Work from Office
Full Time
We are looking for a skilled Security Analyst / Consultant with 1 to 2 years of experience to work on various Identity and Access Management projects in the Risk Consulting team. The ideal candidate will have a strong background in security domain, such as CISSP and CISA or any IAM product-specific certifications. ### Roles and Responsibility Engage in Identity & Access Management projects, including execution of deliverables. Establish, maintain, and strengthen internal and external relationships. Identify potential business opportunities for EY and GTH within existing engagements and escalate them as appropriate. Anticipate and identify risks within engagements and share issues with senior team members. Confer and consult with business, technology, and operations to build and manage solutions using PingDirectory, PingDirectory Proxy, and PingData Sync. Perform installation, configuration, and upgradation of Ping Directory instances. Ensure directory architecture, designs, plans, controls, and processes align with both security and business strategy and standards, and communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and deploy globally PingDirectory and PingDirectory Proxy to provide high-volume, low-latency directory solutions. Implement real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory. Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. ### Job Requirements Advanced knowledge of LDAP and LDAP-based directories. Minimum 5 years of hands-on experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync). Experience in implementing migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, particularly OAuth 2.0 and OIDC. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Hands-on experience with cloud providers – Azure or AWS or GCP. Experience in scripting languages like Python, PowerShell, and Bash. Knowledge of other Ping products – Ping Federate and Ping Access. B.Tech./B.E. with sound technical skills. Strong command over verbal and written English language. Experience in HTML, CSS, and JavaScript. Strong interpersonal and presentation skills. Desirable to have certifications in the security domain, such as CISSP and CISA or any IAM product-specific certifications. AWS Cloud practitioner and Azure AZ-900 certification.
EY
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
My Connections EY
Kochi, Kerala, India
Salary: Not disclosed
Trivandrum, Kerala, India
Salary: Not disclosed
Kolkata, West Bengal, India
Salary: Not disclosed
Coimbatore, Tamil Nadu, India
Salary: Not disclosed
Coimbatore, Tamil Nadu, India
Salary: Not disclosed
Noida, Uttar Pradesh, India
Salary: Not disclosed
Kanayannur, Kerala, India
Salary: Not disclosed
Chennai
6.0 - 10.0 Lacs P.A.
Kochi
7.0 - 11.0 Lacs P.A.
Bengaluru
7.0 - 11.0 Lacs P.A.