Home
Jobs

740 Vulnerability Assessment Jobs - Page 30

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5 - 10 years

15 - 20 Lacs

Ahmedabad

Work from Office

Naukri logo

4–6 years of progressive experience in Information & Cyber Security, including Data Security, Identity & Access Management, or Security Operations in global settings. BFSI or banking experience is preferred but not mandatory.

Posted 1 month ago

Apply

6 - 9 years

11 - 15 Lacs

Hyderabad

Work from Office

Naukri logo

Cyber and 3rd party risk manager About Amgen Amgen harnesses the best of biology and technology to fight the world’s toughest diseases, and make people’s lives easier, fuller and longer. We discover, develop, manufacture and deliver innovative medicines to help millions of patients. Amgen helped establish the biotechnology industry more than 40 years ago and remains on the cutting-edge of innovation, using technology and human genetic data to push beyond what’s known today. What you will do Role Description This is a lead role to support the risk management product team in identifying, analyzing, and mitigating IT-related risks to the organization. This role will involve working closely with various departments to ensure that risk controls are in place, policies are adhered to, and security standards are met. The IT Risk Analyst will assist in developing and maintaining risk management frameworks, performing assessments, and supporting regulatory compliance efforts. Roles & Responsibilities Risk Management Leadership Support the global risk management and third-party organization in leading a team of risk analysts performing tasks related to the global risk assessment processes. Risk Identification and Assessment: Conduct risk assessments to identify vulnerabilities in IT systems, processes, and policies. Assist in the identification and evaluation of risks associated with third-party vendors and partners. Maintain the IT risk register, documenting risks, issues, and remediation actions. Risk Mitigation and Monitoring: Recommend risk mitigation strategies and implement risk management controls across IT infrastructure. Collaborate with IT, cybersecurity, and business teams to track and resolve identified risks and vulnerabilities. Monitor and report on the effectiveness of existing IT risk controls and recommend enhancements as needed. Compliance and Regulatory Support: Ensure compliance with relevant industry standards and regulatory requirements (e.g., GDPR, SOX, PCI-DSS, NIST). Assist in the preparation for audits by internal and external parties, providing documentation and evidence of IT risk management practices. Support the development and implementation of IT governance, risk, and compliance frameworks. Vendor Risk Management: Conduct vendor risk assessments, ensuring third-party services and products align with internal risk and security policies. Regularly review vendor performance and risk exposure, working with procurement and legal teams as necessary. What we expect of you We are all different, yet we all use our unique contributions to serve patients. The [vital attribute] professional we seek is a [type of person] with these qualifications. Basic Qualifications and Experience Education: Bachelor’s degree in information technology, Cybersecurity, Risk Management, or a related field. Certifications such as CRISC (Certified in Risk and Information Systems Control), CISA (Certified Information Systems Auditor), or CISSP (Certified Information Systems Security Professional) are highly desirable. Experience 4-6 years of experience in IT risk management, IT auditing, or information security. Hands-on experience with risk management tools and frameworks (e.g., ISO 27001, NIST, COBIT). Skills and Competencies: Strong understanding of IT infrastructure, systems, and security best practices. Ability to assess technical and business risk related to information systems. Excellent problem-solving, analytical, and communication skills. Ability to communicate complex risk concepts to non-technical stakeholders. Ability to assess and interpret security-related clauses in third-party contracts, such as Security Requirements Schedules (SRS) Familiarity with regulatory frameworks and compliance standards (e.g., GDPR, HIPAA, SOX, PCI-DSS). Technical Knowledge: Proficiency with risk management tools, GRC (Governance, Risk, and Compliance) software, and security incident management tools. Experience with security controls related to networks, databases, and cloud environments. Soft Skills: Excellent analytical and troubleshooting skills Strong verbal and written communication skills Ability to work effectively with global, virtual teams High degree of initiative and self-motivation Ability to manage multiple priorities successfully Team oriented, with a focus on achieving team goals Strong presentation and public speaking skills Collaboration with global teams What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.

Posted 1 month ago

Apply

2 - 6 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

As an Application Developer, you will lead IBM into the future by translating system requirements into the design and development of customized systems in an agile environment. The success of IBM is in your hands as you transform vital business needs into code and drive innovation. Your work will power IBM and its clients globally, collaborating and integrating code into enterprise systems. You will have access to the latest education, tools and technology, and a limitless career path with the world’s technology leader. Come to IBM and make a global impact! Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Manage SaaS application configuration settings, integrations Build compliance requirements and SaaS Application security baselines. Perform continuous monitoring of applications identifying security vulnerabilities and address through remediation efforts Preferred technical and professional experience Validate and maintain incident response plans and processes to address potential threats Determine risks and remediation options with implemented SaaS applications Evaluate new applications to ensure implementation can meet security baselines

Posted 1 month ago

Apply

4 - 9 years

7 - 11 Lacs

Hyderabad

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

4 - 8 years

7 - 11 Lacs

Navi Mumbai, Chennai

Work from Office

Naukri logo

Conduct vulnerability assessments using industry-leading tools (e.g., Nessus, Tenable, Qualys). Develop and maintain vulnerability management processes, Analyze assessment results to identify and prioritize risks. Perform penetration testing.

Posted 1 month ago

Apply

3 - 6 years

6 - 12 Lacs

Faridabad

Work from Office

Naukri logo

Hi, We are looking to expand our Cyber Security Team. Job Location is Faridabad Role & responsibilities Cyber security and network security testing including operation of test equipment in accordance with Regulatory Standards and requirements. use his/her expertise and experience for testing, planning and report writing. Responsible for contributing to accomplishment of department goals and objectives. Full ownership of timely delivery of project. collaborate with cross-Functional teams. Stay up to date with emerging threats, vulnerabilities, testing tools, guidelines. Recommend best practices. Provide training to other team members as needed. Conduct multiple projects within tight deadlines. Testing report preparation and review. Participate in incident response activities as needed. Preferred candidate profile Graduate in computer Science/Information Technology/ Cyber Security. Must be CEH (EC Council). Highly motivated and certified in Ethical hacking and Network Security/Cyber Security. Expertise in penetration tests, vulnerability assessments and security audits on various computer systems, networks and applications to identify potential security risks and vulnerabilities. Strong knowledge of network protocols, operating systems, and security technologies. Experience with security tools such as Metasploit, Nessus, burp Suite and Wireshark. Also, OWASP top 10. Excellent analytical, problem-solving, and communication skills. Teamwork and management. Willingness to travel if required. Salary and benefits: Salary will be based on competency Other Benefits Medical and Accidental Insurance Transport facility (Nearest Metro station) Food facility 5 days/week Interested candidate please share your updated resume to nikita.singh@nemko.com or apply to this job here on naukri.com

Posted 1 month ago

Apply

5 - 9 years

7 - 10 Lacs

Madurai

Work from Office

Naukri logo

Position : Senior Cyber Security Engineer Location : Madurai Experience : 5+ Years Roles and Responsibilities: 1. Security Infrastructure Design: Develop and design security architectures for complex systems. Implement security solutions that effectively protect information systems and data. 2. Implementation of Security Measures: Deploy security technologies, including Firewalls, intrusion detection/prevention systems, antivirus software, and encryption solutions. Configure and manage security tools to detect and respond to security incidents. 3. Network Security: Implement and manage network security measures to protect against unauthorized access, attacks, and vulnerabilities. 4. Vulnerability Management: Conduct vulnerability assessments and penetration testing to identify and remediate security weaknesses. Develop and implement strategies for addressing vulnerabilities in a timely manner. 5. Identity and Access Management: Design and implement access controls to ensure only authorized users have appropriate access. Manage identity and access management solutions to protect against unauthorized access. 6. Security Policy and Compliance: Develop and enforce security policies, standards, and procedures. Ensure compliance with relevant laws, regulations, and industry standards. 7. Incident Response and Forensics: Participate in incident response activities, including investigation, analysis, and resolution of security incidents. Conduct digital forensics to identify the root cause of security incidents. 8. Security Awareness and Training: Provide security awareness training to employees to promote a security-conscious culture. Advise on best practices for maintaining security in daily operations. 9. Security Research and Evaluation: Stay informed about the latest security trends, threats, and technologies. Evaluate new security solutions and technologies for potential adoption. 10. Collaboration and Communication: Collaborate with other IT teams, departments, and stakeholders to implement security measures. Communicate security risks and recommendations to technical and non-technical audiences. 11. Impact study of various alerts and categorization based on priority. 12. Strong experience in managing Cyber Security within IT Application, Cloud, Network, IT Infrastructure, etc. 13. Having an active role in all aspects of the project - from first meeting with clients and identifying the Security issues to final recommendations and implementation of the Security change. 14. Good experience in troubleshooting and resolving issues related to Firewall, Cybersecurity Attack, Threat Management and etc 15. Good understanding of the current IT Security practices, threat analysis, privacy and risk policies especially covering Data Loss Prevention (DLP) and etc. 16. Consistently develop security procedures and standard operating documents related to IT Security Operations covering configuration, patching, troubleshooting guides etc. 17. Ability to handle high pressure situations with Good Analytical skills, Problem solving and Interpersonal skills. 18. Find cost-effective solutions to cyber security problems Required Skills and Qualifications: 1. More than 5 years of experience in the Cybersecurity of IT field 2. Strong understanding of network and systems security principles. 3. Proficiency in configuring and managing security technologies and tools. 4. Knowledge of encryption protocols, firewall configurations, and intrusion detection/prevention systems. 5. Experience with vulnerability assessment tools and methodologies. 6. Familiarity with security compliance frameworks (e.g., NIST, ISO 27001). 7. Understanding of identity and access management concepts. 8. Incident response and digital forensics skills. 9. Excellent problem-solving and analytical skills. 10. Strong communication and collaboration skills. Certifications: Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) Certified Information Security Manager (CISM) CompTIA Security+ Shift Timings: 8:30 AM to 5:30 PM / Monday to Friday Please share the CV with: careers@golden-hippo.com Website: www.golden-hippo.com

Posted 1 month ago

Apply

8 - 12 years

25 - 30 Lacs

Chennai, Pune, Delhi

Work from Office

Naukri logo

Hands on experience with Dockers, Git, Jenkins, Kubernetes and AWS/Azure/GCP knowledge. Hands on experience AKS, EKS, Openshift, Tanzu and Rancher Enterprise Cluster. Hands on Experience with Terraform and Infrastructure as Code Hands on experience in Linux/Database/scripting (Shell/Perl/Python) Hands on integration experience of ELK/SONARQUBE/Acunetix tools Understanding customer requirements and project KPIs Implementing various development, testing, automation tools, and IT infrastructure Planning the team structure, activities, and involvement in project management activities. Managing stakeholders and external interfaces Setting up tools and required infrastructure Defining and setting development, test, release, update, and support processes for DevOps operation Have the technical skill to review, verify, and validate the software code developed in the project. Troubleshooting techniques and fixing the code bugs Monitoring the processes during the entire lifecycle for its adherence and updating or creating new processes for improvement and minimizing the wastage Encouraging and building automated processes wherever possible Identifying and deploying cybersecurity measures by continuously performing vulnerability assessment and risk management Incidence management and root cause analysis Coordination and communication within the team and with customers Selecting and deploying appropriate CI/CD tools Strive for continuous improvement and build continuous integration, continuous development, and constant deployment pipeline ( CI/CD Pipeline) Mentoring and guiding the team members Monitoring and measuring customer experience and KPIs Managing periodic reporting on the progress to the management and the customer

Posted 1 month ago

Apply

8 - 13 years

20 - 25 Lacs

Bengaluru

Work from Office

Naukri logo

As a member of the Infrastructure Reliability Engineering team - You are responsible to lead a team of system engineers who focused on Kubernetes, microservices architecture, and cloud technologies. As part of this self-driven team, you will support critical container Infrastructure and ensure the stability of services by performing dedicated maintenance activities. You engage in automation activities, perform root cause analysis (RCA), and remediation. Knowledge of production support process including incident/change/problem management, call triaging, and critical issue resolution procedures. Essential Functions Infrastructure life cycle management and Production Support of container, cloud technologies and orchestration platforms Knowledge of alerts and monitoring tools and system management tools for environments and configuration management and Cloud orchestration tools Hardening, securing the Kubernetes cluster with monitoring and auditing dashboards. Strong technical analytical and troubleshooting skills and possess an ability to explain technical concepts and provide guidance to staff. Proficient to expert scripting and automation skills converting manual and maintenance functions into fully orchestrated automation. Must have Strong Knowledge & experience in system monitoring techniques and tools supporting unattended operations. Ability to operate in complex, highly secure, and highly available, operations environments and interact with the technology domain experts required to maintain those environments. Excellent communication & interpersonal skills. Coaching other members of the support team, sharing technical and customer knowledge in a helpful and timely fashion Responsible for partnering with the Platform, Engineering and Delivery Teams to deliver seamless infrastructure support for all Visa business lines. Work closely with geographically distributed teams on technical challenges and process improvements. Security Remediation process (vulnerability assessment and patch management) Contribute to standardize and document operational procedures. Responsible for adherence of established ITIL practice such as Incident, Change, Problem and Release Management Be scheduled On-Call to support the infrastructure and our systems. Work on shift days ( Sunday to Thursday or Tuesday to Saturday from 9:00AM to 6:00PM) Provide strong leadership with a focus on attracting, motivating, and developing best-in-class talent. Mentor and coach teams to develop future leaders in alignment with company objectives. Balance both leading a team and engaging directly with the work needed to accomplish objectives. Assist direct reports with ongoing prioritization and resource allocation to ensure that the crucial business initiatives are delivered. Utilize leadership skills, problem solving and decision-making skills to facilitate and encourage participation of team members to meet objectives in congruence with approved standards and guidelines. Basic Qualifications 8+ years of relevant work experience with a Bachelor s Degree or at least 5 years of experience with an Advanced Degree (e.g. Masters, MBA, JD, MD) or 2 years of work experience with a PhD, OR 11+ years o

Posted 1 month ago

Apply

3 - 8 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities: Configure, manage, and support SailPoint IdentityNow (IDN) for provisioning, de-provisioning, role management, and access governance across the enterprise.Maintain and troubleshoot SailPoint IDN connectors for integration with various on-premise and cloud-based systems, such as Active Directory, SAP, Office 365, and AWS.Identity Lifecycle Management:Manage the entire identity lifecycle process, including user provisioning, role-based access control (RBAC), access reviews, and compliance reporting.Automate identity-related processes using SailPoint's workflows and policies to enhance operational efficiency.Access Request and Approval Workflow:Design, configure, and maintain user access request workflows, approval processes, and access certification campaigns in IdentityNow.Work closely with stakeholders to define and enforce role-based access policies, ensuring compliance with security best practices.Integration and API Management:Integrate SailPoint IdentityNow with enterprise applications and third-party tools using connectors, APIs, and out-of-the-box integrations.Collaborate with IT teams to integrate IAM solutions into the broader enterprise architecture and security ecosystem.Security & Compliance:Implement role mining, entitlement management, and access certification processes to maintain compliance with internal and external regulatory requirements.Generate reports and dashboards to track access violations, security events, and audit findings.Troubleshooting & Support:Provide support for any issues related to SailPoint IdentityNow, including troubleshooting and resolving user access, workflows, and integration problems.Participate in system upgrades, patches, and testing to ensure continuous functionality and security of the identity management system.Collaboration & Documentation:Work closely with stakeholders to gather requirements and design solutions that meet business needs.Document processes, configurations, and best practices related to SailPoint IDN administration and configuration.Training & Awareness:Provide training and knowledge transfer to the internal teams on how to effectively use SailPoint IdentityNow.Educate users on identity governance processes, including access requests, role management, and compliance. Professional & Technical Skills: Must To Have Skills: Proficiency in SailPoint IdentityNow. Strong understanding of cloud security principles. Experience with security tools and technologies. Knowledge of regulatory compliance requirements. Hands-on experience in implementing security controls. Good To Have Skills: CISSP certification. Additional Information: The candidate should have a minimum of 3 years of experience in SailPoint IdentityNow. This position is based at our Bengaluru office. A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

7 - 12 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:-. Provisioning and DeprovisioningAutomated User Onboarding:When a new user joins an organization, SailPoint can automatically assign the appropriate roles and permissions based on predefined rules.Deprovisioning:Automatically revoking access when a user leaves the organization or changes roles.2. Access ReviewsAutomate periodic access reviews, where managers or users themselves review the permissions they have in various systems to ensure compliance with security policies.3. Role ManagementAutomating the creation and management of roles and ensuring that roles are properly assigned based on business rules, job functions, or regulatory requirements.4. Policy EnforcementAutomating policies that define acceptable access rules and automatically enforcing them, such as ensuring users do not have conflicting access or excessive permissions.5. Lifecycle ManagementAutomatically handling the lifecycle of a user's access based on their status (e.g., employee, contractor, etc.), department, or organizational role.6. Custom Workflows and ApprovalsUsing workflows to automate approval processes, such as multi-step approval for granting access to critical systems.7. Scheduled JobsSailPoint allows you to automate jobs that need to run on a schedule, such as syncing identity data from external systems, updating entitlements, or importing logs.8. Integration with Other SystemsSailPoint can integrate with other enterprise systems (HRMS, CRM, etc.) and automatically sync user data and permissions across systems. Professional & Technical Skills: Must To Have Skills: Proficiency in SailPoint IdentityIQ Strong understanding of cloud security principles Experience in implementing security controls in cloud environments Knowledge of industry security standards and best practices Hands-on experience with security tools and technologies Additional Information: The candidate should have a minimum of 7.5 years of experience in SailPoint IdentityIQ This position is based at our Bengaluru office A 15 years full time education is required Qualification 15 years full time education

Posted 1 month ago

Apply

3 - 8 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities: . Provisioning and DeprovisioningAutomated User Onboarding:When a new user joins an organization, SailPoint can automatically assign the appropriate roles and permissions based on predefined rules.Deprovisioning:Automatically revoking access when a user leaves the organization or changes roles.2. Access ReviewsAutomate periodic access reviews, where managers or users themselves review the permissions they have in various systems to ensure compliance with security policies.3. Role ManagementAutomating the creation and management of roles and ensuring that roles are properly assigned based on business rules, job functions, or regulatory requirements.4. Policy EnforcementAutomating policies that define acceptable access rules and automatically enforcing them, such as ensuring users do not have conflicting access or excessive permissions.5. Lifecycle ManagementAutomatically handling the lifecycle of a user's access based on their status (e.g., employee, contractor, etc.), department, or organizational role.6. Custom Workflows and ApprovalsUsing workflows to automate approval processes, such as multi-step approval for granting access to critical systems.7. Scheduled JobsSailPoint allows you to automate jobs that need to run on a schedule, such as syncing identity data from external systems, updating entitlements, or importing logs.8. Integration with Other SystemsSailPoint can integrate with other enterprise systems (HRMS, CRM, etc.) and automatically sync user data and permissions across systems. Professional & Technical Skills: Must To Have Skills: Proficiency in SailPoint IdentityIQ. Strong understanding of cloud security principles. Experience with security architecture design. Knowledge of security compliance standards. Hands-on experience with security tools and technologies. Additional Information: The candidate should have a minimum of 3 years of experience in SailPoint IdentityIQ. This position is based at our Bengaluru office. A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

5 - 10 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Okta Identity Management Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:-Okta Workforce Identity Cloud (WIC) Administration:User Provisioning & Lifecycle Management:Administer and manage Okta Workforce Identity Cloud (WIC) for user provisioning, de-provisioning, and lifecycle management of internal employees and contractors.Design and implement user authentication flows, multi-factor authentication (MFA), Single Sign-On (SSO), and federated identity integrations to provide secure access to corporate applications.Access Management & Policy Enforcement:Configure and maintain access policies, including role-based access control (RBAC) and dynamic access policies based on user attributes and risk context.Implement Okta's Adaptive Authentication to assess risk levels and apply additional security controls based on user behavior.Integration:Integrate Okta WIC with on-premise and cloud-based enterprise applications (e.g., Office 365, Google Workspace, Salesforce, AWS) to enable seamless authentication and authorization.Ensure Okta integration with Active Directory (AD), LDAP, and other identity repositories to manage workforce access.Monitoring & Reporting:Monitor Okta's WIC platform for performance, security events, and access-related incidents.Generate reports on user activity, authentication logs, and security events to ensure compliance with internal and external regulations.Okta Customer Identity Solutions (CIS) Administration:Customer Identity Management:Administer and optimize Okta Customer Identity Solutions (CIS) for external customers, managing user registration, self-service access, and user authentication across web and mobile applications.Configure and customize customer-facing authentication flows, such as SSO, social logins (Facebook, Google, etc.), and multi-factor authentication (MFA).Customer Experience & Security:Collaborate with product and marketing teams to design a seamless, user-friendly registration and login experience for customers, while ensuring compliance with security and privacy standards.Implement adaptive authentication for customer identities to ensure secure and personalized access across applications and services.API & Developer Tools Integration:Leverage Okta APIs and developer tools to integrate Okta's Customer Identity capabilities with third-party services, such as customer relationship management (CRM) and marketing tools.Support customer-facing applications in scaling Okta-based authentication and user identity flows for optimal performance. Professional & Technical Skills: Must To Have Skills: Proficiency in Okta Identity Management Strong understanding of cloud security principles Experience with security architecture design Knowledge of identity and access management Hands-on experience with security tools and technologies Additional Information: The candidate should have a minimum of 5 years of experience in Okta Identity Management. This position is based at our Bengaluru office. A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

3 - 8 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Saviynt Identity Platform Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities: Develop, configure, and customize the Saviynt IGA platform, including Identity Governance and Access Management features.Design and implement role-based access control (RBAC), access certifications, and policy enforcement in the Saviynt environment.Work with business and technical stakeholders to gather requirements and deliver IAM solutions that meet organizational needs.Configure and customize Saviynt's connectors to integrate with various enterprise applications, systems, and cloud platforms.Develop and implement identity workflows, including user provisioning and de-provisioning, role assignments, and access requests.Troubleshoot and resolve issues related to identity governance and access management in the Saviynt environment.Collaborate with the security and compliance teams to ensure that all IAM solutions adhere to security standards and regulatory requirements.Develop custom scripts, API integrations, and automated processes to streamline identity management tasks.Participate in designing and implementing audit logs and reports for compliance tracking and access reviews.Provide ongoing support and maintenance of Saviynt IGA implementations, including troubleshooting and performing software upgrades.Stay updated on industry trends in identity management, governance, and Saviynt platform updates to continuously enhance system features. Professional & Technical Skills: Must To Have Skills: Proficiency in Saviynt Identity Platform. Strong understanding of cloud security principles. Experience with implementing security controls in cloud environments. Knowledge of identity and access management concepts. Hands-on experience with security tools and technologies. Additional Information: The candidate should have a minimum of 3 years of experience in Saviynt Identity Platform. This position is based at our Bengaluru office. A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

5 - 10 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities: Expected to be an SME Collaborate and manage the team to perform Responsible for team decisions Engage with multiple teams and contribute on key decisions Provide solutions to problems for their immediate team and across multiple teams Lead security assessments and provide recommendations Develop security architecture standards and guidelines Conduct security reviews and audits Professional & Technical Skills: Must To Have Skills: Proficiency in SailPoint IdentityIQ Strong understanding of cloud security principles Experience with security architecture design Knowledge of identity and access management Hands-on experience with security tools and technologies Additional Information: The candidate should have a minimum of 5 years of experience in SailPoint IdentityIQ This position is based at our Bengaluru office A 15 years full time education is required Qualification 15 years full time education

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies