Home
Jobs

150 Cyberark Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 - 9.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Must have skills- Cybersecurity, Cloud, CyberArk, Infrastructure, Onboarding, SaaS, Cyber Security, LDAP, Linux, Windows, Configuration, Error Messages, Patching, Safes Exp 3+ yr 15 LPA 0-15 days ONLY Hybrid - 3 days work from office Required Candidate profile Exp managing CyberArk SaaS Privilege Cloud & the Components Infrastructure

Posted 4 hours ago

Apply

5.0 - 10.0 years

12 - 16 Lacs

Hyderabad

Work from Office

Naukri logo

Project description Luxoft DXC Technology Company is an established company focusing on consulting and implementation of complex projects in the financial industry. At the interface between technology and business, we convince with our know-how, well-founded methodology and pleasure in success. As a reliable partner to our renowned customers, we support them in planning, designing and implementing the desired innovations. Together with the customer, we deliver top performance! For one of our Clients in the Insurance Segment we are searching for a CyberArk Engineer. Responsibilities 1.Work with business units and IT team to onboard privileged accounts to CyberArk 2.Perform CyberArk patching, upgrades, and platform stability. 3.Troubleshoot and resolve CyberArk related issues for privileged accounts and service accounts. 4.Lead the implementation and support of CyberArk Secrets Management initiatives. 5.Assist in periodic audits, compliance, assurance reviews and reporting related to privileged access management. 6.Onboard, configure, and migrate service accounts from basic vaulting to password rotation with full automation. 7.Configure CyberArk workflows, safes, and access controls for privileged account management. 8.Work with application teams to secure credentials for applications, scripts, and automation processes. 9.Maintain and optimize CyberArk policies and manage credential lifecycle. 10.Automate privileged account onboarding workflows to reduce manual effort. Client is in the USA: Mexico candidateswork from 9am EST time zone. India candidatesCandidate should be able to work until 11.00 am EST to overlap a few hours with the client and be able to attend meetings. Skills Must have This role requires a strong L3 engineer. L2 and L1 operational candidate profiles are not suitable for this role. Minimum 5 years of hands-on experience in CyberArk Engineering. Familiarity with CyberArk components such as PVWA, CPM, PSM, PTA etc. Nice to have Insurance industry experience Other Languages EnglishC1 Advanced Seniority Senior

Posted 6 hours ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Mumbai, Pune, Bengaluru

Work from Office

Naukri logo

Your role Drive and ensure business, IT and Security teams are compliant to applicable IAM policy, IAM .standards and instructions. Work closely with IAM team ( Run and Project) to design and deploy monitoring and control systems based on IAM policy and instructions. Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction. Develop and maintain measurable IAM security metrics; ensure metrics provide actionable insights to the applicable stakeholders. Maintain IAM policy & instruction awareness of business, technical, architecture, infrastructure, and end user support Develop and maintain measurable KPIs to showcase IAM governance performance Analyse internal and external threats and recommend remediation actions based on IAM capability. Your profile Maintain IAM policy & instruction awareness of business, technical, architecture, infrastructure, and end user support Develop and maintain measurable KPIs to showcase IAM governance performance Analyse internal and external threats and recommend remediation actions based on IAM capability. Perform IAM audit / gap assessments of internal systems and processes and provide recommendations to mitigate the same Deliverables: PAM Audit compliance Dashboard, reporting Analysis, Identity Health Check & governance

Posted 6 hours ago

Apply

2.0 - 7.0 years

10 - 20 Lacs

Hyderabad, Pune, Bengaluru

Hybrid

Naukri logo

Experience - 2 to 14 years Location - Mumbai / Bangalore/ Pune/ Hyderabad Looking for immediate joiners 2-4-cyberark defender certification is mandate 4+ yrs- cde/ cpc certification is mandate B.E./ B.TECH./ MCA or any other relevant engineering degree. Skills and Experience: Mandatory technical & functional skills Candidate in this role would be a part of the IAM/Cloud consultantgroup. As part of this group, the candidate should have 5 to 8 years of experience with one or more of the followingIAM/Cloud tools: CyberArk (CP, CCP, ASCP, Conjur, Privileged Cloud), BeyondTrust, and HashiCorp Strong development experience and scripting knowledge is a must . Additional Knowledge and experience on following IAM/Cloud tools (SailPoint, Saviynt, ForgeRock, CyberArk, Okta, Ping Federate, Azure AD) Intimately familiar with authentication and authorization protocols such as SAML, SPML, XACML, SCIM, OpenID and OAuth. Key behavioral attributes/requirements Ability to analyze complex identity and access scenarios and develop clear, actionable strategies. Commitment to maintaining high standards of quality and accuracy in all deliverables. Strong verbal and written communication skills for effectively interacting with clients, stakeholders, and team members. Dedicated to exceeding client expectations and providing exceptional service. Effective collaboration and teamwork skills, with the ability to work harmoniously within a team. Flexibility and responsiveness to changing requirements and environments, with the ability to quickly learn and adapt to new IAM technologies and solutions. Adherence to the highest standards of integrity and ethics, ensuring compliance with all legal and company policies related to IAM practices. Innovative and critical thinking in approaching IAM

Posted 8 hours ago

Apply

4.0 - 7.0 years

7 - 9 Lacs

Pune

Work from Office

Naukri logo

Role & responsibilities Administer and maintain AWS cloud infrastructure, including EC2, S3, VPC, and other related services. Manage and support Active Directory, including user accounts, group policies, and security configurations. Administer Okta for identity and access management, including user provisioning, MFA, and SSO. Manage CyberArk for privileged access management, ensuring secure access to critical systems. Administer and maintain VMware vSphere environment, including ESXi hosts, virtual machines, and vCenter Server. Manage and support Veeam for backup and disaster recovery, ensuring data integrity and recoverability. Utilize Cortex for security monitoring and threat detection, responding to security incidents. Manage and maintain Proofpoint for email security, protecting against phishing and malware. Administer and support Google Workspace, including email, calendar, drive, and other applications. Provide technical support to end-users, resolving system-related issues promptly and effectively. Monitor system performance and proactively identify and resolve potential problems. Implement and maintain system security measures to protect against cyber threats and data breaches. Collaborate with other IT team members to design and implement system enhancements and upgrades. Document system configurations, procedures, and troubleshooting steps. Stay up-to-date with the latest system administration technologies and trends. Preferred candidate profile Relevant certifications (e.g., AWS Certified SysOps Administrator, Microsoft Certified, VMware Certified Professional, etc.). Knowledge of ITIL framework. Willing to work in shifts

Posted 8 hours ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Chennai

Work from Office

Naukri logo

The Sailpoint role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Sailpoint domain.

Posted 21 hours ago

Apply

4.0 - 6.0 years

9 - 12 Lacs

Pune

Work from Office

Naukri logo

1. Bachelors degree in Computer Science, Information Security, or a related field (Masters preferred). 2. 5+ years of hands-on experience in Identity and Access Management (IAM) architecture and solutions. 3. Expertise in IAM technologies such as Okta, Azure AD, SailPoint, ForgeRock, Ping Identity, or equivalent. 4. Strong knowledge of security architecture frameworks (e.g., SABSA, TOGAF, Zero Trust) and best practices. 5. In-depth understanding of authentication protocols such as SAML, OAuth, OpenID Connect, LDAP, Kerberos, etc. Experience with Privileged Access Management (PAM) solutions such as CyberArk, BeyondTrust, or similar tools. 6.Familiarity with cloud security architecture for IAM in environments like AWS, Azure, and GCP. 7.Proven experience in role-based access control (RBAC), identity governance, and directory services. 8. Solid understanding of compliance requirements and industry standards (e.g., NIST, ISO 27001) related to IAM.

Posted 21 hours ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

Pune, Bengaluru

Hybrid

Naukri logo

Greetings from Teamware Solutions a division of Quantum Leap Consulting Pvt. Ltd We are hiring a Conjur Admin Work Mode: 24/7 Rotational Shifts and 5 days working from an office. (Shift allowance will be provided) Locations: Bengaluru, Pune Experience: 2 -7 Years Notice Period: Immediate to currently serving and 30-35 days max only. Technical Skills Required: 36 months of experience in Conjur product Conjur Administration: Serve as the primary administrator for Conjur, overseeing the installation, configuration, and maintenance of the Conjur environment. •Manage secrets within Conjur, ensuring their protection and access control according to organizational policies. •Monitor system performance, perform regular health checks, and ensure high availability and reliability of Conjur services. •Troubleshoot and resolve issues related to Conjur infrastructure and performance. •Implement Conjur best practices, including role-based access control (RBAC), policy management, and integration with other systems. CyberArk Administration: Act as the secondary support for CyberArk administration, including managing and maintaining the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and other related components. •Assist in the provision, rotation, and de-provision of privileged credentials within CyberArk. •Support day-to-day operations, monitoring, and maintenance of the CyberArk environment. •Collaborate with the primary CyberArk administrators to ensure alignment with organizational security policies and best practices. Support and Troubleshooting: Serve as the Level 2 support contact for Conjur and CyberArk-related issues, escalating complex issues to Level 3 support as needed. •Respond to and resolve support tickets, incidents, and requests in a timely and efficient manner, documenting steps and solutions. •Perform root cause analysis for recurring issues and provide recommendations for resolution and improvement. Please let me know if you are interested in this position and send me the resumes to netra.s@twsol.com

Posted 23 hours ago

Apply

3.0 - 8.0 years

0 - 3 Lacs

Pune, Bengaluru

Work from Office

Naukri logo

•We are looking for a of IAM resource with 3+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts •At least 36 months of Privileged Access Management domain experience with expertise in Conjur as the primary skill and CyberArk administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: •36 months of experience in Conjur product Conjur Administration: Serve as the primary administrator for Conjur, overseeing the installation, configuration, and maintenance of the Conjur environment. •Manage secrets within Conjur, ensuring their protection and access control according to organizational policies. •Monitor system performance, perform regular health checks, and ensure high availability and reliability of Conjur services. •Troubleshoot and resolve issues related to Conjur infrastructure and performance. •Implement Conjur best practices, including role-based access control (RBAC), policy management, and integration with other systems. CyberArk Administration: Act as the secondary support for CyberArk administration, including managing and maintaining the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and other related components. •Assist in the provision, rotation, and de-provision of privileged credentials within CyberArk. •Support day-to-day operations, monitoring, and maintenance of the CyberArk environment. •Collaborate with the primary CyberArk administrators to ensure alignment with organizational security policies and best practices. Support and Troubleshooting: Serve as the Level 2 support contact for Conjur and CyberArk-related issues, escalating complex issues to Level 3 support as needed. •Respond to and resolve support tickets, incidents, and requests in a timely and efficient manner, documenting steps and solutions. •Perform root cause analysis for recurring issues and provide recommendations for resolution and improvement

Posted 23 hours ago

Apply

7.0 - 11.0 years

7 - 13 Lacs

Pune, Bengaluru

Work from Office

Naukri logo

Greetings from Teamware Solutions a division of Quantum Leap Consulting Pvt. Ltd We are hiring a Centrify Admin Work Mode: 24/7 Rotational Shifts and 5 days working from an office. (Shift allowance will be provided) Locations: Bengaluru, Pune Experience: 7 -10 Years Notice Period: Immediate to currently serving and 30-35 days max only. Job Title: KGS Cyber MSS (IDM Team)- Consultant Educational qualifications •Graduation degree in any stream or equivalent / post-graduation degree/diploma, Certification in any IAM product would be an added advantage. Work experience •We are looking for a of IAM resource with 3+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts The ideal candidate will: •At least 36 months of Privileged Access Management domain experience with expertise in Centrify as the primary skill and Conjur administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: •36 months of experience in Centrify product Centrify Administration: Serve as the primary administrator for Centrify, overseeing the deployment, configuration, and maintenance of the Centrify environment. Manage privileged access and ensure secure authentication and authorization using Centrifys tools and solutions. Perform regular system checks, monitor performance, and ensure the high availability and reliability of Centrify services. Troubleshoot and resolve issues related to the Centrify infrastructure, including connectivity, policy enforcement, and access issues. Implement Centrify best practices and ensure compliance with organizational security policies and standards. Conjur Administration: Act as the secondary support for Conjur administration, including the installation, configuration, and maintenance of the Conjur environment. Manage secrets within Conjur, ensuring their protection and appropriate access control. Support daily operations, monitoring, and health checks of the Conjur system to ensure it is running optimally. Assist in troubleshooting and resolving Conjur-related issues and work collaboratively with other teams to integrate Conjur with other systems. Support and Troubleshooting: Serve as the Level 2 support contact for Centrify and Conjur-related issues, addressing escalations from Level 1 support and involving Level 3 support when necessary. Respond to and resolve support tickets, incidents, and requests efficiently, ensuring thorough documentation of issues and solutions. Conduct root cause analysis for recurring issues and recommend improvements to enhance system reliability and performance. Please let me know if you are interested in this position and send me the resumes to netra.s@twsol.com

Posted 23 hours ago

Apply

8.0 - 12.0 years

6 - 14 Lacs

Hyderabad

Hybrid

Naukri logo

Role & responsibilities Provide user account life cycle management, including creating, provisioning, securing, and inactivation of access. • Collaborate with corporate IAM team in integrating IAM for applications and Infrastructure components. • Perform periodic access review and certifications. • Engineer and implement IAM solutions for Infrastructure components. • Onboard and maintain privileged accounts to vaults like CyberArk etc., • Engineer solutions in SailPoint for access management and review. • Review and Manage AWS IAM Roles • Review and Manage AD/Okta Groups. • Implement access solutions using AWS secret manager. • Create and Maintain Encryption Keys • Review and Respond to Security Audits related to Access and Identity Management • Develop and Lead governance tasks for Access and Identity Management • Engineer and implement solutions to integrate cloud native services with centralized IDPs like Azure AD and Okta • Troubleshooting issues with IAM tools and processes • Review new IAM tools and Engineer solutions according to the infrastructure and application requirement Basic Required Qualifications: • Experience in managing IDPs like AzureAD, Okta, IDM, etc., • Experience working in AWS Cloud Environment • Experience working with Sailpoint or similar tools for user certification. • Experience working with CyberArk or similar privileged access management tool. • Experience managing users and groups for Openldap, git, Jenkins, etc., • Experience in integrating application and cloud native services with centralized IDPs • Experience in Install and Maintain Directory services like AzureAD, OpenLDAP etc., • Experience in attending Security Audits • Experience in Collaborating with Technical and Business Stakeholders

Posted 1 day ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience3-5 Years.

Posted 1 day ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years.

Posted 1 day ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience3-5 Years.

Posted 1 day ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.

Posted 1 day ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years.

Posted 1 day ago

Apply

3.0 - 8.0 years

10 - 15 Lacs

Gurugram

Work from Office

Naukri logo

Hi All, We have below mentioned with us if Interested please share your profile on vishal.nimbalkar@stefanini.com. Job Location: Gurugram Notice Period: 30 to 45 days Max Here are the position details. Job responsibilities - position Number 1 Management of Shared Folder permissions and structures across various file servers - both region and cloud based Providing data/report request responses from Audit and other support teams in a timely manner Facilitating data migration activities across various systems/platforms (Windows Shared Folders, SharePoint Online, MS Teams etc.) Managing permissions on SharePoint Online, MS Teams sites and other M365 Products Creation of AzureAD (EntraID) security groups, Service Principles (SPNs), Shared Mailboxes, Auto/Dynamic Distribution Groups etc. Creation of Active Directory groups of various types and scopes, for permissions setup Managing application infrastructure (Varonis DatAdvantage, Data Privilege etc) - supporting maintenance and upgrade activities Handling user access provisioning requests for various systems/platforms Educational Qualification - Bachelor's degree or equivalent from an accredited institution, preferably in a technical/technological stream Skills matrix - Topic/DomainMust haveGood to haveAdditional Context Access & Identity ManagementAIM common processes and practices User onboarding, joiner-mover-leaver processes Experience of managing accounts and their usage (Shared accounts, service accounts etc.) Access control concepts like RBAC, RBBAC, DAC, MAC etc. Remediation and recertification procedures IAM tools like CyberArk, SailPoint IIQ etc. Workflow management/ITSM tools like ServiceNow Various stages and types of approval workflows for granting access Compliance with SAS, SOX and other regulatory requirements, or industry standards Industry best practices in Access & Identity ManagementActive DirectoryGroups - types, scopes nested/looped groups and their uses High level understanding of Active Directory structure - OUs, Containers, types of policies and their utilities and implications Shared FoldersPermission types and structure - inheritance, object level permissions Experience with troubleshooting of shared folder permissions and access issues Understanding of file servers - types and common use cases Understanding of different technology-based permissions like NTFS, NFS, share permissions etc. Understanding of DFS - common practices and restructuring MS/M365 ExchangeManaging Exchange objects like Shared Mailboxes, Distribution ListsDynamic/M365 groups External Contacts, Public Folders etc. Application Support/Varonis applications preferredSupporting application infrastructure for Varonis or similar ProductsExperience working on Varonis DatAdvantage, Data Privilege and other Varonis modules Understanding of various activity monitoring, filesystem scanning tools and their workingPowerShell/ScriptingCreating and/or working with scripts, especially on PowerShell Knowledge and understanding of functions, scripting/programming best practices Cloud/M365/Azure EnvironmentCreation of Azure AD security groupsBasic understanding of API connectivity, app registrations, client ID/secrets etc. in the context of a cloud environment Experience on Azure EntraID, M365 Admin Centre etc. Understanding of various types of cloud infrastructure setup - their differences and utilities Position Number:- 2 4+ Years Experience :This role involves performing user administration tasks in a Windows Active Directory environment, granting NTFS permissions, and managing Exchange mailboxes. The advantages include enhancing security and compliance, improving productivity, and streamlining access management processes.Our company will benefit from your strong communication skills, versatility, and commitment to excellence. Career experience performing user administration in a Windows Active Directory environment Experience in granting NTFS permissions for folders/files in a Windows environment Experience in Exchange administration; creating and maintaining mailboxes, distribution lists, contacts and public folders Experience performing user administration tasks for various in-house and third-party applications Familiarity with Distributed File System (DFS) Basic knowledge of UNIX administration commands Knowledge of and the ability to adhere to SAS and SOX audit requirements pertaining to Identity & Access Management job requirements, obtaining, and documenting required approvals Experience with work-flow management tools (i.e., ServiceNow) Excellent communication skills and exposure to work on Project on tight deadlines. *Commitment to excellence and high standards, strong organizational skills; able to manage priorities and workflow; provide documentation and accountability Versatility, flexibility, and a willingness to work with constantly changing priorities Experience on Windows PowerShell would be added advantage Thanks & Regards, Vishal Nimbalkar Talent Acquisition Specialist, Sr. Stefanini India Pvt Ltd Midas Tower Hinjawadi Phase 1 Rd. Pune, 411057 Maharashtra, India.

Posted 1 day ago

Apply

2.0 - 7.0 years

3 - 5 Lacs

Pune, Bengaluru

Work from Office

Naukri logo

Role & responsibilities Technical Skills Required: •36 months of experience in Centrify productCentrify Administration:•Serve as the primary administrator for Centrify, overseeing the deployment, configuration, and maintenance of the Centrify environment.•Manage privileged access and ensure secure authentication and authorization using Centrifys tools and solutions.•Perform regular system checks, monitor performance, and ensure the high availability and reliability of Centrify services.•Troubleshoot and resolve issues related to the Centrify infrastructure, including connectivity, policy enforcement, and access issues.•Implement Centrify best practices and ensure compliance with organizational security policies and standards.Conjur Administration:•Act as the secondary support for Conjur administration, including the installation, configuration, and maintenance of the Conjur environment.•Manage secrets within Conjur, ensuring their protection and appropriate access control.•Support daily operations, monitoring, and health checks of the Conjur system to ensure it is running optimally.•Assist in troubleshooting and resolving Conjur-related issues and work collaboratively with other teams to integrate Conjur with other systems.Support and Troubleshooting:•Serve as the Level 2 support contact for Centrify and Conjur-related issues, addressing escalations from Level 1 support and involving Level 3 support when necessary.•Respond to and resolve support tickets, incidents, and requests efficiently, ensuring thorough documentation of issues and solutions.•Conduct root cause analysis for recurring issues and recommend improvements to enhance system reliability and performance. •Understanding of ITIL processes •Ability to work with multiple stake holders from Security, Operations, Application Owners and Service Providers on deployment activities and enhancing the IAM solution. •Knowledge of Operating systems, Database concepts and others potential targets or endpoints for a typical IAM Solution. •Good presentation and documentation skills

Posted 1 day ago

Apply

8.0 - 13.0 years

10 - 20 Lacs

Bengaluru

Hybrid

Naukri logo

We're Hiring! I am excited to share some amazing career opportunities at Happiest Minds. Take your Security career to the next level with Happiest Minds, ! Join a dynamic team, where Security Meets Innovation, and grow with us. Be recognized in a Great Place to Work Certified environment Interested professionals can directly reach out to me ankita.patari@happiestminds.com or can apply in below post Skills: Identity Governance & Administration (IGA),Identity Management (LCM/RBAC),Vulnerability Assessment, AWS IAM, Access Management (SSO/MFA),Privilege Access Management (PAM) Job Description 1. Design and implement Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions based on business needs. 2. Collaborate with stakeholders to understand security requirements and create IAM and PAM strategies. 3. Architect, configure, and maintain IAM and PAM systems, ensuring integration with existing infrastructure. 4. Recommend and implement security technologies and best practices for IAM and PAM. 5. Provide expertise in Single Sign-On (SSO), Multi-Factor Authentication (MFA), and other access control mechanisms. 6. Conduct risk assessments and security reviews to identify vulnerabilities and recommend mitigation strategies. 7. Stay updated with IAM and PAM trends to maintain robust security posture. 8. Collaborate with cross-functional teams to enforce security policies and standards. 9. Lead training sessions to raise awareness and understanding of IAM and PAM concepts. 10. Serve as an expert in IAM and PAM, guiding best practices and contributing to cybersecurity strategy. Thanks & Regards, Ankita

Posted 2 days ago

Apply

0.0 - 3.0 years

2 - 4 Lacs

Mumbai

Work from Office

Naukri logo

RoleUser Access Management (UAM) Team Member DepartmentUser Access Management Reports ToUAM Checker LocationMalad East Mumbai Job Summary: The User Access Management (UAM) Maker is responsible for provisioning and de provisioning application access within the organization. The role ensures that employees, contractors, and other users have the appropriate access to applications , while also maintaining security and compliance. This role involves working with multiple departments to ensure secure and efficient access management practices and ensuring compliance with security policies and regulations. QualificationAny Graduate Experience0-3 Years Soft Skills: 1. Strong attention to details and ability to follow UAM guidelines 2. Good communication and teamwork skills to work across departments

Posted 2 days ago

Apply

5.0 - 10.0 years

15 - 30 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Naukri logo

Role & responsibilities Understanding of the CyberArk architecture. Good knowledge on all CyberArk related components and modules. Experience in implementing LDAP Directory Mapping with CyberArk, Creation of custom PSM connectors for web applications and thick clients using AutoIT and other scripting, CPM Plugins development skills (Using RestAPI, Webform based etc) and knowledge of Networking Concepts. Involved in designing new access policies & its configuration, customizing master policy, and adding exceptions. Evaluate the current Cloud integration with CyberArk working across multiple infrastructure technologies (GCP, Oracle, Azure). Major incident resolution that involves analyze, design, build, and test workarounds and application changes. Prepare, Review & approve Product Design documents Conduct and co-ordinate requirement gathering and use case analysis discussions with application teams Experience in onboarding into PAM. Execute functional Use cases provided by the client. Involved in technical incident escalation, support and troubleshooting (CPM, PVWA, Vault, load balancing, DR, session management, PAM failure issues). Have performed PVT testing on patches, vulnerabilities in DEV, PRE-PROD, PROD following Change Management Process. In depth knowledge of PAM features and should be able to explain the same to the client Experience in Privileged account administration of various Windows, UNIX and database accounts using CyberArk components Troubleshooting CyberArk Privileged Account Security (PAS) Components for operational issues.

Posted 2 days ago

Apply

4.0 - 9.0 years

7 - 17 Lacs

Hyderabad, Chennai, Bengaluru

Hybrid

Naukri logo

Dear Candidate, Please find below Job Description Cyber ark Security Engineer PAM , IAM (Scripting) Collaborate with IT teams to integrate PAM solutions into existing systems and ensure compliance with security policies and best practices. Provide guidance and recommendations on access management strategies and technologies to various schools and units. Onboard Linux/Windows servers to PAM Solutions, ensuring configuration aligns with least privilege principles. Write Python and PowerShell scripts to integrate BeyondTrust PasswordSafe with organizational infrastructure through API integration. Troubleshoot issues related to PAM system integrations with directories and client devices. Experience with leading PAM solutions (BeyondTrust) and hands-on experience with privilege password management. Prior experience in setting up, configuring, onboarding accounts, and creating policies within the PAM environment. Active Directory and LDAP knowledge for managing user identities and ensuring PAM solution integration. Experience integrating systems through API with Python and/or PowerShell. Strong understanding of modern authentication protocols like SAML, OAuth2, OIDC, and Kerberos. Opportunity to work in a dynamic and collaborative environment. Engage in innovative projects that enhance security and access management. Gain valuable experience with cutting-edge PAM technologies. Contribute to process improvements and optimization strategies. Be part of a team that values diversity and inclusion. Regards Divya Grover +91 8448403677

Posted 2 days ago

Apply

5.0 - 10.0 years

4 - 8 Lacs

Coimbatore

Work from Office

Naukri logo

Project Role : Security Advisor Project Role Description : Lead the effort and teams to enable development and implementation of proprietary and innovative security solutions. Assess, manage and ensure compliance to risk reducing behaviors and processes. Must have skills : SailPoint IdentityNow Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Advisor, you will lead the effort and teams to enable development and implementation of proprietary and innovative security solutions. Assess, manage and ensure compliance to risk reducing behaviors and processes. A typical day involves overseeing security projects, collaborating with teams, and ensuring compliance with security protocols. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Lead security initiatives to enhance protection measures- Develop and implement security strategies- Conduct risk assessments and ensure compliance with security standards Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityNow- Strong understanding of identity and access management systems- Experience in implementing security solutions- Knowledge of security protocols and compliance standards- Hands-on experience in risk assessment and mitigation Additional Information:- The candidate should have a minimum of 5 years of experience in SailPoint IdentityNow- This position is based at our Coimbatore office- A 15 years full time education is required Qualification 15 years full time education

Posted 3 days ago

Apply

5.0 - 10.0 years

7 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

Role & responsibilities Preferred candidate profile This role is for you if you have the below Educational qualifications •Graduation degree in any stream or equivalent / post-graduation degree/diploma, Certification in any IAM product would be an added advantage. Work experience •We are looking for a of IAM resource with 5+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts The ideal candidate will: •At least 60 months of Privileged Access Management domain experience with expertise in Conjur as the primary skill and CyberArk administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: •60 months of experience in Conjur and CyberArk administration 1. Conjur Administration: •Serve as the primary administrator for Conjur, overseeing deployment, configuration, and maintenance of the Conjur environment. •Manage secrets within Conjur, ensuring their protection and proper access control according to organizational policies and requirements. •Monitor system performance, conduct regular health checks, and ensure high availability and reliability of Conjur services. •Troubleshoot and resolve complex issues related to Conjur infrastructure and performance. •Implement and enforce best practices for secrets management, policy management, and integration with other systems. 2. CyberArk Privilege Cloud Administration: •Act as a secondary administrator for CyberArk Privilege Cloud, contributing to the deployment, configuration, and maintenance of the solution. •Assist in managing privileged accounts, credential rotation, session management, and audit trails as per organizational policies. •Support monitoring and troubleshooting of CyberArk Privilege Cloud performance and issues, ensuring reliable and secure operations.

Posted 3 days ago

Apply

4.0 - 8.0 years

9 - 13 Lacs

Hyderabad

Work from Office

Naukri logo

Job Description:. Job Summary:. We are seeking a skilled Delinea Active Directory bridging Operations Specialist. The ideal candidate will be responsible for managing and maintaining the Delinea Active Directory bridging privileged access security platform. This includes ensuring its continuous operation and optimization. The specialist will play an integral role in AT&T's privileged access program by managing privileged accounts and reducing overall risk to AT&T.. Key Responsibilities:. Manage the day-to-day operations of the Delinea Active Directory bridging solution, including user provisioning, vault management, and policy enforcement.. Monitor and maintain system health, performance, and security of the Delinea PAM infrastructure. Troubleshoot and resolve issues related to Delinea components, including agents, Access Manager, Audit components etc.. Implement, configure, and maintain policies and workflows in Active Directory and Delinea Access Manager.. Manage onboarding, rotation, and access workflows for privileged accounts.. Conduct regular health checks, patch management, and system upgrades for Delinea infrastructure.. Collaborate with security architects, engineers, and the IT operations team to ensure smooth integration of Delinea with other security tools and services.. Ensure compliance with organizational policies, industry standards, and best practices related to PAM.. Maintain documentation for system configurations, changes, and procedures.. This role requires to work from office and flexible to provide operations support in a 24/7 environment. Experience working with global teams located across USA and International regions. Required Qualifications:. Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field.. Minimum 7 years of experience working with Delinea Active Directory bridging, including deployment, administration, and troubleshooting.. Expertise in Delinea or Centrify components: Agents, Access Manager, Audit components etc... Strong understanding of Privileged Access Management (PAM) principles, Delinea AD Bridging, and Active Directory (AD) integration.. Proficient with CyberArk API usage and integration with external systems.. Hands-on experience with CyberArk upgrades, patches, and best practice implementations.. Familiarity with information security standards (NIST, ISO, etc.) and regulatory compliance requirements (SOX, PCI, etc.).. Preferred Qualifications:. Delinea Privilege Manager or Server PAM certification.. Experience with scripting languages (e.g., PowerShell, Python) to automate tasks within the CyberArk and Delinea environment.. Knowledge of DevOps and CI/CD pipelines as they relate to PAM solutions.. Experience working in a large-scale, complex, multi-domain environment.. Soft Skills:. Strong problem-solving abilities and attention to detail.. Excellent communication and documentation skills.. Ability to work independently as well as collaborate with cross-functional teams.. Capable of working in a high-pressure environment while handling multiple tasks.. #Cybersecurity. Weekly Hours:. 40. Time Type:. Regular. Location:. IND:AP:Hyderabad / Atria Building, Plot 17 Adm: Atria Building, Plot No 17. It is the policy of AT&T to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations for qualified individuals with disabilities. AT&T is a fair chance employer and does not initiate a background check until an offer is made.. Show more Show less

Posted 6 days ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies