Jobs
Interviews

1248 Access Management Jobs - Page 47

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 - 15.0 years

22 - 37 Lacs

Bengaluru

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Infrastructure Architects are the key link between Kyndryl and our clients. You’re in a technical leadership role, uniting and guiding stakeholders from clients, governance, and project executives to delivery and sometimes even the vendors who work with the client. You’ll be there from the start of a project — understanding what’s needed and figuring out the best technical solution. And you’ll be there at the finish, delivering the right product on time and within budget. As an Infrastructure Architect, you’ll draw upon the full breadth of your talent and experience. This is a technical leadership role, so we want you to bring your vision, knowledge, and leadership to each project. To the client, you’re the subject matter expert – consulting early, gathering inputs, understanding what they need from our solution. You define what Kyndryl can do to meet this solution. You design the best solution for the job. And finally, you’re the tech leader for implementation. At Kyndryl we support all major cloud platforms, so you’ll get the chance to use everything you know – and then some. You’ll also become expert at knowing when and how to call on other SMEs outside your wheelhouse. Thinking your way around pre-existing limitations will grow your creativity and flexibility. You’ll learn a lot here, and if you want to work toward certifications there are plenty of opportunities.The rewards for all this are many. You’ll get to influence, create, and deliver something from start to finish. You will have the power to delight our clients. Your future at Kyndryl This role opens the door to many career paths, both vertical and horizontal, and there may be opportunity to travel. It’s a great chance for database administrators or other techs to break into the cloud. It’s also a solid path to become enterprise or chief architect or a distinguished engineer! Whatever you see for yourself, you’ll find the opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience 5 years of experience in Active Directory Migration Ensure the assigned projects are completed within budgets and schedules while meeting business objectives Identify, analyze, mitigate, document, and control project risks that impede successful project delivery Provide effective and regular communication within the project team and to stakeholders, sponsors and management team SailPoint experience REST API Experience Experience with Identity Management, Access Management, Role Based Access Control, User Access Certification Mainframe experience (RACF/ACF2) Identify resource needs for the project and establishes roles, expectations, goals with team members, and manages project resource tracking Ability to multi-task and assume other roles e.g. business analysis, test management, change management etc. Conduct analysis to drive business process and project improvements Experience with IAM principles and technologies preferred Strong communication skills – verbal, written and presentation; ability to adapt content to various audiences and communicate effectively at all levels of the organization. Demonstrated skills and capabilities in influencing and negotiating Highly detail-oriented individual with exceptional organization skills, including ability to work independently or as part of multiple teams. Strong analytical and innovative problem-solving skills with the proven ability to exercise flexibility and judgment in assessing business issues and risks in a dynamic environment Some after-hours support required Preferred Technical and Professional Experience Familiarity with networking concepts Experience with relational databases and SQL Good understanding of JAVA/J2EE development platform Experience in XML processing/technologies Technical knowledge of wide range of systems, platforms Understanding building and managing infrastructure systems Knowledge of Active Directory Organizational Units, groups and user attributes Basic understanding of authentication protocols such as LDAP and SAML Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 2 months ago

Apply

6 - 10 years

15 - 25 Lacs

Bengaluru

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Infrastructure Architects are the key link between Kyndryl and our clients. You’re in a technical leadership role, uniting and guiding stakeholders from clients, governance, and project executives to delivery and sometimes even the vendors who work with the client. You’ll be there from the start of a project — understanding what’s needed and figuring out the best technical solution. And you’ll be there at the finish, delivering the right product on time and within budget. As an Infrastructure Architect, you’ll draw upon the full breadth of your talent and experience. This is a technical leadership role, so we want you to bring your vision, knowledge, and leadership to each project. To the client, you’re the subject matter expert – consulting early, gathering inputs, understanding what they need from our solution. You define what Kyndryl can do to meet this solution. You design the best solution for the job. And finally, you’re the tech leader for implementation. At Kyndryl we support all major cloud platforms, so you’ll get the chance to use everything you know – and then some. You’ll also become expert at knowing when and how to call on other SMEs outside your wheelhouse. Thinking your way around pre-existing limitations will grow your creativity and flexibility. You’ll learn a lot here, and if you want to work toward certifications there are plenty of opportunities.The rewards for all this are many. You’ll get to influence, create, and deliver something from start to finish. You will have the power to delight our clients. Your future at Kyndryl This role opens the door to many career paths, both vertical and horizontal, and there may be opportunity to travel. It’s a great chance for database administrators or other techs to break into the cloud. It’s also a solid path to become enterprise or chief architect or a distinguished engineer! Whatever you see for yourself, you’ll find the opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience 5 years of experience in Active Directory Migration Ensure the assigned projects are completed within budgets and schedules while meeting business objectives Identify, analyze, mitigate, document, and control project risks that impede successful project delivery Provide effective and regular communication within the project team and to stakeholders, sponsors and management team SailPoint experience REST API Experience Experience with Identity Management, Access Management, Role Based Access Control, User Access Certification Mainframe experience (RACF/ACF2) Identify resource needs for the project and establishes roles, expectations, goals with team members, and manages project resource tracking Ability to multi-task and assume other roles e.g. business analysis, test management, change management etc. Conduct analysis to drive business process and project improvements Experience with IAM principles and technologies preferred Strong communication skills – verbal, written and presentation; ability to adapt content to various audiences and communicate effectively at all levels of the organization. Demonstrated skills and capabilities in influencing and negotiating Highly detail-oriented individual with exceptional organization skills, including ability to work independently or as part of multiple teams. Strong analytical and innovative problem-solving skills with the proven ability to exercise flexibility and judgment in assessing business issues and risks in a dynamic environment Some after-hours support required Preferred Technical and Professional Experience Familiarity with networking concepts Experience with relational databases and SQL Good understanding of JAVA/J2EE development platform Experience in XML processing/technologies Technical knowledge of wide range of systems, platforms Understanding building and managing infrastructure systems Knowledge of Active Directory Organizational Units, groups and user attributes Basic understanding of authentication protocols such as LDAP and SAML Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 2 months ago

Apply

7 - 12 years

12 - 16 Lacs

Noida

Work from Office

Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : SailPoint IdentityNow Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities: Expected to be an SME. Collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Lead the planning and execution of security projects. Ensure project milestones are met within the defined timelines. Provide guidance and mentorship to team members. Professional & Technical Skills: Must To Have Skills: Proficiency in SailPoint IdentityNow. Strong understanding of identity and access management principles. Experience with security tools and technologies. Knowledge of security frameworks and regulations. Hands-on experience in implementing security solutions. Good To Have Skills: Experience with cloud security solutions. Additional Information: The candidate should have a minimum of 7.5 years of experience in SailPoint IdentityNow. This position is based at our Noida office. A 15 years full time education is required. Qualifications 15 years full time education

Posted 2 months ago

Apply

3 - 8 years

5 - 10 Lacs

Hyderabad

Work from Office

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Your typical day will involve utilizing your expertise in SailPoint IdentityIQ and other security tools to ensure the security of our organization's systems and data. You will collaborate with cross-functional teams to identify and mitigate security risks, implement security measures, and respond to security incidents. Roles & Responsibilities: Expected to perform independently and become an SME. Required active participation/contribution in team discussions. Contribute in providing solutions to work related problems. Collaborate with cross-functional teams to identify and mitigate security risks. Implement security measures to protect enterprise systems, applications, and data. Utilize SailPoint IdentityIQ and other security tools to ensure the security of systems and data. Respond to security incidents and conduct investigations to determine the root cause. Stay updated with the latest security threats and vulnerabilities to proactively address them. Assist in the development and implementation of security policies and procedures. Provide guidance and support to other team members on security best practices. Professional & Technical Skills: Must To Have Skills:Proficiency in SailPoint IdentityIQ. Strong understanding of security principles, concepts, and best practices. Experience in designing and implementing security solutions. Knowledge of network security protocols and technologies. Familiarity with security frameworks and compliance standards. Good To Have Skills:Experience with security incident response and forensic analysis. Recommendation:Familiarity with other identity and access management (IAM) tools. Additional Information: The candidate should have a minimum of 3 years of experience in SailPoint IdentityIQ. This position is based at our Hyderabad office. A 15 years full time education is required. Qualifications 15 years full time education

Posted 2 months ago

Apply

7 - 11 years

10 - 14 Lacs

Hyderabad

Work from Office

Project Role : Application Lead Project Role Description : Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have skills : SAP Governance Risk and Compliance (SAP GRC) Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years of full time education Summary : 8+ years work experience in SAP Authorizations, Users & Access Management Services in S/4 HANA, BW 4/HANA, Fiori, GTS, PO, BO/BOBJ and SAP GRC Access Control 10 and/or later versions. Good technical skills and ability to support ERP Systems; IT transformation experience in a global company, preferably in a FMCG and/or FMCH context having understanding of modern User & Access Management concepts and best practices; Demonstrate understanding in formulating strategies, alternatives and recommendations in information security management. Ability to evaluate risk and communicate it in a fact-based manner. Proficient in Application Management Methodologies and IT Governance. Can communicate solutions, ideas, suggestions to a variety of stakeholders effectively and comprehensibly, ability to defend the Core Model position. Strong experience in IT general controls (ITGCs), Sox Audits and Internal Control best practices. Significant experience in IT service management and tools (ITIL, ServiceNow, Jira) Team coordination/management skills; Proven ability to lead and work independently in multi-cultural environment and facilitating workshops; Experience in Project Management, involving Agile and Digital methodologies. At ease with Microsoft Office tools, and in general with IS tools. Experience with multi-geography, multi-tier service design and management. Knowledge of technological trends. Qualifications 15 years of full time education

Posted 2 months ago

Apply

7 - 12 years

9 - 14 Lacs

Coimbatore

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Your typical day will involve designing and implementing security solutions, collaborating with cross-functional teams, and ensuring the integrity and confidentiality of data. Roles & Responsibilities: Expected to be an SME, collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Design and implement security solutions to protect the organization's cloud infrastructure. Collaborate with cross-functional teams to ensure the integrity and confidentiality of data. Conduct risk assessments and develop strategies to mitigate security risks. Stay up-to-date with the latest security trends and technologies. Ensure compliance with industry standards and regulations. Train and educate employees on security best practices. Professional & Technical Skills: Must To Have Skills:Proficiency in Security Architecture Design. Strong understanding of cloud security principles and best practices. Experience with cloud security technologies and tools. Knowledge of network security protocols and technologies. Familiarity with security frameworks and standards such as ISO 27001 and NIST. Good To Have Skills:Experience with cloud platforms such as AWS or Azure. Experience with security incident response and management. Knowledge of threat intelligence and vulnerability management. Understanding of identity and access management concepts. Solid grasp of encryption and cryptographic techniques. Additional Information: The candidate should have a minimum of 7.5 years of experience in Security Architecture Design. This position is based at our Mumbai office. A 15 years full time education is required. Qualifications 15 years full time education

Posted 2 months ago

Apply

17 - 21 years

11 - 15 Lacs

Bengaluru

Work from Office

About The Role – Cyber Security Lead This is a senior level role that needs expertise in leading a security team to design & implement solutions, adherence to various compliance policies & regulations and managing the security technologies effectively that will enhance overall security across the enterprise. Need to have specialization in various security technology to support overall security operations for Data, Cloud & network security and strategic thinking with a hands-on approach to problem-solving, excellent stakeholder management, communication skills, proven experience driving cross-functional cybersecurity initiatives, continuously identify risks and enforce robust security controls that should result in an improved security posture without compromising on end user experience. Technology Expertise and leadership skills Lead the Cybersecurity operations team with a strong focus on DLP, Data protection, Cloud & Network security governance. Hand-on experience on security tool governance and control effectiveness to maintain the compliance on Data protection, Cloud & network security control. Expertise on security control program (Email security, Data protection, Network & Cloud security) and drive continuous improvements. Define, develop & execute cybersecurity strategies aligned with Business goals and regulatory requirements. Good understanding on Perimeter security control, Lateral movement, Web security & private access, Clou security posture & data security management, DLP operation & Incident management. Proven experience on security controls implementation, operation monitoring on data classification, data handling and sensitive data movement across the endpoints, cloud & network. Provides expertise and guidance on potential issues & risks remediations, enhancements, or delay experience in technology security areas to include cloud, data, storage, data access management, and emerging technologies resilience activities (Endpoint, Network security), security standards, policies & procedures, and control frameworks. Participate in security architecture review, security control assessment & support Audit. Expertise on operation management & governance to meet SLA metrics, health & compliance dashboards readiness, and reporting to the leadership. Strong leadership and team-building abilities. Education Bachelor or Master’s degree in computer science, Information Security, Cybersecurity, or a related field Relevant certifications such as CISM, CISSP, CISA or equivalent are highly desirable Experience 15+ years of experience in cybersecurity with at least 5 years in a team lead role. Proven track record of implementation and executing cybersecurity strategies & governance in a complex & fast paced environment In-depth knowledge of cybersecurity tools, technologies, best practices. About The Role ? ? ? ? About The Role – Cyber Security Lead This is a senior level role that needs expertise in leading a security team to design & implement solutions, adherence to various compliance policies & regulations and managing the security technologies effectively that will enhance overall security across the enterprise. Need to have specialization in various security technology to support overall security operations for Data, Cloud & network security and strategic thinking with a hands-on approach to problem-solving, excellent stakeholder management, communication skills, proven experience driving cross-functional cybersecurity initiatives, continuously identify risks and enforce robust security controls that should result in an improved security posture without compromising on end user experience. Technology Expertise and leadership skills Lead the Cybersecurity operations team with a strong focus on DLP, Data protection, Cloud & Network security governance. Hand-on experience on security tool governance and control effectiveness to maintain the compliance on Data protection, Cloud & network security control. Expertise on security control program (Email security, Data protection, Network & Cloud security) and drive continuous improvements. Define, develop & execute cybersecurity strategies aligned with Business goals and regulatory requirements. Good understanding on Perimeter security control, Lateral movement, Web security & private access, Clou security posture & data security management, DLP operation & Incident management. Proven experience on security controls implementation, operation monitoring on data classification, data handling and sensitive data movement across the endpoints, cloud & network. Provides expertise and guidance on potential issues & risks remediations, enhancements, or delay experience in technology security areas to include cloud, data, storage, data access management, and emerging technologies resilience activities (Endpoint, Network security), security standards, policies & procedures, and control frameworks. Participate in security architecture review, security control assessment & support Audit. Expertise on operation management & governance to meet SLA metrics, health & compliance dashboards readiness, and reporting to the leadership. Strong leadership and team-building abilities. Education Bachelor or Master’s degree in computer science, Information Security, Cybersecurity, or a related field Relevant certifications such as CISM, CISSP, CISA or equivalent are highly desirable Experience 15+ years of experience in cybersecurity with at least 5 years in a team lead role. Proven track record of implementation and executing cybersecurity strategies & governance in a complex & fast paced environment In-depth knowledge of cybersecurity tools, technologies, best practices.

Posted 2 months ago

Apply

5 - 8 years

5 - 9 Lacs

Noida

Work from Office

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: OKTA - Identity and Access Management. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 2 months ago

Apply

3 - 6 years

5 - 10 Lacs

Pune

Work from Office

About PhonePe Group: PhonePe is Indias leading digital payments company with 50 crore (500 Million) registered users and 3.7 crore (37 Million) merchants covering over 99% of the postal codes across India. On the back of its leadership in digital payments, PhonePe has expanded into financial services (Insurance, Mutual Funds, Stock Broking, and Lending) as well as adjacent tech-enabled businesses such as Pincode for hyperlocal shopping and Indus App Store which is India's first localized App Store. The PhonePe Group is a portfolio of businesses aligned with the company's vision to offer every Indian an equal opportunity to accelerate their progress by unlocking the flow of money and access to services. Culture At PhonePe, we take extra care to make sure you give your best at work, Everyday! And creating the right environment for you is just one of the things we do. We empower people and trust them to do the right thing. Here, you own your work from start to finish, right from day one. Being enthusiastic about tech is a big part of being at PhonePe. If you like building technology that impacts millions, ideating with some of the best minds in the country and executing on your dreams with purpose and speed, join us! PhonePe Workforce Manager job description mentioned below: Forecasting, Planning & Scheduling Develop full scale capacity plans, associate communication documents, define key variables and create strategies for risk mitigation and contingency planning. Identify and analyse Inter-Day & Intra-Day Volume trends, anomalies and developing various statistical models to effectively plan for similar trend . Administer the usage of various WFM tool and models (such as Erlang) to create fully optimized schedules to enhance business efficiency. Access Management Design and implement support channel solutions like Call routing, ACD, IVR, Ubona workflow etc. as per operational requirements and attain the most eminent productivity. Periodic audits report on the access levels for the users active and deactivated on the systems, identify deviations and drive remediation activities for any noncompliance. Understanding the gaps with the current Technology/System/Tools and work with product team to improve technology and processes based on industry best practices. Execution Driving real time operational performance through centralized command centre by ensuring apt Break/Schedule Adherence & Reduction of Wrap/Hold thereby leading to reduction in AHT Develop and deploy effective load balancing workflow assignments to ensure parity and prioritization across sites, processes are well managed for their respective BUs. Initiate alarm / red flag through systems and proactive communications to all stakeholders highlighting any anomalies on the volume inflow which would adversely impact the business metrics. Reporting Create & Manage BI Dashboards for the operational teams, identify improvement opportunities, mitigate with action plans, review and track daily for the progress with operations team. Prepare, analyze and review the key business metrics in a periodic manner, surface the right insights to the operational leadership team for high-quality decision making. Commercials Daily billing trackers to be published to all stakeholders (internal and external) thereby keeping a close tab on the projections vs actual delivery. Initiating payments to service providers in accordance with pre-agreed terms after validation of billing files. People Practices Hiring the right staff, provide them with adequate support, motivate them to go extra mile, create a high-performance culture and retain the workforce talent pool by rewarding them for their work. Responsible for coaching, mentoring, evaluating and developing next line leaders in the WFM team. Setting up realistic, measurable goals for the team, monitor teams performance against these goals, providing documented feedback on the performance and track for the progress on the feedbacks. PhonePe Full Time Employee Benefits (Not applicable for Intern or Contract Roles) Insurance Benefits - Medical Insurance, Critical Illness Insurance, Accidental Insurance, Life Insurance Wellness Program - Employee Assistance Program, Onsite Medical Center, Emergency Support System Parental Support - Maternity Benefit, Paternity Benefit Program, Adoption Assistance Program, Day-care Support Program Mobility Benefits - Relocation benefits, Transfer Support Policy, Travel Policy Retirement Benefits - Employee PF Contribution, Flexible PF Contribution, Gratuity, NPS, Leave Encashment Other Benefits - Higher Education Assistance, Car Lease, Salary Advance Policy Working at PhonePe is a rewarding experience! Great people, a work environment that thrives on creativity, the opportunity to take on roles beyond a defined job description are just some of the reasons you should work with us. Read more about PhonePe .

Posted 2 months ago

Apply

6 - 11 years

10 - 15 Lacs

Bengaluru

Work from Office

The Identity and Access Management (IAM) team provides services for Nokia's workforce and business-to-business domains. Our diverse global team maintains over a dozen IAM-related services in legacy on-premises and modern cloud landscapes. Nokia IAM is currently focused on renewing services to leverage cloud platform capabilities. We are seeking an experienced Red Hat IdM specialis t to support Nokia Identity Management services in a third-tier support role. Solve service problems and escalated incidents. You have: Bachelor's degree in computer science with 6+ years of hands-on experience with Red Hat Linux operating system (or other Linux operation systems) and 2+ years of hands-on experience with Red Hat Identity Management (IdM). Strong understanding and hands-on experience with Red Hat IdM server and client installation and configuration and with Red Hat IdM operations (users/groups/hosts management, policies configuration, etc). Strong understanding and hands-on experience with different services on Linux operating system (certificate system, Kerberos KDC, DNS Server, NTP Server, etc). Strong knowledge on LDAP. Experience in shell scripting. It would be nice if you also had: Experience in Perl or Python Knowledge on cloud services such as Azure and GCP. Knowledge on NIS (Network Information System). Knowledge on other identity management products. Solve complex/technical problems in IDM services. Perform recurrent maintenance tasks on all IDM components. Monitor the current environment and take proactive actions to maintain the service. Participate in service upgrade and enhancement deployments. Mentor junior team members. Interface with IdM T2 support, Service Delivery Management, and surrounding subject matter experts.

Posted 2 months ago

Apply

10 - 15 years

10 - 14 Lacs

Bengaluru

Work from Office

As a Senior Full-Stack .NET Developer in IAM team, you will play a crucial role in enhancing and modernizing our security services. Collaborating with a diverse, global team, you will develop and maintain Windows desktop and ASP.NET Core web applications while implementing secure Azure integrations. Emphasizing a culture of innovation and continuous learning, you will engage in architectural discussions and participate in code reviews, contributing to the enhancement of security measures across our platforms. Our dynamic work environment fosters self-motivation and adaptability, allowing you to rapidly integrate new technologies and refine your skills while directly impacting cloud transformation efforts You have: Bachelor's degree in computer science, information technology, or electronics and communication with 10+ years of experience in .NET development, focusing on C# and .NET Core/Framework Proficiency in ASP.NET Core Identity configuration and customization Deep understanding of Active Directory concepts and integration Extensive experience with Azure services, including Key Vault and AAD integrations It would be nice if you also had: Experience with Windows Presentation Foundation (WPF) or Universal Windows Platform (UWP) Knowledge of structured logging (Serilog, NLog), Application Insights integration, and custom telemetry Proficiency with Git and Microsoft CI/CD platforms Relevant certifications (e.g., Microsoft CertifiedAzure Developer Associate) Develop and maintain Windows Forms and ASP.NET Core applications to enhance IAM services. Design and implement secure integrations with Azure services, focusing on Key Vault and Active Directory. Optimize database solutions using Entity Framework Core for performance and security. Implement and oversee application security measures, ensuring compliance with industry standards. Conduct code reviews and participate in architectural discussions to drive best practices. Utilize Azure DevOps pipelines for streamlined deployment, monitoring, and continuous integration. Mentor junior developers, fostering an environment of continuous learning and growth within the team. Collaborate with cross-functional teams to address IAM challenges and drive strategic initiatives.

Posted 2 months ago

Apply

3 - 8 years

5 - 15 Lacs

Pune

Work from Office

We are looking for an Identity and Access Management consultant. The main scope of work includes everything from IAM project design and development, implementation, administration and support. Expertise in at least one IAM tools preferably One Identity . Requirement Strong knowledge of Identity and Access Management project design, development, implementation, administration, and support. Hands-on experience in IaaS (Identity as a Service) projects and knowledge in Cloud Platform Hands-on experience in Single Sign-on (SSO) implementation. Hands-on experience in Java development Experience in implementing federation for configuring cross domain single sign-on for third-party products. Hands-on experience in Directory Services (LDAP, AD, etc.). Experienced in Windows and Linux based operating systems. Highly motivated team player with a result-oriented approach and good communication skills. Technical Skills Proficient in One Identity Manager Experience in IAM Solutions like One Identity, Oracle, SailPoint, ForgeRock, Saviynt, Okta, PingFederate and Ping Access Hands-on Experience on Installations and configurations of Tools for SSO, Federation and MFA Experience in Identity and Access Management domain with specializing in User Provisioning, RBAC, Certification, SOD and workflows Experience in any development languages Java - preferred, NET, Python and shell scripting Hands-on experience in developing custom event handlers, schedulers, custom workflows. Interact with clients, including working with client teams in an onsite and offshore delivery model Contribute to requirements gathering, design documentation by conducting workshops in onsite/offshore delivery model Customize, configure and develop IAM solution integrations using requirements and design Explore new IAM technologies with guidance from team leads Raise technical risks and assist in process compliance activities Assist with creation and review of technical documents Work on IAM strategy engagements.

Posted 2 months ago

Apply

5 - 10 years

6 - 16 Lacs

Pune

Work from Office

We are seeking a highly skilled and experienced Saviynt Architect to join our Enterprise Security department. The ideal candidate will have 5 to 10 years of experience in designing and implementing Saviynt solutions for enterprise-level organizations. As a Saviynt Architect, you will play a critical role in ensuring the security and compliance of our systems and applications. Roles and Responsibilities: Design and implement Saviynt solutions to meet the security and compliance requirements of our organization. Configure the REST connector with different platform applications. Hands-on experience on JAVA with respect to IGA. Good to have experience who worked on heavy Saviynt instance of 1L+ users. Configure the child applications and direct integrations. Good to have knowledge on SAP, ABAP connect, SCIM connector and SAP cloud application provisioning. Must hands on experience on Success factor, SAP HANA connector and JDBC connector. Must hands-on experience on Saviynt features like Custom action, Technical and user update rules, endpoints, analytics, SODs, Certifications, Service Accounts, custom integrations, connections, roles, RBAC, DB structure and SSO etc. Collaborate with cross-functional teams to gather requirements and define the scope of Saviynt projects. Develop and maintain technical documentation, including architecture diagrams, design specifications, and implementation plans. Configure and customize Saviynt modules to align with our organization's security policies and procedures. Conduct regular audits and assessments to identify vulnerabilities and recommend remediation actions. Provide technical guidance and support to the Saviynt implementation team, ensuring successful deployment and integration of Saviynt solutions. Stay up to date with the latest industry trends and best practices in Saviynt architecture and enterprise security. Qualifications: Bachelors degree in computer science, Information Technology, or a related field. 5 to 10 years of experience in the Enterprise Security domain, with a focus on Saviynt architecture and implementation. Strong knowledge of Saviynt modules, including Identity Governance and Administration (IGA), Access Request and Certification, and Access Analytics. Experience in designing and implementing Saviynt solutions for large-scale organizations. Proficient in programming languages such as Java, Python, or PowerShell. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams. Our Offer: A position in an established, high-growth company headquartered in Germany with flat hierarchies and efficient decision-making. High degree of personal responsibility and a large scope for independent decision-making. Many opportunities and support for personal and professional development.

Posted 2 months ago

Apply

1 - 5 years

6 - 11 Lacs

Pune

Work from Office

Siemens Digital Industries Software is a leading provider of solutions for the design, simulation, and manufacture of products across many different industries. Formula 1 cars, skyscrapers, ships, space exploration vehicles, and many of the objects we see in our daily lives are being conceived and manufactured using our Product Lifecycle Management (PLM) software. Key Responsibilities: You will be part of our development team that works on business applications. As a Senior Java developer team member, you must contribute to the designing and development of an IAM (Identity & Access Management) based micro-services. Implement software programming for products (both internal and external) with focus on surpassing customer expectations, on achieving high quality and on-time delivery. Responsible for ensuring the overall functional quality of the released product on all required platforms and mechanism. Ability to understand complex products, solutions, and problems. Promotes innovation through the ability to introduce new technology/knowledge into multiple areas of a product and to our people. Able to solve the most complex of technical problems. Works without supervision on the most complex projects with complete latitude for independent judgment and technical expertise. Advanced knowledge of the field. Assist with less experienced peers. About The Role : We are looking for a Senior Developer with extensive experience in Identity and Access Management (IAM) solutions majorly with Java/ Spring Boot background. The ideal candidate will have a deep understanding of SAML, OIDC, and OAuth 2.0 protocols, as well as expertise in Single Sign-On (SSO) and Single Logout (SLO) mechanisms. Experience with enterprise IAM solutions such as Microsoft Entra, Auth0, and Okta is essential. Technical mandatory requirement: Develop the microservices in Java/ Spring boot for IAM domain. Should have strong hands-on coding experience in Java, Spring boot based applications. Design, develop, and implement IAM services using SAML, OIDC, SCIM1.1 SCIM2.0 and OAuth 2.0 protocols. Good Experience of designing and implementing high performance and scalable APIs. Configure and manage SSO and SLO functionalities across various applications and platforms. Good understanding of Standard RFC "˜s that define the Authorization Best Practices. Integration experience on enterprise IAM solutions like Microsoft Entra, Auth0, and Okta. Collaborate with cross-functional teams to ensure seamless integration of IAM solutions. Troubleshoot and resolve IAM-related issues and provide technical support. Stay updated with the latest trends and best practices in IAM and security protocols. Conduct security assessments and audits to ensure compliance with industry standards. Implement and manage Policy-Based Access Control (PBAC), Role-Based Access Control (RBAC), Multi-tenancy, and Attribute-Based Access Control (ABAC). Work with AWS and Azure environments. Good hands-on experience on EKS and Docker Technology. Good to havePython, Golang We are Siemens A collection of over 377,000 minds building the future, one day at a time in over 200 countries. We're dedicated to equality, and we welcome applications that reflect the diversity of the communities we work in. All employment decisions at Siemens are based on qualifications, merit, and business need. Bring your curiosity and creativity and help us shape tomorrow! We offer a comprehensive reward package which includes a competitive basic salary, bonus scheme, generous holiday allowance, pension, and private healthcare. Siemens Software. "˜Transform the every day"™ and "˜Accelerate transformation."™ #LI-PLM #LI-Hybrid, #SWSaaS

Posted 2 months ago

Apply

2 - 6 years

12 - 16 Lacs

Pune

Work from Office

Hello eager tech expert! To create a better future, you need to think outside the box. That"™s why we at Siemens need innovators who aren"™t afraid to push boundaries to join our diverse team of tech gurus. Got what it takes? Then help us create lasting, positive impact! Siemens Corporate Technology "India Tech Hub" is at the forefront of driving digital transformation and enabling the integration of artificial intelligence into the fabric of industrial solutions. As a pivotal innovation center, the Tech Hub is dedicated to harnessing the power of AI to revolutionize the future of work. With a focus on customer-centric solutions, Siemens India Tech Hub is a beacon for exploring industrial AI use cases, ensuring that Siemens remains a global leader in the digital era. You"™ll break new ground by To provide solution expertise in End User Computing (EUC), specializing in Identity and AccessManagement (IAM), Intune Administration & MDM Expertise. Intune Administration & MDM ExpertisePossesses advanced skills in Autopilot deployment, managing and troubleshooting MDM-related issues, and enforcing compliance and security policies. Software Packaging & DeploymentPowerShell scripting, App-V, InstallShield, and AdminStudio for application packaging and deployment. Identity & Access ManagementDefine and govern Azure Active Directory (AAD), Group Policy (GPO), and Microsoft Entra ID, ensuring secure access control and user identity management. Browser Management & PoliciesConfigure and Manage browser policies via Intune to optimize security and performance. Automation & ReportingProvide data reporting using power BI and automation using Power Automate to streamlet processes & enhance team efficiency. A proactive professional with a robust problem-solving mindset, exceptional communication skills, and a dedication to optimizing IT operations and end-user support. You"™re excited to build on your existing expertise, including Bachelor"™s degree in computer science, Information Technology, or a related field. At least 7 years of experience in End User Computing (EUC), Identity and Access Management (IAM), Intune Administration & MDM. Experience with Power BI, Power Automate and other M365 tools. Excellent analytical, problem-solving, and communication skills. Ability to work independently and as part of a team. Experience in ITIL process definition and implementation. Knowledge of Agile methodologies and experience working in a Scrum team. Strong understanding of M365 tooling architecture. Create a better #TomorrowWithUs! We value your unique identity and perspective and are fully committed to providing equitable opportunities and building a workplace that reflects the diversity of society. Come bring your authentic self and create a better tomorrow with us. Protecting the environment, conserving our natural resources, fostering the health and performance of our people as well as safeguarding their working conditions are core to our social and business commitment at Siemens. This role is based in Pune. You"™ll also get to visit other locations in India and beyond, so you"™ll need to go where this journey takes you. In return, you"™ll get the chance to work with international team and working on global topics.

Posted 2 months ago

Apply

6 - 10 years

15 - 25 Lacs

Bengaluru

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all – at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science – taking information that has been gathered and looking for areas to have that “Ah Ha” moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity – governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience Experience: Minimum of 4-6 years of relevant experience in CyberArk administration and cybersecurity practices, with proven hands-on experience in Privileged Access Management (PAM) using PSM/PSMP. CyberArk Privilege Cloud Management : Proven experience managing CyberArk SaaS Privilege Cloud and its associated components infrastructure. Tenant Management and Cloud Connectors: Strong understanding of Tenant Management, Secure Tunnel, and Cloud Connectors within CyberArk. CyberArk Onboarding : Experience managing CyberArk onboarding activities, including onboarding accounts via RESTAPI, manual onboarding, and bulk onboarding processes. Platform and Safe Creation: Ability to create new safes, accounts, and platforms in CyberArk and link new platforms to the CyberArk environment. Privileged Account Management: Securely managing and monitoring privileged account access to target hosts using Privileged Session Manager (PSM) and Privileged Session Manager Proxy (PSMP). LDAP & AD Federation : Strong knowledge of LDAP and AD Federation. Familiarity with secure integrations with external services such as LDAP/S and RADIUS. CyberArk PAS Components Knowledge: Familiarity with various CyberArk PAS components, including: Privilege Access Suite (PAS) Secure Password Vault and Safes Password Vault Web Access (PVWA) Central Policy Manager (CPM) Privileged Session Manager (PSM & PSMP) Application Identity Manager (AIM), Central Policy (CP), and Central Credential Provider (CCP). Password Management & Compliance: Experience managing privileged account passwords, including verification, change, and reconciliation, ensuring compliance with organizational policies. Session Management: Understanding of user sessions directed through PSM and PSMP for monitoring and auditing. Policy and Reporting: Experience in creating/modifying master policies, and generating reports on safes and user activity. Health Checks & Monitoring: Performing health checks on CyberArk infrastructure and monitoring various components to ensure system integrity and uptime. Troubleshooting & Configuration: Ability to troubleshoot configuration and connectivity issues related to PAM services and components, including network connectivity issues and load balancing. Server Administration: Proficient in Linux Red Hat 7/8, Windows Server 2016/2019/2022 administration. Database and Directory Services: Knowledge of managing database targets, LDAP, AD, and IAM systems. PowerShell & Python Knowledge: Basic knowledge of PowerShell and Python scripting for automation and system integration is a strong advantage. Networking Concepts: Understanding of networking concepts, including firewalls, routing, and load balancing. Disaster Recovery & Failover: Solid knowledge of CyberArk disaster recovery, failover, and failback mechanisms to ensure availability and business continuity. Vault Data Backup: Experience in Vault Data Backup processes for ensuring critical data is securely backed up and protected. Change Management: Proven experience in managing change processes, including preparing and executing delivery plans during Change Advisory Board (CAB) reviews. Incident Handling: Responsible for managing complex and escalated incidents and requests with a focus on resolving issues efficiently. KPI Compliance: Ensuring adherence to KPI metrics for incident and service request resolution, including timely communication and escalation procedures. Stakeholder Communication: Providing input and updates to stakeholders involved in critical incidents, particularly during outages or system failures. Preferred Technical and Professional Experience CyberArk Certifications: Certification as CyberArk Defender, Sentry, or CPC-PAM would be a plus. Troubleshooting Expertise: Advanced troubleshooting skills for identifying and resolving configuration, connectivity, and system performance issues related to PAM services. Report Generation: Experience using CyberArk’s PAS Reporter and Telemetry tools to generate and analyze operational reports. Team Collaboration: Ability to work as a key team player, participating in regular team reviews and contributing to continuous improvement. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 2 months ago

Apply

1 - 3 years

5 - 8 Lacs

Bengaluru

Work from Office

As a Zendesk Identity Access Management (IAM) Engineer you will be responsible for designing, configuration, testing, implementation, and maintaining systems and solutions that control access to the organizations resources, sensitive information, and data. The primary goal of this role is to ensure that only authorized individuals have access to these resources, while preventing unauthorized users from gaining entry. What you get to do every day as an IAM Engineer Day to day management and monitoring of Identity management tools and Public Cloud tooling (e.g., MFA, Security Token, OAUTH, AWS, Okta, Atlassian, and BigFix) and maintains appropriate configurations and access policies. Direct experience administering IAM related SaaS applications. Review and lead the gathering of business, functional and technical requirements for establishing an Okta Identity platform. Review updates and new features of Okta and make recommendations for implementation to the environment. Defines and enforces business process strategy, entitlement and access management Manages app integration requests including SSO and User Lifecycle Management Manages IDM environment including all related processes, Access Groups, Service accounts, Sandbox access, API configuration. Proactively identify & resolve IAM lifecycle management related issues Work with stakeholders and other team members to clarify business requirements, remove roadblocks and gain alignment while adhering to internal governance processes while. Works with business partners to gather information and requirements. Defines Scope, and works to identify potential issues / limitations capabilities, recommends solutions and drives work to completion Maintains and reviews existing processes. Works to continuously update and improve end to end processes. Maintains and reviews IAM documentation ensuring all documentation is kept up to date with current Zendesk IAM policies and procedures. Translates requests from Business partners into Jira Stories and Epics What you bring to the role: 1-3 years experience in an IT Operations role or educational equivalent; ideally in CS/IS or holds Bachelors degree. Strong understanding of day to day management of Okta for group and user management, app provisioning tasks, app intake and deprecation, etc. Working knowledge of all main areas of the Okta product including Identity Engine, Universal Directory, and Adaptive MFA. Working knowledge of Cloud Authentication and Access management Services. Possess a solid understanding of identity management and security policy concepts, protocols, and best practices Direct experience administering IAM related SaaS applications. Hands-on experience integrating applications with Okta SSO (SAML, OIDC, SWA, Etc.) Able to effectively present SSO concepts to stakeholders with various levels of technical understanding Working knowledge of Okta Workflows and high level programming concepts is a plus. Works well across geographies/timezones as a member of a global organization. Availability during normal business hours with flexibility based on business requirements, must be able to travel 10% of the time Value & Organizational Skills Excellent verbal and written communication skills Passion for continuous learning and professional growth. Able to make difficult and quick decisions daily with limited supervision and often with competing priorities and varying degrees of urgency. Possess a passion for continuous learning and professional growth. Recognizes and adjusts communication style to account for a diverse global workplace. Highly developed negotiation, facilitation and consensus building skills. Preferred Okta Certified Administrator or higher Zendesk endeavors to make reasonable accommodations for applicants with disabilities and disabled veterans pursuant to applicable federal and state law.

Posted 2 months ago

Apply

5 - 7 years

15 - 25 Lacs

Hyderabad, India

Work from Office

Position - SailPoint or Saviynt SME Exp - 5-7 Yrs Location - Hyderabad SME for SailPoint IdentityIQ, ISC and/or Saviynt platforms. Lead the design, implementation, and support of identity governance solutions Perform Role Based Access Controls RBAC

Posted 2 months ago

Apply

3 - 6 years

5 - 8 Lacs

Pune

Work from Office

The Security and Controls Associate will handle Access Management, Security and Controls for ERP, AX 2012 and other Apps like TM1, HFM, Trintech, Tagetik, Banking portals. Work closely with Ongoing Projects for EUT / UAT. What will you be doing? Managing Access Management including system controls in Tagetik Application. This should cover the following modules - Reconciliation (similar to Trintech or Blackline) Financial Controls (similar to Trintech or Blackline) Financial Reporting (similar to HFM and TM1) Month end close (similar to Trintech or Blackline). Closely work with the team for Access Controls review and submission process. Responding to Auditors basis audit samples with clear documentation Involved in UAT process across all applications. Creation of Process SOPs and other relevant documentation. Collaborate closely with business collaborators to identify SOD conflicts and vital remedies. What will you need to be Successful? B.com Degree or equivalent in Accounting, Finance, Business Management or other business-related field required Strong business insight and honesty with the ability to interact effectively with colleagues in all functions and levels Ability to work in a high-performing team environment Established proficiency in carrying out large scale strategies and global projects while meeting and/or exceeding customers expectations. Proficiency in English - Good verbal and written communication skills. You. Unlimited We believe in crafting the greatest good for society. Our strongest investments are in our people and the patients we serve. Inclusion, Diversity and Equity - committed to welcoming, celebrating, and growing Diversity. Learn more about it on our website: https://www.smith-nephew.com/ . Other reasons why you will love it here! Your future: Major medical coverage + Policy exclusions and Insurance non-medical limit. Education Assistance. Work / Life balance: Flexible Personal / Vacation time off, Privilege leave, Floater leave, etc. Your Wellbeing: Parents / Parents-in-law s insurance coverage also available. Flexibility: Hybrid work model (for most professional roles). Extra Perks: Free Cab Transport facility for all employees, one-time meal provided to all employees as per shifts, Night Shift Allowances.

Posted 2 months ago

Apply

6 - 11 years

8 - 13 Lacs

Hyderabad, Chennai

Work from Office

About us* Global Business Services is recognized for flawless execution, sound risk management, operational resiliency, operational excellence, and innovation. The Global Information Security (GIS) is responsible for protecting Bank information systems, confidential and proprietary data, and customer information. Cyber Security Technology (CST) is a globally distributed team responsible for cyber security innovation and architecture, engineering, solutions and capabilities development, cyber resiliency, access management engineering, data strategy, deployment maintenance, technical project management and information technology security control support. Teammates in this role deliver moderately complex tools and systems that mitigate the risk of malicious cyber-attacks. Job Description* Individuals in this role contribute to the protection of system boundaries, keeping computer systems and network devices hardened against attacks and secure sensitive data. It is important that those in this role actively create and nurture partnerships with peer teams and identify opportunities for cross-team collaboration. Individuals in this role operate within a structured environment with some oversight but are eager to take initiative and tackle complex problems within one or more security engineering domains. This role may mentor one or more junior team members Primary Level of Engagement: Works as a senior contributing member of an initiative, under supervision of an engineering lead. Primary Interactions: Direct Manager Engineering Lead Project Manager GIS Peers IT Stakeholders Internal GIS Customers Responsibilities* Identify, define, document, and implement security system requirements for AWS and Azure utilizing Wiz. Develop and execute test plans and produce quantitative results. Leverage broad knowledge of information security technologies, techniques, processes, and prepare to grow that knowledge within one or more security engineering domains. Drive complex technical information security projects to ensure on-time delivery. Identify and raise risks or potential vulnerabilities at all stages of the security- engineering process. Think outside the box to develop multiple solutions to complex problems. Work closely with a diverse set of stakeholders with varying priorities to debate and negotiate paths forward. Contribute to existing test suites (integration, regression, and performance), analyze test reports, identify any test issues/errors, and triage the underlying cause. Document and communicate required information for deployment, maintenance, support, and business functionality. Identify gaps in information security standards adherence and work with appropriate partners to develop plans to close gaps. Requirements* Education* :Bachelors Degree in Computer Science, or related technical discipline Certifications If Any: NA Experience Range* Minimum 6 years of related experience Foundational skills* Broad knowledge of information cloud security technologies, techniques and processes and excitement to grow that knowledge within one or more security-engineering domains. Experience with Wiz is a mandatory. Coding experience in Hashicorp Terraform AWS OPA, SCP, SecurityHub, Config, EventBridge, SSM, Azure Policy Experience with policy as code, CSPM, cloud/SaaS security management is helpful. Ability to communicate (verbal and written) across all levels of the organization, from technical experts to senior executives. Comfortable working with distributed team members using video conferencing, instant messaging, telephone calls, etc. Strong attention to detail, confident enough to raise questions and identify issues. Enjoys trouble shooting and puzzle solving. Desired skills Microsoft Defender a plus. Knowledge on Continuous Integration & Deployment tools DevSecOps Experience at a financial institution is a plus. Work Timings* 12.30 PM to 9.30 PM Job Location* Chennai / Hyderabad

Posted 2 months ago

Apply

12 - 14 years

30 - 37 Lacs

Pune

Work from Office

About The Role : Job Title - Technology Analyst Java Engineer Corporate TitleAVP Location Pune Role Description Technology Management is responsible for improving the technological aspects of operations to reduce infrastructure costs, improve functional performance and help deliver Divisional business goals. To achieve this, organization needs to be engineering focused. Looking for technologists who demonstrate a passion to build the right thing in the right way. Work includesPartnering with key internal stakeholders to translate bank strategy into objectives and plans for implementation supporting the delivery of world class technology solutions Take care of computer operations and production support, systems and database administration, network operations, and client service Ensuring systems performance and service level requirements are met Transferring business requirements into technical solutions or into Release Management What we'll offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy: Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Part of a global team, forging strong relationships with geographically diverse teams / colleagues and business to formulate and execute technology strategy. Focus of the individual must be on ensuring that we remain an engineering focused organization. We are looking for technologists who demonstrate a passion to think out of the box. Work with application platform supporting a wide variety of Alternatives funds and businesses globally. Work with technical specialists to develop in house solutions and support existing applications. Coordinate application life cycle, including access management, security, disaster recovery, day-to-day support, and business workflow management. Perform data analysis, identify data quality issues, and develop strategies for data cleansing and transformation. Design innovative, sustainable solutions which are congruent with the strategic direction of the Bank. Challenge the status quo and influences key stakeholders to ensure industry best practice is adhered to within their area of expertise. Ensure knowledge articles and documentation are up to date. Be responsible for IT Governance in line with company policies and regulations. Your skills and experience 12-14 + years of Hand on experience with Java & Spring Boot Experience with software development lifecycle (e.g. Agile, Waterfall) Expertise with relational databases like Oracle / MSSQL Excellent understanding of Microservice architectures and experience with REST API Experience with any of the public cloud like GCP / Azure / AWS Experience with application migration from On-Prem / Private cloud to Public cloud will be a plus Experience in a business aligned IT department of a financial institution Effective learning, problem-solving, decision-making capability Exposure to and inclination towards developing knowledge on AI / ML and Generative AI to identify, analyze and implement potential use cases. Strong verbal and written communication skills Self-starter, proactive and excellent team player with ability to work well under pressure in a fast-paced environment and always with professionalism. Ability to be open minded, learn new technologies on the job, share information, transfer knowledge. Enterprise technology knowledge and experience (e.g., application/data migration, architecture, infrastructure, data transfer methods (SFTP), application and database technologies) Experience with vendor hosted SaaS solutions and Identity and Access Management (IAM) will be a plus. Good understanding of risk frameworks, control environments and application governance. Skills and Experience That Will Help You Excel Bachelor of Science degree from an accredited college or university with a concentration in Computer Science or Software Engineering (or equivalent) Familiarity with Finance and specifically Asset Management industry, Alternative investments Positive attitude and a team player Proactive and ability to work independently Open to learn, adapt and solution with new technologies Defines and implements best practices, solutions and standards related to their area of expertise. How we'll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm

Posted 2 months ago

Apply

2 - 6 years

7 - 11 Lacs

Mumbai

Work from Office

About The Role : Job TitleInformation Security Analyst, AS LocationMumbai, India Role Description CRO DCO Resilience team Manages and Governs various risk types for Chief Risk Office (CRO) including but not limited to Information Security, Data Protection, Records Management, Business Continuity, Vendor / Third Party Risk Management (TPRM) The Resilience team in India is a part of CRO's Divisional Control Office (DCO) responsible for Governance on various risk types Information Security Analyst will be responsible for ensuring governance on information security and other risk types for various CRO Functions Information Security Analyst will support CRO DCOs efforts to identify, analyse and report the non-financial risks of the CRO Function, thereby ensuring that Group and Functional standards are consistently applied. The candidate is required to demonstrate very good understanding of risk management activities, paired with strong stakeholder management and Microsoft office skills. The role will have full exposure to all areas within CRO and requires working closely with a variety of stakeholders. The role has considerable scope for professional development across the Risk Management domain What we'll offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities As the Information Security & Technology Analyst your responsibilities will include (but not be limited to): Assume ISO ownership for assigned Risk applications Ensure execution of Information Security risk assessments and compliance evaluation Ensure implementation of controls for identified Information Security and Technology risks for designated business applications and functions Ensure implementation and maintenance of Identity and Access Management processes, as well as execution of periodical recertification of User Access Rights Ensure annual validation of key application documentation, including KOP and User access matrix for each assigned application and activities Provide timely updates to the DBISO and/or Risk Chief BISO regarding afore mentioned tasks Ensure accuracy of application entries regarding Information Security in the Group inventory of applications (NAR) Engage and create a positive network across external teams like Technology, respective functions, Chief BISOs, Risk type managers etc. Treatment of escalation questions regarding problems as well as assessments of potential violations of regulatory or internal guidelines regarding Information Security Cooperation in improving existing processes and workflows as well as independent implementation of new processes Regular attendance at scheduled meetings and telephone conferences, e.g., presentations of work results to senior decision-makers/workgroups, processing of meetings and telephone conferences (preparation of agendas, if needed, keeping the minutes) Management of urgent activities at short notice Management of enquiries from auditors and regulators Your skills and experience Core understanding of non-financial risk. Good understanding of risk management activities and internal control frameworks. Strong analytical skills to interpret and analyse data. The ability to successfully navigate a complex organisation, build strong relationships and work collaboratively with diverse stakeholders across the bank Very good Microsoft Office skills, particularly Excel and PowerPoint A sound knowledge of Information Security would be preferred along with Information Security Certifications / skills How we'll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs

Posted 2 months ago

Apply

5 - 10 years

8 - 13 Lacs

Pune

Work from Office

About The Role : Job TitleSenior Engineer, AVP LocationPune, India Role Description We are seeking a Data Security Engineer to design, implement and manage security measures that protect sensitive data across our organization. This role focusses on the execution and delivery of Data Security solutions, focusing on configuration, engineering, and integration within a complex enterprise environment. While the role operates within Cybersecurity the person will collaborate with IT, Risk Management, and Business Units on a case-by-case basis, delving Data Loss prevention solutions. The ideal candidate understands and manages the existing tool stack within a complex environment, navigates through technical integration challenges and supports the transition from legacy solutions to new solutions within the pillar and across different areas of the bank. This role will work on specific tools like Symantec DLP, Zscaler but require the flexibility to evaluate and integrate new solutions like PaloAlto, Fortinet, Microsoft Purview and capabilities in existing cloud security solutions like Azure/GCP. What we'll offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Policy Development and ImplementationDesign and implement data loss prevention policies, standards, and procedures to protect sensitive data from unauthorized access and disclosure. Risk AssessmentConduct regular assessments of our implementation to identify vulnerabilities and potential threats to the organization's data. Develop strategies to mitigate identified risks. DLP SolutionsEvaluate, deploy, and manage DLP solutions and technologies. Ensure that these tools are effectively integrated and configured to protect sensitive data across the organization. Monitoring and AnalysisMonitor data movement and usage to detect and respond to potential data breaches or policy violations. Analyse incidents to identify root causes and develop corrective actions. CollaborationWork with IT, legal, and business teams to ensure that DLP measures align with organizational goals and regulatory requirements. Provide guidance and support to stakeholders on data protection issues. Design and Implement data security frameworks, including encryption, tokenization and anonymization techniques within a hybrid environment Implement cloud-native security controls (e.g., CASB, CSPM, DSPM ) to protect data in SaaS, IaaS, and PaaS environments. Implement Digital Rights Management, encryption and tokenization strategies and solutions to protect data in hybrid environments and prevent unauthorized access and disclosure. Deploy and manage data discovery & classification tools to identify sensitive data across structured and unstructured sources. Implement automated classification and labeling strategies for compliance and risk reduction. Your skills and experience Technical Expertise 5+ years of hands-on experience in Data Security, Information Protection, or Cloud Security. Strong expertise in delivering Data Security platforms (Symantec, Netskope, Zscaler, PaloAlto, Fortinet, etc.). Knowledge of Cloud Service Provisioning and experience with Cloud Security (AWS, Azure, GCP) and SaaS data protection solutions. Experience with Cloud Security (CASB), SaaS Security Posture Management (SSPM), Data Security Posture Management (DSPM). Proficiency in network security, endpoint protection, and identity & access management (IAM). Scripting knowledge (Python, PowerShell, APIs) for security automation are a plus. Hands-on experience with AI/ML and data security related remediations are a plus. Soft Skills & Collaboration Strong problem-solving and analytical skills to assess security threats and data exposure risks. Ability to work cross-functionally with Security, IT, and Risk teams. Effective written and verbal communication skills, especially when documenting security configurations and investigations. Professional certifications such as CISSP, CISM, CCSP, GIAC (GCIH, GCFA), or CEH. How we'll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs

Posted 2 months ago

Apply

8 - 13 years

20 - 25 Lacs

Bengaluru

Work from Office

You ll have up to 35 reports under your scope of responsibility. You will be required to deliver technical work (as a senior technical architect) on Industries projects at 25% utilization and balance that with leading your team of Technical Consultants, Architects and Managers. You ll be responsible for hiring, training, and mentoring our Technical Consultants so they can implement successfully in turning the program design of our Solution Architects and Technical Architects into highest-quality solutions that meets the customers needs. Serve as a trusted advisor to the client, guiding customers and colleagues in rationalizing and deploying emerging technologies that drive increased business value Identify and lead internal critical initiatives to grow the Industries consulting practice; serving as an active contributor to the community s overall knowledge base and expertise Work closely on projects with Delivery Managers, Solution Architects, and directly with clients to architect technology solutions to meet client needs Lead Enterprise Architecture and Governance for an enterprise-level customer engagement. Serve as a trusted advisor to the client driving conversations with their Enterprise Architects and business stakeholders that shape the architectural vision, and establish a program architectural roadmap. Lead functional and technical workshops. Demonstrate leadership skills in designing, delivering, testing, and deploying. Lead a project team of developers focused on driving optimized solutions for our Industries clients leveraging Salesforce Service Cloud, Sales Cloud, and Experience Cloud Ensure the success of these teams while securing the highest CSAT and business outcomes Manage customer expectations; negotiate solutions to complex problems with both the customer and third-party stakeholders Establish trust with the customer s leadership, promoting and/or implementing best practices with SFI and Salesforce Highlight and manage risk areas in the solution in a proactive manner, and commit to seeing an issue through to completion Minimum Requirements: 18+ years of experience leading Salesforce technical consulting projects and handling individual contributors. 8+ years of people management experience Domain Experience in Telecommunication/Media Strong application design skills combined with strong data, integration, and security architecture skills Expertise in one or multiples of Industry Cloud, Sales/Service/Experience Cloud, and Vlocity OmniStudio Integration Architecture (Must have) Platform Security (Must have) Identity and Access Management / Integration Security Sharing and Visibility (Must have) Data Architecture and Management (Must have) Architectural Design Patterns Apex Design Patterns (Must Have) Salesforce/Apex, Triggers, Lightning Flows, Lightning, LWC, and experience with modern web and mobile technologies (HTML, CSS, JavaScript, Web Components, others) Proficiency in English Preferred Requirements: Salesforce Certification Preferred (Admin, Developer, Sales, and Service Clouds, Application Architect) OmniStudio Developer/Consultant Thorough individual with the ability to rapidly learn and take advantage of new concepts, business models, and technologies Strong communication skills, both written and verbal. Able to effectively develop materials that are appropriate for the audience A great listener with the ability to communicate with people in diverse roles Proven ability to analyze, design, and optimize business processes via technology and integration Resourceful and innovative thinker who can work through and solve problems Adept at navigating/mediating conflict and fostering healthy dialogue Strong interpersonal skills - nurture effective working relationships with others Exceptional analytical skills - experience overseeing and managing business metrics, productivity, and outcomes

Posted 2 months ago

Apply

2 - 4 years

8 - 12 Lacs

Gurugram

Work from Office

Company: MMC Corporate Description: We are seeking a talented individual to join our GIS team at MMC Corporate This role will be based in Gurgaon. This is a hybrid role that has a requirement of working at least three days a week in the office. Global Cyber Defense - Security Operations Center What can you expect? We are looking for someone to join and grow in our Security Operations Center (SOC) in a technical analyst role on various daytime business hours shifts. As an Analyst, you will be responsible for analyzing security event data, assessing the potential impact of events, and creating recommendations to defend against emerging threats. You will follow security events through the triage and response lifecycle and document all processes in a centralized knowledgebase. In this role, you will participate in ongoing security incidents and continuous SOC initiatives, such as new content development and enrichment. Additionally, you will collaborate across multiple teams on various efforts to continue to strengthen the security posture of Marsh & McLennan Companies. What is in it for you? Be able to work with a global team with a company with a strong brand and strong results to match. Be part of an organization with a culture of internal mobility, collaboration, valued partnership from the business and drive for innovation in data & analytics, including the latest AI technology Grow your career with direct exposure to Senior Technologists, Business Leaders, and Employee Resource Groups which provide access relevant volunteer and mentoring opportunities and interactions with counterparts in industry groups and client organizations. Competitive pay (salary and bonus potential), Full benefits package - starting day one (medical, dental, vision, STD/LTD, life insurance, RSP (Retirement Savings Plan or TFSA (tax free savings account.) Entitled to vacation, floating holidays, time off to give back to your community, sick days, and national holidays. We will count on you to : Analyzing network traffic, endpoint security events, and other various log sources to identify threats, assess potential impact, and recommend mitigations Supporting other security functions and teams to ensure the holistic implementation of security controls, technologies, practices, and programs Contributing to the development and improvement of response processes, documentation, tool configurations, and detection logic Assisting in additional Security Operation Center initiatives, including playbook development and documentation, new rule creation, and tool evaluations Maintaining an operational knowledge of global threat trends, known threat actors, common tactics, techniques, and procedures (TTPs), and emerging security technologies Collaborating on Security Operation Center team training opportunities and other cross training opportunities Operating as a subject matter expert on various security topics across multiple domains Supporting 24x7 operations by assisting in ongoing incidents during non-standard hours What you need to have? Undergraduate degree in Computer Science (CS), Computer Information Systems (CIS), other related degrees, or equivalent experience 2+ years of information security experience and/or 2-4 years of experience in security analysis in a non-security focused role Excellent critical thinking skills, with proven analytical expertise and the ability to learn adaptively Demonstrated effective verbal, written and interpersonal communication skills with the ability to communicate security concepts to both technical and non-technical audiences Demonstrated experience with security technologies and alerts, such as intrusion prevention and detection systems, web proxies, SIEM, SOAR, EDR, firewalls, web application scanner, vulnerability scanners, forensics tools, open-source tools, or other security technologies Knowledge in one or more of the following domains: Network Operations and Architecture, Operating Systems, Identity and Access Management, Programming, Cloud Computing, Databases, or Cryptography What makes you stand out Ability to operate independently in a dynamic, evolving environment with multiple inputs and tasks simultaneously Knowledge of common attacks, current threats, threat actors, and industry trends Familiarity with common security frameworks and models, such as MITRE ATT&CK, Lockheed Martin Cyber Kill Chain, The Diamond Model of Intrusion Analysis and NIST Cybersecurity Framework Professional or technical certifications, such as Security+, GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), or other related certifications Why join our team: We help you be your best through professional development opportunities, interesting work and supportive leaders. We foster a vibrant and inclusive culture where you can work with talented colleagues to create new solutions and have impact for colleagues, clients and communities. Our scale enables us to provide a range of career opportunities, as well as benefits and rewards to enhance your well-being.

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies