Senior Security Analyst

5 - 8 years

7 - 10 Lacs

Posted:3 months ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

Your Role and Responsibilities The Endpoint Privilege Management Specialist is responsible for designing, implementing, and maintaining effective endpoint privilege management solutions. This role focuses on minimizing security risks by enforcing the principle of least privilege, ensuring that users and applications have only the necessary permissions to perform their tasks. The ideal candidate will have a strong understanding of endpoint security, operating systems, and privilege management tools. Key responsibilities: Endpoint Onboarding and Configuration: Beyond Trust EPM on all designated endpoints with minimal disruption to daily operations. This includes: Responsibilities: Design, implement, and maintain EPM solutions across the organization. Develop and enforce privilege management policies and procedures. Configure and manage EPM software, including policy creation, application control, and reporting. Monitor and analyze privileged access activity and identify potential security risks. Troubleshoot and resolve technical issues related to EPM. Conduct regular security audits and compliance checks. Collaborate with IT and security teams to ensure seamless integration of EPM solutions. Stay up-to-date with the latest EPM technologies and best practices. Document EPM configurations, policies, and procedures. Directory Services Integration: Aligning EPM with customers directory services for synchronized user data and controlled access to privileged resources. Role-Based Access Control (RBAC): Defining role-specific policies that enforce least-privilege principles and control application privileges per user role. User Privilege and Application Management: Integration of EPM with customer’s directory to streamline user lifecycle management, provisioning, and DE provisioning. Privilege Assignment: Customized privilege levels based on job role, with access limited to necessary applications and functionalities. Application Control: Enforcement of application policies to restrict unauthorized software, thereby reducing risk from potentially harmful or unapproved applications. Just-In-Time (JIT) Privilege Management: Establish JIT access for applications requiring elevated privileges. JIT privileges will only be granted for specific, approved applications and only for the necessary time period to enhance security. Access Review and Auditing: Continuous monitoring of user activities and application access, generating regular and ad-hoc reports for compliance and audit purposes. Reporting and Compliance Checks: Scheduled reporting to maintain visibility over privilege usage and application access, with detailed logs for audit trails and compliance purposes. Required Skills: Proficiency in EPM solutions Beyond Trust Privilege Management, Strong understanding of Windows, macOS, and Linux/Unix operating systems. Knowledge of Active Directory/LDAP. Understanding of endpoint security concepts (antivirus, antimalware, EDR). Knowledge of security auditing and compliance requirements. Strong problem-solving and analytical skills. Excellent communication and collabor Band: U3 Competency : CSRM

Mock Interview

Practice Video Interview with JobPe AI

Start Security Analysis Interview Now

My Connections Tech Mahindra

Download Chrome Extension (See your connection in the Tech Mahindra )

chrome image
Download Now
Tech Mahindra
Tech Mahindra

Information Technology & Services

Noida

125,000+ Employees

1495 Jobs

    Key People

  • CP Gurnani

    Managing Director & CEO
  • Vivek Agarwal

    Global Head - Strategy and Marketing

RecommendedJobs for You

Pune, Maharashtra, India

Bengaluru, Karnataka, India

Pune, Maharashtra, India