Jobs
Interviews

11 Uam Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 7.0 years

5 - 15 Lacs

Hyderabad

Work from Office

Greetings from Technogen !!! We thank you for taking time about your competencies and skills, while allowing us an opportunity to explain about us and our Technogen, we understand that your experience and expertise are relevant the current open with our clients. About Technogen : TechnoGen Brief Overview:- TechnoGen, Inc. is an ISO 9001:2015, ISO 20000-1:2011, ISO 27001:2013, and CMMI Level 3 Global IT Services Company headquartered in Chantilly, Virginia. TechnoGen, Inc. (TGI) is a Minority & Women-Owned Small Business with over 20 years of experience providing end-to-end IT Services and Solutions to the Public and Private sectors. TGI provides highly skilled and certied professionals and has successfully executed more than 345 projects. TechnoGen is committed to helping our clients solve complex problems and achieve their goals, on time and under budget. LinkedIn: https://www.linkedin.com/company/technogeninc/about/ Job Title :User Access Management Technician Required Experience :2+ Years Location : Hyderabad. Job Summary: We are seeking a detail-oriented and security-focused User Access Management (UAM) Technician to join our IT/Security team. The ideal candidate will play a key role in managing user access rights, maintaining secure access across systems, and ensuring compliance with identity governance policies and SOX regulatory requirements. This position is critical to protecting the organizations digital assets by enforcing appropriate access controls across our enterprise environment and supporting audit readiness through accurate documentation and controls. Key Responsibilities: Access Provisioning & Deprovisioning Create, modify, and deactivate user accounts in accordance with company policy and onboarding/offboarding procedures. Coordinate with HR and department leads to process access requests for new hires, terminations, and role changes as needed. Access Reviews & Audits Conduct periodic access reviews to ensure users have appropriate permissions. Support internal and external audits by providing access logs and control documentation. System Integration & Automation Assist in implementing and maintaining identity and access management tools and workflows. Help automate provisioning tasks using tools like Active Directory, Azure AD, Okta and Exchange. Security & Compliance Monitor for unauthorized access attempts and escalate incidents as necessary. Ensure compliance with SOX and other regulatory requirements. User Support & Troubleshooting Respond to access-related service tickets in a timely manner. Troubleshoot account and login issues across multiple platforms and escalate to engineering/security teams as needed. Maintain accurate and up-to-date documentation for user access procedures, systems, and policies (SOP) Required Qualifications Associate or bachelors degree in information technology, Cybersecurity, or a related field. 2+ years of experience in IT support, security operations, or identity and access management. Hands-on experience with (Active Directory, AD Manager Plus, Okta, MS Azure and Exchange, and MS Licenses, etc.). Strong understanding of access control principles and user lifecycle management. Familiarity with ITIL processes and ticketing systems (e.g., ServiceNow). Excellent attention to detail, communication, and organizational skills. Best Regards, Syam.M | Sr.IT Recruiter syambabu.m@technogenindia.com www.technogenindia.com | Follow us on LinkedIn

Posted 5 days ago

Apply

10.0 - 20.0 years

10 - 20 Lacs

Hyderabad

Work from Office

Greetings from Technogen !!! We thank you for taking time about your competencies and skills, while allowing us an opportunity to explain about us and our Technogen, we understand that your experience and expertise are relevant the current open with our clients. About Technogen : TechnoGen Brief Overview:- TechnoGen, Inc. is an ISO 9001:2015, ISO 20000-1:2011, ISO 27001:2013, and CMMI Level 3 Global IT Services Company headquartered in Chantilly, Virginia. TechnoGen, Inc. (TGI) is a Minority & Women-Owned Small Business with over 20 years of experience providing end-to-end IT Services and Solutions to the Public and Private sectors. TGI provides highly skilled and certied professionals and has successfully executed more than 345 projects. TechnoGen is committed to helping our clients solve complex problems and achieve their goals, on time and under budget. LinkedIn: https://www.linkedin.com/company/technogeninc/about/ Job Title : IAM & UAM Operations Lead Required Experience : 10+ years Location : Hyderabad. Certification/Licenses: - Preferable ITILv3 GSEC, CISSP, GIAC, (ISC)2, Okta, CyberArk or similar technical certification a plus. Knowledge: Extensive knowledge of IAM and PAM. Extensive knowledge of RedHat Linux, Windows, AD, Entra, MFA, Okta, JML, SCIM, CyberArk Extensive knowledge of Incident Management, Problem Management, Change and Production Control Frameworks as set forth in the ITILv.3 library. Skills: Strong ability to build, influence, lead and motivate effective teams towards end results. Ability to write and present effective materials, including presentations, status reporting, etc. Ability to lead effective meetings that are tailored to the audience. Demonstrated ability to work effectively with all levels of staff, clients and other IT personnel. Ability to negotiate with customers to reach agreement on common goals and service levels. Ability to conduct thorough root cause analysis to resolve issues. Experience: Bachelors degree in technology or applicable experience. 10+ Years of experience within information security operations in multiple roles. 10+ years of experience with cloud security and infrastructure (AWS, GCP, Entra) and O365 services and technology. 10+ years of experience with security identity operations utilizing PAM (CyberArk, Delinea, Okta OPA etc.) 10+ years of experience with security identity operations utilizing IGA platforms (SailPoint, Okta IGA etc). 5+ years of experience defining, refining, and driving efficiency in operational processes. Extensive experience with Okta modules OPA, OIG, ASA, Workflows is a plus. Extensive experience with, but not excluded to: SAML, OID, OAuth, SCIM, MFA. Extensive experience working with and managing Active Directory, Entra ID. Experience with IAM technologies (IAM, PIM, PAM) and directory services such as SailPoint, Okta, Active Directory, OneLogin, LastPass, Keeper, Delinia. Experience with PowerShell, Python, and scripting. Knowledge of information security identity standards, principles, and practices required. Knowledge of industry security standards, guidelines, and regulatory/compliance requirements related to information security such as ISO 27001, NIST 800-53, SOC2, PCI, SOX, NYDFS, etc. Excellent prioritization, decision making, critical thinking, communication, and relationship building skills. Advanced Microsoft Excel skills required, including pivot tables, formulas, and data analysis tools. Strong ability to work collaboratively across teams during high-stress situations. Thrive in a fast-paced, startup environment where priorities shift quicklymove with urgency, adapt to change, and communicate proactively to maintain momentum without losing sight of ownership or impact. Ability to work independently and in a team environment. Experience with budgeting for Operations products, services, and support. Experience managing co-location relationships with heavy emphasis on Outsourcing relationships Skilled in examining and re-engineering IT operations and procedures, formulating policy, and developing and implementing new strategies. Ability to analyze complex problems, interpret operational needs, and develop integrated, creative solutions. Strong interpersonal skills and the ability to effectively communicate with a wide range of individuals and constituencies in a diverse community. Advanced analytical, evaluative, and objective critical thinking skills. Working knowledge and understanding of the principles and processes of computerized business and operating systems. Ability to gather data, compile information, and prepare reports for Executive Management Skilled in organizing resources and establishing priorities. Ability to supervise and train employees, to include organizing, prioritizing, and scheduling work assignments. Ability to provide technical guidance and leadership to professional personnel in area of expertise. Ability to provide and drive data collection needs for various annual Corporate Audits: SOX, PCI, etc.

Posted 5 days ago

Apply

4.0 - 9.0 years

10 - 17 Lacs

Hyderabad

Work from Office

Job Description: User Access Management Technician Job Summary We are seeking a detail-oriented and security-focused User Access Management (UAM) Technician to join our IT/Security team. The ideal candidate will play a key role in managing user access rights, maintaining secure access across systems, and ensuring compliance with identity governance policies and SOX regulatory requirements. This position is critical to protecting the organizations digital assets by enforcing appropriate access controls across our enterprise environment and supporting audit readiness through accurate documentation and controls. Key Responsibilities: Access Provisioning & Deprovisioning Create, modify, and deactivate user accounts in accordance with company policy and onboarding/offboarding procedures. Coordinate with HR and department leads to process access requests for new hires, terminations, and role changes as needed. Access Reviews & Audits Conduct periodic access reviews to ensure users have appropriate permissions. Support internal and external audits by providing access logs and control documentation. System Integration & Automation Assist in implementing and maintaining identity and access management tools and workflows. Help automate provisioning tasks using tools like Active Directory, Azure AD, Okta and Exchange. Security & Compliance Monitor for unauthorized access attempts and escalate incidents as necessary. Ensure compliance with SOX and other regulatory requirements. User Support & Troubleshooting Respond to access-related service tickets in a timely manner. Troubleshoot account and login issues across multiple platforms and escalate to engineering/security teams as needed. Maintain accurate and up-to-date documentation for user access procedures, systems, and policies (SOP) Required Qualifications Associate or bachelor’s degree in information technology, Cybersecurity, or a related field. 2+ years of experience in IT support, security operations, or identity and access management. Hands-on experience with (Active Directory, AD Manager Plus, Okta, MS Azure and Exchange, and MS Licenses, etc.). Strong understanding of access control principles and user lifecycle management. Familiarity with ITIL processes and ticketing systems (e.g., ServiceNow). Excellent attention to detail, communication, and organizational skills.

Posted 1 week ago

Apply

2.0 - 7.0 years

5 - 15 Lacs

Hyderabad

Work from Office

Greetings from Technogen !!! We thank you for taking time about your competencies and skills, while allowing us an opportunity to explain about us and our Technogen, we understand that your experience and expertise are relevant the current open with our clients. About Technogen : https://technogenindia.com/ Technogen India Pvt. Ltd. is a boutique Talent & IT Solutions company, founded in 2008, has been serving global customers for over last 2 decades,. Talent Solutions: We assist several GCCs, Global MNCs and IT majors on their critical and unique IT talent needs through our services around Recruitment Process Outsourcing (RPO), contract staffing, permanent hiring, Hire-Train-Deploy (HTD), Build-Operate-Transfer (BOT) and Offshore staffing. Job Title : User Access Management Technician Required Experience : 2+ years Work Mode: WFO-4 Days from Office. Location : Hyderabad. Job Summary Access Provisioning & Deprovisioning Create, modify, and deactivate user accounts in accordance with company policy and onboarding/offboarding procedures. Coordinate with HR and department leads to process access requests for new hires, terminations, and role changes as needed. Access Reviews & Audits Conduct periodic access reviews to ensure users have appropriate permissions. Support internal and external audits by providing access logs and control documentation. System Integration & Automation Assist in implementing and maintaining identity and access management tools and workflows. Help automate provisioning tasks using tools like Active Directory, Azure AD, Okta and Exchange. Security & Compliance Monitor for unauthorized access attempts and escalate incidents as necessary. Ensure compliance with SOX and other regulatory requirements. User Support & Troubleshooting Respond to access-related service tickets in a timely manner. Troubleshoot account and login issues across multiple platforms and escalate to engineering/security teams as needed. Maintain accurate and up-to-date documentation for user access procedures, systems, and policies (SOP) Required Qualifications Associate or bachelors degree in information technology, Cybersecurity, or a related field. 2+ years of experience in IT support, security operations, or identity and access management. Hands-on experience with (Active Directory, AD Manager Plus, Okta, MS Azure and Exchange, and MS Licenses, etc.). Strong understanding of access control principles and user lifecycle management. Familiarity with ITIL processes and ticketing systems (e.g., ServiceNow). Excellent attention to detail, communication, and organizational skills. Best Regards, Syam.M| Sr.IT Recruiter syambabu.m@technogenindia.com www.technogenindia.com | Follow us on LinkedIn

Posted 1 week ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Gurugram

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: UAM - User Access Management. Experience3-5 Years.

Posted 3 weeks ago

Apply

3.0 - 8.0 years

4 - 9 Lacs

Pune

Work from Office

Manage Access Management, Security and Controls for ERP,. AX 2012 and other Apps like TM1, HFM, Trintech, Tagetik, Banking portals Work closely with Ongoing Projects for EUT / UAT What will you be doing? 1. Looking for experienced candidate in managing Access Management including system controls in Tagetik Application. This should cover the following modules Reconciliation (similar to Trintech or Blackline) Financial Controls (similar to Trintech or Blackline) Financial Reporting (similar to HFM and TM1) Month end close (similar to Trintech or Blackline) 2. Work closely with the team for Access Controls review and submission process 3. Responding to Auditors basis audit samples with clear documentation 4. Involved in UAT process across all applications 5. Creation of Process SOPs and other relevant documentation 6. Work closely with business stakeholders in identifying the SOD conflicts and necessary remediation What will you need to be Successful? : B.com Degree or equivalent in Accounting, Finance, Business Management or other business-related field required Strong business acumen and professionalism with the ability to interact effectively with colleagues in all functions and levels Ability to work in a high-performing team environment Proven ability to execute large scale strategies and global projects while meeting and/or exceeding customers' expectations

Posted 4 weeks ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Coimbatore

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: UAM - User Access Management. Experience3-5 Years.

Posted 1 month ago

Apply

8.0 - 13.0 years

15 - 25 Lacs

Mumbai

Work from Office

About ERGO Technologies and Services India ERGO Technology & Services India (ET&S India) is the newest part of the ERGO Technology & Services Management the main outsourcing provider of IT for ERGO worldwide. It is backed up by ERGO an 18 Billion Euro Organization with presence in 15+ countries has a charter to provide technology services to the ERGO countries in multiple countries. ETS India will be fueling the Digital aspirations of ERGO world in years to come. With ambitious plan to build a large offshore development centers in multiple cities of the country ETS India shall be at the forefront in developing capabilities and providing career opportunities to employees in diverse technologies across domains of Insurance. Key Accountabilities & Responsibilities: Role Description: Manages and ensures the identification, analysis and preparation of explicit and implicit stakeholder requirements and drives the functional support for business applications during deployment and 3rd level support. Key Accountabilities & Responsibilities: Design and Configuration: Support and participate in high-level and detail design and configuration sessions and workshops with other SMEs, Architects, and partners for ERGO central IT and Legal Entities. Functional Design: Work with product owners to support the functional design and configuration of solution in the relevant technology area (such as, Network Security, User Access Management (UAM), Cyber Threat Intelligence (CTI), IT Security Landscape, Logging and Monitoring), translation of specific regulation requirements to technical requirements Training and Knowledge Transfer: Conduct regulation training, handover, and knowledge transfer sessions Key Competencies & Skills required Technical: Good understanding of overall IT Infrastructure, Network Security & Cybersecurity tools, technologies and process. Must have deep understanding of various technologies and concept used in complex enterprises such as SIEM, PAM, Firewall, IPS, WAF, data security, 2FA, AAA, PKI, Encryption, DMZ, network segmentation, DLP, DDoS, Cloud security, CASB, secure file sharing, networking concept & protocols, security architectures, CTI Must have working experience with the Cybersecurity framework (such as NIST, RBI, SEBI, IRDAI, NCIIPC). Experience in working in agile teams Experience in working with distributed teams (off-shore, near-shore, on-site) Have CISSP or equivalent professional certification Nice to have: Experience in the use of policy administration systems in insurance Knowledge of insurance contract/administration processes Experience in German insurance Behavioural Skills: Excellent interpersonal and communication skills for working in a global environment Willingness to learn and adapt quickly Proactive approach to identifying issues and presenting solutions and options Professional and friendly presence when interacting with customers and other roles Willingness to ask questions for a better understanding Soft Skills: Ability to quickly get to grips with complex issues Quick comprehension and the ability to communicate knowledge in a comprehensible way Communicative, assertive and able to deal with conflicts Previous Experience & Qualifications Education/Qualification: College degree with a focus on insurance, mathematics, economics, business informatics, computer science or equivalent or related discipline or equivalent education or work experience Very good knowledge of English, both in writing and speaking Knowledge & Experience: 8+ years of relevant experience

Posted 1 month ago

Apply

6.0 - 11.0 years

20 - 35 Lacs

Pune

Hybrid

Lead the migration of portfolios from Quantis to Bloomberg AIM; ensuring accurate holding reconciliation.Verify & configure investment limits in Bloomberg AIM; comprehensive testing wid both positive & negative scenarios.Establish & test integration Required Candidate profile The ideal candidate hands-on exp. with Bloomberg AIM implementation; investment management systems; and system integration.E2E migration activities; testing; documentation; & user access management.

Posted 1 month ago

Apply

3.0 - 8.0 years

7 - 15 Lacs

Bengaluru

Hybrid

Immediate hiring for SAP Security & GRC Consultant Position- SAP Security & GRC Consultant Experience-3.5+ Years Location-Bangalore (Hybrid- 3days WFO) Notice Period-Immediate We are looking for an experienced SAP Security & GRC Consultant to manage and enhance user access, roles & authorizations, compliance, and risk management within SAP environments. The ideal candidate should have expertise in SAP Security concepts, Role Design, GRC Access Control, Process Control, Risk Analysis, and Audit Compliance. This role involves collaborating with business and IT teams to ensure secure, compliant, and optimized SAP access management. Key Responsibilities: Design, implement, and maintain SAP roles and authorization concepts across SAP S/4HANA, ECC, BW, Fiori, and other SAP applications. Manage and optimize SAP GRC (Governance, Risk & Compliance) solutions, including Access Control (AC), Process Control (PC), and Risk Management (RM). Perform user provisioning, role assignment, and access reviews to ensure compliance with SOX, GDPR, and other regulatory standards. Conduct Risk Analysis, Segregation of Duties (SoD) checks, and remediation to mitigate security risks. Implement and maintain GRC workflows for User Access Management (UAM) and Emergency Access Management (EAM) or Firefighter Access. Support SAP Security audits, risk assessments, and compliance checks, providing necessary reports and documentation. Participate in SAP system upgrades, migrations, and new implementations to ensure proper security design. Required Skills & Experience: 5 to 7 years of experience in SAP Security and Roles & Authorization Management. Strong expertise in SAP GRC Access Control (AC), Process Control (PC), Risk Management (RM), and SoD Analysis. Hands-on experience with User Access Review (UAR), Role-Based Access Control (RBAC), and Privileged Access Management (PAM). Deep understanding of SAP Authorization Objects, SUIM, PFCG, SU24, and Role Derivation concepts. Experience in Fiori Security, S/4HANA Security, and Business Role Management (BRM). Apply to :

Posted 1 month ago

Apply

5 - 8 years

5 - 9 Lacs

Gurugram

Work from Office

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: UAM - User Access Management. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies