Posted:3 months ago|
Platform:
Work from Office
Full Time
Your Role and Responsibilities The Endpoint Privilege Management Specialist is responsible for designing, implementing, and maintaining effective endpoint privilege management solutions. This role focuses on minimizing security risks by enforcing the principle of least privilege, ensuring that users and applications have only the necessary permissions to perform their tasks. The ideal candidate will have a strong understanding of endpoint security, operating systems, and privilege management tools. Key responsibilities: Endpoint Onboarding and Configuration: Beyond Trust EPM on all designated endpoints with minimal disruption to daily operations. This includes: Responsibilities: Design, implement, and maintain EPM solutions across the organization. Develop and enforce privilege management policies and procedures. Configure and manage EPM software, including policy creation, application control, and reporting. Monitor and analyze privileged access activity and identify potential security risks. Troubleshoot and resolve technical issues related to EPM. Conduct regular security audits and compliance checks. Collaborate with IT and security teams to ensure seamless integration of EPM solutions. Stay up-to-date with the latest EPM technologies and best practices. Document EPM configurations, policies, and procedures. Directory Services Integration: Aligning EPM with customers directory services for synchronized user data and controlled access to privileged resources. Role-Based Access Control (RBAC): Defining role-specific policies that enforce least-privilege principles and control application privileges per user role. User Privilege and Application Management: Integration of EPM with customer’s directory to streamline user lifecycle management, provisioning, and DE provisioning. Privilege Assignment: Customized privilege levels based on job role, with access limited to necessary applications and functionalities. Application Control: Enforcement of application policies to restrict unauthorized software, thereby reducing risk from potentially harmful or unapproved applications. Just-In-Time (JIT) Privilege Management: Establish JIT access for applications requiring elevated privileges. JIT privileges will only be granted for specific, approved applications and only for the necessary time period to enhance security. Access Review and Auditing: Continuous monitoring of user activities and application access, generating regular and ad-hoc reports for compliance and audit purposes. Reporting and Compliance Checks: Scheduled reporting to maintain visibility over privilege usage and application access, with detailed logs for audit trails and compliance purposes. Required Skills: Proficiency in EPM solutions Beyond Trust Privilege Management, Strong understanding of Windows, macOS, and Linux/Unix operating systems. Knowledge of Active Directory/LDAP. Understanding of endpoint security concepts (antivirus, antimalware, EDR). Knowledge of security auditing and compliance requirements. Strong problem-solving and analytical skills. Excellent communication and collabor Band: U3 Competency : CSRM
Tech Mahindra
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
My Connections Tech Mahindra
5.0 - 9.0 Lacs P.A.
Experience: Not specified
3.0 - 6.0 Lacs P.A.
Gandhinagar
7.0 - 17.0 Lacs P.A.
Gurugram, Haryana, India
Salary: Not disclosed
Bengaluru
8.0 - 13.0 Lacs P.A.
Pune, Maharashtra, India
Salary: Not disclosed
4.0 - 7.0 Lacs P.A.
Bengaluru, Karnataka, India
Salary: Not disclosed
3.0 - 7.0 Lacs P.A.
Pune, Maharashtra, India
Salary: Not disclosed