Home
Jobs

826 Access Management Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 5.0 years

3 - 6 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

At KeyData Cyber , our vision is to be the North American leader in designing and delivering digital identity security strategies and solutions to protect our clients in their digital transformation initiatives. KeyData Cyber is a Gartner-recognized leader in professional identity security services, specializing in: Identity Governance & Administration (IGA) Privileged Access Management (PAM) Customer Identity & Access Management (CIAM) Cloud Security Posture Management (CSPM) Identity Threat Detection & Response (ITDR) Come join us, you re key to our success! We are currently looking for an Okta CIC Support Engineer will step in and own our largest and most important customer issues in addition to providing level two support to our other support teams. In this role, you will be a part of a global team that provides 24/7 support to help customers with their PAM Program. When customers cannot resolve issues themselves, your job is to ensure that we have the necessary tools and processes to swiftly resolve the issue. Youll troubleshoot technical problems for customers with a mix of debugging, networking, system administration, updating documentation, and, when needed, coding/scripting. Our Managed Services teams are focused and dedicated to the customers, and you will help drive the success of the PAM program by understanding and advocating for our customers issues. This role requires you to work in a shift pattern or non-standard work hours as required. This may include weekend work. About Our Team: KeyData Next-Gen Managed Services accelerates customers ability to digitally transform their business with world-class IAM technology products, infrastructure, and expertise. Our team (Identity Rockstars) is dedicated to helping our customers small and large businesses, educational institutions, and government agencies see the benefits of our services come to life. As part of an entrepreneurial team in this rapidly growing business, you will play a key role in understanding the needs of our customers and help shape their Identity Program for the future. If youre passionate about working in an environment where you can experience accelerated growth, development, and a high impact, this role could be for you! Location: India, Remote Employment type: Full-time, Permanent RESPONSIBILITIES: Design, implement, and manage Okta Customer Identity Cloud (Auth0) CIAM deployments for customers Manage incident & problem related to Okta through effective diagnosis, resolution, or implementation of new enhancement to decrease the number of re-occurring issues. Collaborate with cross-functional teams; including connected applications and infrastructure team to jointly troubleshoot the issues and resolve in timely manner Proactively identify and resolve production issues related to Okta, ensuring minimal impact on business operations and conduct root cause analysis. Respond promptly to critical incidents and participate in on-call rotations as required. Manage escalations of technical issues from service managers and Tier I support, and partner with Architects and professional services team to resolve the issues and integration challenges. Understand customer requirements and execute delivery of POCs as required for customers that have more complex use cases Configure Auth0 to provide Single Sign-On services and enable Multi-Factor Authentication (MFA) Evaluate integration opportunities from technical perspective and recommend solutions Assist application teams through the SDLC process (including requirements gathering, configuration, testing to integrate applications with Auth0) Participate in efforts to develop departmental strategies Create documentation and procedures as required as part of the delivery effort for the Auth0 solution Provide training to customer IT teams on best practices Identify, track, and resolve technical issues REQUIRED QUALIFICATIONS: 2-5 years of experience in working with Auth0 Installation, integration, and deployment of Auth0 in client environments. Knowledge and experience implementing standard security protocols (eg. OAuth2, OIDC, SAML, LDAP) Work experience with the following programming languages: Java, JavaScript, JSP/Servlets, SQL Experience supporting projects through the full system development lifecycle Experience developing, implementing or architecting information systems Technical architecture experience integrating identity management, access management and access governance software into clients infrastructure and applications. Familiarity with regulatory requirements and standards related to IAM, such as GDPR PREFERRED QUALIFICATIONS: Prior professional services or federal consulting experience Experience in consumer identity and directory services Certified Okta Developer - Customer Identity Cloud Completion of the Okta Customer Identity Cloud: Implement Authentication with Auth0 course. Previous identity analytics experience #LI-AS1 Why KeyData Cyber? A Place Putting People First - Our team is our strongest asset. We have smart, hard-working, and talented team members. We support learning and development at all levels and encourage work-life balance as part of our key values. A Place to Accelerate Your Career - We have the most digital identity solution deployments in Canada and we are in hyper-growth mode across North America. There are extensive opportunities to learn, develop, and advance in different areas of the business. A Place to Share Your Perspective - We create a culture of respect, belonging, and empowerment for everyone by promoting fair treatment and full participation for all. If you require accommodation due to a disability at any time during the recruitment and/or assessment process, please contact Talent Acquisition and we will make all reasonable efforts to accommodate your request. Apply now to join the KeyData Cyber team!

Posted 6 hours ago

Apply

3.0 - 7.0 years

9 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

Not Applicable Specialism Data, Analytics & AI Management Level Senior Associate & Summary At PwC, our people in data management focus on organising and maintaining data to enable accuracy and accessibility for effective decisionmaking. These individuals handle data governance, quality control, and data integration to support business operations. In data governance at PwC, you will focus on establishing and maintaining policies and procedures to optimise the quality, integrity, and security of data. You will be responsible for optimising data management processes and mitigate risks associated with data usage. At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purposeled and valuesdriven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . & Summary A career within Data and Analytics services will provide you with the opportunity to help organizations uncover enterprise insights and drive business results using smarter data analytics. We focus on a collection of organizational technology capabilities, including business intelligence, data management, and data assurance that help our clients drive innovation, growth, and change within their organizations in order to keep up with the changing nature of customers and technology. We make impactful decisions by mixing mind and machine to leverage data, understand and navigate risk, and help our clients gain a competitive edge. s Develop and design custom Collibra workflows that meet business and governance requirements for data product management, access management, data catalog management using Workflow Designer module. Integrate Collibra seamlessly with Azure using out of the box and custom connectors, ensuring optimal performance and scalability. Collaborate with crossfunctional business teams to understand functional data governance workflow requirements and translate them into effective Collibra workflow diagrams. Utilize Groovy scripting to develop the required workflows and enhance Collibra functionalities. Provide technical expertise and guidance on best practices for designing and implementing workflows using Collibra in an Azure services and environment. Conduct thorough testing and validation of workflows to ensure robustness and reliability. Document solutions and create user guides to facilitate smooth adoption and usage by Client teams Coordinate in change management process. Resolve technical issues as required. Support and enhance data management and governance initiatives. Mandatory skill sets Implementation, configuration, maintenance of Collibra environments. Expert in Development of custom workflows on Collibra platform, managing Data catalogues for Azure services, mapping business/technical requirements to Collibra features. Experience in data product management, data sharing, data access using Collibra. Experience in installing Collibra Connectors, running ingestions from a variety of sources especially from Azure ecosystem and handson experience Collibra, its JAVA & REST APIs including ability develop groovy scripts. Experience in Production Rollouts and successful implementation of Collibra features. Complies with security standards and technical Preferred skill sets Certifications in Collibra Years of experience required 58 Education qualification B.Tech / M.Tech / MBA / MCA Education Degrees/Field of Study required Bachelor of Technology, Master of Business Administration Degrees/Field of Study preferred Required Skills Collibra Data Governance Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Business Process Management (BPM), Communication, Corporate Governance, Creativity, Data Access Control, Database Administration, Data Governance Training, Data Processing, Data Processor, Data Quality, Data Quality Assessment, Data Quality Improvement Plans (DQIP), Data Stewardship, Data Stewardship Best Practices, Data Stewardship Frameworks, Data Warehouse Governance, Data Warehousing Optimization, Embracing Change, Emotional Regulation, Empathy, Inclusion {+ 17 more} Travel Requirements Government Clearance Required?

Posted 6 hours ago

Apply

8.0 - 13.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Number of Openings AD-OT 1 ECMS ID in sourcing stage TBD Assignment Duration 3 to 6 months Total Yrs. of Experience 8+ years Relevant Yrs. of experience 5+ years Detailed JD (Roles and Responsibilities) Please refer attached JD Mandatory skills As per attached JD Desired/ Secondary skills As per attached JD Domain Cyber Security Max Vendor Rate in Per Day (Currency in relevance to work location) 13.5K INR per day Work Location given in ECMS ID PUNE WFO/WFH/Hybrid WFO 10 days from office ( 9:25 hours ) BG Check (Before OR After onboarding) After onboarding Is there any working in shifts from standard Daylight (to avoid confusions post onboarding) YES/ NO Yes , as per client ask L3 Infrastructure Expert Authentication Specialist AD OT Context The IT organization of Air Liquide was profoundly transformed in 2014 with the creation of an infrastructure services provider, GIO, and several business IT departments, called "DDS" ("Digital Delivery Services"), responsible for applications related to a business or geographical area. The Global Infrastructure and Operations (GIO) entity of Air Liquide is the global shared services center that provides IT infrastructure services to the various client IT departments of the Air Liquide Group. Since its creation, GIO has profoundly transformed the Groups infrastructure, leveraging Cloud solutions and introducing modern and innovative technologies. Integrated into the "Security Services" service line, you will report to the head of "Transition & Operations department. You will join a dynamic, close-knit, and talented team. In an international context, you will work with people from all walks of life. Scope - Perimeter - technologies: The main scope and perimeter of the L3 AD OT expert will be : Active Directory in the industrial world PKI in the industrial world Radius in the industrial world Hyper - V (Hyper V farms hostings OT AD/PKI/Radius servers) AWS account (AWS account hosting AD servers) Windows Master (used to deploy domain controllers and PKI/Radius servers) Missions and roles : Within GIO, in the Security / Transition and Operations department, the main missions of the L3 AD OT will be the following: The production and maintenance in operational condition of the Infrastructures that host the Groups Industrial Active Directory directory, the PKI, and the Radius authentication infrastructure The production and maintenance in operational condition of the Groups Industrial Active Directory directory, the PKI, and the Radius authentication infrastructure Continuous improvement of the described services Management of critical incidents and security crises, guaranteeing rapid resolution and minimal disruption. Implementation of complex changes with the coordination of the teams concerned in compliance with security policies. Management (including coordination) of "problems". Optimization of the tools used by the Identity Access Management administrators (AD, PKI, Radius, Strong Authentication, ...). Automation of recurring tasks. Supporting internal projects, from their design to their implementation. Development and deployment of solutions in an automated way (Infra as Code). Development of operational dashboards that make sense. Conducting technical projects (analysis, planning, execution, monitoring, reporting). Ensuring the quality of the service delivered by the transition and operations department to its clients, broadly speaking. Training of L2 and other L3 support teams. To carry out these general missions, the L3 Expert will notably be responsible for: Analyzing, qualifying, and coordinating requests from internal or external clients (e.g., integration, carve-out, connection request, etc.) Leading the evolution of the Authentication infrastructure, including architectural improvements and the implementation of new functionalities. Eliminating vulnerabilities. Ensuring the availability and integrity of information presented in the groups directories. Ensuring the preventive and evolutionary maintenance of the AD, PKI, Radius,... platforms (functional and technical specifications, upgrades...) from an operational and security point of view. Coordinating these evolutions from a technical and organizational point of view. Assisting application managers in interfacing with IAM solutions. Ensuring the maintenance of SLAs. Coordinating the evolutions and projects around authentication platforms and ensuring the satisfaction of internal and external clients. Resolving critical incidents related to the technologies operated by the team, having previously found the root cause and defined the remediation plan. Providing support to the OT authentication L2, L3 teams as well as other service lines. Being the guarantor of the teams documentation (DAT, operational documents, etc.) Drafting procedures and architecture documents for ADAS services for the team and other teams. Expected competencies : Experience General requirements : 5 years of experience in IAM architecture management (Microsoft ADDS, ADCS, NPS) with a security-oriented mindset, as Level 3 Support (last level before the vendor) Fluent English Experience in an international context Well organized Required knowledge and skills: Very good general knowledge of Information Systems and IT professions Theoretical and operational knowledge of IT organizations Mastery of Windows AD 2019 / Microsoft PKI environments Mastery of authentication and federation protocols Mastery of automation tools (Powershell) Ability to effectively manage a crisis situation (technical problems) Mastery of AD, Microsoft PKI administration tools (Admin Center, DSC, GPO, ...) Ability to analyze the level of risk and make informed decisions. Nice to have : Good knowledge of AWS. Knowledge of the Sectigo product or equivalent public PKI product. Good knowledge of Radius (NPS). Ability to simplify and synthesize complex situations, taking into account all elements. Knowledge of managing Master Servers and administration workstations. Microsoft Certification : Windows Server Hybrid Administrator Associate Other critical skills: Passion and enthusiasm Customer orientation and a taste for teamwork (openness, interpersonal skills) Very good presentation and communication skills (written and oral) Analytical skills Autonomy A demonstrated ability to successfully solve problems and manage multiple tasks/priorities.

Posted 6 hours ago

Apply

5.0 - 10.0 years

12 - 16 Lacs

Bengaluru

Work from Office

Naukri logo

Job Overview: We are seeking a skilled and experienced Service Reliability Specialist to join our diverse team as part of newly created Service Reliability Centre (SRC). In this role, you will help improve the availability and performance of Arm infrastructure by utilising Arms AI Operations (AIOPS) and observability platforms. You will collaborate closely with development and platform teams to build and maintain robust observability and response processes. Responsibilities: Serve as the primary technical contact during critical incidents for both on-premise and cloud infrastructure. Lead Root Cause Analysis (RCA) for major incidents, identifying contributing factors and actionable remediation. Utilize Dynatrace and ServiceNow for correlation analysis, system tracing, and optimizing alerts and visibility. Perform detailed diagnostics for virtualization, storage, operating systems, and cloud services during incidents. Develop clear and comprehensive runbooks, diagnostic guides, and incident documentation. Collaborate post-incident with platform teams to implement improvements via automation, tuning, or design enhancements. Coordinate improvements in monitoring, event correlation, and response processes with platform and tooling teams. Automate routine diagnostic tasks using scripting (Ansible, Python). Provide technical expertise during service onboarding, including setting alert rules, thresholds, and RCA guidelines. Required Skills and Experience: 5+ years in Infrastructure Operations or Platform Support. Skilled in detailed root cause analysis and impact assessments in complex environments (cloud-native and legacy). Expertise with observability tools (Dynatrace, Datadog, Splunk). Proficient in managing Linux/Windows servers, virtualization, storage, and identity platforms (LDAP, Azure AD). Strong scripting skills (Python, PowerShell, Bash) and infrastructure automation experience using Ansible. Familiarity with ITSM processes and incident management using ServiceNow. Comfortable with independent work and flexible shift schedules (including off-hours/weekends) as part of a global team. Excellent documentation and communication skills to translate technical issues into actionable insights. Capable of analyzing incident trends and recommending reliability improvements. Knowledge of virtualization, storage infrastructure, high-performance computing, and cloud services. Experience with User Access Management (UAM) and Identity Access Management (IAM) on-premise (OUD LDAP) and Azure AD. Experience maintaining Windows and Linux operating systems. Proficient with engineering tools (GitHub, Jira, Confluence). Nice To Have Skills and Experience: Exposure to high performance computing or cloud-native services Knowledge to CI/CD tooling (e.g., Jenkins, GitLab) or container-based systems Experience defining SLIs, SLOs , and building service health dashboards In Return: Accommodations at Arm At Arm, we want to build extraordinary teams. . To note, by sending us the requested information, you consent to its use by Arm to arrange for appropriate accommodations. All accommodation or adjustment requests will be treated with confidentiality, and information concerning these requests will only be disclosed as necessary to provide the accommodation. Although this is not an exhaustive list, examples of support include breaks between interviews, having documents read aloud, or office accessibility. Please email us about anything we can do to accommodate you during the recruitment process. Equal Opportunities at Arm Hybrid Working at Arm #LI-LK2 Accommodations at Arm At Arm, we want to build extraordinary teams. . To note, by sending us the requested information, you consent to its use by Arm to arrange for appropriate accommodations. All accommodation or adjustment requests will be treated with confidentiality, and information concerning these requests will only be disclosed as necessary to provide the accommodation. Although this is not an exhaustive list, examples of support include breaks between interviews, having documents read aloud, or office accessibility. Please email us about anything we can do to accommodate you during the recruitment process. Equal Opportunities at Arm

Posted 6 hours ago

Apply

8.0 - 12.0 years

9 - 13 Lacs

Hyderabad

Work from Office

Naukri logo

Job Title: Databricks Infrastructure Engineer Location: Hyderabad/Bengaluru Job Summary: We are looking for a skilled Databricks Infrastructure Engineer to design, build, and manage the cloud infrastructure that supports Databricks development efforts. This role will focus on creating and maintaining scalable, secure, and automated infrastructure environments using Terraform and other Infrastructure-as-Code (IaC) tools. The infrastructure will enable data engineers and developers to efficiently create notebooks, pipelines, and ingest data following the Medallion architecture (Bronze, Silver, Gold layers). The ideal candidate will have strong cloud engineering skills, deep knowledge of Terraform, and hands-on experience with Databricks platform provisioning. Key Responsibilities: Infrastructure Design & Provisioning: Design and implement scalable and secure infrastructure environments to support Databricks workloads aligned with the Medallion architecture. Develop and maintain Infrastructure-as-Code (IaC) scripts and templates using Terraform and/or ARM templates for provisioning Databricks workspaces, clusters, storage accounts, networking, and related Azure resources. Automate the setup of data ingestion pipelines, storage layers (Bronze, Silver, Gold), and access controls necessary for smooth data operations. Platform Automation & Optimization: Create automated deployment pipelines integrated with CI/CD tools (e.g., Azure DevOps, Jenkins) to ensure repeatable and consistent infrastructure provisioning. Optimize infrastructure configurations to balance performance, scalability, security, and cost-effectiveness. Monitor infrastructure health and perform capacity planning to support evolving data workloads. Implement and maintain backup, recovery, and disaster recovery strategies for Databricks environments. Optimize performance of Databricks clusters, jobs, and SQL endpoints. Automate routine administration tasks using scripting and orchestration tools. Troubleshoot platform issues, identify root causes, and implement solutions. Security & Governance: Implement security best practices including network isolation, encryption, identity and access management (IAM), and role-based access control (RBAC) within the infrastructure. Collaborate with governance teams to embed compliance and audit requirements into infrastructure automation. Collaboration & Support: Work closely with data engineers, data scientists, and platform administrators to understand infrastructure requirements and deliver solutions that enable efficient data engineering workflows. Provide documentation and training on infrastructure setup, usage, and best practices. Troubleshoot infrastructure issues and coordinate with cloud and platform support teams for resolution. Stay up to date with Databricks features, releases, and best practices Required Qualifications: 8-12 years of experience in Databricks and cloud infrastructure engineering, preferably with Azure Strong hands-on experience writing Infrastructure-as-Code using Terraform; experience with ARM templates or CloudFormation is a plus. Practical knowledge of provisioning and managing Databricks environments and associated cloud resources. Familiarity with Medallion architecture and data lake house concepts. Experience with CI/CD pipeline creation and automation tools such as Azure DevOps, Jenkins, or GitHub Actions. Solid understanding of cloud networking, storage, security, and identity management. Proficiency in scripting languages such as Python, Bash, or PowerShell. Strong collaboration and communication skills to work across cross-functional teams. Preferred Skills: Prior experience working with Databricks platform, including workspace and cluster management. Knowledge of data governance tools and practices. Experience with monitoring and logging tools (e.g., Azure Monitor, CloudWatch). Exposure to containerization and orchestration technologies such as Docker and Kubernetes. Understanding of data ingestion frameworks and pipeline orchestration tools like Apache Airflow or Azure Data Factory. Location: IND:AP:Hyderabad / Argus Bldg 4f & 5f, Sattva, Knowledge City- Adm: Argus Building, Sattva, Knowledge City Job ID R-67994 Date posted 06/22/2025

Posted 6 hours ago

Apply

2.0 - 3.0 years

6 - 10 Lacs

Hyderabad

Work from Office

Naukri logo

FS XSector Specialism Risk Management Level Senior Associate & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In identity and access management at PwC, you will focus on confirming secure and efficient access to systems and data for employees and/or clients. Your work will involve the design and implementation of strategies to protect sensitive information and manage user identities. Why PWC Learn more about us . . & Summary We are seeking a highly skilled Sailpoint Developer .If candidate has experience of 23 years, he/she must be Sailpoint Certified, above 3 years experience sailpoint certification is not mandatory but good to have s Technical Skills/Knowledge Candidates should have handson experience in sailpoint(8.x) development that should include below functionalities. Writing Rules using sailpoint apis in Java/Beanshell. Concepts of Roles, Policies, Certifications. Basic concepts like installation, Identity Mappings, correlation, debugging, filters etc. Knowledge on Workflows, LCM, Email Templates and Provisioning Good to have skills Custom Connector Sailpoint Integration with different tools Rest apis Very good Java programming skills Good understanding of the Deployment process. Must have exposure in agile projects Mandatory skill sets sailpoint Preferred skill sets sailpoint Years of experience required 312 Education qualification B.Tech Education Degrees/Field of Study required Bachelor of Engineering Degrees/Field of Study preferred Required Skills SailPoint IdentityNow Accepting Feedback, Accepting Feedback, Access Control Models, Access Control System, Access Management, Active Listening, Analytical Thinking, Authorization Compliance, Authorization Management Systems, Azure Active Directory, Cloud Identity and Access Management (IAM), Communication, Creativity, CyberArk Management, Cybersecurity, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Federated Identity Management, ForgeRock Identity Platform, Identity and Access Management (IAM), IdentityBased Encryption, Identity Federation, Identity Governance Framework (IGF) {+ 22 more} No

Posted 6 hours ago

Apply

6.0 - 8.0 years

10 - 20 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Naukri logo

Hi, We are looking for a highly skilled Senior Azure Developer with strong experience in Identity & Access Management (IAM) and integration technologies. The ideal candidate will have hands-on experience designing and implementing secure, scalable integration solutions in a cloud-native environment, particularly in Azure. Job Title: Senior Azure Developer (Integration & IAM) Client Role: Senior Azure Developer Notice period: immediate to 30days only Location: Bangalore (Flexible) Experience: 5+ Years only Key Responsibilities: Design and implement IAM-centric integration solutions (JML, access governance, SOD) Develop interfaces using IBM Security Directory Integrator (TDI) Integrate solutions with Active Directory (AD/AAD) Use Azure-native tools and optionally AWS for secure integration Apply CI/CD, secure coding, and telemetry practices across development Collaborate with stakeholders across technical and business functions Ensure high security, performance, and maintainability in cloud deployments Stay updated on emerging technologies and integration best practices Mandatory Skills: Deep knowledge of IAM processes (JML) Hands-on experience with IBM Directory Integrator (TDI) Integration with AD/AAD Experience with MFT, EAI, ESB, API, Streaming tools Proven experience in Azure-based integration Understanding of cloud-native architectures (containers, serverless) Desirable Skills: Programming experience in Python, Java, JavaScript, Go, C/C++ Experience managing integration/IT projects Strong skills in documentation and implementation planning Soft Skills: Strong communication and stakeholder engagement Team collaboration and leadership abilities Analytical and solution-oriented mindset Interview Mode: Virtual Work Location: Bangalore (Flexible) How to Apply: Interested candidates, please share your updated resume to suja.muthuvel@pisquaretech.com Include the following details: Total Experience Relevant Experience (IAM & Azure Integration) Current CTC Expected CTC Notice Period Willingness to join under Pi-Square payroll Note: Immediate joiners or candidates with a notice period of 15 days or less preferred. Keywords: Azure Developer, IAM, IBM TDI, Active Directory, Cloud Integration, Azure Cloud, API, CI/CD, Serverless, MFT, ESB, , Bangalore Jobs

Posted 14 hours ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

About The Position The Lead IT Cybersecurity Engineer is responsible for the technical design of IT cybersecurity architectural guidelines and standards, as well as the secure implementation of IT digital technologies across platforms and product lines in Chevron The primary responsibility is to assure IT solutions are "secure by design", with a high focus on delivering secure digital capabilities and retiring legacy technology when possible Key Responsibilities Responsibilities include but are not limited to: Enable digital transformation by ensuring secure-by-design principles are incorporated in the IT digital capabilities across the enterprise Establish cybersecurity governance for IT technologies across all technology functions Lead security research proposals and proofs of concept for emerging technologies Consult as a subject matter expert on cybersecurity risk assessments for IT technologies Define cybersecurity architectures for IT solutions Serve as a subject matter expert in one or more cybersecurity domains, including, but not limited to, Network Security, Cloud Security, Endpoint Security, Application Security, Data Security, and Identity and Access Management Required Qualifications Minimum 5 years related work experience in cybersecurity with increasing levels of responsibility Technical experience in one or more cybersecurity domains, including, but are not limited to, Network Security, Cloud Security, Endpoint Security, Application Security, Data Security, and Identity and Access Management General understanding of the cyber threat landscape, including cyber-criminal and cyber-espionage threats Previous experience administering cybersecurity technologies and/or supporting cybersecurity operations Preferred Education Bachelors degree or masters degree in Cybersecurity, Information Technology, Information Systems, or Computer Science Certifications in IT Cybersecurity are highly preferred (e g , GISP, GREM, ISSEP, OSCP or other similar certification) Certifications in SAFe Scaled Agile or related scrum/agile project management framework is desirable Preferred Qualifications Knowledge of industry-accepted cyber security frameworks such as NIST 800-53, MITRE ATT&CK, and the Cyber Kill Chain Experience in conducting and/or leading cybersecurity assessments (risk, vulnerability) and creating a detailed mitigation plan and recommendations to address gaps identified Ability to influence and motivate teams, and work with a variety of disciplines, cultures, and environments Demonstrated ability to work effectively, and communicate effectively at all levels with operations, design, projects, vendors, peers, etc Communicates in a clear, concise, understandable manner both orally and in writing Chevron ENGINE supports global operations, supporting business requirements across the world Accordingly, the work hours for employees will be aligned to support business requirements The standard work week will be Monday to Friday Working hours are 8:00am to 5:00pm or 1 30pm to 10 30pm Chevron participates in E-Verify in certain locations as required by law

Posted 1 day ago

Apply

2.0 - 5.0 years

6 - 10 Lacs

Pune

Work from Office

Naukri logo

Job Title- Information Security Analyst, Associate Location- Pune, India Role Description Information Security Production Services (IS PS) supports all divisions with information security relevant areas, like Application user recertification and other identity & access management areas. IS PS is seeking an Information Security Analyst for Application Onboarding. Your key responsibilities Understand and analyze business setting front to back from an information security perspective, interact closely with the business (e.g. Divisional CISO, Divisional ISO, project managers, business managers, COO representatives) on new projects and advise the business on information security relevant aspects End to end understanding and hands on experience of End user recertification process and Request & Approval process. Onboarding new applications to the banks central Recertification, Request & Approval platform and Segregation of Duties control. Coordinating the banks onboarding process by interacting with stakeholders involved such as the business, Identity and Access Management team and IT. Liaise with subject matter experts (e.g. in IT, Legal, Group Data Protection, Compliance etc.) Present end results and options to the business and discuss steps for resolution, develop an area of expertise and knowledge in an information security topic. As on-boarding Information Security Analyst you will be responsible to perform on-boarding assessments if an IT asset is applicable for end user application access for request & approval, Recertification, segregation of Duties control and perform business requirement gathering. Responsible to onboard application for access from request & approval based on gathered business requirements on to be on-boarded role/entitlement of access provision and hand over to technical team for form configuration, SIT, Release Management and Deployment. Organize training session for applications where user provision will be handed over to CSO central ID Admin team Support UAT testing as part of affected stakeholder group for Recertification, Request & approval and SoD. Efficiently engage, manage and influence the main stakeholders, along within application on-boarding process including Information Security Officer, IT Application Owner, Engineering and Operations teams Provide process improvement inputs to various stakeholders involved Proactively seek ways to improve upon existing practices and processes. Display insight and ability in identifying issues and develop successful solutions Report and escalate potential risks to the management to help avoid / minimize the impact Work with multiple, distributed teams (across different locations) Support develops key operational procedures where necessary and ensure adherence to all such defined policies Comfortable with associated disciplines of Security Policy and Governance in banking domain Your skills and experience Should have 8+ years of total work experience or at least 6+ years of relevant experience in similar role. Background in information security, Identity and Access management or similar. Background in the business or having worked with a business unit of advantage Ability to manage multi-tasks assignments and efficiently prioritize workload with limited supervision and resilient under pressure. Ability to build a network in the business and among business managers, project managers and subject matter experts Strong communication skills both verbal (incl. presentation skills) or written and ability to deal with people at all levels in a global matrix organization Flexible, pro-active and innovative

Posted 1 day ago

Apply

2.0 - 4.0 years

9 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

Minimum qualifications: Bachelor's degree or equivalent practical experience 2 years of experience designing solutions that maintain or enhance the privacy posture of the organization by analyzing and assessing proposed engineering designs (e g , product features, infrastructure systems) and influencing stakeholders 2 years of experience applying privacy technologies (e g , differential privacy, automated access management solutions, etc ), and customizing existing solutions and frameworks to meet organizational needs Experience in Software Architecture, Risk Analysis, Cross-Functional Collaboration, Differential Privacy, Privacy Design Document, Privacy Data Handling Preferred qualifications: Experience in Analytical, Strategic Thinking, Artificial Intelligence, Machine Learning Experience in privacy testing in wearables, smart-home or mobile devices Experience managing multiple requests, while determining resource allocation (e g , time, prioritization) to solve problems in a fast-paced, changing organization Domain knowledge in health related privacy designs in wearables, smart-home or mobile devices Familiarity with mobile and Android platform, and app development A passion for keeping people and their data safe About the jobIn this role, you will review the product designs on Google devices, Home and Health platforms, and provide privacy guidance and requirements for product privacy assurance The Devices and Services Privacy Teams mission is to work with product/engineering teams on Google devices and platforms to ensure users are confident our products are safe and trustworthy The Core team builds the technical foundation behind Googles flagship products We are owners and advocates for the underlying design elements, developer platforms, product components, and infrastructure at Google These are the essential building blocks for excellent, safe, and coherent experiences for our users and drive the pace of innovation for every developer We look across Googles products to build central solutions, break down technical barriers and strengthen existing systems As the Core team, we have a mandate and a unique opportunity to impact important technical decisions across the company Responsibilities Exercise design and architecture related knowledge to develop and drive technical privacy solutions as well as policy changes alongside engineering teams Drive privacy solutions into products and services, including early engagement with product and engineering team on the product design; cross-functional collaboration to ensure the privacy excellence for product launches, including with legal and public policy teams; conduct privacy risk assessment and provide guidance and solutions to mitigate identified privacy risks Post launch support in the form of privacy subject matter analysis for incidents and vulnerability reports Google is proud to be an equal opportunity workplace and is an affirmative action employer We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status We also consider qualified applicants regardless of criminal histories, consistent with legal requirements See also Google's EEO Policy and EEO is the Law If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form

Posted 1 day ago

Apply

10.0 - 15.0 years

8 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

Total Experience 10+ Relevant Experience on Mandatory Skills 10+ Strategize and Maintain IAM processes for 6 applications Mandatory Skills The ideal candidate should possess the following: Core Skills Good conceptual understanding on IAM Experience in writing Identity strategy Understands and formulate general principle of IAM like Identity , Access, CIAM and PAM Solid understanding and practical experience with core IAM concepts, including: Joiner-Mover-Leaver (JML) processes RBAC and ABAC controls Application onboarding industrial process Access certifications Segregation of Duties (SoD) IAM reporting and analytics Strong capability to translate business requirements into effective IAM technical solutions. Strong communication skills with the ability to engage both technical and non-technical stakeholders. Strong understanding of IAM protocols and standards such as SAML, OAuth, OpenID Connect, SCIM, and LDAP. Demonstrated ability to lead IAM projects with confidence, ensuring alignment with business goals and technical feasibility. Extensive hands-on experience with IAM as a security function, including Identity Governance (IGA), Privileged Access Management (PAM), and Single Sign-On (SSO) solutions. Proven track record in managing the delivery and operations of leading IAM platforms such as Saviynt, SailPoint, ForgeRock or One Identity. Proficiency in working with Active Directory and Azure Entra ID and famous cloud platforms like AWS and GCP. Good to Have Skills Additional expertise in tools like CyberArk, BeyondTrust, or Okta is highly desirable. Familiarity with DevSecOps practices and integration of IAM into CI/CD pipelines. Experience with scripting or automation (e.g., PowerShell, Python) for IAM tasks. Exposure to Zero Trust Architecture and modern identity-centric security models.

Posted 1 day ago

Apply

5.0 - 8.0 years

8 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

Strategize and Maintain IAM processes for 6 applications Mandatory Skills The ideal candidate should possess the following: Core Skills Good conceptual understanding on IAM Experience in writing Identity strategy Understands and formulate general principle of IAM like Identity , Access, CIAM and PAM Solid understanding and practical experience with core IAM concepts, including: Joiner-Mover-Leaver (JML) processes RBAC and ABAC controls Application onboarding industrial process Access certifications Segregation of Duties (SoD) IAM reporting and analytics Strong capability to translate business requirements into effective IAM technical solutions. Strong communication skills with the ability to engage both technical and non-technical stakeholders. Strong understanding of IAM protocols and standards such as SAML, OAuth, OpenID Connect, SCIM, and LDAP. Demonstrated ability to lead IAM projects with confidence, ensuring alignment with business goals and technical feasibility. Extensive hands-on experience with IAM as a security function, including Identity Governance (IGA), Privileged Access Management (PAM), and Single Sign-On (SSO) solutions. Proven track record in managing the delivery and operations of leading IAM platforms such as Saviynt, SailPoint, ForgeRock or One Identity. Proficiency in working with Active Directory and Azure Entra ID and famous cloud platforms like AWS and GCP. Good to Have Skills Additional expertise in tools like CyberArk, BeyondTrust, or Okta is highly desirable. Familiarity with DevSecOps practices and integration of IAM into CI/CD pipelines. Experience with scripting or automation (e.g., PowerShell, Python) for IAM tasks. Exposure to Zero Trust Architecture and modern identity-centric security models.

Posted 1 day ago

Apply

6.0 - 9.0 years

50 - 70 Lacs

Bengaluru

Work from Office

Naukri logo

Job Title IAM Lead ECMS Req # (Mandatory) Not yet generated Number of Openings 1 Duration of contract 6 months to start Total Experience 10+ Relevant Experience on Mandatory Skills 10+ Job Description Strategize and Maintain IAM processes for 6 applications Mandatory Skills The ideal candidate should possess the following: Core Skills Good conceptual understanding on IAM Experience in writing Identity strategy Understands and formulate general principle of IAM like Identity , Access, CIAM and PAM Solid understanding and practical experience with core IAM concepts, including: Joiner-Mover-Leaver (JML) processes RBAC and ABAC controls Application onboarding industrial process Access certifications Segregation of Duties (SoD) IAM reporting and analytics Strong capability to translate business requirements into effective IAM technical solutions. Strong communication skills with the ability to engage both technical and non-technical stakeholders. Strong understanding of IAM protocols and standards such as SAML, OAuth, OpenID Connect, SCIM, and LDAP. Demonstrated ability to lead IAM projects with confidence, ensuring alignment with business goals and technical feasibility. Extensive hands-on experience with IAM as a security function, including Identity Governance (IGA), Privileged Access Management (PAM), and Single Sign-On (SSO) solutions. Proven track record in managing the delivery and operations of leading IAM platforms such as Saviynt, SailPoint, ForgeRock or One Identity. Proficiency in working with Active Directory and Azure Entra ID and famous cloud platforms like AWS and GCP. Good to Have Skills Additional expertise in tools like CyberArk, BeyondTrust, or Okta is highly desirable. Familiarity with DevSecOps practices and integration of IAM into CI/CD pipelines. Experience with scripting or automation (e.g., PowerShell, Python) for IAM tasks. Exposure to Zero Trust Architecture and modern identity-centric security models. Vendor Billing range Rs. 17,000 to Rs. 19,000 / day Specific Work Location & Mode of work Remote, India Client Interview (Yes /No) Yes Background verification Outcome needed - Before or After Onboarding As per Infosys policy. No separate background check required by client.

Posted 1 day ago

Apply

0.0 - 4.0 years

2 - 3 Lacs

Coimbatore

Work from Office

Naukri logo

Role Summary: We are looking for a detail-oriented and proactive IT Project Coordinator to join our Business Digital Office (BDO). In this role, you will support digital transformation initiatives by coordinating cross-functional projects, driving PMO activities, and ensuring high-quality documentation and stakeholder alignment. The ideal candidate will have experience in project coordination, requirement tracking, documentation governance, and working across IT and business teams. Key Responsibilities: Project Coordination: Act as the central point of coordination for IT-related project activities, supporting BDO Leads in planning, tracking, and delivery across multiple digital transformation streams. Requirement Management: Collaborate with internal stakeholders to gather and document functional and non-functional requirements, track progress, and ensure timely delivery. Project Documentation: Manage and maintain essential documentation including: Project Charters Requirement Documents Solution Briefs Architecture & Data Flow Diagrams IT Security Checklists Access Management Documents User Guides and Training Materials PMO Support: Drive PMO activities such as status reporting, action tracking, and schedule management. Maintain project trackers and ensure alignment with governance frameworks. T&R (Topic & Responsibility) Management: Update and manage T&R records to include stakeholders, responsibilities, due dates, and related documents. Weekly Reporting: Publish weekly updates on project milestones, open issues, and risk areas to support decision-making by project leads and leadership. Stakeholder Engagement: Work closely with Developers, Solution Architects, Process Owners, Security Managers, and PMO teams to drive project execution and resolve blockers. Qualifications Educational qualification: Bachelor s degree in Information Technology, Computer Science, Business Administration, or a related field Experience :

Posted 1 day ago

Apply

3.0 - 8.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you’d like, where you’ll be supported and inspired bya collaborative community of colleagues around the world, and where you’ll be able to reimagine what’s possible. Join us and help the world’s leading organizationsunlock the value of technology and build a more sustainable, more inclusive world. Your Role Minimum 3-8 years’ experience assessing against standards and frameworks including one or more of the followingDOE C2M2, IEC-62243/ISA-99, NIST CSF, NERC CIP, etc. Minimum 3-5 years’ experience working with ICS technologies and/or environments on one or more of the followingSCADA, DCS, EMS, DMS, ADMS, PCN, RTUs, IACS, PLCs, HMIs, etc. Minimum 3-5 years working with cybersecurity functions of one or more of the followingvulnerability assessment and management processes, identity and access management, incident response and monitoring, etc. Problem-solving ability and strong analytical skills Experience of working with diverse teams and is a team player Relevant certifications (CISSP, GICSP, GRID, GCIP, etc.). Keep abreast with the latest technology trends and predictions Ability to drive the creation of prototypes and proof of concepts Able to effectively communicate, interact and influence business and operational stakeholders and partners Ability to deliver innovative solutions and consistently demonstrate customer outcomes. Primary Skills DOE C2M2 IEC-62243/ISA-99 NIST CSF NERC CIP

Posted 1 day ago

Apply

3.0 - 6.0 years

7 - 11 Lacs

Noida

Work from Office

Naukri logo

R1 RCM is a leading provider of technology-driven solutions that help hospitals and health systems to manage their financial systems and improve patients experience. We are the one company that combines the deep expertise of a global workforce of revenue cycle professionals with the industry's most advanced technology platform, encompassing sophisticated analytics, Al, intelligent automation and workflow orchestration. R1 is a place where we think boldly to create opportunities for everyone to innovate and grow. A place where we partner with purpose through transparency and inclusion. We are a global community of engineers, front-line associates, healthcare operators, and RCM experts that work together to go beyond for all those we serve. Because we know that all this adds up to something more, a place where we're all together better.R1 India is proud to be recognized amongst Top 25 Best Companies to Work For 2024, by the Great Place to Work Institute. This is our second consecutive recognition on this prestigious Best Workplaces list, building on the Top 50 recognition we achieved in 2023. Our focus on employee wellbeing and inclusion and diversity is demonstrated through prestigious recognitions with R1 India being ranked amongst Best in Healthcare, amongst Top 50 Best Workplaces for Millennials, Top 50 for Women, Top 25 for Diversity and Inclusion and Top 10 for Health and Wellness. We are committed to transform the healthcare industry with our innovative revenue cycle management services. Our goal is to make healthcare work better for all by enabling efficiency for healthcare systems, hospitals, and physician practices. With over 30,000 employees globally, we are about 17,000+ strong in India with presence in Delhi NCR, Hyderabad, Bangalore, and Chennai. Our inclusive culture ensures that every employee feels valued, respected, and appreciated with a robust set of employee benefits and engagement activities. :- Required to work on Access Request Management fulfilment operations and tickets within defined SLAs- Required to perform UAA (User Access Administration) audit activities- Manage On/Off Boarding tasks- Required to perform Application role- based access, Prov/De Provisioning tasks- Required to manage access of inhouse applications such as Account Creation, Modification and Deactivation- Required to provision accounts in Enterprise directory services (Active Directory)- Required to perform tasks in O365 User provisioning- Basic administration of MS Azure Active Directory- Required to perform Multi Factor Authentication (MFA) admin tasks- Required to generate Status Reports, Dashboards and Quality Metrics- Candidate will be required to interact with Client, vendors and other business functions- Should be ready to work in rotational shift and support over Indian Holidays and Weekends- Should be open for 24*7 Support including Night shifts / US business hours Skills: - Understanding of Identity and Access Management (IAM) concepts- Analytical and Troubleshooting skills- Well versed with creating and analyzing excel data for UAA related tasks- Word/Excel/PowerPoint knowledge- Basic SQL and Database Query processing knowledge and skills- Basic understanding of MS Active Directory and Azure services- Experience with Role Based Access Controls- Understanding of MFA and related administration skills- Communication and Presentation skills Preferred skill - PowerShell scripting knowledge if any Preferred Certifications - ITIL, Agile, SQL, MS Active Directory, Healthcare IT Education - B. Tech, BSC IT, BCA or any Technology Bachelor or Masters Degree Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests. Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visitr1rcm.com Visit us on Facebook

Posted 1 day ago

Apply

1.0 - 3.0 years

7 - 11 Lacs

Noida

Work from Office

Naukri logo

. Education B. Tech, BSC IT, BCA or any Technology bachelors or masters Degree Experience1-3 years Roles & Responsibilities: Required to work on Access Request Management fulfilment operations and tickets within defined SLAs. Required to perform UAA (User Access Administration) audit activities. Manage On/Off Boarding tasks. Required to perform Application role- based access, Prov/De Provisioning tasks. Required to manage access of inhouse applications such as Account Creation, Modification and Deactivation Required to provision accounts in Enterprise directory services (Active Directory) Required to perform tasks in O365 User provisioning. Basic administration of MS Azure Active Directory Required to perform Multi Factor Authentication (MFA) admin tasks. Required to generate Status Reports, Dashboards and Quality Metrics Candidate will be required to interact with Client, vendors and other business functions. Should be ready to work in rotational shift and support over Indian Holidays and Weekends Should be open for 24*7 Support including Night shifts / US business hours. Skills: Understanding of Identity and Access Management (IAM) concepts Analytical and Troubleshooting skills. Well versed with creating and analyzing excel data for UAA related tasks. Word/Excel/PowerPoint knowledge Basic SQL and Database Query processing knowledge and skills Basic understanding of MS Active Directory and Azure services Experience with Role Based Access Controls Understanding of MFA and related administration skills Communication and Presentation skills Preferred skill PowerShell scripting knowledge if any Preferred Certifications ITIL, Agile, SQL, MS Active Directory, Healthcare IT Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests. Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visitr1rcm.com Visit us on Facebook

Posted 1 day ago

Apply

9.0 - 14.0 years

11 - 16 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for an experienced CyberArk PAM Specialist to design, implement, and support CyberArk Privileged Access Management (PAM) solution. Roles and Responsibilities:1. Define, design, and implement CyberArk Privilege Cloud (SaaS).2. Install and configure cloud connectors.3. Configure MFA, SAML, LDAP, SIEM integration4. Troubleshoot and resolve CyberArk related technical issues.5. Work closely with application teams to onboard different types to systems to CyberArk6. Generate custom CPM, PSM plugins if required7. Support application onboarding, including access policies, group assignments, and role management.8. Communicate effectively with business teams, external clients, and solution providers.9. Document technical designs, solutions, and implementation plans.10. Work independently and take ownership of technical deliverables. Professional & Technical Skills: 1. Strong experience in CyberArk P-cloud, Conjure Secrets Management, CyberArk PAM (Vault, CPM, PVWA, AAM)2. Solid understanding of security standards and protocols including SSO, MFA, SAML, OAuth, OIDC, LDAP, RADIUS, and Kerberos.3. Proficient in CyberArk and related technologies. Experience in system administration, scripting (UNIX, Linux scripting), Rest API, LDAP directories, Active Directory4. Experience in providing guidance in CyberArk strategy; must have PAM deep dive experience.5. Strong understanding of PAM Architecture, deployment methodologies and best practices.6. Effective at presenting information to different audiences at the correct level of detail (e.g., from engineering teams to executive management).7. Be a product and domain expert in PAM domain experienced in conducting environment assessments and health checks in line with best practices.8. Strong troubleshooting and problem-solving skills.9. Experience in EPM is desirable but not mandatory10. Excellent verbal and written communication skills.11. Ability to work independently on technical tasks and client engagements.12. Candidate must be an independent self-starter able to perform all deployment activities with oversight and as a member of a project team.13. Candidate must have Sentry Certification. Nice to have CyberArk CDE14. Good to Have Skills - Thycotic (Delinea), Beyond Trust, HashiCorp Vault Additional Information:1. 9+ years experience related to designing, deploying, and configuring PAM solutions, or 6+ years direct PAM consulting experience.2. Candidate must have completed 16 years of full-time education.3. This position is open to all Accenture locations. Qualification 15 years full time education

Posted 1 day ago

Apply

9.0 - 14.0 years

11 - 16 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for an experienced CyberArk PAM Specialist to design, implement, and support CyberArk Privileged Access Management PAM solution. Roles and Responsibilities:1. Define, design, and implement CyberArk Privilege Cloud-SaaS.2. Install and configure cloud connectors.3. Configure MFA, SAML, LDAP, SIEM integration4. Troubleshoot and resolve CyberArk related technical issues.5. Work closely with application teams to onboard different types to systems to CyberArk6. Generate custom CPM, PSM plugins if required7. Support application onboarding, including access policies, group assignments, and role management.8. Communicate effectively with business teams, external clients, and solution providers.9. Document technical designs, solutions, and implementation plans.10. Work independently and take ownership of technical deliverables. Professional & Technical Skills: 1. Strong experience in CyberArk P-cloud, Conjure Secrets Management, CyberArk PAM-Vault, CPM, PVWA, AAM2. Solid understanding of security standards and protocols including SSO, MFA, SAML, OAuth, OIDC, LDAP, RADIUS, and Kerberos.3. Proficient in CyberArk and related technologies. Experience in system administration, scripting UNIX, Linux scripting, Rest API, LDAP directories, Active Directory4. Experience in providing guidance in CyberArk strategy; must have PAM deep dive experience.5. Strong understanding of PAM Architecture, deployment methodologies and best practices.6. Effective at presenting information to different audiences at the correct level of detail e.g. from engineering teams to executive management.7. Be a product and domain expert in PAM domain experienced in conducting environment assessments and health checks in line with best practices.8. Strong troubleshooting and problem-solving skills.9. Experience in EPM is desirable but not mandatory10. Excellent verbal and written communication skills.11. Ability to work independently on technical tasks and client engagements.12. Candidate must be an independent self-starter able to perform all deployment activities with oversight and as a member of a project team.13. Candidate must have Sentry Certification. Nice to have CyberArk CDE14. Good to Have Skills Thycotic Delinea, Beyond Trust, HashiCorp Vault Additional Information:1. 9+ years experience related to designing, deploying, and configuring PAM solutions, or 6+ years direct PAM consulting experience.2. Candidate must have completed 16 years of full-time education.3. This position is open to all Accenture locations. Qualification 15 years full time education

Posted 1 day ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Hyderabad, Pune

Work from Office

Naukri logo

Oracle HCM Security SME1 Position Title Oracle HCM Security SME No of position 1 Location Pune / Hyderabad We are looking for a skilled Oracle HCM Security Product & Configuration Subject Matter Expert (SME) to lead and manage the security design, configuration, and administration of Oracle HCM Cloud applications. The SME will ensure robust access controls, compliance with data privacy regulations, and alignment of security roles with business processes to safeguard sensitive employee information. Required skill and experience Must have 5+ year experience, hands-on experience in Oracle HCM Cloud security design, configuration, and administration. Deep understanding of Oracle HCM security architecture, role provisioning, data security policies, and privilege management. Serve as the Oracle HCM Security SME for the design, configuration, and maintenance of security roles, privileges, and policies within Oracle HCM Cloud. Analyze business requirements to design role-based access control models and segregation of duties (SoD) frameworks. Configure and maintain security roles, data security policies, and user provisioning workflows. Conduct regular security audits, access reviews, and remediation activities to ensure compliance with internal and external standards. Collaborate with HR, IT, and compliance teams to enforce data privacy, governance, and regulatory requirements. Lead security testing including unit testing, security validation, and user acceptance testing (UAT). Troubleshoot and resolve security and access issues for Oracle HCM users. Develop security documentation, training materials, and deliver training sessions for administrators and end-users. Stay current with Oracle HCM Cloud security enhancements, patches, and industry best practices. Support Oracle HCM Cloud upgrade cycles from a security perspective. Provide guidance on integrating Oracle HCM security with other enterprise applications and identity management solutions (e.g., Oracle Identity Manager, Single Sign-On). Experience with role mining, role design, and segregation of duties (SoD) analysis. Strong knowledge of Oracle HCM Cloud modules and their security implications. Experience working with identity and access management (IAM) tools and concepts. Familiarity with data privacy regulations such as GDPR, HIPAA, or equivalent. Excellent problem-solving, analytical, and communication skills. Oracle HCM Security certification or equivalent experience preferred. Preferred qualifications Bachelors degree or the equivalent combination of education plus relevant experience.

Posted 1 day ago

Apply

1.0 - 5.0 years

6 - 11 Lacs

Pune

Work from Office

Naukri logo

Key Responsibilities: You will be part of our development team that works on business applications. As a Senior Java developer team member, you must contribute to the designing and development of an IAM (Identity & Access Management) based micro-services. Implement software programming for products (both internal and external) with focus on surpassing customer expectations, on achieving high quality and on-time delivery. Responsible for ensuring the overall functional quality of the released product on all required platforms and mechanism. Ability to understand complex products, solutions, and problems. Promotes innovation through the ability to introduce new technology/knowledge into multiple areas of a product and to our people. Able to solve the most complex of technical problems. Works without supervision on the most complex projects with complete latitude for independent judgment and technical expertise. Advanced knowledge of the field. Assist with less experienced peers. : We are looking for a Senior Developer with extensive experience in Identity and Access Management (IAM) solutions majorly with Java/ Spring Boot background. The ideal candidate will have a deep understanding of SAML, OIDC, and OAuth 2.0 protocols, as well as expertise in Single Sign-On (SSO) and Single Logout (SLO) mechanisms. Experience with enterprise IAM solutions such as Microsoft Entra, Auth0, and Okta is essential. Technical mandatory requirement: Develop the microservices in Java/ Spring boot for IAM domain. Should have strong hands-on coding experience in Java, Spring boot based applications. Design, develop, and implement IAM services using SAML, OIDC, SCIM1.1 SCIM2.0 and OAuth 2.0 protocols. Good Experience of designing and implementing high performance and scalable APIs. Configure and manage SSO and SLO functionalities across various applications and platforms. Good understanding of Standard RFC s that define the Authorization Best Practices. Integration experience on enterprise IAM solutions like Microsoft Entra, Auth0, and Okta. Collaborate with cross-functional teams to ensure seamless integration of IAM solutions. Troubleshoot and resolve IAM-related issues and provide technical support. Stay updated with the latest trends and best practices in IAM and security protocols. Conduct security assessments and audits to ensure compliance with industry standards. Implement and manage Policy-Based Access Control (PBAC), Role-Based Access Control (RBAC), Multi-tenancy, and Attribute-Based Access Control (ABAC). Work with AWS and Azure environments. Good hands-on experience on EKS and Docker Technology. Good to havePython, Golang A collection of over 377,000 minds building the future, one day at a time in over 200 countries. We're dedicated to equality, and we welcome applications that reflect the diversity of the communities we work in. All employment decisions at Siemens are based on qualifications, merit, and business need. Bring your curiosity and creativity and help us shape tomorrow! We offer a comprehensive reward package which includes a competitive basic salary, bonus scheme, generous holiday allowance, pension, and private healthcare. Siemens Software. Transform the every day and Accelerate transformation. #LI-PLM #LI-Hybrid, #SWSaaS

Posted 1 day ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : SAP Security Good to have skills : SAP Governance Risk and Compliance (SAP GRC)Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will engage in the design, construction, and configuration of applications tailored to fulfill specific business processes and application requirements. Your typical day will involve collaborating with team members to understand project needs, developing innovative solutions, and ensuring that applications are optimized for performance and usability. You will also participate in testing and troubleshooting to ensure that the applications function as intended, contributing to the overall success of the projects you are involved in. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Assist in the documentation of application processes and workflows.- Engage in continuous learning to stay updated with the latest technologies and best practices. Professional & Technical Skills: - Must To Have Skills: Proficiency in SAP Security.- Good To Have Skills: Experience with SAP Governance Risk and Compliance (SAP GRC).- Strong understanding of application development methodologies.- Experience with user access management and role-based security.- Familiarity with compliance and regulatory requirements related to SAP. Additional Information:- The candidate should have minimum 3 years of experience in SAP Security.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 day ago

Apply

6.0 - 11.0 years

4 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

P2 C1 STS Primary- Informatica IDQ 9 or higher Secondary- PL/SQL skills JD- IDQ/Informatica Developer experience working on transformations, mapplet, mapping and Scorecards Informatica Axon tool experience Experience Translating business rules into IDQ Rules, IDQ application deployment, Schedulers Knowledge with IDQ repository objects IDQ Performance management & Access management Understands concept for Data governance Experience with IDQ and Axon integration Informatica PowerCenter experience (9 higher) Experience with unix scripting IBM Information analyzer Good to have

Posted 1 day ago

Apply

5.0 - 10.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : SAP Identity and Access Management Good to have skills : SAP Basis Administration, SAP Business Suite on HANAMinimum 5 year(s) of experience is required Educational Qualification : 15 years of full time education Summary :As an Application Developer for SAP Identity and Access Management, you will be responsible for designing, building, and configuring applications to meet business process and application requirements. Your typical day will involve working with SAP BASIS Administration, SAP HANA Technical Architecture, and SAP Business Suite on HANA to ensure the smooth functioning of the SAP Identity and Access Management system. Roles & Responsibilities:- Design, build, and configure applications to meet business process and application requirements using SAP Identity and Access Management.- Collaborate with cross-functional teams to ensure the smooth functioning of the SAP Identity and Access Management system.- Provide technical expertise in SAP BASIS Administration, SAP HANA Technical Architecture, and SAP Business Suite on HANA.- Develop and maintain technical documentation related to SAP Identity and Access Management system.- Ensure compliance with security policies and procedures related to SAP Identity and Access Management system. Professional & Technical Skills: - Must To Have Skills: Strong experience in SAP Identity and Access Management.- Good To Have Skills: SAP BASIS Administration, SAP HANA Technical Architecture, SAP Business Suite on HANA.- Experience in designing, building, and configuring applications using SAP Identity and Access Management.- Strong understanding of SAP BASIS Administration, SAP HANA Technical Architecture, and SAP Business Suite on HANA.- Experience in developing and maintaining technical documentation related to SAP Identity and Access Management system.- Knowledge of security policies and procedures related to SAP Identity and Access Management system. Additional Information:- The candidate should have a minimum of 5 years of experience in SAP Identity and Access Management.- The ideal candidate will possess a strong educational background in computer science or a related field, along with a proven track record of delivering impactful solutions using SAP Identity and Access Management.- This position is based at our Mumbai office. Qualification 15 years of full time education

Posted 1 day ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

Educational MCA,MTech,Bachelor Of Technology,Bachelor of Engineering,BCA Service Line Application Development and Maintenance Responsibilities 1. IAM Solution Design and Implementation:o Design and deploy IAM solutions using tools like ForgeRock, Okta, Ping Identity, or similar platforms.o Develop and maintain role-based access control (RBAC) and attribute-based access control (ABAC) models.2. Authentication and Authorization:o Implement and manage Single Sign-On (SSO), Multi-Factor Authentication (MFA), and passwordless authentication solutions.o Configure and support authentication protocols such as SAML, OAuth2, OpenID Connect, and LDAP.3. User Lifecycle Management:o Automate user provisioning, de-provisioning, and access reviews.o Integrate IAM solutions with HR systems and directories for seamless user lifecycle management.4. Access Governance:o Conduct periodic access reviews and audits to ensure compliance with internal policies and regulatory requirements.o Implement identity governance solutions to manage entitlements and certifications.5. Integration and Customization:o Integrate IAM solutions with enterprise applications, directories, and third-party systems.o Customize IAM workflows and policies to meet organizational needs.6. Monitoring and Incident Response:o Monitor IAM systems for anomalies and unauthorized access attempts.o Respond to and resolve IAM-related incidents and issues.7. Documentation and Training:o Create and maintain documentation for IAM processes, configurations, and policies.o Provide training and support to end-users and administrators on IAM tools and best practices. Additional Responsibilities: Technical Expertise:o IAM development experience using Java/Pythono Hands-on experience with IAM tools such as ForgeRock, Okta, Ping Identity, SailPoint, or similar platforms.o Strong knowledge of authentication protocols (SAML, OAuth2, OpenID Connect, LDAP).o Experience with directory services (Active Directory, LDAP) and user provisioning systems. Compliance and Governance:o Familiarity with regulatory frameworks such as GDPR, HIPAA, PCI-DSS, and SOX.o Experience with identity governance solutions for access reviews and certifications. Soft Skills: o Strong problem-solving and analytical skills.o Excellent communication and collaboration abilities. Certifications (Preferred):o ForgeRock Certified Access Management Specialisto Okta Certified Professionalo Ping Identity Certified Professionalo CISSP or CISM Preferred Skills: Technology-Java-Java - ALL Technology-Identity Management-Identity Management - ALL Technology-Identity Management-IAM Architecture Consultancy Technology-Machine Learning-Python

Posted 1 day ago

Apply

Exploring Access Management Jobs in India

Access management is a critical aspect of cybersecurity that involves controlling who has access to resources within an organization. In India, the demand for access management professionals is on the rise as companies prioritize data security and compliance with regulations. Job seekers in this field can expect a range of opportunities across various industries.

Top Hiring Locations in India

  1. Bangalore
  2. Mumbai
  3. Delhi
  4. Pune
  5. Hyderabad

These cities are known for their thriving IT sectors and are actively hiring for access management roles.

Average Salary Range

The salary range for access management professionals in India varies based on experience and location. Entry-level positions may start around INR 4-6 lakhs per annum, while experienced professionals can earn upwards of INR 15 lakhs per annum.

Career Path

Typically, a career in access management progresses from roles such as Access Management Analyst or Associate to Access Management Specialist, then onto Access Management Manager or Lead, and finally to Chief Information Security Officer (CISO).

Related Skills

In addition to expertise in access management, professionals in this field are often expected to have skills in cybersecurity, identity and access management (IAM) tools, risk management, compliance, and IT security best practices.

Interview Questions

  • What is the difference between authentication and authorization? (basic)
  • How do you ensure compliance with access management policies in an organization? (medium)
  • Can you explain the concept of least privilege access? (medium)
  • What are some common access control models used in access management? (advanced)
  • How do you handle access requests from different departments with conflicting priorities? (medium)
  • Explain the role of Role-Based Access Control (RBAC) in access management. (medium)
  • How do you stay updated with the latest trends and technologies in access management? (basic)
  • Describe a scenario where you had to troubleshoot an access management issue. (medium)
  • How do you prioritize access management tasks in a fast-paced environment? (medium)
  • Can you explain the concept of Single Sign-On (SSO) and its benefits? (medium)
  • What are some common challenges faced in access management implementation? (medium)
  • How do you ensure data privacy while managing access to sensitive information? (medium)
  • What role does access management play in data security and compliance? (basic)
  • How do you handle access management for remote or mobile users? (medium)
  • Explain the process of access certification and its importance. (medium)
  • How would you handle a security breach related to access management? (advanced)
  • What are some key metrics you would use to measure the effectiveness of access management controls? (medium)
  • Can you discuss the importance of segregation of duties in access management? (medium)
  • Describe a successful access management project you led and its impact on the organization. (advanced)
  • How do you collaborate with other IT teams to ensure seamless access management processes? (medium)
  • What steps would you take to improve access management practices in an organization? (medium)
  • How do you address user resistance to access management policies and procedures? (medium)
  • Can you explain the concept of dynamic access control and its benefits? (advanced)
  • How do you ensure that access management processes align with industry regulations and standards? (medium)

Closing Remark

As you prepare for access management roles in India, remember to showcase your expertise in cybersecurity, IAM tools, and compliance. Stay updated with industry trends and technologies to stand out in the competitive job market. With the right skills and preparation, you can confidently pursue rewarding opportunities in access management. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies