scalability and performance. At Tower, every employee plays a role in our success. Our Business Support teams are essential to building and maintaining the platform that powers everything we do — combining market access, data, compute, and research infrastructure with risk management, compliance, and a full suite of business services. Our Business Support teams enable our trading and engineering teams to perform at their best. At Tower, employees will find a stimulating, results-oriented environment where highly intelligent and motivated colleagues inspire each other to reach their greatest potential. Role Summary You will own the day-to-day security operations that keep our on-premise and cloud based engineering stack running safely and smoothly. The position is hands-on: triage incoming tickets, perform user-lifecycle tasks, maintain policy configurations, facilitate third-party risk reviews, and follow through with internal and external clients until issues are fully resolved. Key Responsibilities Identity & Access Management (IAM) – User Lifecycle Management, maintaining roles(RBAC), entitlements, and policy violations in SailPoint IIQ, Okta (SSO, MFA, SCIM), and Keeper. Troubleshooting authentication/authorization failures and managing quarterly access certifications. Secrets & Key Management – Operating and tuning HashiCorp Vault, provision accounts, manage PKI/TTL policies, champion best practices. Secure Endpoint Management - Operating and Managing EDR / NDR to ensure the tools are configured as per industry best practices Secure Network Access – Administering Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) policies, SSL-inspection exceptions, and environmental health. Ticket & Workflow Governance – Monitoring inbound ticket queues, review access and change requests, and approve or decline workflows in line with internal security policies. Third-Party Risk Coordination – Facilitating vendor-led third-party risk assessments: act as primary liaison between the external assessment partner and internal system owners, gather evidence, track remediation items, and ensure assessments are completed on schedule. Client-Facing Communication – Owning ticket queues, status calls, and post-mortems; ensure SLAs are met and stakeholders remain informed. Required Qualifications 3+ years in security operations, IT ops, or IAM engineering. Hands-on admin experience with at least three of the following: SailPoint IIQ, Okta, HashiCorp Vault, Zscaler, Keeper, Duo, AWS IAM, Azure AD. Working knowledge of authentication protocols (SAML, OAuth 2.0/OIDC, Kerberos, LDAP) and network fundamentals (TCP/IP, TLS, DNS). Familiar with ITIL-based incident, change, and problem-management processes. Excellent written and verbal communication skills; able to run client calls and produce clear after-action reports. Preferred / Nice-to-Have SailPoint IdentityIQ or Okta Certified Professional/Administrator. Experience with zero-trust architectures or ZTNA products (Zscaler, Netskope, etc.). Exposure to secrets-as-a-service and dynamic secrets in HashiCorp Vault. Cloud-security certifications (AWS SAA/Security Specialty, AZ-500, or equivalent). Familiarity with GRC tooling (ServiceNow IRM, Archer) and evidence gathering for third party questionnaires and audits (SOC 2, ISO 27001). Familiarity in scripting/automation (PowerShell, Python, or Bash) and using REST APIs for integration or remediation. Core Competencies Customer Obsession: Close the loop with customers and internal partners. Drive to Learn & Share : Learn new technologies and contribute to overall growth of the team Operational Rigor: Value checklists, metrics, and continuous improvement. Bias for Automation: If you do it twice, script it. Benefits Tower’s headquarters are in the historic Equitable Building, right in the heart of NYC’s Financial District and our impact is global, with over a dozen offices around the world. At Tower, we believe work should be both challenging and enjoyable. That is why we foster a culture where smart, driven people thrive – without the egos. Our open concept workplace, casual dress code, and well-stocked kitchens reflect the value we place on a friendly, collaborative environment where everyone is respected, and great ideas win. Our Benefits Include Generous paid time off policies Savings plans and other financial wellness tools available in each region Hybrid working opportunities Free breakfast, lunch and snacks daily In-office wellness experiences and reimbursement for select wellness expenses (e.g., gym, personal training and more) Volunteer opportunities and charitable giving Social events, happy hours, treats and celebrations throughout the year Workshops and continuous learning opportunities At Tower, you’ll find a collaborative and welcoming culture, a diverse team and a workplace that values both performance and enjoyment. No unnecessary hierarchy. No ego. Just great people doing great work – together. Tower Research Capital is an equal opportunity employer. Show more Show less

Posted 2 months ago

Apply

2.0 - 4.0 years

15 - 20 Lacs

Bengaluru

Work from Office

locationsBangalore, Indiaposted onPosted 14 Days Ago job requisition id30476 FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity " The Security Engineer is a highly visible and critical role, collaborating on complex cloud and corporate service edge protection technologies and oversight. With your proven history of technical knowledge of identity and access management systems and services you will be working on a variety of different challenges facing the organization. You will provide both guidance and direct input to help ensure a secure, well-protected environment that complies with all applicable security standards ". Director, Cyber Security. What Youll Contribute Assist with implementation of security tools and services to enhance the oversight and governance of all company identities. Assist with implementation of identity governance and administration (IGA) solutions for the company. Implement identity security detections using next-gen Identity Threat Detection and Response (ITDR) and Non-Human Identity (NHI) platforms and tools. Create automated tooling to test identity systems to ensure detections work as designed. Create automation to produce automated policy and posture collection and reporting, to allow for identity-specific proofs managed within Infrastructure as Code. Create pipelines to deploy and manage IAM solutions and tooling. Provide engineering and technical guidance for supporting the automation of interacting with security tools and services that support the IAM program within the company. Keep current on emerging security technologies and tools and provide recommendations. Support our compliance and certification initiatives and design with those in mind. Collaborate with other engineers on design, analysis, architecture, implementation, pen-testing, security reviews and process enhancements. What Were Seeking 2-4 years in a security role, preferably in financial services or technology. Experience in securing hybrid network infrastructure services. Expertise in security, identity, architecture, and design. Hands-on experience with AWS, Azure, or other cloud platforms and IAM best practices. 2-4 years of experience with privileged access management tools (CyberArk, SailPoint, Delinea). Experience with Okta preferred. Proficiency in identity-related technologies and protocols (LDAP, SAML, OAuth, OIDC). Experience with identity provider services (Active Directory, AWS IAM, Okta). Familiarity with Zero Trust security models (Zscaler, AWS networking). Knowledge of Identity Governance Administration services. Experience with automation scripting and API integrations. Familiarity with DevOps concepts, IaC tools, and CI/CD pipelines. Proficiency in at least one high-level language (e.g., Python). Understanding of compliance frameworks (PCI-DSS, ISO 27001, NIST). Certifications like CISSP, AWS Security Specialty, or Azure SC-300 preferred. Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at

Posted 2 months ago

Apply

8.0 - 13.0 years

20 - 35 Lacs

Noida, Pune, Bengaluru

Work from Office

Aujas / NuSummit (Formerly NSEIT) is looking for Lead Sailpoint developer role. Work Location : Bangalore/Pune/Noida/Chennai. Mode: 5 Days WFO is mandatory. JD: Strong expertise in both technical and functional aspects of SailPoint IIQ development Experience in developing and debugging Java rules within IIQ Solid understanding and hands-on experience in Identity and Access Management (IAM) , specifically with SailPoint Expertise in developing rules at various levels: workflow, form, and quicklink Experience in writing rules to customize certification processes Ability to write rules for custom task creation and execution Proficiency in writing effective filters Strong conceptual understanding of the Identity Object Model Expertise in SailPoint certifications such as Manager, Advanced, Account Group Permissions, and Delegation Rules Hands-on experience in designing and implementing SailPoint connectors like Active Directory, LDAP, JDBC , SQL Server, and Sybase Good to have: Experience in custom connector development Kindly ignore this email if you have already applied in the last 3 months. We have multiple open positions feel free to refer this opportunity to your friends as well!

Posted 2 months ago

Apply

5.0 - 10.0 years

12 - 16 Lacs

Hyderabad

Work from Office

Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : SailPoint IdentityIQ Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability. Your typical day involves overseeing project implementation, utilizing method, tools, training, and assets to ensure successful project delivery. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Lead project planning and execution- Ensure project milestones are met- Provide guidance and mentorship to team members Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityIQ- Strong understanding of identity and access management- Experience in implementing security solutions- Knowledge of security frameworks and regulations- Hands-on experience in leading security projects Additional Information:- The candidate should have a minimum of 5 years of experience in SailPoint IdentityIQ- This position is based at our Hyderabad office- A 15 years full time education is required Qualification 15 years full time education

Posted 2 months ago

Apply

3.0 - 8.0 years

6 - 9 Lacs

Bengaluru

Work from Office

Job Description: JD for IAM / SSO resource Design and Implement SSO based integrations for various marketing applications with Azure Active Dir / Entra ID, SailPoint, ForgeRock Adhere to security best practices, TMNA standards and ensure least privilege access is granted Plan and implement migration / on-boarding of users to the new authentication and authorization system Audit, troubleshoot and resolve issues related to user onboarding and migration in a time-bound manner Co-ordinate with business teams and TMNA IAM team to ensure above activities are executed with quality and on-time Please make Entra AD skillset the primary based on feedback from the IAM team Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here .

Posted 2 months ago

Apply

7.0 - 10.0 years

2 - 6 Lacs

Gurgaon

On-site

Experience: 7 – 10 YEARS Location: GURGAON/ HYBRID MODE CTC TO BE OFFERED : Mention Your Current & Expected CTC Notice Period: IMMEDIATE TO 30 DAYS KeySkills: JAVA, PYTHON, PRIVILEGED ACCESS MANAGEMENT ARCHITECT, PRIVILEGE, IDENTITY ACCESS MANAGEMENT (PAM) SYSTEMS, ACTIVE DIRECTORY, MFA PROCESS, IAM PROTOCOLS, SAILPOINT, SAVIYNT, BEYONDTRUST, CYBERARK, DELINEA, THYCOTIC, ON-PREM, CLOUD BASED PAM SOLUTIONS, IDENTITY SECURITY DOMAIN, CYBERSECURITY CONTROLS, PAM INFRASTRUCTURE SYSTEMS, HLD, LLD, IMPLEMENTATION GUIDE, OPERATION MANUALS Job Description: As a Privileged Access Management Architect, your role and responsibilities would include: Hands-on expertise on Designing, developing, testing, implementing, and integrating Privilege and Identity Access Management (PAM) systems with a large enterprise Expertise with Active Directory, MFA process and IAM protocols, etc. for authentication Experience with identity governance products like SailPoint, Saviynt, BeyondTrust etc Experience in Privilege Access Management products like CyberArk, Delinea, Thycotic Hands-On expertise for On-Prem as well as cloud based PAM solutions. Hands on experience in the Identity Security domain Assessing requirements for PAM solutions to meet stakeholders needs Designing technical cybersecurity controls and define standards and best practices in the application of PAM principles and best practices Driving requirements and design specifications for privileged access management solutions and collaborating with others in performing these activities Providing escalation support for production PAM infrastructure systems and processes where applicable Identifying and documenting privileged account management business and technical use cases Developing PAM best practices and solutions for common client problems Facilitating the continuous adoption, training, communication, and education of PAM capabilities, functions, and standards to our teams and clients. Very good with documentation of HLD, LLD, Implementation guide and Operation Manuals Note: (i) Our client is looking for immediate & early joiners. (ii) Having LinkedIn Profile is a must. (iii) Being an immediate & high priority requirement interested candidates can share their Resumes with Photograph in word doc. format

Posted 2 months ago

Apply

6.0 - 8.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Req ID: 481603 We create smart innovations to meet the mobility challenges of today and tomorrow. We design and manufacture a complete range of transportation systems, from high-speed trains to electric buses and driverless trains, as well as infrastructure, signalling and digital mobility solutions. Joining us means joining a truly global community of more than 38 900 people dedicated to solving real-world mobility challenges and achieving international projects with sustainable local impact. OVERALL PURPOSE OF THE ROLE: The primary responsibility of the specialist security Operations is to ensure security risks are identified and managed within acceptable limits. The Security specialist will work closely with Design Authority, Solution Architects, IS Design,IS&T operations and Business teams to manage security of the organization RESPONSIBILITIES: To analyse and update critical and non critical log sources and their health status check for redundant log sources and take necessary steps working with right stake holders daily health check and monitoring of SOC infra Co-relationship, framework management for SOC use cases responsible for analytics and data crunching or data analysis and represenation of outcome for leadeship to make next decisions KPI definition, revision and imprvement for SOC infra, health and use cases Technical Competencies & Experience To be considered for this role, candidate need to demonstrate the following skills experience and attributes: Bachelor’s/Master’s degree in Engineering/Technology or related field Minimum 6-8 years of relevant IT experience Professional industry standard certifications like CISSP, CEH, GIAC, CISM, ISO 27002 etc. will be an added advantage Experience with various IT / Security technologies ­ including, Active Directory, DNS, Messaging, Firewalls/ VPN Gateways, IPS, Proxy, WAF, PKI, IAM,etc. Good understanding of tools like CyberArk, PingIdentity, Sailpoint, Qualys, Veracode Proficient hands­on experience and understanding of various security tools and technologies. Experience in an operational role working directly with internal and external customers, trouble ticketing systems, and incident management Solid understanding of ITIL process framework Must understand and have worked in an operational environment such as a NOC or SOC for 2 ­ 4 years Demonstrated leadership experience in the area of Security Operations Proven planning, prioritization, and organizational skills Demonstrated drive for continuous learning, results ­orientation, and teamwork Ability to drive change through innovation & process improvement Ability to manage projects and drive action items with customers and cross­functional peers Proven crisis management skills Professional & concise communication (written & verbal) Ability and flexibility to adapt to change, including shifting and competing priorities Demonstrated ability to be a big picture thinker, strategist, and long term planner Strong analytical skills with demonstrated problem solving ability Project management skills with a proven ability to design workable solutions will be an added advantage Exposure to ISO 27002 and ISO 27005 An agile, inclusive and responsible culture is the foundation of our company where diverse people are offered excellent opportunities to grow, learn and advance in their careers. We are committed to encouraging our employees to reach their full potential, while valuing and respecting them as individuals. Job Type: Experienced Show more Show less

Posted 2 months ago

Apply

3.0 - 5.0 years

0 Lacs

Mulshi, Maharashtra, India

On-site

Job Summary Synechron is seeking an experienced and proactive Level 2 Support Engineer specializing in One Identity Manager (IDM) to join our IT support team. In this role, you will be responsible for providing advanced technical support, troubleshooting complex issues, and ensuring the optimal functioning of our identity and access management systems. You will play a pivotal role in maintaining secure, efficient user provisioning, deprovisioning, and access workflows, thereby supporting organizational security and compliance initiatives. The ideal candidate will possess strong problem-solving capabilities, excellent communication skills, and the ability to collaborate effectively with diverse technical and non-technical teams. Your expertise will directly contribute to the continuous improvement of identity management processes and system reliability. Software Requirements Required Skills: In-depth knowledge of One Identity Manager (configuration, administration, troubleshooting) Experience with Active Directory, LDAP, and other directory services Scripting proficiency in PowerShell and SQL for automation, data manipulation, and reporting Familiarity with ITSM tools such as ServiceNow and JIRA for incident management and workflow tracking Working knowledge of version control tools (e.g., Git) for deployment and change management Preferred Skills: Experience with other identity solutions like SailPoint, Okta, or similar platforms Knowledge of security protocols, compliance frameworks (GDPR, HIPAA) Automation tools and scripting beyond PowerShell/SQL Overall Responsibilities Provide Level 2 technical support for Identity Management systems, addressing incidents, changes, and service requests Troubleshoot and resolve issues related to user provisioning, deprovisioning, role management, and system performance Collaborate with Level 3 support, development, and security teams to resolve complex problems and optimize workflows Maintain and update detailed technical documentation, including runbooks, process workflows, and troubleshooting guides Monitor system health, generate reports on user access and system performance, and recommend improvements Support system upgrades, patches, and configuration changes with minimal disruption Assist in audits, compliance checks, and internal reviews related to identity access management Provide end-user training and support, ensuring adherence to security policies and best practices Participate in project activities for system enhancements and process automation initiatives Strategic objectives: Maintain secure and reliable identity management operations Improve efficiency and accuracy of user access workflows Drive ongoing system and process improvements Performance outcomes: Timely resolution of incidents and requests Accurate documentation and knowledge sharing Successful deployment of system updates and process optimizations Technical Skills (By Category) Identity and Access Management (Essential): Deep knowledge of One Identity Manager configuration, workflows, and troubleshooting Experience integrating IDM with Active Directory, LDAP, and other identity sources Understanding of user provisioning, role assignment, access governance Scripting & Automation (Essential): Proficiency in PowerShell and SQL scripts for automation, data extraction, and reporting Incident & Change Management (Essential): Effective use of ServiceNow and JIRA for incident logging, tracking, and change management Operating Systems (Essential): Windows Server environments supporting IDM operations Basic Unix/Linux knowledge for troubleshooting and integrations Security & Compliance (Preferred): Familiarity with security policies, GDPR, HIPAA requirements (advantageous) Additional Skills (Preferred): Knowledge of other IDM platforms like SailPoint or Okta Experience with automation and configuration management tools Experience Requirements Minimum of 3-5 years of experience supporting identity management systems or related IT support roles Hands-on experience with One Identity Manager is strongly preferred Exposure to large enterprise environments, especially within finance, banking, or regulated industries Proven ability to troubleshoot complex systems, analyze logs, and perform root cause analysis Experience working in operational support, incident response, or service desk environments Alternative pathways: Candidates with extensive experience in identity systems support beyond One Identity, showing strong troubleshooting and system support capabilities, may also be considered Day-to-Day Activities Provide second-line support for identity management incidents and requests Troubleshoot configuration issues, system errors, and performance bottlenecks Assist in planning and executing system upgrades, patch deployment, and change requests Collaborate with cross-functional teams to resolve security and compliance issues Maintain system documentation, workflow procedures, and knowledge articles Monitor system logs, perform health checks, and generate reports on user access and system activity Engage in incident reviews and root cause analysis sessions Support internal audits and compliance activities related to identity access Communicate effectively with end-users, stakeholders, and vendors regarding incident status and resolutions Qualifications Bachelor's degree in Computer Science, Information Technology, or a relevant discipline, or equivalent work experience Relevant certifications such as ITIL Foundation, One Identity certifications, or equivalents are a plus Willingness to work in rotational shifts from 11:00 am IST to Midnight IST Prior experience in identity management, security, or access governance roles Strong analytical skills and attention to detail Ability to work independently and as part of a team Professional Competencies Critical thinking and problem-solving aptitude, capable of diagnosing complex issues Excellent interpersonal and communication skills, with the ability to simplify technical information Stakeholder management with a customer-centric approach Adaptability to changing priorities and technical environments Proactive mindset with a focus on process and system improvements Effective time management to prioritize incident resolution under pressure S YNECHRON’S DIVERSITY & INCLUSION STATEMENT Diversity & Inclusion are fundamental to our culture, and Synechron is proud to be an equal opportunity workplace and is an affirmative action employer. Our Diversity, Equity, and Inclusion (DEI) initiative ‘Same Difference’ is committed to fostering an inclusive culture – promoting equality, diversity and an environment that is respectful to all. We strongly believe that a diverse workforce helps build stronger, successful businesses as a global company. We encourage applicants from across diverse backgrounds, race, ethnicities, religion, age, marital status, gender, sexual orientations, or disabilities to apply. We empower our global workforce by offering flexible workplace arrangements, mentoring, internal mobility, learning and development programs, and more. All employment decisions at Synechron are based on business needs, job requirements and individual qualifications, without regard to the applicant’s gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. Candidate Application Notice Show more Show less

Posted 2 months ago

Apply

3.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Job Type: Permanent - Full Time Location: Mumbai Job Category: IT Job Description Are you ready to grow your career in our global tech hub? Zurich Cover-More helps people travel safely across the globe every day. We are there at every step of a traveller’s journey, to keep them safe and help them out if something goes wrong. We are committed to providing reliable, fast, flexible and bespoke services for our customers as well as the many well-known brands we partner with! Due to recent international acquisitions, our business has seen great growth, and as a result, we are now seeking a driven and engaging IAM Analyst – Identity & Access Management to join our team. This is a key position that will have you managing and truly partnering with a portfolio of our current clients. This is a fantastic opportunity for an experienced IAM Analyst who wants to engage with their customer; you’ll become a part of their business and provide high-quality, market-leading advice and value-added service. So, what’s the job? You will assist in the User Access Review (UAR) process, including setup, execution, and follow-up. This role will specifically focus on Privileged User Access Management. You'll maintain identity governance controls for timely access provisioning and de-provisioning. You'll assist with privileged access management for critical systems and infrastructure. You'll implement and manage role-based access control (RBAC) across systems. You'll resolve access-related issues in a compliant and timely manner. You'll maintain documentation of access controls, roles, and workflows. You'll collaborate with audit, compliance, and IT security teams on access inquiries. You'll assist in onboarding applications into identity governance. You'll contribute to continuous IAM process, control, and reporting improvements. You'll track IAM operations with access metrics and dashboards. You'll perform periodic certifications of accounts and entitlements for compliance. You'll support access recertification automation and process improvements. You'll monitor IAM systems for anomalous activity and escalate incidents. You'll promote user education on access control best practices. You'll contribute to risk assessments and control gap analysis. You'll liaise with stakeholders to define access requirements and segregation of duties. You'll assist in developing and testing IAM disaster recovery plans. You'll evaluate and provide feedback on new IAM tools and features. And what are we looking for? You'll have 3+ years of experience in IAM, access control, or IT security operations. You'll possess knowledge of IAM concepts, including UAR, RBAC, PAM, and least-privilege access. You'll have experience with identity governance platforms (e.g., SailPoint, Saviynt, or similar). You'll be familiar with Active Directory, Azure AD, and enterprise authentication systems. You'll understand compliance and audit requirements related to access management. You'll demonstrate strong analytical skills and attention to detail. You'll be able to work both independently and collaboratively in a global team environment. You'll have effective communication skills, both written and verbal. So, why choose us? We value optimism, caring, togetherness, reliability and determination. We have more than 2600 employees worldwide: we’re a global group of digital natives, actuaries, marketers, doctors, nurses, case managers, claims specialists, finance experts and customer service professionals. We share a global mission to look after travellers, at every step of their journey. Job flexibility. We understand the importance of making sure that work fits into your life, not the other way around. Our hybrid work week policy ensures our employees maintain work-life balance with the flexibility of 3 days in the office and 2 days working from home. Career growth. We want you to continue to learn, develop and bring your ideas to the table. We want to hear what you think, and we want you to work with the business - not for the business! Diversity and inclusion. We respect who you are and thoroughly embrace diversity. So whatever walk of life you wander, just be you and come as you are. Take the time you need, for you and your community. We encourage you to take the time you need, when you need it. We offer regular annual and personal leave benefits along with anniversary leave, covid leave (to get vaccinated and for when you’re sick), volunteer leave and a comprehensive paid parental leave scheme. We also offer some other perks, including: Mediclaim insurance cover in case of any health emergency Coverage under group personal accident insurance Flexible and compressed work weeks and hybrid working options. Generous range of paid leave – 21 annual leave days, 6 sick leave days, 12 public holidays An extra day off for you to take on your birthday or your annual work anniversary. Apply today and let’s go great places together! If you are interested in applying for an internal position, please familiarise yourself with the Internal Applications section of the Recruitment Selection and Separation policy. You can find this policy on the People & Culture SharePoint here . Show more Show less

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies