Job
                                Description
                            
                            
                                
At EY, youll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And were counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-IAM
Consulting- Risk 
As part of our EY-cyber security team, you shall Engage in Identity & Access Management projects in the capacity of execution of deliverables. An important part of your role will be to actively establish, maintain and strengthen internal and external relationships. Youllalso identify potential business opportunities for EY and GTH within existing engagements and escalate these as appropriate. Similarly, youll anticipate and identify risks within engagements and share any issues with senior members of the team The opportunity 
Were looking for Security Analyst / Consultant in the RiskConsulting team to work on various Identity and Access Management projectsfor our customers across the globe. Also, the professional shall need to report any identified risks within engagements and share any issues and updates with senior members of the team. In line with EYs commitment to quality, youll confirm that work is of the highest quality as per EYs quality standards andis reviewed bythe next-level reviewer. As an influential member of the team, youll help to create a positive learning culture, coach and counsel junior team members and help them to develop. Your key responsibilities 
Confer and consult with business, technology, and operations to build and manage solution using PingDirectory, PingDirectory Proxy, and PingData Sync. Performing installation, configuration, and upgradation of Ping Directory instances. Ensure that directory architecture, designs, plans, controls, processes are aligned with Security as well as business strategy andstandards and be able to communicate and defend solution architecture positions. Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review. Create network design, server configuration/sizing specifications, and subsequently put together a global deployment ofPingDirectory and PingDirectory Proxy, to provide a high-volume, low-latency directory solution. Real-time synchronization, identity correlation, and directory storage using Ping/VDS Directory Increase efficiency and maintainability incorporating scripting and automation whenever appropriate. 
Skills and attributes for success 
Advanced knowledge of LDAP and LDAP based directories. Minimum 5 years of hands-experience with PingDirectory Suite (PingDirectory, PingDirectory Proxy, and PingData Sync.) Implemented any migration projects from Oracle Ldap/Radiant logic to PingDirectory. Strong knowledge of PingDirectory administrative configuration. Good understanding of Authentication and Authorization standards and patterns, most criticallythe OAuth 2.0 and OIDC standards. Ability to develop consumption tools/widgets for applications to consume data from Ping Directory using Ping Directory API. Knowledge of SSL/TLS, PKI, certificates, and certificate authorities. Have hands-on experience on cloud provider Azure or AWS or GCP Experience in scripting language - python, PowerShell and bash Knowledge of other Ping products Ping Federate, Ping Access.
 
To qualify for the role, you must have. 
B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Experience in HTML, CSS and JavaScript. Strong interpersonal and presentation skills. 1-2 Years Work Experience. 
Certification:
 
Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications. AWS Cloud practitioner and Azure AZ-900 certification.