Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5 - 8 years
5 - 9 Lacs
Hyderabad
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 months ago
3 - 8 years
3 - 7 Lacs
Bengaluru
Work from Office
Hiring PAM Administrator with 4–5 yrs experience for HPE (Bangalore, WFO). Must have CyberArk skills in upgradation, patching & troubleshooting. Immediate joiners/notice period candidates preferred.
Posted 2 months ago
5 - 10 years
12 - 22 Lacs
Pune
Work from Office
Job description We are looking for an Identity and Access Management Architect. The main scope of work includes everything from IAM project design and development, implementation, administration and support. Expertise in more than 5 years into Saviynt. Roles and Responsibilities: Design and implement Saviynt solutions to meet the security and compliance requirements of our organization. Configure the REST connector with different platform applications. Hands-on experience on JAVA with respect to IGA. Good to have experience who worked on heavy Saviynt instance of 1L+ users. Configure the child applications and direct integrations. Good to have knowledge on SAP, ABAP connect, SCIM connector and SAP cloud application provisioning. Must hands on experience on Success factor, SAP HANA connector and JDBC connector. Must hands-on experience on Saviynt features like Custom action, Technical and user update rules, endpoints, analytics, SODs, Certifications, Service Accounts, custom integrations, connections, roles, RBAC, DB structure and SSO etc. Collaborate with cross-functional teams to gather requirements and define the scope of Saviynt projects. Develop and maintain technical documentation, including architecture diagrams, design specifications, and implementation plans. Configure and customize Saviynt modules to align with our organization's security policies and procedures. Conduct regular audits and assessments to identify vulnerabilities and recommend remediation actions. Provide technical guidance and support to the Saviynt implementation team, ensuring successful deployment and integration of Saviynt solutions. Stay up to date with the latest industry trends and best practices in Saviynt architecture and enterprise security. Preferred candidate profile Bachelors degree in computer science, Information Technology, or a related field. 5 to 10 years of experience in the Enterprise Security domain, with a focus on Saviynt architecture and implementation. Strong knowledge of Saviynt modules, including Identity Governance and Administration (IGA), Access Request and Certification, and Access Analytics. Experience in designing and implementing Saviynt solutions for large-scale organizations. Proficient in programming languages such as Java, Python, or PowerShell. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams
Posted 2 months ago
5 - 8 years
15 - 27 Lacs
Pune
Hybrid
Job description- We are looking for an Identity and Access Management Senior Consultant. The main scope of work includes everything from IAM project design and development, implementation. Should have expertise in CyberArk PAM. Skill Sets: Hands on Experience with CyberArk. Hands on experience with Connector Configuration like Active Directory, Azure Active directory, SAP R/3, SCIM and Custom PowerShell connector. Should have implemented requirement (with minimum customizations) based on use cases. Should be familiar with IAM technologies (OAuth/SAML/REST/SCIM/SSO/WebSSO). Roles & Responsibilities: Support head of PAM by solving issues resulting from incidents and developing solutions based on requests by customer. Taking care of run topics. Suitable candidate will work in a project independently. Analyzing customer requirements, designing and implementing solutions. Conduct walkthrough session with client for developed functionality. Support deployment process to promote code in higher environments. Debugging and troubleshooting of issues in CyberArk. Analyze issue, provide recommendations and implement the solution. Provide support for ongoing project.
Posted 2 months ago
6 - 10 years
15 - 25 Lacs
Bengaluru
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all – at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science – taking information that has been gathered and looking for areas to have that “Ah Ha” moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity – governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience Experience: Minimum of 4-6 years of relevant experience in CyberArk administration and cybersecurity practices, with proven hands-on experience in Privileged Access Management (PAM) using PSM/PSMP. CyberArk Privilege Cloud Management : Proven experience managing CyberArk SaaS Privilege Cloud and its associated components infrastructure. Tenant Management and Cloud Connectors: Strong understanding of Tenant Management, Secure Tunnel, and Cloud Connectors within CyberArk. CyberArk Onboarding : Experience managing CyberArk onboarding activities, including onboarding accounts via RESTAPI, manual onboarding, and bulk onboarding processes. Platform and Safe Creation: Ability to create new safes, accounts, and platforms in CyberArk and link new platforms to the CyberArk environment. Privileged Account Management: Securely managing and monitoring privileged account access to target hosts using Privileged Session Manager (PSM) and Privileged Session Manager Proxy (PSMP). LDAP & AD Federation : Strong knowledge of LDAP and AD Federation. Familiarity with secure integrations with external services such as LDAP/S and RADIUS. CyberArk PAS Components Knowledge: Familiarity with various CyberArk PAS components, including: Privilege Access Suite (PAS) Secure Password Vault and Safes Password Vault Web Access (PVWA) Central Policy Manager (CPM) Privileged Session Manager (PSM & PSMP) Application Identity Manager (AIM), Central Policy (CP), and Central Credential Provider (CCP). Password Management & Compliance: Experience managing privileged account passwords, including verification, change, and reconciliation, ensuring compliance with organizational policies. Session Management: Understanding of user sessions directed through PSM and PSMP for monitoring and auditing. Policy and Reporting: Experience in creating/modifying master policies, and generating reports on safes and user activity. Health Checks & Monitoring: Performing health checks on CyberArk infrastructure and monitoring various components to ensure system integrity and uptime. Troubleshooting & Configuration: Ability to troubleshoot configuration and connectivity issues related to PAM services and components, including network connectivity issues and load balancing. Server Administration: Proficient in Linux Red Hat 7/8, Windows Server 2016/2019/2022 administration. Database and Directory Services: Knowledge of managing database targets, LDAP, AD, and IAM systems. PowerShell & Python Knowledge: Basic knowledge of PowerShell and Python scripting for automation and system integration is a strong advantage. Networking Concepts: Understanding of networking concepts, including firewalls, routing, and load balancing. Disaster Recovery & Failover: Solid knowledge of CyberArk disaster recovery, failover, and failback mechanisms to ensure availability and business continuity. Vault Data Backup: Experience in Vault Data Backup processes for ensuring critical data is securely backed up and protected. Change Management: Proven experience in managing change processes, including preparing and executing delivery plans during Change Advisory Board (CAB) reviews. Incident Handling: Responsible for managing complex and escalated incidents and requests with a focus on resolving issues efficiently. KPI Compliance: Ensuring adherence to KPI metrics for incident and service request resolution, including timely communication and escalation procedures. Stakeholder Communication: Providing input and updates to stakeholders involved in critical incidents, particularly during outages or system failures. Preferred Technical and Professional Experience CyberArk Certifications: Certification as CyberArk Defender, Sentry, or CPC-PAM would be a plus. Troubleshooting Expertise: Advanced troubleshooting skills for identifying and resolving configuration, connectivity, and system performance issues related to PAM services. Report Generation: Experience using CyberArk’s PAS Reporter and Telemetry tools to generate and analyze operational reports. Team Collaboration: Ability to work as a key team player, participating in regular team reviews and contributing to continuous improvement. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 2 months ago
3 - 7 years
5 - 9 Lacs
Gurugram
Work from Office
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. Requirements: Proficient with Active Directory and related concepts Familiar with access control methods (RBAC/ABAC) Working knowledge of identity lifecycle management processes and challenges Hands-on experience with cybersecurity tools that function in the following spacesPAM / PIM / IAM, DLP, SOAR (XSIAM), Microsoft Security, AWS Security, Red Teaming / AppSec, Isolated Recovery Environments (IREs) Experience with identity federation and SSO solutions PAM experience or familiarity with specific vendor tools Able to speak to PAM best practices Understanding of the principle of least privilege, separation of duties Experience with REST API and app integration Experience configuring, guiding, or overseeing access review and certification, role management Past participation in identity steering committee Understanding of PIM, JIT, conditional access Familiarity with US compliance and regulatory frameworks that inform identity requirements Qualifications: 6+ years of working knowledge of one or more Identity-Based Security SolutionsOkta, Sailpoint, Delinea, BeyondTrust, CyberArk, etc. Any of the following preferred but not required Security+, CISSP, any vendor-specific certifications related to Identity products Willingness to travel to support client projects and shadowing opportunities (50+ % of the time) Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (OTE) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.
Posted 2 months ago
6 - 10 years
5 - 9 Lacs
Gurugram
Work from Office
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. The Senior Consultant, ADDM (Application Discovery and Dependency Mapping) is responsible for leading and delivering Application Discovery and Dependency Mapping project workstreams. They are the subject matter expert (SME) for Application Discovery and Dependency Mapping. The SME works closely with other technology SMEs to build and validate accurate application affinity groups and associated business applications within the ADDM platform. Key Responsibilities Use of Application Discovery and Dependency Mapping platforms including but not limited to Device42. Creates and maintains ADDM platform configurations to accommodate Client requirements. Configures and maintains automated discovery jobs and associated scheduling. Coordinate efforts with other SMEs, Client resources, and vendors to remediate discovery job errors. Lead ADDM workstreams including assisting in project plan development, project status reporting, coordination of Client and internal resources, and adhering to established project schedules and timelines. Independently work with Client stakeholders to ensure affinity groups and associated business applications are accurately developed and validated in the ADDM platform. Generate standard and custom reporting to support the development of project deliverables. Participate as a subject matter expert in project workshops. Maintain close communication with Client stakeholders including senior leadership on matters that require explanation, interpretation, or advice. Develop and promote relationships both internally and with client stakeholders. Participate in business development efforts for ADDM opportunities including assisting or leading POCs and demos, project scoping, and proposal development. Mentor other internal resources on the use of ADDM platforms by leading training and knowledge transfer sessions. Qualifications At least five (5) years as an IT Manager, Director, or Consultant at a Management Consultant Organization (Big 4, Slalom, etc.). At least two (2) years of experience in conducting Application Discovery and Dependency Mapping with Device42. Experience with other platforms such as Flexera Foundation/Cloudscape, ServiceNow Discovery/MID, AWS Migration Evaluator, Microsoft Azure Migrate, and/or Google StratoZone is also highly preferred. Experience with other systems of record such as ServiceNow CMDB, LeanIX, Confluence, Jira, SolarWinds, Datadog, Dynatrace, etc. are also important skills used in the delivery of ADDM services. Knowledge of ITSM and ITOM processes including CMDB. Understanding of authentication technologies such as Active Directory, LDAP, TACACS, CyberArk, etc. Basic understanding of Linux/Unix shell commands. Understanding of networking topics including IP Addressing, TCP/UDP Ports, TCP/IP Protocols, load balancers, firewalls, NAT, etc. Ability to troubleshoot a network connection by using ping, traceroute, netstat and other commands. Understanding of common application architectures and components (database, middleware, web, etc.) Basic understanding of IaaS/PaaS cloud computing. Experience and/or familiarity with AWS, Azure, Google are a plus. Ability to manipulate and analyze large data sets in Microsoft Excel and Microsoft PowerBI for data visualizations. Ability to communicate esoteric technical concepts to business leaders using verbal communication and visual aids such as PowerPoint or PowerBI. Education Undergraduate degree in Computer Science, Mathematics, or similar discipline. Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (OTE) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.
Posted 2 months ago
2 - 7 years
4 - 9 Lacs
Pune, Bengaluru
Work from Office
Job Title: Conjur Admin Secrets Management & DevSecOps Location: Pune / Bangalore Experience: 2–8 Years Employment Type: Full-Time Job Description We are looking for a skilled and motivated Conjur Admin to join our cybersecurity and DevSecOps team. In this role, you will be responsible for implementing and managing CyberArk Conjur solutions to secure and automate secrets management across our cloud infrastructure, CI/CD pipelines, and application environments. You will work closely with security, DevOps, and cloud engineering teams to design scalable and compliant secret access solutions, ensuring secure credential storage and governance throughout the development lifecycle. Key Responsibilities Deploy, configure, and manage CyberArk Conjur (Open Source or Enterprise). Implement secure secret injection for applications, services, and pipelines. Create and manage policies, roles, authentication layers (LDAP, Kubernetes, AWS IAM, etc.). Automate secret lifecycle: generation, rotation, expiration, and revocation. Integrate Conjur with CI/CD tools (Jenkins, GitLab, GitHub Actions). Secure cloud-native and containerized environments (AWS, Azure, GCP, Kubernetes, OpenShift). Support audits, compliance reviews, and security assessments. Enforce least-privilege and Zero Trust principles. Required Skills Hands-on experience with CyberArk Conjur (Open Source or Enterprise). Strong Linux/Unix administration and scripting skills. Familiarity with IAM, TLS/SSL, PKI, and REST APIs. Experience with DevOps and automation tools (Docker, Kubernetes, Terraform, Ansible, Jenkins). Solid understanding of secrets management and application security best practices. Preferred Qualifications CyberArk or relevant security certifications. Experience with other secret management tools (Vault, AWS Secrets Manager, etc.). Familiarity with compliance standards like SOC 2, HIPAA, ISO 27001. Why Join Us? Work on cutting-edge DevSecOps and cloud security initiatives. Collaborate in a high-impact, security-first engineering culture. Competitive salary, flexible work environment, and professional growth opportunities.
Posted 2 months ago
5 - 8 years
10 - 14 Lacs
Kolkata
Work from Office
Project Role : Application Lead Project Role Description : Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have skills : Informatica Product 360 (PIM) Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : a:Should have excellent communication and presentation skills b:Should be a good team player/lead c: Project Role :Application Lead Project Role Description :Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have Skills :Informatica Product 360 (PIM), SSI:No Technology Specialization NON SSI:Good to Have Skills :SSI: NON SSI:Job Requirements :Key Responsibilities :a:Testing source code and debugging code b:Writing high-quality code to complete application development on schedule c:Strong analytical and problem-solving skills d:Possessing specialist knowledge of operating systems, devices, applications and software e:Manage all production system and recommend ways to optimize performance and provide solution to problems and prepare reports for all problems f:Administer and resolve applications issues, provide updates and perform root cause analysis Technical Experience :a:Experience with Informatica MDM and PIM Implementation b:In-depth understanding of PIM features and capabilities, propose solutions based on Informatica P360 platform capabilities c:Create end-to-end specifications for PIM solutions Lead project team members through the activities required to implement Informatica PIM solution make specific recommendations to bring the PIM implementation into conformance with best practices Informatica P360 PIM Certification is recommended Professional Attributes :a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:Strong articulation skills are mandatory Educational Qualification:a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:Additional Info : Qualification a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:
Posted 2 months ago
2 - 7 years
10 - 15 Lacs
Pune, Bengaluru
Work from Office
Role Overview: We are looking for a skilled Conjur Admin to manage and maintain our secrets management infrastructure using CyberArk Conjur . The role is critical to ensuring secure credential storage, access policies, and integrations across development, operations, and cloud environments. The ideal candidate will have a strong background in DevSecOps, cloud security, and infrastructure automation. Key Responsibilities: Secrets Management & Platform Administration: Install, configure, and administer CyberArk Conjur Open Source/Enterprise . Manage secret injection mechanisms for applications, services, and CI/CD pipelines. Set up and maintain policies, roles, permissions, and authentication layers (e.g., LDAP, Kubernetes, AWS IAM). Rotate, revoke, and audit secrets across systems and services. Cloud & DevOps Integration: Integrate Conjur with CI/CD tools (e.g., Jenkins, GitLab, GitHub Actions). Implement secret management in cloud-native and containerized environments (AWS, Azure, GCP, Kubernetes, OpenShift). Collaborate with DevOps teams to secure automated workflows and deployments. Enable applications to securely retrieve credentials using API or sidecar containers. Security & Compliance: Maintain audit trails, logs, and reports for compliance and incident response. Ensure best practices for least privilege access and Zero Trust architecture. Support security assessments and penetration testing activities involving secret access. Required Skills & Qualifications: Hands-on experience with CyberArk Conjur (Open Source or Enterprise). Proficiency in managing secrets lifecycle : generation, rotation, expiration, and revocation. Experience with Linux/Unix administration , shell scripting, and RESTful APIs. Familiarity with IAM concepts , LDAP , RBAC , TLS/SSL , and PKI . Experience working with DevOps tools like Docker, Kubernetes, Jenkins, Ansible, Terraform, etc. Understanding of network and application security principles. Strong problem-solving and documentation skills. Preferred Qualifications: CyberArk or relevant security certifications (e.g., CyberArk Defender/Conjur Certified). Knowledge of other secrets management tools (e.g., HashiCorp Vault, AWS Secrets Manager). Experience in regulated environments (e.g., financial services, healthcare) with compliance standards like SOC 2 , HIPAA , ISO 27001 .
Posted 2 months ago
3 - 8 years
4 - 9 Lacs
Pune, Bengaluru, Hyderabad
Hybrid
Hands-on experience in Installing/Upgrading and Setting up CyberArk Components (EPV, PWV, EPM, CPM, PVWA, PSM, PSMP, AIM) to customizing/configuring it for given Policies and procedures. Design, architecture, and migration experience on CyberArk. Provisioning, creating workflows, custom connectors and policies. Integrating various platforms with CyberArk, such as different LDAP providers, Windows servers, UNIX servers, databases and networking devices. Creation of automation scripts using PACLI and REST API. Experience on customization of CyberArk Platforms. Custom PSM Connectors/CPM Plugins (with AutoIT/Shell Scripting) and good knowledge on auto-detection configuration and usage of Discovery Scanning tools. Experience on AIM (CP and CCP) Credential Provider agents installation/upgradation. Experience on CyberArk version upgrade. Experience on DR Drill activities. Knowledge on HSM and PTA integration would be an added advantage. Exposure to CyberArk Pcloud is an added advantage. Primary skills: CyberArk PAM/Pcloud design and implementation CyberArk Sentry/Defender certification is good to have. Preferably CyberArk PAM experience is preferred else good to have PAM experience in any of these platforms viz. StrongDM/OneIdentityLLC/BeyondTrust/ManageEngine/Foxpass/ JumpCloud/ARCON/ Centrify/Microsoft Purview Experience Required: 5-8 Years in CyberArk PAM and EPM deployment preferred or candidates who have worked on similar solutions from other OEMs with overall 10-13 years of IT experience.
Posted 2 months ago
7 - 12 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:-mplement, configure, and manage PAM solutions such as CyberArk or BeyondTrust to ensure privileged access is secure, auditable, and compliant with regulatory standards.Work closely with IT, DevOps, and security teams to design and integrate secure access control systems into existing IT infrastructure.Perform security assessments and identify potential vulnerabilities in privileged accounts, systems, and services.Develop and enforce policies for privileged account management, password rotation, and access control.Monitor the activity of privileged accounts to detect any unusual or unauthorized behavior, escalating issues when necessary.Work with auditing teams to ensure compliance with security regulations and standards (e.g., NIST, PCI-DSS, GDPR).Provide guidance and support to the organization regarding security best practices for privileged access.Develop and maintain detailed documentation on the configuration, deployment, and operational procedures for PAM solutions.Participate in incident response efforts, identifying, containing, and mitigating security incidents involving privileged accounts.Stay current on emerging security threats and PAM technologies, applying this knowledge to enhance the organization's security posture. Professional & Technical Skills: Must To Have Skills: Proficiency in CyberArk Privileged Identity Access Management Strong understanding of cloud security principles Experience in designing and implementing security solutions Knowledge of security compliance standards Hands-on experience with security tools and technologies Additional Information: The candidate should have a minimum of 7.5 years of experience in CyberArk Privileged Identity Access Management This position is based at our Bengaluru office A 15 years full time education is required Qualification 15 years full time education
Posted 2 months ago
5 - 10 years
4 - 8 Lacs
Pune
Work from Office
Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Identity Access Management (IAM), CyberArk Privileged Access Management, Google Cloud Platform Administration, ControlM Administration, Unix, Python, Shell Scripting, Data Lake, MYSQL, Java, JavaSc Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : A Bachelors or Masters Degree in Technology or similar streams as fulltime education is required Summary :As a Security Advisor, you will lead the effort and teams to enable development and implementation of proprietary and innovative security solutions. Assess, manage, and ensure compliance to risk-reducing behaviors and processes. Your day will involve overseeing security initiatives, collaborating with teams, and ensuring adherence to security protocols. Roles & Responsibilities: Expected to be an SME. Collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Lead the development and implementation of security solutions. Assess and manage risk-reducing behaviors and processes. Ensure compliance with security protocols. Professional & Technical Skills: Must To Have Skills: Proficiency in Identity Access Management (IAM), Google Cloud Platform Administration, CyberArk Privileged Identity Access Management, ControlM Administration, Unix, Google Cloud, Python, Shell Scripting, Data Lake, MYSQL, Java, JavaScript along with Privileged Access Managment (PAM) concepts. Strong understanding of security protocols and best practices. Experience in implementing security solutions. Knowledge of risk assessment and management. Familiarity with compliance standards and regulations. Additional Information: The candidate should have a minimum of 5 years of experience in Identity Access Management (IAM). This position is based at our Pune office. A Bachelors or Masters Degree in Technology or similar streams as fulltime education is required. Qualification A Bachelors or Masters Degree in Technology or similar streams as fulltime education is required
Posted 2 months ago
5 - 10 years
4 - 8 Lacs
Pune
Work from Office
Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Identity Access Management (IAM), GitHub, Unix, Splunk, MySQL, Python, Ansible, Terraform Good to have skills : CyberArk Privileged Access Management, Google Cloud Platform Administration, ControlM Administration Minimum 5 year(s) of experience is required Educational Qualification : A Bachelors or Masters Degree in Technology or similar streams as fulltime education is required Summary :As a Security Advisor, you will lead the effort and teams to enable development and implementation of proprietary and innovative security solutions. Assess, manage and ensure compliance to risk reducing behaviors and processes. Showcasing leadership and expertise in security solutions. Roles & Responsibilities: Expected to be an SME. Collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Lead the development and implementation of security solutions. Assess and manage risk reducing behaviors and processes. Ensure compliance with security standards and protocols. Professional & Technical Skills: Must To Have Skills: Proficiency in Identity Access Management (IAM). Privileged Access Management (PAM) concepts Must To Have Skills: Experience with Google Cloud Platform Administration, CyberArk, Splunk Monitoring, Python Scripting, Github, Unix, MySQL. Strong understanding and working knowledge in Automation tools such as Ansible, Terraform. Strong understanding of security protocols and best practices. Knowledge of CyberArk Privileged Identity Access Management. Experience in ControlM Administration. Additional Information: The candidate should have a minimum of 7.5 years of experience in Identity Access Management (IAM). This position is based at our Pune office. A Bachelors or Masters Degree in Technology or similar streams as fulltime education is required. Qualification A Bachelors or Masters Degree in Technology or similar streams as fulltime education is required
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France