3 - 9 years
5.0 - 11.0 Lacs P.A.
Bengaluru
Posted:2 months ago| Platform:
Work from Office
Full Time
About Lowe s Lowe s Companies, Inc. (NYSE: LOW) is a FORTUNE 50 home improvement company serving approximately 16 million customer transactions a week in the United States. With total fiscal year 2024 sales of more than $83 billion, Lowe s operates over 1,700 home improvement stores and employs approximately 300,000 associates. Based in Mooresville, N.C., Lowe s supports the communities it serves through programs focused on creating safe, affordable housing, improving community spaces, helping to develop the next generation of skilled trade experts and providing disaster relief to communities in need. For more information, visit Lowes.com . Job Summary The primary purpose of this role is to support the design, implementation and ongoing operation of information security tools and services. This includes leading the process of translating business and technical requirements into robust enterprise security software solutions that ensure information assets are adequately protected with acceptable levels of control. This also includes monitoring, testing, and evaluating security assessments of systems and taking steps to design and implement remediation solutions. To be successful, the individual in this role must have strong knowledge of security practices and tools related to identity and access management along with enterprise digital certificate management systems. This role establishes and maintains programs that enable the business to operate efficiently and remain in compliance with regulatory and industry best practices." To be successful, the individual in this role must have knowledge of security practices and tools related to identity and access management along with enterprise digital certificate management systems. This role helps establish and maintain programs that enable the business to operate efficiently and remain in compliance with regulatory and industry best practices Key Responsibilities RBAC Design Implementation : Develop and maintain RBAC models, policies, and procedures to ensure proper access control across applications, databases, and cloud environments. IAM Strategy : Work with the Identity Access Management (IAM) team to enhance user provisioning, de-provisioning, and access reviews. Role Engineering : Define and manage roles, entitlements, and access levels based on least privilege and separation of duties (SoD) principles. Automation Scripting : Implement automation for role assignments, access certifications, and provisioning using scripting (PowerShell, Python) and IAM tools. Security Compliance : Ensure compliance with SOX, PCI-DSS, GDPR, HIPAA, and other regulatory requirements. Collaboration : Work with IT, security, and business teams to streamline access control policies. Incident Response: Investigate access control breaches, unauthorized access, and policy violations. Reporting Auditing : Generate reports on user access, role assignments, and compliance status. Assists the Information Security team in monitoring security systems, reviewing logs, and managing information security syst Collaborates with other technology teams including Engineering to design and implement remediation solutions Identifies, reports, and provides assistance during information security incidents as part of an Incident Response Team; reviews and responds to security alerts to investigate malicious activity Supports evaluation of new security technologies that address both current and future needs based on emerging threats and industry trends Keeps up to date with exploits relevant to the retail sales environment Solves complex architecture/design and business problems; solutions are extensible; works to simplify, optimize, remove bottlenecks, etc. Provides mentoring and guidance to more junior level engineers; may provide feedback and direction on specific engineering tasks Responds to escalated security issues for enterprise systems; facilitates advanced diagnosis and troubleshooting when necessary Participates in the implementation of hardware and software changes into environments to ensure security requirements are met Provides input into security breach response procedures; helps lead security breach response activities Leads break/fix activities, escalating problems to senior management and/or vendors as appropriate Analyzes the output of industry standard cybersecurity tools and identifies remediations to reduce risk and exposure of applications Required Qualifications Bachelor s degree in computer science, Information Security, or related field. 4+ years of experience in IAM and RBAC implementations. Hands-on experience with IAM tools (SailPoint, Okta, CyberArk, etc.). Strong knowledge of Active Directory (AD), LDAP, SSO, MFA, and Privileged Access Management (PAM). Experience in cloud security (AWS, Azure, GCP) and integrating RBAC policies in cloud environments. Proficiency in Python, PowerShell, or Java for automating IAM processes. Strong understanding of NIST, CIS, and Zero Trust security frameworks. Preferred Qualifications Masters Degree in Computer Science, CIS, Business Administration, or related field 4 Years experience working on project(s) involving the implementation of solutions applying development life cycles (SDLC) Experience in RBAC implementation for large-scale enterprises Certifications such as CISSP, CISM , Azure Security Engineer etc.., Familiarity with CI/SD pipelines and DevSecOps Practice
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Chennai, Pune, Delhi, Mumbai, Bengaluru, Hyderabad, Kolkata
INR 25.0 - 30.0 Lacs P.A.
Bengaluru, Hyderabad, Mumbai (All Areas)
INR 20.0 - 35.0 Lacs P.A.
Bengaluru
INR 7.0 - 12.0 Lacs P.A.
INR 9.0 - 13.0 Lacs P.A.
INR 5.0 - 9.0 Lacs P.A.
Greater Noida, Bengaluru
INR 37.5 - 42.5 Lacs P.A.
INR 13.0 - 17.0 Lacs P.A.
INR 5.0 - 7.0 Lacs P.A.
INR 9.0 - 15.0 Lacs P.A.
INR 2.0 - 7.0 Lacs P.A.