Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 9.0 years
0 Lacs
thiruvananthapuram, kerala
On-site
As an L3 SOC Analyst at CyberProof, a UST Company, you will play a crucial role in monitoring, investigating, and resolving security incidents, violations, and suspicious activities. Your primary responsibilities will include: - Acting as an escalation point for high and critical severity security incidents and conducting thorough investigations to determine potential impact and understand the extent of compromise. - Analyzing attack patterns, Tools, Techniques and Procedures (TTPs) to identify methods of attacks and attack life cycle. - Providing recommendations on issue resolution activities such as security controls policy configuration changes and security hygiene improvement. - Hunting for Indicators of Compromise (IOCs) and signs of Advanced Persistent Threats (APTs) within the Clients environment. - Conducting threat hunting through in-depth log analysis to identify potential threats that may have evaded automated detection. - Identifying gaps and weaknesses in existing security processes and proposing enhancements to improve established incident response methodologies. - Collaborating with cross-functional teams to ensure end-to-end management of security incident lifecycle. - Documenting and updating incident response processes, defining outcomes for future references, and driving continuous improvement. - Participating in regular team meetings, Incident Response war room discussions, and executive briefing sessions. Requirements: - Minimum 2+ years of experience as a SOC L3 Analyst working as part of a Global SOC team. - Resolving, escalating, reporting, and raising recommendations for resolving and remediating security incidents. - Proactively monitoring and reviewing threats and suspicious events from customers participating in the service. - Handling the advanced monitoring of system logs, SIEM tools, and network traffic for unusual or suspicious activity. - Investigating and resolving security violations by providing post-mortem analysis to illuminate issues and possible solutions. - Collating security incident and event data to produce monthly exception and management reports. - Reporting unresolved network security exposure, misuse of resources, or noncompliance situations using defined escalation processes. - Assisting and training team members in the use of security tools, the preparation of security reports, and the resolution of security issues. - Developing and maintaining documentation for security systems and procedures. - Experience in handling Linux servers, familiar with Linux OS and commands. - Maintaining excellent customer satisfaction through professional, proactive, and personal service. - Experience with SIEM vendors such as QRadar, ArcSight, RSA, and LogRhythm. - Experience in incident response and in writing procedures runbooks and playbooks. - Ability to work with customers IT and security teams. CyberProof, a UST Company, is dedicated to transforming the operations of customers and securing the security landscape by utilizing innovative approaches and cutting-edge technologies. UST is a global digital transformation solutions provider that partners with clients from design to operation to make a real impact through transformation. With over 30,000 employees in 30 countries, UST builds for boundless impact, touching billions of lives in the process.,
Posted 3 days ago
6.0 - 8.0 years
0 Lacs
mumbai, maharashtra, india
On-site
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl We are always moving forward - always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Kyndryl's Security & Resiliency is one of our most critical practices, ensuring enterprises, regardless of their size and complexity, remain secure, available, reliable, and resilient. We take Cybersecurity seriously. We're not just invested we're committed. We're not just protecting data we're empowering. Kyndryl is committed to making the world safer, not only by investing in state-of-the-art services and technologies but also by empowering underserved communities with essential cyber skills. When you walk through our doors, you're not only joining a team but you're also becoming part of a legacy. Welcome to Kyndryl, where Cybersecurity isn't just a job - it's a passion a commitment to designing, running, and managing the most modern and reliable technology infrastructure that the world depends on every day. Join us as a Cybersecurity Infrastructure Professional, where you'll be entrusted with the crucial task of maintaining and enhancing the infrastructure that is the backbone of our cybersecurity operations for our Fortune 500 clients. You'll be responsible for the orchestration of infrastructure, keeping our systems protected from the relentless advances of physical and cyber adversaries. Your vigilance and technical expertise will be the shield that safeguards our computer systems, networks, and invaluable data from the threat of unauthorized access, theft, damage, and other malicious activities. Your domain will revolve around preserving the integrity of an IT infrastructure, the security of networks, and the sanctity of data. If you have a passion for cybersecurity and are looking for a role that combines cutting-edge technology with the thrill of safeguarding critical assets, then this role is your gateway to the world of cybersecurity heroism. Join us at Kyndryl, and let's build the future of digital security together. Role and Responsibilities of the Job: Incident Handling: Respond to escalated incidents from L1, performing deeper investigation and analysis. Troubleshooting: Advanced troubleshooting of Server security management (Symantec DCS and Trend Micro Deep Security) technologies. Enhancements: Propose improvements in security monitoring, detection, and response protocols. Risk Management : Assist in identifying security risks, supporting vulnerability management efforts. Reporting: Document incidents, update knowledge bases, and report complex issues to the L3 team. Analysis: Perform initial assessment and triage of security events escalate incidents as per protocols. Response: Conduct basic troubleshooting for Server security management (Symantec DCS and TrendMicro Deep security). Leadership : Serve as the final escalation point for complex incidents and security events. Investigation : Lead in-depth investigations of advanced threats and security incidents. Design and Implementation : Server security management (Symantec DCS and Trend Micro Deep Security) Policy Development : Establish and enforce policies, procedures, and best practices for the security infrastructure. Strategic Planning : Assess, design, and enhance security architecture, supporting the organization's cybersecurity strategy. Mentorship : Train and mentor L1/L2 engineers, ensuring best practices in incident handling and escalation. Analyse and resolve complex issues escalated from L1. Investigate root causes of agent communication failures, detection issues. Perform in-depth log analysis raised by SOC (agent logs, system logs, SIEM etc.) Create and modify security policies. Tune and optimize policies based on behavior/observation and false positives Apply exception handling for specific servers or applications Troubleshoot agent deployment failures Perform manual agent installations using automation tools or scripts available with Bank Patch or update agent software Maintain version consistency across agents and servers Coordinate with infra/application teams for security patch rollout Participate in DR drills, ensure server security alignment Collaborate with OEM/vendor support (Symantec/Trend Micro) for unresolved issues Validate compliance with internal security policies Provide audit support by generating security logs, reports, and changing history Maintain and update SOPs for incident handling and agent management Document lessons learned and RCA for major incidents excluding L3 incidents. Your Future at Kyndryl When you join Kyndryl, you're not just joining a company - you're entering a space of opportunities. Our partnerships with industry alliances and vendors mean you'll have access to skilling and certification programs needed to excel in Security & Resiliency, while simultaneously supporting your personal growth. Whether you envision your career path as a technical leader within cybersecurity or transition into other technical, consulting, or go-to-market roles - we're invested in your journey. . Who You Are Who You Are You're good at what you do and possess the required experience to prove it. However, equally as important - you have a growth mindset keen to drive your own personal and professional development. You are customer-focused - someone who prioritizes customer success in their work. And finally, you're open and borderless - naturally inclusive in how you work with others. Required Skills and Experience : Minimum 6 to 8 Years of Work IT Experience with 4-6 years of relevant experience in Server security management. Security Technologies: Proficient in Server security management (Symantec DCS and Trend Micro Deep Security) Problem Solving: Strong analytical and troubleshooting skills to address complex security incidents. Communication: Effective communication skills, with the ability to document and relay technical information clearly. Availability: Willingness to work in a 24x7 environment, with flexible availability for shift rotations. Mastery of security tools and technologies, such as endpoint security and SIEM solutions Deep understanding of operating systems (e.g., Windows, Linux) and their security mechanisms Ability to assess and follow best practices in technology deployment and configuration Preferred Skills and Experience : Bachelor's Degree / Diploma Engineering Security Certifications (preferred): Relevant certifications such as CompTIA Security+, CISSP, CEH, or vendor-specific certifications (e.g., Server security management (Symantec DCS and Trend Micro Deep Security). Ready to provide 24X7 Support. Good verbal and written communication Skills in English. Shift Work: Rotation-based shift coverage, ensuring continuous monitoring and response capability. Growth Opportunity: Engage with leading-edge security technology and contribute to a collaborative and evolving cybersecurity team. Being You Diversity is a whole lot more than what we look like or where we come from, it's how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we're not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you - and everyone next to you - the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That's the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter - wherever you are in your life journey. Our employee learningprograms give you access to the best learning in the industry to receive certifications, includingMicrosoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked How Did You Hear About Us during the application process, select Employee Referral and enter your contact's Kyndryl email address.
Posted 1 week ago
3.0 - 5.0 years
0 Lacs
mumbai, maharashtra, india
On-site
Job Requirements Role/Job Title: Security Architect Function/Department: Information Technology Job Purpose As a Security Architect, you will play a pivotal role in designing, implementing, and maintaining the organisations security across multiple projects. Your primary responsibility will be to ensure the confidentiality, integrity, and security of the bank&aposs systems, data, and applications while adhering to regulatory and compliance requirements in the Indian banking industry. Roles And Responsibilities Develop and maintain the banks enterprise security architecture in line with business goals and regulatory requirements (e.g., RBI guidelines, PCI DSS). Assess the current security posture and recommend improvements. System and Network Security Oversee implementation of security measures for cloud and on-premises environments. Ensure compliance with Indian banking regulations, including data localization and cybersecurity guidelines. Conduct regular security audits and risk assessments. Collaborate with IT teams to integrate security into application development (DevSecOps). Provide technical guidance on new projects and third-party vendor assessments. Conduct security training and awareness programs for employees. Expertise in network security, endpoint protection, identity and access management (IAM), and SIEM solutions. Proficiency in secure software development lifecycle (SDLC) and DevSecOps practices. Hands-on experience with cloud security (AWS, Azure, GCP). Knowledge of encryption, cryptography, and data protection techniques. Strong experience in cybersecurity, with at least 3 years in a security architect role. Previous experience in the BFSI (Banking, Financial Services, and Insurance) sector is highly desirable. Education Qualification Graduation: Bachelor of Science (B.Sc) / Bachelor of Technology (B.Tech) / Bachelor of Computer Applications (BCA) Post-Graduation: Master of Science (M.Sc) /Master of Technology (M.Tech) / Master of Computer Applications (MCA) Show more Show less
Posted 1 week ago
8.0 - 12.0 years
0 Lacs
karnataka
On-site
The Network Specialist role involves conducting comprehensive gap assessments, identifying vulnerabilities, and implementing remediation strategies to enhance network security, performance, and scalability. The ideal candidate will possess deep expertise in designing, optimizing, and securing enterprise networks across various environments including on-premise, cloud, and hybrid setups. Responsibilities include: - Conducting a detailed analysis of existing network architecture to identify security risks, performance issues, and compliance gaps. - Developing and implementing solutions to address network vulnerabilities, optimize performance, and enhance security. - Designing and implementing scalable, high-performance, and secure network architectures for LAN, WAN, SD-WAN, and hybrid cloud environments. - Ensuring network security best practices, implementing firewall policies, VPN configurations, Zero Trust principles, and complying with industry standards such as ISO 27001, NIST, and GDPR. - Improving network performance by analyzing latency, bandwidth utilization, and QoS policies. - Designing and deploying SD-WAN solutions, hybrid connectivity, and cloud networking for platforms like AWS, Azure, or Google Cloud. - Implementing automation using tools like Ansible, Terraform, or scripting (Python, Bash) for network configurations. - Providing detailed reports on findings, remediation steps, and ongoing network health assessments. Required Skills & Experience: - 8+ years of experience in enterprise network architecture, design, and security. - Strong expertise in routing & switching, firewall management, WAN Accelerators, and load balancers. - Experience in SD-WAN, MPLS, VPN, BGP, OSPF, and network segmentation. - Knowledge of Zero Trust Networking, NAC, and network security frameworks. - Hands-on experience with cloud networking solutions. - Proficiency in network automation tools and scripting. - Familiarity with SIEM solutions, IDS/IPS, DDoS protection, and network monitoring. - Certifications such as CCIE, CCNP, AWS/Azure Network Specialty, Fortinet NSE, Palo Alto PCNSE are preferred.,
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
kolkata, west bengal
On-site
As a Senior SecOps Engineer specializing in AWS architecture, you will be a technical leader and problem solver, responsible for ensuring the security posture of our cloud infrastructure. Leveraging your deep understanding of AWS services, security frameworks, and automation tools, you will implement and maintain a secure and compliant environment. Your ability to collaborate with cross-functional teams and stay abreast of evolving security threats will be critical to your success. Design and implement secure AWS infrastructure architectures, including VPCs, subnets, security groups, IAM policies, and network access control lists (ACLs). Develop and enforce security best practices for AWS services such as EC2, S3, RDS, and Lambda. Implement and manage security controls in multi-account and multi-region AWS environments. Lead the identification, investigation, and resolution of security incidents and vulnerabilities. Develop and maintain incident response plans and procedures. Conduct vulnerability assessments and penetration testing of AWS environments. Develop and maintain security automation scripts using tools like Python, Bash, and AWS CLI. Implement and manage security monitoring tools such as CloudWatch, GuardDuty, Security Hub, and third-party SIEM solutions. Automate security compliance checks and reporting. Collaborate with development and operations teams to integrate security controls into CI/CD pipelines. Ensure security policies and best practices are consistently followed across the organization. Provide security training and awareness to development and operations teams. Perform risk assessments of AWS cloud environments and identify potential security risks. Recommend and implement security improvements to mitigate identified risks. Ensure compliance with industry standards and regulations (e.g., PCI DSS, HIPAA, GDPR). Stay updated with the latest security threats and vulnerabilities affecting cloud infrastructure. Research and evaluate new security technologies and tools. Provide threat intelligence and vulnerability analysis to relevant teams. Utilize Infrastructure as Code (IaC) tools like Terraform and CloudFormation to automate security infrastructure deployment and management. Implement and manage configuration management tools for security hardening. Qualifications: - Extensive experience in SecOps engineering, with a focus on AWS architecture. - Proven experience in designing and implementing secure AWS infrastructure. - Experience in incident response and vulnerability management. Technical Skills: - Strong expertise in AWS architecture and security services (IAM, VPC, CloudTrail, GuardDuty, Security Hub, etc.). - In-depth knowledge of security operations, incident response, and threat management. - Experience with Infrastructure as Code (Terraform, CloudFormation). - Proficiency in scripting and automation tools (Python, Bash, AWS CLI). - Experience with security monitoring and SIEM tools. - Strong attention to detail and commitment to quality.,
Posted 2 weeks ago
3.0 - 5.0 years
0 Lacs
gurgaon, haryana, india
Remote
Why Join Siemens At Siemens, you will be part of a global leader committed to innovation, quality, and excellence. This role offers the opportunity to work on challenging projects, develop professionally, and make a significant impact in the electrical and instrumentation domain, particularly within power plant and renewable energy projects. If you are passionate about leading a talented team and driving technical excellence, we encourage you to apply. As Siemens Energy, We energize society by supporting our customers to make the transition to a more sustainable world, based on innovative technologies and our ability to turn ideas into reality. We do this by: . Expanding renewables . Transforming conventional power . Strengthening electrical grids . Driving industrial decarbonization . Securing the supply chain and necessary minerals Looking for challenging role If you really want to make a difference - make it with us Siemens Energy (SE) is a global pacesetter in energy, helping customers to meet the evolving demands of today's industries and societies. SE comprises broad competencies across the entire energy value chain and offers a uniquely comprehensive portfolio for utilities, independent power producers, transmission system operators and the oil and gas industry. Products, solutions and services address the extraction, processing and the transport of oil and gas as well as power generation in central and distributed thermal power plants and power transmission in grids. With global headquarters in Munich in Germany and more than 88,000 employees in over 80 countries, Siemens energy has a presence across the globe and is a leading innovator for the energy systems of today and tomorrow, as it has been for more than 150 years. Your new role - challenging and future-oriented You would be responsible for all system administration requirements like installation, upgrades, and updates of DCS Systems (SPPA T3000) before the delivery of components to customers as well as during the after-sales service phase. You would be part of remote service support center and would support customers in troubleshooting of problems faced by customer. As part of your profile there would be requirement of travelling to many project sites during installation as well as service phase of I&C Systems. You have great opportunity to work with global remote support centers and global teams We don't need superheroes, just super minds You're a bachelor's in engineering with 3 to 5 years of experience in system administration of Instrumentation & Control (I&C)/PLC systems. You've great knowledge and experience of DCS & PLC Systems You've great knowledge of SPPA T3000 control system and know-how on the system administration and troubleshooting would be an added advantage. You've great knowledge of network implementation including switches, firewalls, router etc. You've professional exposure in implementation of cyber solutions like NIDS, Application Whitelisting, Domain Controller, SIEM Solutions would be added advantage. We've got quite a lot to offer. How about you This role is based in Gurgaon, where you'll get the chance to work with teams impacting entire cities, countries - and the shape of things to come. We're Siemens. A collection of over 379,000 minds building the future, one day at a time in over 200 countries. We're dedicated to equality, and we welcome applications that reflect the diversity of the communities we work in. All employment decisions at Siemens are based on qualifications, merit and business need. Bring your curiosity and imagination and help us shape tomorrow.
Posted 2 weeks ago
4.0 - 8.0 years
0 Lacs
haryana
On-site
As a skilled professional with prior experience in SOC or NOC environment, you will be responsible for conducting advanced forensics activities including packet captures using tools like Wireshark and Netmon. Your expertise in the configuration and operation of SIEM Solutions, Security Solutions such as Firewalls, IDS, Internet Filters, DLP, Vulnerability Scanners, Anti Malware Solutions, etc., will be crucial for this role. Additionally, you are expected to possess a basic understanding of Linux and Windows operating systems along with strong analytical and problem-solving skills. Excellent communication skills, both verbal and written, are essential as you will be evaluating and implementing new tools and solutions by collaborating directly with vendors. Your key responsibilities will include monitoring and analyzing cybersecurity events, identifying security threats, performing threat analysis, risk analysis, and vulnerability testing to anticipate and prevent potential attacks. You will also be tasked with investigating and containing malware incidents, managing vulnerability and patch management processes, and maintaining SIEM solutions. Furthermore, you will be required to analyze security logs from various tools, collaborate with IT groups for analysis and troubleshooting, ensure compliance with security standards through device reviews, and update security documentation. This full-time position with benefits such as health insurance, paid time off, and Provident Fund, requires a minimum of 4 years of experience in SIEM, Security Operation Centre, OEM, and Cybersecurity. If you are ready to take on these challenges and contribute to a dynamic cybersecurity environment, we encourage you to apply for this role located in person.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
haryana
On-site
You will be responsible for designing, configuring, and managing SIEM solutions to effectively monitor and analyze security events. Your role will involve conducting threat hunting and developing use cases to identify and mitigate potential vulnerabilities. Additionally, you will be required to monitor alerts, perform root cause analysis, and implement corrective actions for security incidents. Collaboration with IT and security teams will be essential to integrate SIEM with other tools and systems seamlessly. You will also play a key role in maintaining security documentation and providing training to promote a culture of security awareness within the organization. It will be crucial for you to stay updated on emerging threats and technologies in order to enhance the organization's security posture effectively.,
Posted 2 weeks ago
10.0 - 12.0 years
0 Lacs
bengaluru, karnataka, india
On-site
KEY ACCOUNTABILITIES Develop and maintain SOC documentation, attack-based Standard Operating Procedures (SOP), SLAs and report templates to be used by Group Technology and regional Business Unit Technology teams. Supervise the team of SOC analysts and act as L2 specialist for the cases escalated by the monitoring team. Conduct threat-hunting activities using SIEM logs and other sources of intelligence to identify undetected threats. Leverage Threat Intelligence to build out and tune use cases for security monitoring and detection and develop security hunting tasks to detect suspicious activity. Work with different IT teams to troubleshoot and resolve security-related issues and assist in configuring the logs to be forwarded from their respective systems to the centralized logging system. Monitor the performance of security devices and take corrective actions for any threshold breaches. Assist the global and regional IT teams in project-related activities such as creating or reviewing the use cases for any new/existing systems and coordinate with vendors to add/update the use cases. Assist in reviewing deliverables from projects, implementation, and health check activities and introduce any potential changes required to IT security monitoring plans. Study vulnerabilities, identify relevant threats, corrective actions/recommendations, and report results. Stay up to date in current tools, techniques, and vulnerabilities to incorporate into monitoring plans. Conduct SOC Maturity Model assessment for the Group Technology and regional business units. OTHER Act as an ambassador for DP World at all times when working promoting and demonstrating positive behaviours in harmony with DP World's Principles, values and culture ensuring the highest level of safety is applied in all activities understanding and following DP World's Code of Conduct and Ethics policies. Perform other related duties as assigned. QUALIFICATIONS, EXPERIENCE AND SKILLS Knowledge and Experience Bachelor's Degree in Computer Science or equivalent. Should have 10+ years of experience in IT Security with at least 6 years of experience in an L2 role within a security operations center. In-depth technical and hands-on knowledge and experience across Cyber Security and Technology domains. Strong understanding of the Cyber Kill Chain, pervasive threats attack methods and remediation. Knowledge of current cyber threats, trends, attack lifecycle, and various Tactics, Techniques, and Procedures (TTPs). Detailed understanding of MITRE framework and common attack vectors. Industry recognized professional certifications such as GCIH, Security+, CEH are preferable. Good understanding in E-commerce, logistics, supply chain & port operations applications will be an added advantage. Experience in working with Multinational Companies (MNC) is preferable. Soft Skills Excellent analytical skills. Excellent verbal and written communication. Program and Project management skills. Time management skills. Team player and conflict management skills. Ability to adapt in a complex environment, loves challenges, with the will and drive to learn new things on his/her own. Cultural awareness. Technical Skills Hands-on experience with managing well known on-prem & cloud SIEM solutions on public/private clouds like AWS, Azure, etc. Experience of implementing and managing SOAR platform. Experience with two or more analysis tools used in a CIRT or similar investigative environment. Ability to build content in SIEM system. Ability to analyse and triage IoCs. Ability to perform in-depth research tasks and produce written summaries covering insights and predictions based on an analytical process. #LI-MP1
Posted 2 weeks ago
7.0 - 11.0 years
0 Lacs
haryana
On-site
You are invited to join Miratech, a global IT services and consulting company dedicated to driving digital transformation and innovation across various industries. As a Privileged Access Management (PAM) Architect, you will play a pivotal role in designing and implementing PAM solutions that align with organizational objectives and regulatory requirements. Your responsibilities will include developing a comprehensive PAM architecture strategy, leading the deployment of PAM solutions, focusing on workload access controls and secrets management, and ensuring secure storage, access, and rotation of privileged credentials. You will leverage PAM tools such as CyberArk, HashiCorp Vault, and Microsoft Entra ID to enhance security measures and streamline access management processes. Additionally, you will design PAM policies, standards, and procedures to ensure consistent and secure management of privileged accounts while complying with organizational policies and regulatory requirements. To excel in this role, you should possess at least 7 years of experience in Privileged Access Management using PAM Solutions like CyberArk/StrongDM as an Architect/SME. You should have a strong industry background in architecting and designing PAM solutions, a deep technical understanding of PAM capabilities and security technologies, and familiarity with regulatory requirements related to PAM. Proficiency in Privileged Access Management concepts and standard processes is essential, along with expertise in security technologies such as Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, and SIEM solutions. Join us at Miratech and benefit from a Culture of Relentless Performance, where you can work with a successful technology development team and enjoy remote work flexibility. Embrace our Growth Mindset by participating in professional development opportunities, collaborating on impactful projects for global clients, and thriving in a welcoming multicultural environment. Be part of our commitment to social sustainability values, focusing on IT education, community empowerment, fair operating practices, environmental sustainability, and gender equality. Don't miss the opportunity to contribute to cutting-edge technology solutions and make a difference in the world by joining Miratech as a Privileged Access Management (PAM) Architect.,
Posted 3 weeks ago
4.0 - 6.0 years
0 Lacs
bengaluru, karnataka, india
On-site
Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, where you'll be supported and inspired by a collaborative community of colleagues around the world, and where you'll be able to reimagine what's possible. Join us and help the world's leading organizations unlock the value of technology and build a more sustainable, more inclusive world. Your role We are seeking an experienced and highly motivated Cloud Security Engineer for 4 to 6 years for Pan India to manage the implementation and optimization of security solutions across our public and hybrid cloud infrastructure. This role requires hands-on expertise in Microsoft Defender for Cloud, Cloud Access Security Broker (CASB), Cloud Workload Protection Platforms (CWPP), and Cloud Security Posture Management (CSPM) tools. The ideal candidate will be responsible for ensuring robust visibility, security, and compliance across all cloud-native assets, workloads, and applications. Design, deploy, and manage cloud-native security architectures across Azure, AWS, and GCP environments. Implement and optimize Microsoft Defender for Cloud, CASB solutions, and CWPP/CSPM tools to secure cloud workloads and assets. Monitor cloud environments for anomalies, vulnerabilities, and potential threats. Ensure compliance with regulatory standards (e.g., ISO, NIST, GDPR, HIPAA) and internal security policies. Conduct risk assessments and threat modeling of cloud services and applications. Collaborate with DevOps and Cloud Engineering teams to embed security into CI/CD pipelines. Develop automated security alerts, incident responses, and logging mechanisms. Provide recommendations for cloud architecture adjustments to strengthen security posture. Create and maintain documentation for cloud security strategies, policies, and procedures. Your profile Hands-on experience with Microsoft Defender for Cloud and CASB solutions (e.g., Microsoft Defender for Cloud Apps). Expertise in CWPP and CSPM platforms such as Prisma Cloud, Wiz, or Microsoft Defender CSPM. Strong knowledge of cloud platforms including Azure, AWS, and GCP. Proficiency in scripting (e.g., PowerShell, Python) and infrastructure-as-code tools (e.g., Terraform, ARM templates). Familiarity with cloud security frameworks, SIEM solutions, and cloud-native logging tools (e.g., Azure Monitor, AWS CloudWatch). What you'll love about working here You can shape yourwith us. We offer a range of career paths and internal opportunities within Capgemini group. You will also get personalized career guidance from our leaders. You will get comprehensive wellness benefits including health checks, telemedicine, insurance with top-ups, elder care, partner coverage or new parent support via flexible work. At Capgemini, you can work onin tech and engineering with industry leaders or createto overcome societal and environmental challenges. Capgemini is a global business and technology transformation partner, helping organizations to accelerate their dual transition to a digital and sustainable world, while creating tangible impact for enterprises and society. It is a responsible and diverse group of 340,000 team members in more than 50 countries. With its strong over 55-year heritage, Capgemini is trusted by its clients to unlock the value of technology to address the entire breadth of their business needs. It delivers end-to-end services and solutions leveraging strengths from strategy and design to engineering, all fueled by its market leading capabilities in AI, generative AI, cloud and data, combined with its deep industry expertise and partner ecosystem.
Posted 3 weeks ago
0.0 years
0 Lacs
gurugram, haryana, india
On-site
Inviting applications for the role of Senior Manager, Information & Cyber Security! In this role, you should have exposure on GRC platform Implementation , Cyber Security Framework, BOT / AI Management Framework, Cyber Regulatory Management and TPRM platform Implementation Responsibilities . Develop and implement security solutions: Develop and implement security solutions, including security monitoring, incident response, vulnerability management, and access control. . Conduct security assessments: Conduct security assessments for clients to identify potential security risks, vulnerabilities, and threats. . Develop security strategies: Develop security strategies for clients based on their risk profile and business requirements. . Manage security operations: Manage security operations for clients, including incident response, threat hunting, and security incident management. . Provide technical guidance: Provide technical guidance and support to clients on security-related issues. . Stay up-to-date with the latest security trends and technologies: Stay up-to-date with the latest security trends and technologies, and apply this knowledge to the development of new security solutions and strategies. . Collaborate with other teams: Collaborate with other teams, including the risk management team and the IT team, to ensure that security solutions are integrated with the client%27s overall business strategy. . Experience with security monitoring tools, such as SIEM, IDS/IPS, and vulnerability scanners. . Knowledge of security frameworks, such as NIST, ISO, and CIS. Qualifications we seek in you! Minimum Qualifications . CA / MBA / Engg / Bachelors in Information Technology . Additional qualifications like Post Graduate Diploma in Cyber Security, Certified Information Security Manager (CISM), Certified in Cyber Security (CC), Diploma in Computer Forensics, Certified Cyber Crime Investigator. Preferred Qualifications . Experience in Cyber Security, Information Security, Data Privacy and IT Risk Management. . Carried out Cyber Security Risk Assessment , Vulnerability Management, Managing Incident Response, Data Privacy framework and Implementation, Cyber Security Operations (SIEM, IDS/IPS, WAF, DLP, PT), Threat Modelling, Creating Cyber and Information Policies and Procedures, NIST CSF framework implementation, Cyber Fraud Investigation and Technology Audit . Performed engagements or projects with the companies or clients focussed on VA/PT Analysis, SIEM, IDS/IPS monitoring, DLP, WAF implementation, NIST CSF Implementation, Threat Modelling (OWASP), Cyber Fraud Investigation . Evaluated applications, tools and networks for cyber risk management, assisted organizations to identify right security posture, designed threat models to identify existing threats for the organization, created remediation plan to mitigate cyber risk . Implemented DLP tools, EDR tools, SIEM solutions, WAF, IDS / IPS and performed Application Security Testing . Understanding of cloud security principles and experience with cloud security platforms. . Strong analytical and problem-solving skills. . Excellent communication and presentation skills. . Ability to work effectively in a team and collaborate with clients and other stakeholders. . . . . .
Posted 3 weeks ago
3.0 - 7.0 years
0 Lacs
maharashtra
On-site
As a Security Architect in the Information Technology department, your role will involve designing, implementing, and maintaining the organization's security measures across various projects. Your primary focus will be on ensuring the confidentiality, integrity, and security of the bank's systems, data, and applications while adhering to regulatory and compliance requirements within the Indian banking industry. Key responsibilities include developing and upkeeping the enterprise security architecture in alignment with business objectives and regulatory mandates such as RBI guidelines and PCI DSS. You will be tasked with evaluating the current security posture, making recommendations for enhancements, and overseeing the implementation of security measures for both cloud and on-premises environments. Furthermore, you will need to ensure compliance with Indian banking regulations, conduct regular security audits and risk assessments, collaborate with IT teams to integrate security into application development through DevSecOps practices, and provide technical guidance on new projects and third-party vendor assessments. Additionally, conducting security training and awareness programs for employees will be part of your duties. To excel in this role, expertise in network security, endpoint protection, identity and access management (IAM), and SIEM solutions is essential. Proficiency in secure software development lifecycle (SDLC) and DevSecOps practices, along with hands-on experience in cloud security (AWS, Azure, GCP), encryption, cryptography, and data protection techniques are required. A minimum of 3 years of experience in a security architect role, particularly within the BFSI (Banking, Financial Services, and Insurance) sector, is highly preferred. Education Qualifications: - Graduation: Bachelor of Science (B.Sc) / Bachelor of Technology (B.Tech) / Bachelor of Computer Applications (BCA) - Post-Graduation: Master of Science (M.Sc) / Master of Technology (M.Tech) / Master of Computer Applications (MCA),
Posted 1 month ago
3.0 - 6.0 years
3 - 6 Lacs
Noida, Uttar Pradesh, India
On-site
Creation of supporting SOPs in line with policy requirements. Integration of all new devices (on-premise and AWS cloud) with SIEM. Experience in threat hunting, red teaming, and cyber drills. Monitoring the status of device integration and supporting teams to ensure smooth operation in case of any breakage. Support teams for defining SOPs and performing triage. Ensuring the functioning of the SIEM tool and related processes as per the mentioned requirements. Reporting computer security events in accordance with established processes and procedures. Coordinate with system owners and other departments (IDC/NOC/TOPS/Enterprise IT) as needed to analyze events and drive necessary requirements for closure. Support ongoing analysis and response of computer security incidents by SOC (Monitoring) Team. Creation of new use cases/reports as per business requirements. Creation of new use-cases specific to the banking environment. Creation of new dashboards in the SIEM console as per requirements. SIEM tickets closure. Drive key security operations responsibilities (e.g., secure code review, configuration review). Experience / Job Competencies / Success Factors: 10+ years of technical experience working in a SOC or incident response, preferably with BFSI sector experience, especially in banking. Experience with one or more Security Information and Event Management (SIEM) solutions, especially with Dnif. In-depth understanding of security threats, threat attack methods, and the current threat environment. Experience in security monitoring, Incident Response (IR), security tools configuration, and security remediation. Excellent troubleshooting and analytical skills with the ability to articulate and propose security solutions in business terms. Ability to multitask in a fast-paced environment. Provide support for audit and compliance requirements within defined timelines. Must be comfortable working in a fast-paced environment with tight deadlines and changing priorities. Understanding of network protocols, network capture/analysis tools such as Wireshark. Understanding of Linux and Windows operating systems and OS event logging. Experience working with AWS environments. Comfortable working with different security solutions in a diverse IT infrastructure environment, including: FireEye network APT, Palo Alto Firewalls, WAF - F5, HIPS - TrendMicro, PIM - CyberArk, Qualys Vulnerability Scanner, TrendMicro Endpoint security suite and APT, Honey Pot-Smokescreen. Experience in developing production SIEM use cases. Ability to work non-core hours (swing or night shift) if necessary. Certifications: Security+, CEH, CISSP, SANS Course of Incident Response, Digital Forensics.
Posted 1 month ago
3.0 - 6.0 years
3 - 6 Lacs
Navi Mumbai, Maharashtra, India
On-site
Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion it's a place where you can grow, belong and thrive. Your day at NTT DATA The Security Managed Services Engineer (L3) is a seasoned engineering role, responsible for providing a service to clients by proactively identifying and resolving technical incidents and problems. Through pre-emptive service incident and resolution activities, as well as product reviews, operational improvements, operational practices, and quality assurance this role will maintain a high level of service to clients. The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and is responsible for managing tickets of high complexity, conducts advanced and complicated tasks, aware of client's high level and low-level security architecture and provides resolution to a diverse range of complex problems. This position uses considerable judgment and independent analysis within defined policies and practices and applies analytical thinking and deep technical expertise in achieving client outcomes, while coaching and mentoring junior team members across functions. The Security Managed Services Engineer (L3) may also contribute to / support on project work as and when required. What you'll be doing Key Responsibilities: Ensures that assigned infrastructure at the client site is configured, installed, tested, and operational Performs necessary checks, apply monitoring tools and respond to alerts. Identifies problems and errors prior to or when it occurs and logs all such incidents in a timely manner with the required level of detail. Assists in analyzing, assigning, and escalating support calls. Investigates third line support calls assigned and identify the root cause of incidents and problems Reports and escalates issues to 3rd party vendors if necessary. Provides continuous feedback to clients and affected parties and update all systems and/or portals as prescribed by the company. Proactively identifies opportunities for work optimization including opportunities for automation of work. Coaches L2 teams for advance technical troubleshooting and behavioral skills. May manage and implement projects within technology domain, delivering effectively and promptly per client agreed upon requirements and timelines. May work on implementing and delivering Disaster Recovery functions and tests. Performs any other related task as required. Knowledge and Attributes: Ability to communicate and work across different cultures and social groups Ability to plan activities and projects well in advance and takes into account possible changing circumstances. Ability to maintain a positive outlook at work. Ability to work well in a pressurized environment. Ability to work hard and put in longer hours when it is necessary. Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting. Ability to adapt to changing circumstances. Ability to place clients at the forefront of all interactions, understanding their requirements, and creating a positive client experience throughout the total client journey. Academic Qualifications and Certifications: Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience) Relevant certifications depending on technology domain expertise such as (but not limited to) - CCNP in Security or PCNSE certification or Firewall Vendor related certification is good to have along with advance technical certification like CCIE, CISSP. Required Experience: Seasoned Managed Services experience handling complex Security Infrastructure. Seasoned experience required in Engineering function within a medium to large ICT organization. Seasoned working knowledge of ITIL processes. Seasoned experience working with vendors and/or 3rd parties. Workplace type: On-site Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
hyderabad, telangana
On-site
You are a Cybersecurity Implementation Engineer with at least 2 years of relevant experience, specializing in customer parser development, Yara rules creation, playbook implementation, and data ingestion techniques. In this role, you will be involved in designing and implementing cutting-edge cybersecurity solutions while collaborating with a team of skilled professionals. Your responsibilities will include developing custom parsers to extract and normalize data from various sources, designing and maintaining Yara rules for threat detection, creating playbook automation for incident response, and implementing data ingestion pipelines for analyzing security data. You will work closely with cross-functional teams to understand customer requirements, identify emerging threats, and provide technical support during security incident response activities. To qualify for this position, you should hold a Bachelor's degree in Computer Science, Information Security, or a related field. You must have hands-on experience in cybersecurity, data analysis, detection engineering, and implementing custom parsers for log and data normalization. Proficiency in creating and managing Yara rules, designing playbook automation, and utilizing tools like Demisto and Phantom is essential. Additionally, you should be familiar with data ingestion technologies, SIEM solutions such as Splunk and ELK, and possess excellent analytical, troubleshooting, and communication skills. If you are a dedicated cybersecurity professional with expertise in customer parser development, Yara rules creation, playbook implementation, and data ingestion techniques, we invite you to join our team. Help us in our mission to safeguard our organization and customers from cyber threats by sharing your updated profile at naveen.vemula@netenrich.com.,
Posted 1 month ago
8.0 - 12.0 years
0 Lacs
chennai, tamil nadu
On-site
As an experienced Cloud Monitoring & SOC Specialist, you will be leading the optimization and integration of the monitoring ecosystem. Your passion for transforming data into actionable insights and reducing alert fatigue will be instrumental in this role. Your responsibilities will include consolidating and integrating various tools such as SolarWinds, Instana, Google Cloud Operations, VMware Log Insight, and Rapid7 into a unified monitoring ecosystem. You will architect clear and efficient monitoring and incident-response workflows, implementing centralized AI-driven alerting to minimize noise and accelerate detection. In addition, you will be responsible for developing methods for proactive monitoring and continuous improvement by learning from incidents and iterating on processes. Configuring and maintaining essential NOC/SOC dashboards and monthly capacity reports for leadership visibility will also be part of your role. To qualify for this position, you should have deep technical expertise with 8-10 years of experience in monitoring architecture, tool integration, and SOC operations. Hands-on experience with infrastructure monitoring, APM, cloud (GCP), centralized logging, and SIEM solutions is required. Familiarity with tools such as SolarWinds, Instana, Google Cloud Operations, VMware Log Insight, and Rapid7 is considered a strong advantage. A proven track record of designing effective alert rules, incident-response playbooks, and automated workflows is essential. Experience in writing and refining monitoring procedures, SLAs, runbooks, and regular capacity/performance reports is also required. Strong communication skills and the ability to collaborate with DevOps, SecOps, and IT teams to drive continuous improvement are key attributes for success in this role.,
Posted 2 months ago
2.0 - 6.0 years
0 Lacs
karnataka
On-site
At EY, you have the opportunity to shape a career tailored to your unique abilities, supported by a global network, inclusive environment, and cutting-edge technology to empower your growth. Your individuality and insights will contribute to EY's continuous improvement. Embrace this chance to craft an exceptional journey for yourself while contributing to a more productive working world for all. As a Senior in Cyber Managed Service - Threat Detection & Response focusing on Security Orchestration, Automation and Response (Splunk SOAR), your key capabilities include exceptional teamwork, a drive to combat cyber threats, and collaborating with customers to devise security automation strategies. You will work with the team to deliver innovative integrations and playbooks, ensuring practical solutions to customer challenges. Your responsibilities encompass the execution and upkeep of Splunk SOAR analytical processes, platform management, development of custom scripts and playbooks for task automation, and leveraging Python, REST API, JSON, and basic SQL. Your role involves utilizing Incident Response and Threat Intelligence tools, creating efficient Python-based Playbooks, and employing the Splunk SOAR platform for automation across various technologies. Collaboration with security operations teams, incident responders, and intelligence groups is crucial. Experience in security operations centers and familiarity with SIEM solutions like Splunk and Microsoft Sentinel is advantageous, as is knowledge of Splunk content development. You should be eager to learn new technologies, contribute to technical content development, and conceptualize automation for business workflows. Proficiency in network monitoring technologies and endpoint protection platforms is desired. Your ability to support production issues, engage with stakeholders, coordinate with vendors for incident closure, and develop remediation action plans is essential. Ideal qualifications include a minimum of 3+ years in cybersecurity with network architecture expertise, experience in deploying and integrating Splunk SOAR in enterprise environments, and familiarity with ServiceNow SOAR. Strong communication skills, network administration background, scripting proficiency, and a technical degree are required. Additionally, certifications in Splunk and core security disciplines are beneficial. Join EY in building a better working world, where diverse teams worldwide use data and technology to provide assurance and support client growth and transformation. Be a part of EY's mission to address complex global challenges through innovative solutions across assurance, consulting, law, strategy, tax, and transactions.,
Posted 2 months ago
5.0 - 6.0 years
6 - 8 Lacs
Mumbai, Maharashtra, India
On-site
Dream11 is seeking a skilled Senior Security Engineer - Security Operations to strengthen our defense against evolving threats. If you have over 5 years of experience in SecOps, incident response, or threat hunting, and a strong background in SIEM implementation, you'll be crucial in maintaining security compliance and building automated defense frameworks. Your Role Integrate data sources, analyze logs, write/fine-tune alerts, and maintain security compliance across the infrastructure. Manage and implement SIEM solutions for both on-premise and cloud architectures. Develop and optimize the incident response framework , including processes, playbooks, and documentation. Develop and optimize the threat hunting/intelligence framework , including processes, playbooks, and documentation. Build automated frameworks to remediate threats without human intervention based on incident response policies. Effectively communicate with internal and external stakeholders to drive the security operations roadmap . Qualifiers 5+ years of work experience in SecOps/Incident Response/Threat hunting (Blue Team)/SIEM tool implementation . Working knowledge of security technologies like EDR/Firewalls/Antivirus/SOAR .
Posted 2 months ago
2.0 - 6.0 years
0 Lacs
pune, maharashtra
On-site
As a member of our team at FIS, you will be part of a dynamic and innovative environment that tackles some of the most challenging issues in financial services and technology. We value curiosity, motivation, and forward-thinking individuals who thrive in an open, collaborative, and fun team setting. You will have the opportunity to work alongside a talented group of individuals dedicated to providing cutting-edge financial technology solutions on a global scale. Your role will involve executing security controls to safeguard company information, maintaining security systems, and enforcing security policies to regulate system access. Additionally, you will be responsible for researching potential security breaches, creating security documentation, and responding to security-related inquiries using established protocols. A key aspect of your responsibilities will involve managing and expanding coverage of the SIEM solution, identifying and implementing security controls, and collaborating with the user community to understand and address security needs. You will also play a vital role in developing custom automations to streamline processes and enhancing workflow efficiency. To excel in this role, you should possess knowledge and experience in deploying SIEM solutions, cloud technologies, network technologies, and security technologies. Strong time management, communication, decision-making, and organizational skills are essential, along with the ability to establish and maintain effective working relationships with both technical and non-technical audiences. The ideal candidate will hold a Bachelor's degree in computer science or have an equivalent combination of education, training, and work experience. This position is classified as a developing level professional role, requiring moderate skills with a high level of proficiency and the ability to work on complex projects in various technical environments. If you are looking to be part of a forward-thinking team that is dedicated to innovation and excellence in financial technology solutions, we encourage you to apply for this exciting opportunity at FIS.,
Posted 2 months ago
1.0 - 6.0 years
6 - 11 Lacs
Hyderabad, Bengaluru, Mumbai (All Areas)
Work from Office
Candidate must have expertise in selling cybersecurity products/services, experience in revenue and target ownership and a strong track record in team leadership and mentoring. Engage with customers to assess their technical requirements, Required Candidate profile Certifications such as CISSP, CISM, CEH, or vendor-specific certifications. Understanding of cybersecurity products and services, The candidate must have deep expertise in corporate/B2B sales.
Posted 2 months ago
6.0 - 11.0 years
15 - 30 Lacs
Gurugram
Remote
Job Description We are looking for a Senior Identity Access Management Engineer (PAM Architecture) to lead the design of our PAM architecture strategy. This role will also involve contributing to the design and implementation of the PAM platform and its associated tools. Responsibilities: Develop a comprehensive PAM architecture strategy that aligns with organizational objectives and regulatory requirements. Lead the design contribute to the development and deployment of PAM solutions, focusing on workload access controls and secrets management. Contribute to the implementation and management of secrets management solutions ensuring secure storage, access and rotation of privileged credentials. Leverage PAM tools such as CyberArk, HashiCorp Vault, and Microsoft Entra ID to enhance security measures and streamline access management processes. Design PAM policies, standards, and procedures to ensure consistent and secure management of privileged accounts. Ensure PAM practices comply with organizational policies and regulatory requirements. Assess the effectiveness of PAM controls, making data-driven decisions to reduce risk and enhance security posture. Collaborate with technology and business partners to identify and mitigate risks associated with privileged access. Stay current with emerging trends and technologies in PAM and cybersecurity and driving enhancements to existing solutions. Qualifications 6+ years of experience in Privileged Access Management using PAM Solutions like CyberArk/StrongDM as an Architect/SME. Strong industry experience in architecting and designing PAM solutions and deployment across the enterprise. Deep technical understanding of PAM capabilities, controls and security technologies in areas related to identity and access management to address privilege-based risk. Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR. Expertise with build vs. buy solution options. Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, and SIEM solutions. Proficient in Privileged Access Management (PAM) concepts and standard processes, covering privileged account discovery and vaulting, session management, DevOps secret management, and endpoint privilege management. Nice to have: Experience with Python, PowerShell, and Bash. We offer: Culture of Relentless Performance: join an unstoppable technology development team with a 99% project success rate and more than 30% year-over-year revenue growth. Competitive Pay and Benefits: enjoy a comprehensive compensation and benefits package, including health insurance, and a relocation program. Work From Anywhere Culture: make the most of the flexibility that comes with remote work. Growth Mindset: reap the benefits of a range of professional development opportunities, including certification programs, mentorship and talent investment programs, internal mobility and internship opportunities. Global Impact: collaborate on impactful projects for top global clients and shape the future of industries. Welcoming Multicultural Environment: be a part of a dynamic, global team and thrive in an inclusive and supportive work environment with open communication and regular team-building company social events. Social Sustainability Values: join our sustainable business practices focused on five pillars, including IT education, community empowerment, fair operating practices, environmental sustainability, and gender equality. * Miratech is an equal opportunity employer and does not discriminate against any employee or applicant for employment based on race, color, religion, sex, national origin, age, disability, veteran status, sexual orientation, gender identity, or any other protected status under applicable law.
Posted 2 months ago
7.0 - 12.0 years
25 - 40 Lacs
Gurugram
Remote
Job Description We are looking for a Senior Identity Access Management Engineer (PAM Architecture) to lead the design of our PAM architecture strategy. This role will also involve contributing to the design and implementation of the PAM platform and its associated tools. Responsibilities: Develop a comprehensive PAM architecture strategy that aligns with organizational objectives and regulatory requirements. Lead the design contribute to the development and deployment of PAM solutions, focusing on workload access controls and secrets management. Contribute to the implementation and management of secrets management solutions ensuring secure storage, access and rotation of privileged credentials. Leverage PAM tools such as CyberArk, HashiCorp Vault, and Microsoft Entra ID to enhance security measures and streamline access management processes. Design PAM policies, standards, and procedures to ensure consistent and secure management of privileged accounts. Ensure PAM practices comply with organizational policies and regulatory requirements. Assess the effectiveness of PAM controls, making data-driven decisions to reduce risk and enhance security posture. Collaborate with technology and business partners to identify and mitigate risks associated with privileged access. Stay current with emerging trends and technologies in PAM and cybersecurity and driving enhancements to existing solutions. Qualifications 7+ years of experience in Privileged Access Management using PAM Solutions like CyberArk/StrongDM as an Architect/SME. Strong industry experience in architecting and designing PAM solutions and deployment across the enterprise. Deep technical understanding of PAM capabilities, controls and security technologies in areas related to identity and access management to address privilege-based risk. Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR. Expertise with build vs. buy solution options. Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, and SIEM solutions. Proficient in Privileged Access Management (PAM) concepts and standard processes, covering privileged account discovery and vaulting, session management, DevOps secret management, and endpoint privilege management. Nice to have: Experience with Python, PowerShell, and Bash. We offer: Culture of Relentless Performance: join an unstoppable technology development team with a 99% project success rate and more than 30% year-over-year revenue growth. Competitive Pay and Benefits: enjoy a comprehensive compensation and benefits package, including health insurance, and a relocation program. Work From Anywhere Culture: make the most of the flexibility that comes with remote work. Growth Mindset: reap the benefits of a range of professional development opportunities, including certification programs, mentorship and talent investment programs, internal mobility and internship opportunities. Global Impact: collaborate on impactful projects for top global clients and shape the future of industries. Welcoming Multicultural Environment: be a part of a dynamic, global team and thrive in an inclusive and supportive work environment with open communication and regular team-building company social events. Social Sustainability Values: join our sustainable business practices focused on five pillars, including IT education, community empowerment, fair operating practices, environmental sustainability, and gender equality. * Miratech is an equal opportunity employer and does not discriminate against any employee or applicant for employment based on race, color, religion, sex, national origin, age, disability, veteran status, sexual orientation, gender identity, or any other protected status under applicable law.
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |