Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 7.0 years
4 - 9 Lacs
Pune, Bengaluru
Hybrid
Greetings from Teamware Solutions a division of Quantum Leap Consulting Pvt. Ltd We are hiring a Conjur Admin Work Mode: 24/7 Rotational Shifts and 5 days working from an office. (Shift allowance will be provided) Locations: Bengaluru, Pune Experience: 2 -7 Years Notice Period: Immediate to currently serving and 30-35 days max only. Technical Skills Required: 36 months of experience in Conjur product Conjur Administration: Serve as the primary administrator for Conjur, overseeing the installation, configuration, and maintenance of the Conjur environment. •Manage secrets within Conjur, ensuring their protection and access control according to organizational policies. •Monitor system performance, perform regular health checks, and ensure high availability and reliability of Conjur services. •Troubleshoot and resolve issues related to Conjur infrastructure and performance. •Implement Conjur best practices, including role-based access control (RBAC), policy management, and integration with other systems. CyberArk Administration: Act as the secondary support for CyberArk administration, including managing and maintaining the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and other related components. •Assist in the provision, rotation, and de-provision of privileged credentials within CyberArk. •Support day-to-day operations, monitoring, and maintenance of the CyberArk environment. •Collaborate with the primary CyberArk administrators to ensure alignment with organizational security policies and best practices. Support and Troubleshooting: Serve as the Level 2 support contact for Conjur and CyberArk-related issues, escalating complex issues to Level 3 support as needed. •Respond to and resolve support tickets, incidents, and requests in a timely and efficient manner, documenting steps and solutions. •Perform root cause analysis for recurring issues and provide recommendations for resolution and improvement. Please let me know if you are interested in this position and send me the resumes to netra.s@twsol.com
Posted 3 days ago
3.0 - 8.0 years
0 - 3 Lacs
Pune, Bengaluru
Work from Office
•We are looking for a of IAM resource with 3+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts •At least 36 months of Privileged Access Management domain experience with expertise in Conjur as the primary skill and CyberArk administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: •36 months of experience in Conjur product Conjur Administration: Serve as the primary administrator for Conjur, overseeing the installation, configuration, and maintenance of the Conjur environment. •Manage secrets within Conjur, ensuring their protection and access control according to organizational policies. •Monitor system performance, perform regular health checks, and ensure high availability and reliability of Conjur services. •Troubleshoot and resolve issues related to Conjur infrastructure and performance. •Implement Conjur best practices, including role-based access control (RBAC), policy management, and integration with other systems. CyberArk Administration: Act as the secondary support for CyberArk administration, including managing and maintaining the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and other related components. •Assist in the provision, rotation, and de-provision of privileged credentials within CyberArk. •Support day-to-day operations, monitoring, and maintenance of the CyberArk environment. •Collaborate with the primary CyberArk administrators to ensure alignment with organizational security policies and best practices. Support and Troubleshooting: Serve as the Level 2 support contact for Conjur and CyberArk-related issues, escalating complex issues to Level 3 support as needed. •Respond to and resolve support tickets, incidents, and requests in a timely and efficient manner, documenting steps and solutions. •Perform root cause analysis for recurring issues and provide recommendations for resolution and improvement
Posted 3 days ago
7.0 - 11.0 years
7 - 13 Lacs
Pune, Bengaluru
Work from Office
Greetings from Teamware Solutions a division of Quantum Leap Consulting Pvt. Ltd We are hiring a Centrify Admin Work Mode: 24/7 Rotational Shifts and 5 days working from an office. (Shift allowance will be provided) Locations: Bengaluru, Pune Experience: 7 -10 Years Notice Period: Immediate to currently serving and 30-35 days max only. Job Title: KGS Cyber MSS (IDM Team)- Consultant Educational qualifications •Graduation degree in any stream or equivalent / post-graduation degree/diploma, Certification in any IAM product would be an added advantage. Work experience •We are looking for a of IAM resource with 3+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts The ideal candidate will: •At least 36 months of Privileged Access Management domain experience with expertise in Centrify as the primary skill and Conjur administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: •36 months of experience in Centrify product Centrify Administration: Serve as the primary administrator for Centrify, overseeing the deployment, configuration, and maintenance of the Centrify environment. Manage privileged access and ensure secure authentication and authorization using Centrifys tools and solutions. Perform regular system checks, monitor performance, and ensure the high availability and reliability of Centrify services. Troubleshoot and resolve issues related to the Centrify infrastructure, including connectivity, policy enforcement, and access issues. Implement Centrify best practices and ensure compliance with organizational security policies and standards. Conjur Administration: Act as the secondary support for Conjur administration, including the installation, configuration, and maintenance of the Conjur environment. Manage secrets within Conjur, ensuring their protection and appropriate access control. Support daily operations, monitoring, and health checks of the Conjur system to ensure it is running optimally. Assist in troubleshooting and resolving Conjur-related issues and work collaboratively with other teams to integrate Conjur with other systems. Support and Troubleshooting: Serve as the Level 2 support contact for Centrify and Conjur-related issues, addressing escalations from Level 1 support and involving Level 3 support when necessary. Respond to and resolve support tickets, incidents, and requests efficiently, ensuring thorough documentation of issues and solutions. Conduct root cause analysis for recurring issues and recommend improvements to enhance system reliability and performance. Please let me know if you are interested in this position and send me the resumes to netra.s@twsol.com
Posted 3 days ago
8.0 - 12.0 years
6 - 14 Lacs
Hyderabad
Hybrid
Role & responsibilities Provide user account life cycle management, including creating, provisioning, securing, and inactivation of access. • Collaborate with corporate IAM team in integrating IAM for applications and Infrastructure components. • Perform periodic access review and certifications. • Engineer and implement IAM solutions for Infrastructure components. • Onboard and maintain privileged accounts to vaults like CyberArk etc., • Engineer solutions in SailPoint for access management and review. • Review and Manage AWS IAM Roles • Review and Manage AD/Okta Groups. • Implement access solutions using AWS secret manager. • Create and Maintain Encryption Keys • Review and Respond to Security Audits related to Access and Identity Management • Develop and Lead governance tasks for Access and Identity Management • Engineer and implement solutions to integrate cloud native services with centralized IDPs like Azure AD and Okta • Troubleshooting issues with IAM tools and processes • Review new IAM tools and Engineer solutions according to the infrastructure and application requirement Basic Required Qualifications: • Experience in managing IDPs like AzureAD, Okta, IDM, etc., • Experience working in AWS Cloud Environment • Experience working with Sailpoint or similar tools for user certification. • Experience working with CyberArk or similar privileged access management tool. • Experience managing users and groups for Openldap, git, Jenkins, etc., • Experience in integrating application and cloud native services with centralized IDPs • Experience in Install and Maintain Directory services like AzureAD, OpenLDAP etc., • Experience in attending Security Audits • Experience in Collaborating with Technical and Business Stakeholders
Posted 3 days ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience3-5 Years.
Posted 3 days ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years.
Posted 3 days ago
3.0 - 5.0 years
7 - 11 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience3-5 Years.
Posted 3 days ago
8.0 - 10.0 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No PerformanceParameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.
Posted 3 days ago
5.0 - 8.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years.
Posted 3 days ago
3.0 - 8.0 years
10 - 15 Lacs
Gurugram
Work from Office
Hi All, We have below mentioned with us if Interested please share your profile on vishal.nimbalkar@stefanini.com. Job Location: Gurugram Notice Period: 30 to 45 days Max Here are the position details. Job responsibilities - position Number 1 Management of Shared Folder permissions and structures across various file servers - both region and cloud based Providing data/report request responses from Audit and other support teams in a timely manner Facilitating data migration activities across various systems/platforms (Windows Shared Folders, SharePoint Online, MS Teams etc.) Managing permissions on SharePoint Online, MS Teams sites and other M365 Products Creation of AzureAD (EntraID) security groups, Service Principles (SPNs), Shared Mailboxes, Auto/Dynamic Distribution Groups etc. Creation of Active Directory groups of various types and scopes, for permissions setup Managing application infrastructure (Varonis DatAdvantage, Data Privilege etc) - supporting maintenance and upgrade activities Handling user access provisioning requests for various systems/platforms Educational Qualification - Bachelor's degree or equivalent from an accredited institution, preferably in a technical/technological stream Skills matrix - Topic/DomainMust haveGood to haveAdditional Context Access & Identity ManagementAIM common processes and practices User onboarding, joiner-mover-leaver processes Experience of managing accounts and their usage (Shared accounts, service accounts etc.) Access control concepts like RBAC, RBBAC, DAC, MAC etc. Remediation and recertification procedures IAM tools like CyberArk, SailPoint IIQ etc. Workflow management/ITSM tools like ServiceNow Various stages and types of approval workflows for granting access Compliance with SAS, SOX and other regulatory requirements, or industry standards Industry best practices in Access & Identity ManagementActive DirectoryGroups - types, scopes nested/looped groups and their uses High level understanding of Active Directory structure - OUs, Containers, types of policies and their utilities and implications Shared FoldersPermission types and structure - inheritance, object level permissions Experience with troubleshooting of shared folder permissions and access issues Understanding of file servers - types and common use cases Understanding of different technology-based permissions like NTFS, NFS, share permissions etc. Understanding of DFS - common practices and restructuring MS/M365 ExchangeManaging Exchange objects like Shared Mailboxes, Distribution ListsDynamic/M365 groups External Contacts, Public Folders etc. Application Support/Varonis applications preferredSupporting application infrastructure for Varonis or similar ProductsExperience working on Varonis DatAdvantage, Data Privilege and other Varonis modules Understanding of various activity monitoring, filesystem scanning tools and their workingPowerShell/ScriptingCreating and/or working with scripts, especially on PowerShell Knowledge and understanding of functions, scripting/programming best practices Cloud/M365/Azure EnvironmentCreation of Azure AD security groupsBasic understanding of API connectivity, app registrations, client ID/secrets etc. in the context of a cloud environment Experience on Azure EntraID, M365 Admin Centre etc. Understanding of various types of cloud infrastructure setup - their differences and utilities Position Number:- 2 4+ Years Experience :This role involves performing user administration tasks in a Windows Active Directory environment, granting NTFS permissions, and managing Exchange mailboxes. The advantages include enhancing security and compliance, improving productivity, and streamlining access management processes.Our company will benefit from your strong communication skills, versatility, and commitment to excellence. Career experience performing user administration in a Windows Active Directory environment Experience in granting NTFS permissions for folders/files in a Windows environment Experience in Exchange administration; creating and maintaining mailboxes, distribution lists, contacts and public folders Experience performing user administration tasks for various in-house and third-party applications Familiarity with Distributed File System (DFS) Basic knowledge of UNIX administration commands Knowledge of and the ability to adhere to SAS and SOX audit requirements pertaining to Identity & Access Management job requirements, obtaining, and documenting required approvals Experience with work-flow management tools (i.e., ServiceNow) Excellent communication skills and exposure to work on Project on tight deadlines. *Commitment to excellence and high standards, strong organizational skills; able to manage priorities and workflow; provide documentation and accountability Versatility, flexibility, and a willingness to work with constantly changing priorities Experience on Windows PowerShell would be added advantage Thanks & Regards, Vishal Nimbalkar Talent Acquisition Specialist, Sr. Stefanini India Pvt Ltd Midas Tower Hinjawadi Phase 1 Rd. Pune, 411057 Maharashtra, India.
Posted 3 days ago
2.0 - 7.0 years
3 - 5 Lacs
Pune, Bengaluru
Work from Office
Role & responsibilities Technical Skills Required: •36 months of experience in Centrify productCentrify Administration:•Serve as the primary administrator for Centrify, overseeing the deployment, configuration, and maintenance of the Centrify environment.•Manage privileged access and ensure secure authentication and authorization using Centrifys tools and solutions.•Perform regular system checks, monitor performance, and ensure the high availability and reliability of Centrify services.•Troubleshoot and resolve issues related to the Centrify infrastructure, including connectivity, policy enforcement, and access issues.•Implement Centrify best practices and ensure compliance with organizational security policies and standards.Conjur Administration:•Act as the secondary support for Conjur administration, including the installation, configuration, and maintenance of the Conjur environment.•Manage secrets within Conjur, ensuring their protection and appropriate access control.•Support daily operations, monitoring, and health checks of the Conjur system to ensure it is running optimally.•Assist in troubleshooting and resolving Conjur-related issues and work collaboratively with other teams to integrate Conjur with other systems.Support and Troubleshooting:•Serve as the Level 2 support contact for Centrify and Conjur-related issues, addressing escalations from Level 1 support and involving Level 3 support when necessary.•Respond to and resolve support tickets, incidents, and requests efficiently, ensuring thorough documentation of issues and solutions.•Conduct root cause analysis for recurring issues and recommend improvements to enhance system reliability and performance. •Understanding of ITIL processes •Ability to work with multiple stake holders from Security, Operations, Application Owners and Service Providers on deployment activities and enhancing the IAM solution. •Knowledge of Operating systems, Database concepts and others potential targets or endpoints for a typical IAM Solution. •Good presentation and documentation skills
Posted 3 days ago
8.0 - 13.0 years
10 - 20 Lacs
Bengaluru
Hybrid
We're Hiring! I am excited to share some amazing career opportunities at Happiest Minds. Take your Security career to the next level with Happiest Minds, ! Join a dynamic team, where Security Meets Innovation, and grow with us. Be recognized in a Great Place to Work Certified environment Interested professionals can directly reach out to me ankita.patari@happiestminds.com or can apply in below post Skills: Identity Governance & Administration (IGA),Identity Management (LCM/RBAC),Vulnerability Assessment, AWS IAM, Access Management (SSO/MFA),Privilege Access Management (PAM) Job Description 1. Design and implement Identity and Access Management (IAM) and Privileged Access Management (PAM) solutions based on business needs. 2. Collaborate with stakeholders to understand security requirements and create IAM and PAM strategies. 3. Architect, configure, and maintain IAM and PAM systems, ensuring integration with existing infrastructure. 4. Recommend and implement security technologies and best practices for IAM and PAM. 5. Provide expertise in Single Sign-On (SSO), Multi-Factor Authentication (MFA), and other access control mechanisms. 6. Conduct risk assessments and security reviews to identify vulnerabilities and recommend mitigation strategies. 7. Stay updated with IAM and PAM trends to maintain robust security posture. 8. Collaborate with cross-functional teams to enforce security policies and standards. 9. Lead training sessions to raise awareness and understanding of IAM and PAM concepts. 10. Serve as an expert in IAM and PAM, guiding best practices and contributing to cybersecurity strategy. Thanks & Regards, Ankita
Posted 4 days ago
0.0 - 3.0 years
2 - 4 Lacs
Mumbai
Work from Office
RoleUser Access Management (UAM) Team Member DepartmentUser Access Management Reports ToUAM Checker LocationMalad East Mumbai Job Summary: The User Access Management (UAM) Maker is responsible for provisioning and de provisioning application access within the organization. The role ensures that employees, contractors, and other users have the appropriate access to applications , while also maintaining security and compliance. This role involves working with multiple departments to ensure secure and efficient access management practices and ensuring compliance with security policies and regulations. QualificationAny Graduate Experience0-3 Years Soft Skills: 1. Strong attention to details and ability to follow UAM guidelines 2. Good communication and teamwork skills to work across departments
Posted 4 days ago
5.0 - 10.0 years
15 - 30 Lacs
Hyderabad, Chennai, Bengaluru
Work from Office
Role & responsibilities Understanding of the CyberArk architecture. Good knowledge on all CyberArk related components and modules. Experience in implementing LDAP Directory Mapping with CyberArk, Creation of custom PSM connectors for web applications and thick clients using AutoIT and other scripting, CPM Plugins development skills (Using RestAPI, Webform based etc) and knowledge of Networking Concepts. Involved in designing new access policies & its configuration, customizing master policy, and adding exceptions. Evaluate the current Cloud integration with CyberArk working across multiple infrastructure technologies (GCP, Oracle, Azure). Major incident resolution that involves analyze, design, build, and test workarounds and application changes. Prepare, Review & approve Product Design documents Conduct and co-ordinate requirement gathering and use case analysis discussions with application teams Experience in onboarding into PAM. Execute functional Use cases provided by the client. Involved in technical incident escalation, support and troubleshooting (CPM, PVWA, Vault, load balancing, DR, session management, PAM failure issues). Have performed PVT testing on patches, vulnerabilities in DEV, PRE-PROD, PROD following Change Management Process. In depth knowledge of PAM features and should be able to explain the same to the client Experience in Privileged account administration of various Windows, UNIX and database accounts using CyberArk components Troubleshooting CyberArk Privileged Account Security (PAS) Components for operational issues.
Posted 4 days ago
4.0 - 9.0 years
7 - 17 Lacs
Hyderabad, Chennai, Bengaluru
Hybrid
Dear Candidate, Please find below Job Description Cyber ark Security Engineer PAM , IAM (Scripting) Collaborate with IT teams to integrate PAM solutions into existing systems and ensure compliance with security policies and best practices. Provide guidance and recommendations on access management strategies and technologies to various schools and units. Onboard Linux/Windows servers to PAM Solutions, ensuring configuration aligns with least privilege principles. Write Python and PowerShell scripts to integrate BeyondTrust PasswordSafe with organizational infrastructure through API integration. Troubleshoot issues related to PAM system integrations with directories and client devices. Experience with leading PAM solutions (BeyondTrust) and hands-on experience with privilege password management. Prior experience in setting up, configuring, onboarding accounts, and creating policies within the PAM environment. Active Directory and LDAP knowledge for managing user identities and ensuring PAM solution integration. Experience integrating systems through API with Python and/or PowerShell. Strong understanding of modern authentication protocols like SAML, OAuth2, OIDC, and Kerberos. Opportunity to work in a dynamic and collaborative environment. Engage in innovative projects that enhance security and access management. Gain valuable experience with cutting-edge PAM technologies. Contribute to process improvements and optimization strategies. Be part of a team that values diversity and inclusion. Regards Divya Grover +91 8448403677
Posted 4 days ago
5.0 - 10.0 years
4 - 8 Lacs
Coimbatore
Work from Office
Project Role : Security Advisor Project Role Description : Lead the effort and teams to enable development and implementation of proprietary and innovative security solutions. Assess, manage and ensure compliance to risk reducing behaviors and processes. Must have skills : SailPoint IdentityNow Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Advisor, you will lead the effort and teams to enable development and implementation of proprietary and innovative security solutions. Assess, manage and ensure compliance to risk reducing behaviors and processes. A typical day involves overseeing security projects, collaborating with teams, and ensuring compliance with security protocols. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Lead security initiatives to enhance protection measures- Develop and implement security strategies- Conduct risk assessments and ensure compliance with security standards Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityNow- Strong understanding of identity and access management systems- Experience in implementing security solutions- Knowledge of security protocols and compliance standards- Hands-on experience in risk assessment and mitigation Additional Information:- The candidate should have a minimum of 5 years of experience in SailPoint IdentityNow- This position is based at our Coimbatore office- A 15 years full time education is required Qualification 15 years full time education
Posted 5 days ago
5.0 - 10.0 years
7 - 14 Lacs
Bengaluru
Work from Office
Role & responsibilities Preferred candidate profile This role is for you if you have the below Educational qualifications •Graduation degree in any stream or equivalent / post-graduation degree/diploma, Certification in any IAM product would be an added advantage. Work experience •We are looking for a of IAM resource with 5+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts The ideal candidate will: •At least 60 months of Privileged Access Management domain experience with expertise in Conjur as the primary skill and CyberArk administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: •60 months of experience in Conjur and CyberArk administration 1. Conjur Administration: •Serve as the primary administrator for Conjur, overseeing deployment, configuration, and maintenance of the Conjur environment. •Manage secrets within Conjur, ensuring their protection and proper access control according to organizational policies and requirements. •Monitor system performance, conduct regular health checks, and ensure high availability and reliability of Conjur services. •Troubleshoot and resolve complex issues related to Conjur infrastructure and performance. •Implement and enforce best practices for secrets management, policy management, and integration with other systems. 2. CyberArk Privilege Cloud Administration: •Act as a secondary administrator for CyberArk Privilege Cloud, contributing to the deployment, configuration, and maintenance of the solution. •Assist in managing privileged accounts, credential rotation, session management, and audit trails as per organizational policies. •Support monitoring and troubleshooting of CyberArk Privilege Cloud performance and issues, ensuring reliable and secure operations.
Posted 5 days ago
4.0 - 8.0 years
9 - 13 Lacs
Hyderabad
Work from Office
Job Description:. Job Summary:. We are seeking a skilled Delinea Active Directory bridging Operations Specialist. The ideal candidate will be responsible for managing and maintaining the Delinea Active Directory bridging privileged access security platform. This includes ensuring its continuous operation and optimization. The specialist will play an integral role in AT&T's privileged access program by managing privileged accounts and reducing overall risk to AT&T.. Key Responsibilities:. Manage the day-to-day operations of the Delinea Active Directory bridging solution, including user provisioning, vault management, and policy enforcement.. Monitor and maintain system health, performance, and security of the Delinea PAM infrastructure. Troubleshoot and resolve issues related to Delinea components, including agents, Access Manager, Audit components etc.. Implement, configure, and maintain policies and workflows in Active Directory and Delinea Access Manager.. Manage onboarding, rotation, and access workflows for privileged accounts.. Conduct regular health checks, patch management, and system upgrades for Delinea infrastructure.. Collaborate with security architects, engineers, and the IT operations team to ensure smooth integration of Delinea with other security tools and services.. Ensure compliance with organizational policies, industry standards, and best practices related to PAM.. Maintain documentation for system configurations, changes, and procedures.. This role requires to work from office and flexible to provide operations support in a 24/7 environment. Experience working with global teams located across USA and International regions. Required Qualifications:. Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field.. Minimum 7 years of experience working with Delinea Active Directory bridging, including deployment, administration, and troubleshooting.. Expertise in Delinea or Centrify components: Agents, Access Manager, Audit components etc... Strong understanding of Privileged Access Management (PAM) principles, Delinea AD Bridging, and Active Directory (AD) integration.. Proficient with CyberArk API usage and integration with external systems.. Hands-on experience with CyberArk upgrades, patches, and best practice implementations.. Familiarity with information security standards (NIST, ISO, etc.) and regulatory compliance requirements (SOX, PCI, etc.).. Preferred Qualifications:. Delinea Privilege Manager or Server PAM certification.. Experience with scripting languages (e.g., PowerShell, Python) to automate tasks within the CyberArk and Delinea environment.. Knowledge of DevOps and CI/CD pipelines as they relate to PAM solutions.. Experience working in a large-scale, complex, multi-domain environment.. Soft Skills:. Strong problem-solving abilities and attention to detail.. Excellent communication and documentation skills.. Ability to work independently as well as collaborate with cross-functional teams.. Capable of working in a high-pressure environment while handling multiple tasks.. #Cybersecurity. Weekly Hours:. 40. Time Type:. Regular. Location:. IND:AP:Hyderabad / Atria Building, Plot 17 Adm: Atria Building, Plot No 17. It is the policy of AT&T to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations for qualified individuals with disabilities. AT&T is a fair chance employer and does not initiate a background check until an offer is made.. Show more Show less
Posted 1 week ago
9.0 - 13.0 years
18 - 22 Lacs
Bengaluru
Work from Office
Date 20 Jun 2025 Location: Bangalore, KA, IN Company Alstom Req ID:482643 Job Title:IAM Architect OVERALL PURPOSE OF THE ROLE Take on a new challenge and apply your comprehensive IAM knowledge in a new cutting-edge field. Youll work alongside innovative, supportive, and solution-driven teammates. You'll spearhead the development and governance of identity and access management, ensuring alignment with our IAM security policy. Day-to-day, youll work closely with teams across the business (HR, Sourcing, Master Data managers, IS&T, business representatives), design IAM mechanisms and tools, and lead the functional and technical roadmap. Organisation structure (job belongs to..) Digital Services Reports directly to: Identity & Access Lead Architect Roles and Responsibility The IAM Architect has under his responsibility Collaborating on the definition of IAM standards Validating architecture against Security Policy Enhancing the global IAM architecture Supporting security aspects of IT projects related to IAM Perform Technical review and Impact assessment for all changes and new requirement. Update the design document and maintain Support level 5 expertise for IAM platforms and topics Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction. Contribute & validate new security solutions like B2B Operations and B2B SSO in IAM. PAM architecture & domain expertise Collaborate and support for troubleshooting and manage issues related to identities, authentication/authorization and access permissions. Able to analyse risks and to design an appropriate IAM security pattern (provisioning, habitation workflow, authentication, master data authorities, segregation of duty, Privileged Access Management, federation) Youll specifically take care of coordinating with stakeholders on IAM Architecture topics, managing identity lifecycle processes, and working with external/internal resources to support the Alstom IAM program. Recommend solutions for complex operational problems & implement industry best practices The IAM Architect would contribute actively to the security aspects related to IAM in Alstoms IT projects ISSCQ produce all Information System Security and Compliance Questionnaire at the initial phase of all projects Risk analysis perform risk analysis and identify mitigation plan when relevant Security Acceptance make the right decision considering the residual risk and the asset value Experience We value passion and attitude over experience. Thats why we dont expect you to have every single skill. Instead, weve listed some that we think will help you succeed and grow in this role Bachelors/Masters degree in Engineering/Technology or related field Overall 10+years of work experience, 4-5 years of experience in IAM architecture/security activities, with an IT Security background Expertise in IAM concepts and architecture Knowledge of ISO 27002 and ISO 27005 standards Professional industry standard certifications like CISSP, CISA, CEH, GIAC, CISM, etc. will be an added advantage Experience on IAM solutions within Saviynt AAG, Microsoft Azure or other IAG solution Experience on PAM (Privilege Access Management) solutions (eg Cyberark, BeyondTrust) Subject-matter expertise across all IAM topics as it relates to both cloud and on-premises enterprise technology, and the relationship between the architectures. Professional & concise communication (written & verbal) Technical Competencies Experience on operations IAM solutionsLevel 3 Experience on IAM solutions withinSaviynt AAG, Microsoft Azure or other IAG solutionLevel 3 Very Good understanding of Identity & access governance, Multi-Factor authentication and Privileged Access ManagementLevel 4 Good understanding on technologies related to Identity and access management, such as e.g. API ,AD,LDAP,SQL Level 4 Intimately familiar with IAM functional process and design (SOD, Workflow approval, MFA,..) Level 4 Good understanding on functional concept of Identity and access management (workflows, SOD, recertification access, provisioning, auto-correlation access, )Level 4 Very good understanding on security IAM principals and design (e.g network, ) Level 4 2-3 years of IAM Saviynt software experience is appreciated:Level 2 Behavioural Attributes Ability to work global with functional as well as technical teams in a dynamic environment Eye for details, structured and process oriented Demonstrated drive for continuous learning, results-orientation, and teamwork Influence stakeholders for improving and sustaining performance Demonstrate a positive mindset, high levels of character and integrity, and a keen awareness of continuous improvement Advise and collaborate with others to develop strong, positive working relationships across all levels of the organization to drive success of projects and efforts Offer creative, innovative, data-based solutions by focusing on forward progress and creativity, even when working through complex, often competing needs. You dont need to be a train enthusiast to thrive with us. We guarantee that when you step onto one of our trains with your friends or family, youll be proud. If youre up for the challenge, wed love to hear from you! Important to note As a global business, were an equal-opportunity employer that celebrates diversity across the 63 countries we operate in. Were committed to creating an inclusive workplace for everyone.
Posted 1 week ago
6.0 - 11.0 years
15 - 30 Lacs
Gurugram
Remote
Job Description We are looking for a Senior Identity Access Management Engineer (PAM Architecture) to lead the design of our PAM architecture strategy. This role will also involve contributing to the design and implementation of the PAM platform and its associated tools. Responsibilities: Develop a comprehensive PAM architecture strategy that aligns with organizational objectives and regulatory requirements. Lead the design contribute to the development and deployment of PAM solutions, focusing on workload access controls and secrets management. Contribute to the implementation and management of secrets management solutions ensuring secure storage, access and rotation of privileged credentials. Leverage PAM tools such as CyberArk, HashiCorp Vault, and Microsoft Entra ID to enhance security measures and streamline access management processes. Design PAM policies, standards, and procedures to ensure consistent and secure management of privileged accounts. Ensure PAM practices comply with organizational policies and regulatory requirements. Assess the effectiveness of PAM controls, making data-driven decisions to reduce risk and enhance security posture. Collaborate with technology and business partners to identify and mitigate risks associated with privileged access. Stay current with emerging trends and technologies in PAM and cybersecurity and driving enhancements to existing solutions. Qualifications 6+ years of experience in Privileged Access Management using PAM Solutions like CyberArk/StrongDM as an Architect/SME. Strong industry experience in architecting and designing PAM solutions and deployment across the enterprise. Deep technical understanding of PAM capabilities, controls and security technologies in areas related to identity and access management to address privilege-based risk. Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR. Expertise with build vs. buy solution options. Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, and SIEM solutions. Proficient in Privileged Access Management (PAM) concepts and standard processes, covering privileged account discovery and vaulting, session management, DevOps secret management, and endpoint privilege management. Nice to have: Experience with Python, PowerShell, and Bash. We offer: Culture of Relentless Performance: join an unstoppable technology development team with a 99% project success rate and more than 30% year-over-year revenue growth. Competitive Pay and Benefits: enjoy a comprehensive compensation and benefits package, including health insurance, and a relocation program. Work From Anywhere Culture: make the most of the flexibility that comes with remote work. Growth Mindset: reap the benefits of a range of professional development opportunities, including certification programs, mentorship and talent investment programs, internal mobility and internship opportunities. Global Impact: collaborate on impactful projects for top global clients and shape the future of industries. Welcoming Multicultural Environment: be a part of a dynamic, global team and thrive in an inclusive and supportive work environment with open communication and regular team-building company social events. Social Sustainability Values: join our sustainable business practices focused on five pillars, including IT education, community empowerment, fair operating practices, environmental sustainability, and gender equality. * Miratech is an equal opportunity employer and does not discriminate against any employee or applicant for employment based on race, color, religion, sex, national origin, age, disability, veteran status, sexual orientation, gender identity, or any other protected status under applicable law.
Posted 1 week ago
7.0 - 12.0 years
6 - 10 Lacs
Mumbai
Work from Office
Position Purpose Position for Devops and Cloud engineer expert for managing the Devops requirements of Credit Application modules/components. He/she would need to contribute to proposing devops improvements and present to technical architecture and lead community, and implement solution in Credit Application. He/she would need to mentor the team in Devops, take knowledge sharing session, do peer programming and help team to improve teams skill on this. Responsibilities Direct Responsibilities # Add/Manage Jenkins CI CD pipeline. # Migration of environment to Kubernetes. # Managing of various non-prod environments used in the application. # Analyzing environment/deployment specific issues reported and providing solutions. # Conduct knowledge sharing sessions to team and contribute to creating Devops leadership. # Coaching Mentoring, Peer programming. # Propose improvements in Devops area and present the same in technical committees. # Follow all the best practices and quality process of the project. # Contribute to Devops obsolescence management. # Follow existing process defined in the program Contributing Responsibilities # Contribute to hiring by conducting technical interviews in ISPL # Acquire and share knowledge on technical topics within and across teams Technical Behavioral Competencies Must have Thorough knowledge and hands on experience on below: Git and bitbucket for Source code management (Version Control System). Jenkins: for automating server deployments with plugins for constructing CI/CD pipelines. Docker: for software containerization. Kubernetes: for container orchestration. Sonar: for code quality Ansible, Groovy: for configuration management and deployment. Unix scripting Security: Vault (CyberArk) Optional: Dynatrace Any Cloud platform IBM Cloud, AWS, Azure Specific Qualifications (if required) Skills Referential Behavioural Skills : (Please select up to 4 skills) Ability to deliver / Results driven Ability to collaborate / Teamwork Attention to detail / rigor Creativity Innovation / Problem solving Transversal Skills: (Please select up to 5 skills) Ability to develop others improve their skills Ability to anticipate business / strategic evolution Analytical Ability Ability to manage / facilitate a meeting, seminar, committee, training Choose an item. Education Level: Bachelor Degree or equivalent Experience Level At least 7 years Other/Specific Qualifications (if required)
Posted 1 week ago
3.0 - 8.0 years
4 - 9 Lacs
Chennai
Work from Office
Position Purpose Support for the technical IAM Infrastructure (Sailpoint)is a position to maintain and monitor the infrastructure, ensure that the applications are up and running and manage incidents and requests. Responsibilities Direct Responsibilities Infrastructure Maintenance Ensure the IAM infrastructure (SailPoint/ ETAC/ LDAP IDM) is available and functional with a daily Monitoring check Check and remediationexploration errors, Authorization, Servers integration Provisioning check and remediation on servers to meet KPI expectations Infrastructure/ Application availability & monitoring Incident Management: First user contactSupport users in the resolution of incidents (ServiceNow/Email) Incident analysis and resolution Entry point for Expert escalation Contribution to continuous production optimization (curative and preventive) Service Requests managementSupport people of end user queries (ServiceNow/Email) Strong hands-on experience on Web and Application servers Provide technical leadership and Propose improvements related to the support activity (job performance, service request, production incidents) Good knowledge on Incident/Change/Problem management process (ServiceNow). Have good knowledge on setting up monitoring of servers through Dynatrace tools Contributing Responsibilities Contribute to the knowledge transfer with Paris OPS teams Contribute to the definition of procedures and processes necessary for the team Help build team spirit and integrate into BNP Paribas culture Contribute to the regular activity reporting and KPI calculation Contribute to continuous improvement actions Contribute to the acquisition by ISPL team of new skills & knowledge to expand its scope Technical & Behavioral Competencies Knowledge of ITIL General IT infrastructure knowledge Strong infrastructure skills Cloud & OPEN (OS Linux RHEL, Windows Server, Middleware, etc.) Particular knowledge and experience with IAM tool SAILPOINT/ Cyberark - Entreprise Password vault Good written and spoken English French speaking will be appreciated Measure and identify areas for improving Quality and overall Delivery Able to communicate efficiently Good Team Player Specific Qualifications (if required) Strong infrastructure skills Cloud & OPEN (OS Linux RHEL, Windows Server, Middleware, etc.) SailPoint expertise. LDAP IDM knowledge nice to have Strong interest in Incident Management with analytical and investigative skills Skills Referential Behavioural Skills(Please select up to 4 skills) Adaptability Ability to collaborate / Teamwork Client focused Attention to detail / rigor Transversal Skills: (Please select up to 5 skills)Analytical AbilityAbility to understand, explain and support changeAbility to manage a projectAbility to develop and adapt a processAbility to develop others & improve their skillsEducation Level:Master Degree or equivalentExperience LevelAt least 3 years
Posted 1 week ago
1.0 - 3.0 years
4 - 8 Lacs
Hyderabad
Hybrid
Operations and Administration Support the Global Service Desk with elevated technical and support requirements. Provide 1st line support using the ServiceNow Live Chat & Phone service. Prompt responding is vital. Provide remote/virtual support using Zoom or other remote tools available to technicians. Work on Global Service Desk incidents/requests routed to the Global Service Desk via ServiceNow. Use of additional IT tools to provide 1st line resolutions including Okta admin, Active Directory, Intune, ServiceNow, Zoom etc. Escalations, Collaboration, and Documentation Record Incidents accurately and timely in the ServiceNow ticket management system. Identifying outdated documentation and reporting to manager/senior team members. Keeping customers properly informed of open tickets. Preferred candidate profile
Posted 1 week ago
3.0 - 8.0 years
6 - 12 Lacs
Chennai
Work from Office
Position Purpose Support for the technical IAM Infrastructure (Sailpoint): is a position to maintain and monitor the infrastructure, ensure that the applications are up and running and manage incidents and requests. Responsibilities Direct Responsibilities Infrastructure Maintenance Ensure the IAM infrastructure (SailPoint/ ETAC/ LDAP IDM) is available and functional with a daily Monitoring check Check and remediation: exploration errors, Authorization, Servers integration Provisioning check and remediation on servers to meet KPI expectations Infrastructure/ Application availability monitoring Incident Management: First user contact: Support users in the resolution of incidents (ServiceNow/Email) Incident analysis and resolution Entry point for Expert escalation Contribution to continuous production optimization (curative and preventive) Service Requests management: Support people of end user queries (ServiceNow/Email) Strong hands-on experience on Web and Application servers Provide technical leadership and Propose improvements related to the support activity (job performance, service request, production incidents) Good knowledge on Incident/Change/Problem management process (ServiceNow). Have good knowledge on setting up monitoring of servers through Dynatrace tools Contributing Responsibilities Contribute to the knowledge transfer with Paris OPS teams Contribute to the definition of procedures and processes necessary for the team Help build team spirit and integrate into BNP Paribas culture Contribute to the regular activity reporting and KPI calculation Contribute to continuous improvement actions Contribute to the acquisition by ISPL team of new skills knowledge to expand its scope Technical Behavioral Competencies Knowledge of ITIL General IT infrastructure knowledge Strong infrastructure skills Cloud OPEN (OS Linux RHEL, Windows Server, Middleware, etc.) Particular knowledge and experience with IAM tool: SAILPOINT/ Cyberark - Entreprise Password vault Good written and spoken English French speaking will be appreciated Measure and identify areas for improving Quality and overall Delivery Able to communicate efficiently Good Team Player Specific Qualifications (if required) Strong infrastructure skills Cloud OPEN (OS Linux RHEL, Windows Server, Middleware, etc.) SailPoint expertise. LDAP IDM knowledge nice to have Strong interest in Incident Management with analytical and investigative skills Skills Referential Behavioural Skills : (Please select up to 4 skills) Adaptability Ability to collaborate / Teamwork Client focused Attention to detail / rigor Transversal Skills: (Please select up to 5 skills) Analytical Ability Ability to understand, explain and support change Ability to manage a project Ability to develop and adapt a process Ability to develop others improve their skills Education Level: Master Degree or equivalent Experience Level At least 3 years Other/Specific Qualifications (if required)
Posted 1 week ago
3.0 - 8.0 years
5 - 10 Lacs
Chennai
Work from Office
Position Purpose Support for the technical IAM Infrastructure (Sailpoint): is a position to maintain and monitor the infrastructure, ensure that the applications are up and running and manage incidents and requests. Responsibilities Direct Responsibilities Infrastructure Maintenance Ensure the IAM infrastructure (SailPoint/ ETAC/ LDAP IDM) is available and functional with a daily Monitoring check Check and remediation: exploration errors, Authorization, Servers integration Provisioning check and remediation on servers to meet KPI expectations Infrastructure/ Application availability & monitoring Incident Management: First user contact: Support users in the resolution of incidents (ServiceNow/Email) Incident analysis and resolution Entry point for Expert escalation Contribution to continuous production optimization (curative and preventive) Service Requests management: Support people of end user queries (ServiceNow/Email) Strong hands-on experience on Web and Application servers Provide technical leadership and Propose improvements related to the support activity (job performance, service request, production incidents) Good knowledge on Incident/Change/Problem management process (ServiceNow). Have good knowledge on setting up monitoring of servers through Dynatrace tools Contributing Responsibilities Contribute to the knowledge transfer with Paris OPS teams Contribute to the definition of procedures and processes necessary for the team Help build team spirit and integrate into BNP Paribas culture Contribute to the regular activity reporting and KPI calculation Contribute to continuous improvement actions Contribute to the acquisition by ISPL team of new skills & knowledge to expand its scope Technical & Behavioral Competencies Knowledge of ITIL General IT infrastructure knowledge Strong infrastructure skills Cloud & OPEN (OS Linux RHEL, Windows Server, Middleware, etc.) Particular knowledge and experience with IAM tool: SAILPOINT/ Cyberark - Entreprise Password vault Good written and spoken English French speaking will be appreciated Measure and identify areas for improving Quality and overall Delivery Able to communicate efficiently Good Team Player Specific Qualifications (if required) Strong infrastructure skills Cloud & OPEN (OS Linux RHEL, Windows Server, Middleware, etc.) SailPoint expertise. LDAP IDM knowledge nice to have Strong interest in Incident Management with analytical and investigative skills Skills Referential Behavioural Skills : (Please select up to 4 skills) Adaptability Ability to collaborate / Teamwork Client focused Attention to detail / rigor Transversal Skills: (Please select up to 5 skills) Analytical Ability Ability to understand, explain and support change Ability to manage a project Ability to develop and adapt a process Ability to develop others & improve their skills Education Level: Master Degree or equivalent Experience Level At least 3 years Other/Specific Qualifications (if required)
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane