Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
10.0 - 15.0 years
35 - 40 Lacs
Chennai
Work from Office
Position Purpose This position would be responsible to serve as technical subject matter expert and provide consulting support to architects and engineers on application integration. Also they work with L2 support resources when they need technical help on major issues. Responsibilities Direct Responsibilities Defining technical architecture, process solutions. Providing consultation services for IT risk. Understanding of end to end process of Account/Session/Password management on various platforms such as windows, Unix, database, applications, appliances. Checks to be performed on CPM password failures, plugin Creation/Modification, New Connectors/Dispatchers(Webform/AutoIT/Tool Based) Knowledge on Audit & Monitoring , Backup Restoration User Management, Auto Provisioning/ Deprovisioning Vault and Component Servers Health, Configuration Management, DR Switch/Drill CyberArk Upgrade/Enhancement and Migration Notification Settings, SMTP Management API/Ansible/Automations, Scripts/Jobs/Calls Assisting & Developing the Delivery of complete CyberArk Infrastructure & the corresponding functionalities. Stay Up-to-date with the latest CyberArk features , updates and industry best practices. Document SOP , System configurations and Incident report management. Regular applying of the CyberArk patches as per bulletin. Owning the P1 incidents applying the right RCA approach. Implement Change request with proper ticketing mechanism and stake holder communications. Implement enhancement in monitoring/alerting solutions, develop scripts for house keeping. Contributing Responsibilities Perform trending & root cause analysis of issues Support and management of system outages via the published major incident management process. Analyse automation failures, identify root cause of failure and work internally/with Vendor to fix the issue. Attend Major Incident Management calls related to outages and complex technical issues needing interaction with multiple teams. Attend conference calls opened by applications team for complex technical issues. Understand the urgency, priority and gravity of the situation and accordingly maintain two-way communication. Should be able to take decisions during major incidents, outages on matters related to service degradation and managing communications to impacted stakeholders. Be able to supplement with a rationale for decisions taken. Create and support policies, standards and processes. Technical & Behavioral Competencies a) Should have strong understanding on Plugin and PSM Connector development to manage the password for different applications. b) Integrating various platforms with CyberArk, such as different LDAP providers, Windows Servers, UNIX Servers, Databases and networking Devices; Experience in LDAP directory structures preferably CA Directory c) Experience with Windows/ UNIX platforms in large heterogeneous environment. d) Should also has a strong background in Information Security principles and controls. e) Fluent in English language (verbal, reading and writing) Specific Qualifications (if required) B.E. (Comp/ECE/EEE) / MCA/ MSc IT Skills Referential Behavioural Skills : (Please select up to 4 skills) Ability to collaborate / Teamwork Attention to detail / rigor Client focused Communication skills - oral & written Transversal Skills: (Please select up to 5 skills) Ability to understand, explain and support change Analytical Ability Ability to manage / facilitate a meeting, seminar, committee, training Choose an item. Choose an item. Education Level: Bachelor Degree or equivalent Experience Level At least 10 years
Posted 1 week ago
7.0 - 12.0 years
30 - 35 Lacs
Noida, Chennai, Bengaluru
Hybrid
Must Have Skills: 7 to 12 years of experience in deployment & implementation of Privileged Identity Management using CyberArk solution for large scale customers across various industry verticals Play active role in the execution of the project and demonstrate strong technical leadership Have a strong knowledge of the CyberArk privileged account security suite CyberArkversion 7.x, 8.x, 9.x and 10.x . Experience in the use of CyberArk PACLI to automate tasks related to user and safe management. Good understating of CyberArk components like EPM, OPM, AIM, etc. Capture detailed requirements for the CyberArk solution based on input from platform owners, eco-system owners, the target architecture and high-level requirements. Design and Architecture of the overall CyberArk implementation. Performing compliance checks on CyberArk for IT security safes and to Provide alerts and reports appropriately. Investigate, Provide RCA and resolve Incidents. Open to travel as and when required for deployment at customer sites Be a strong team player Advanced knowledge of windows/VMware administration. Advanced knowledge of Windows Cluster Server Strong grasp of network design, application/infrastructure security concepts, techniques, technologies, and tools Experience in working in an on/offshore environment and proven track record of delivering quality outcomes Customer service background able to empathize with customer and own the issues raised to resolution Leading team contribution to any queries requiring technical specialist input Other Required Skills: Experience in deployment and implementation of anyof the other PIM tools: CA PAM (Xceedium) BeyondTrust Quest / OneIdentity Thycotic ERPM Good understanding of LDAP concepts and working experience with at least few of the following directories: Oracle Internet Directory/Oracle Virtual Directory Sun Directory Server Active Directory Tivoli Directory Server Novell Directory Server CA Directory Experience in using database client tools like Toad, etc. Experience in using standard protocols like SSH, Telnet, RDP, etc. and related tools like Putty. Experience in working with the Network devices like firewalls, routers, etc. Should have the ability to understand customer scenario and requirements (may include customized integration situations) and be capable of suggesting solutions. Excellent communication skills and ability to work with global counterparts. Knowledge of basic networking Experience in Windows and Linux operating systems from PIM integration and debugging perspective Exposure to virtual environments with experience in integrating ESX, ESX(i) hosts with the PIM solution. Good troubleshooting skills Runbook documentation Qualifications: 5-7 years of strong PAM implementation experience Strong oral and written communications skills Customer Facing Exposure is must Open to travel requirements
Posted 1 week ago
8.0 - 13.0 years
6 - 10 Lacs
Bengaluru
Work from Office
The roe supports fu end to end software deveopment cyce, from initia cient engagement, through assessments and road-mapping, to onger term engagement in an advisory capacity. As an Appication Security Consutants, the person shoud everage the technica expertise of the security competencies, varied product and deivery capabiities Required education Bacheor's Degree Preferred education Master's Degree Required technica and professiona expertise Candidate with 8 + years of experience in IT domain with 3+ years on Deina (Thycotic) PAM impementation with Thycotic Certification (Optiona). Experience in deveopment and end to end impementation, design and architecture of privieged access soution using Deina Secret Serveries Experience in Instaing and upgrading secret server, onboarding secrets, remote password changing, configuring roes & Permissions, configuring foder structure, secret tempates, secret poicy, aunchers, session recording, account discovery, sites, event subscriptions, event pipeine poicy and other operationa activities for Deina Secret Server Preferred technica and professiona experience Knowedge of Web Services (REST/SOAP), Directories (LDAP, AD), etc and PowerShe scripts in PAM soution REST API Automations using PowerShe Scripting (Buk Upoad Utiity options, Account Onboarding PowerShe Script, User Deetion using Script PowerShe Script) Good understanding of LDAP concepts and working experience with at east few of the foowing directories:' Orace Internet Directory/Orace Virtua Directory, Sun Directory Server, Active Directory, Tivoi Directory Server
Posted 1 week ago
2.0 - 7.0 years
6 - 10 Lacs
Bengaluru
Work from Office
Candidates must be a CyberArk Certified Deivery Engineer (CCDE) or equivaent. The successfu appicant wi be an experienced CyberArk PAM consutant to take our cient's project forward and support the account. Taking on and further deveoping/depoying of our cient's Privieged Access Management soution based on CyberArk technoogy. Lead Consutant with demonstrabe experience of CyberArk Privieged Access Management soution experience. HLD and LLD experience. Abiity to work with the interna Project team and end customer to continue design and depoyment activities and further enhance the PAM soution. Documentation skis. Security Poicy and Governance experience and appreciation. Identity & Access Management/IDAM experience and knowedge. Design and deiver high quaity security architecture and infrastructure setups and/or sub-systems to agreed deadines. Assist customers in deveoping a secured privieged access management infrastructure and aso to define poicies to protect their appications/patforms/targets from unauthorized access Required education Bacheor's Degree Preferred education Master's Degree Required technica and professiona expertise 2+ years of industry experience with minimum 2+ years reevant experience in CyberArk privieged access soution. Experience in deveopment and impementation, design and architecture of privieged access soution using CyberArk Must possess the technica/functiona skis necessary to understand and manage consuting project engagements. Experience in end-to-end impementation ifecyce of CyberArk project Exceent hands-on knowedge on the best practices of depoying CyberArk PAS, incuding various components ike EPV, CPM, PVWA, PSM, PSMP, OPM and PTA. We versed with Active Directory. Experience in deveoping custom connectors using automation approaches ike AutoIT script Preferred technica and professiona experience Experience with Okta ASA, Ping, Saviynt, ForgeRock. Experience with JavaScript and one of the major JavaScript MVC frameworks (preferaby Anguar). Directory experience (AD, Azure AD, LDAP), SaaS depoyment experience. Knowedge of enterprise web technoogies, security and cutting-edge infrastructures Knowedge of Coud architectures and compex enterprise On-Premises IT andscapes and hybrid Coud/On-Prem architectures. Knowedge of enterprise identity ifecyce management processes and standards Proven track record in working as part of a team, meeting deadines, tutoring/mentoring. Experience with at east one of the foowing deveopment environments/anguagesJ2EE, Java, JavaScript. Experience in specific industry verticas is preferred
Posted 1 week ago
8.0 - 13.0 years
6 - 10 Lacs
Pune
Work from Office
The roe supports fu end to end software deveopment cyce, from initia cient engagement, through assessments and road-mapping, to onger term engagement in an advisory capacity. As an Appication Security Consutants, the person shoud everage the technica expertise of the security competencies, varied product and deivery capabiities Required education Bacheor's Degree Preferred education Master's Degree Required technica and professiona expertise Candidate with 8 + years of experience in IT domain with 3+ years on Deina (Thycotic) PAM impementation with Thycotic Certification (Optiona). Experience in deveopment and end to end impementation, design and architecture of privieged access soution using Deina Secret Serveries Experience in Instaing and upgrading secret server, onboarding secrets, remote password changing, configuring roes & Permissions, configuring foder structure, secret tempates, secret poicy, aunchers, session recording, account discovery, sites, event subscriptions, event pipeine poicy and other operationa activities for Deina Secret Server Preferred technica and professiona experience Knowedge of Web Services (REST/SOAP), Directories (LDAP, AD), etc and PowerShe scripts in PAM soution REST API Automations using PowerShe Scripting (Buk Upoad Utiity options, Account Onboarding PowerShe Script, User Deetion using Script PowerShe Script) Good understanding of LDAP concepts and working experience with at east few of the foowing directories:' Orace Internet Directory/Orace Virtua Directory, Sun Directory Server, Active Directory, Tivoi Directory Server
Posted 1 week ago
3.0 - 8.0 years
1 - 2 Lacs
Pune, Bengaluru
Work from Office
Job Description: Technical Skills Required: 36 months of experience in Centrify product Centrify Administration: Serve as the primary administrator for Centrify, overseeing the deployment, configuration, and maintenance of the Centrify environment. Manage privileged access and ensure secure authentication and authorization using Centrifys tools and solutions. Perform regular system checks, monitor performance, and ensure the high availability and reliability of Centrify services. Troubleshoot and resolve issues related to the Centrify infrastructure, including connectivity, policy enforcement, and access issues. Implement Centrify best practices and ensure compliance with organizational security policies and standards. Conjur Administration: Act as the secondary support for Conjur administration, including the installation, configuration, and maintenance of the Conjur environment. Manage secrets within Conjur, ensuring their protection and appropriate access control. Support daily operations, monitoring, and health checks of the Conjur system to ensure it is running optimally. Assist in troubleshooting and resolving Conjur-related issues and work collaboratively with other teams to integrate Conjur with other systems. Support and Troubleshooting: Serve as the Level 2 support contact for Centrify and Conjur-related issues, addressing escalations from Level 1 support and involving Level 3 support when necessary. Respond to and resolve support tickets, incidents, and requests efficiently, ensuring thorough documentation of issues and solutions. Conduct root cause analysis for recurring issues and recommend improvements to enhance system reliability and performance. Understanding of ITIL processes Ability to work with multiple stakeholders from Security, Operations, Application Owners and Service Providers on deployment activities and enhancing the IAM solution. Knowledge of Operating systems, Database concepts and others potential targets or endpoints for a typical IAM Solution. Good presentation and documentation skills
Posted 1 week ago
5.0 - 8.0 years
7 - 14 Lacs
Hyderabad
Work from Office
Job Description for IAM Integrating Provide user account life cycle management including creating provisioning securing and inactivation of access Collaborate with corporate IAM team in integrating IAM for applications and Infrastructure components Perform periodic access review and certifications Engineer and implement IAM solutions for Infrastructure components Onboard and maintain privileged accounts to vaults like CyberArk etc Engineer solutions in SailPoint for access management and review Review and Manage AWS IAM Roles Review and Manage ADOkta Groups Implement access solutions using AWS secret manager Create and Maintain Encryption Keys Review and Respond to Security Audits related to Access and Identity Management Develop and Lead governance tasks for Access and Identity Management Engineer and implement solutions to integrate cloud native services with centralized IDPs like Azure AD and Okta Troubleshooting issues with IAM tools and processes Review new IAM tools and Engineer solutions according to the infrastructure and application requirement Basic Required Qualifications Experience in managing IDPs like AzureAD Okta IDM etc Experience working in AWS Cloud Environment Experience working with Sailpoint or similar tools for user certification Experience working with CyberArk or similar privileged access management tool Experience managing users and groups for Openldap git Jenkins etc Experience in integrating application and cloud native services with centralized IDPs Experience in Install and Maintain Directory services like AzureAD OpenLDAP etc Experience in attending Security Audits Experience in Collaborating with Technical and Business Stakeholders Skills Mandatory Skills : Cloud Security - AWS Native Security
Posted 1 week ago
10.0 - 15.0 years
18 - 22 Lacs
Bengaluru
Work from Office
Date 22 May 2025 Location: Bangalore, KA, IN Company Alstom Req ID:482643 Job Title:IAM Architect OVERALL PURPOSE OF THE ROLE Take on a new challenge and apply your comprehensive IAM knowledge in a new cutting-edge field. Youll work alongside innovative, supportive, and solution-driven teammates. You'll spearhead the development and governance of identity and access management, ensuring alignment with our IAM security policy. Day-to-day, youll work closely with teams across the business (HR, Sourcing, Master Data managers, IS&T, business representatives), design IAM mechanisms and tools, and lead the functional and technical roadmap. Organisation structure (job belongs to..) Digital Services Reports directly to: Identity & Access Lead Architect Roles and Responsibility The IAM Architect has under his responsibility Collaborating on the definition of IAM standards Validating architecture against Security Policy Enhancing the global IAM architecture Supporting security aspects of IT projects related to IAM Perform Technical review and Impact assessment for all changes and new requirement. Update the design document and maintain Support level 5 expertise for IAM platforms and topics Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction. Contribute & validate new security solutions like B2B Operations and B2B SSO in IAM. PAM architecture & domain expertise Collaborate and support for troubleshooting and manage issues related to identities, authentication/authorization and access permissions. Able to analyse risks and to design an appropriate IAM security pattern (provisioning, habitation workflow, authentication, master data authorities, segregation of duty, Privileged Access Management, federation) Youll specifically take care of coordinating with stakeholders on IAM Architecture topics, managing identity lifecycle processes, and working with external/internal resources to support the Alstom IAM program. Recommend solutions for complex operational problems & implement industry best practices The IAM Architect would contribute actively to the security aspects related to IAM in Alstoms IT projects ISSCQ produce all Information System Security and Compliance Questionnaire at the initial phase of all projects Risk analysis perform risk analysis and identify mitigation plan when relevant Security Acceptance make the right decision considering the residual risk and the asset value Experience We value passion and attitude over experience. Thats why we dont expect you to have every single skill. Instead, weve listed some that we think will help you succeed and grow in this role Bachelors/Masters degree in Engineering/Technology or related field Overall 10+years of work experience, 4-5 years of experience in IAM architecture/security activities, with an IT Security background Expertise in IAM concepts and architecture Knowledge of ISO 27002 and ISO 27005 standards Professional industry standard certifications like CISSP, CISA, CEH, GIAC, CISM, etc. will be an added advantage Experience on IAM solutions within Saviynt AAG, Microsoft Azure or other IAG solution Experience on PAM (Privilege Access Management) solutions (eg Cyberark, BeyondTrust) Subject-matter expertise across all IAM topics as it relates to both cloud and on-premises enterprise technology, and the relationship between the architectures. Professional & concise communication (written & verbal) Technical Competencies Experience on operations IAM solutionsLevel 3 Experience on IAM solutions withinSaviynt AAG, Microsoft Azure or other IAG solutionLevel 3 Very Good understanding of Identity & access governance, Multi-Factor authentication and Privileged Access ManagementLevel 4 Good understanding on technologies related to Identity and access management, such as e.g. API ,AD,LDAP,SQL Level 4 Intimately familiar with IAM functional process and design (SOD, Workflow approval, MFA,..) Level 4 Good understanding on functional concept of Identity and access management (workflows, SOD, recertification access, provisioning, auto-correlation access, )Level 4 Very good understanding on security IAM principals and design (e.g network, ) Level 4 2-3 years of IAM Saviynt software experience is appreciated:Level 2 Behavioural Attributes Ability to work global with functional as well as technical teams in a dynamic environment Eye for details, structured and process oriented Demonstrated drive for continuous learning, results-orientation, and teamwork Influence stakeholders for improving and sustaining performance Demonstrate a positive mindset, high levels of character and integrity, and a keen awareness of continuous improvement Advise and collaborate with others to develop strong, positive working relationships across all levels of the organization to drive success of projects and efforts Offer creative, innovative, data-based solutions by focusing on forward progress and creativity, even when working through complex, often competing needs. You dont need to be a train enthusiast to thrive with us. We guarantee that when you step onto one of our trains with your friends or family, youll be proud. If youre up for the challenge, wed love to hear from you! Important to note As a global business, were an equal-opportunity employer that celebrates diversity across the 63 countries we operate in. Were committed to creating an inclusive workplace for everyone.
Posted 1 week ago
4.0 - 6.0 years
8 - 12 Lacs
Bengaluru
Work from Office
Date 2 Jun 2025 Location: Bangalore, KA, IN Company Alstom Req ID:481603 We create smart innovations to meet the mobility challenges oftoday and tomorrow. We design and manufacture a complete range of transportation systems, from high-speed trains to electric busesand driverless trains, as well asinfrastructure, signalling and digital mobility solutions. Joining us meansjoininga truly global community ofmore than38 900 people dedicated to solving real-world mobility challenges and achieving international projects with sustainable local impact. OVERALL PURPOSE OF THE ROLE: The primary responsibility of the specialist security Operationsis to ensure security risks are identified and managed within acceptable limits. The Security specialist will work closely with Design Authority, Solution Architects, IS Design,IS&T operations and Business teams to manage security of the organization RESPONSIBILITIES: To analyse and update critical and non critical log sources and their health status check for redundant log sources and take necessary steps working with right stake holders daily health check and monitoring of SOC infra Co-relationship, framework management for SOC use cases responsible for analytics and data crunching or data analysis and represenation of outcome for leadeship to make next decisions KPI definition, revision and imprvement for SOC infra, health and use cases TECHNICAL COMPETENCIES & EXPERIENCE To be considered for this role, candidate need to demonstrate the following skills experience and attributes: Bachelors/Masters degree in Engineering/Technology or related field Minimum 4-6 years of relevant IT experience Professional industry standard certifications like CISSP, CEH, GIAC, CISM, ISO 27002 etc. will be an added advantage Experience with various IT / Security technologies including, Active Directory, DNS, Messaging, Firewalls/ VPN Gateways, IPS, Proxy, WAF, PKI, IAM,etc. Good understanding of tools like CyberArk, PingIdentity, Sailpoint, Qualys, Veracode Proficient handson experience and understanding of various security tools and technologies. Experience in an operational role working directly with internal and external customers, trouble ticketing systems, and incident management Solid understanding of ITIL process framework Must understand and have worked in an operational environment such as a NOC or SOC for 2 4 years Demonstrated leadership experience in the area of Security Operations Proven planning, prioritization, and organizational skills Demonstrated drive for continuous learning, results orientation, and teamwork Ability to drive change through innovation & process improvement Ability to manage projects and drive action items with customers and crossfunctional peers Proven crisis management skills Professional & concise communication (written & verbal) Ability and flexibility to adapt to change, including shifting and competing priorities Demonstrated ability to be a big picture thinker, strategist, and long term planner Strong analytical skills with demonstrated problem solving ability Project management skills with a proven ability to design workable solutions will be an added advantage Exposure to ISO 27002 and ISO 27005 An agile, inclusive and responsiblecultureis the foundation of ourcompanywhere diverse people are offered excellent opportunities to grow, learn and advanceintheir careers.We are committed toencouragingour employeesto reach their full potential,while valuing and respecting them as individuals.
Posted 1 week ago
4.0 - 8.0 years
6 - 10 Lacs
Bengaluru
Work from Office
Senior SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Senior SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred Experience: Experience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures
Posted 1 week ago
4.0 - 8.0 years
6 - 10 Lacs
Bengaluru
Work from Office
SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred Experience: Experience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures
Posted 1 week ago
4.0 - 8.0 years
6 - 10 Lacs
Kochi
Work from Office
SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred Experience: Experience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures Preferred technical and professional experience SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis
Posted 1 week ago
2.0 - 7.0 years
4 - 9 Lacs
Bengaluru
Work from Office
Candidates must be a CyberArk Certified Delivery Engineer (CCDE) or equivalent. The successful applicant will be an experienced CyberArk PAM consultant to take our client's project forward and support the account. Taking on and further developing/deploying of our client's Privileged Access Management solution based on CyberArk technology. Lead Consultant with demonstrable experience of CyberArk Privileged Access Management solution experience. HLD and LLD experience. Ability to work with the internal Project team and end customer to continue design and deployment activities and further enhance the PAM solution. Documentation skills. Security Policy and Governance experience and appreciation. Identity & Access Management/IDAM experience and knowledge. Design and deliver high quality security architecture and infrastructure setups and/or sub-systems to agreed deadlines. Assist customers in developing a secured privileged access management infrastructure and also to define policies to protect their applications/platforms/targets from unauthorized access Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 2+ years of industry experience with minimum 2+ years relevant experience in CyberArk privileged access solution. Experience in development and implementation, design and architecture of privileged access solution using CyberArk Must possess the technical/functional skills necessary to understand and manage consulting project engagements. Experience in end-to-end implementation lifecycle of CyberArk project Excellent hands-on knowledge on the best practices of deploying CyberArk PAS, including various components like EPV, CPM, PVWA, PSM, PSMP, OPM and PTA. Well versed with Active Directory. Experience in developing custom connectors using automation approaches like AutoIT script Preferred technical and professional experience Experience with Okta ASA, Ping, Saviynt, ForgeRock. Experience with JavaScript and one of the major JavaScript MVC frameworks (preferably Angular). Directory experience (AD, Azure AD, LDAP), SaaS deployment experience. Knowledge of enterprise web technologies, security and cutting-edge infrastructures Knowledge of Cloud architectures and complex enterprise On-Premises IT landscapes and hybrid Cloud/On-Prem architectures. Knowledge of enterprise identity lifecycle management processes and standards Proven track record in working as part of a team, meeting deadlines, tutoring/mentoring. Experience with at least one of the following development environments/languagesJ2EE, Java, JavaScript. Experience in specific industry verticals is preferred
Posted 1 week ago
2.0 - 7.0 years
4 - 9 Lacs
Pune
Work from Office
Candidates must be a CyberArk Certified Delivery Engineer (CCDE) or equivalent. The successful applicant will be an experienced CyberArk PAM consultant to take our client's project forward and support the account. Taking on and further developing/deploying of our client's Privileged Access Management solution based on CyberArk technology. Lead Consultant with demonstrable experience of CyberArk Privileged Access Management solution experience. HLD and LLD experience. Ability to work with the internal Project team and end customer to continue design and deployment activities and further enhance the PAM solution. Documentation skills. Security Policy and Governance experience and appreciation. Identity & Access Management/IDAM experience and knowledge. Design and deliver high quality security architecture and infrastructure setups and/or sub-systems to agreed deadlines. Assist customers in developing a secured privileged access management infrastructure and also to define policies to protect their applications/platforms/targets from unauthorized access Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 2+ years of industry experience with minimum 2+ years relevant experience in CyberArk privileged access solution. Experience in development and implementation, design and architecture of privileged access solution using CyberArk Must possess the technical/functional skills necessary to understand and manage consulting project engagements. Experience in end-to-end implementation lifecycle of CyberArk project Excellent hands-on knowledge on the best practices of deploying CyberArk PAS, including various components like EPV, CPM, PVWA, PSM, PSMP, OPM and PTA. Well versed with Active Directory. Experience in developing custom connectors using automation approaches like AutoIT script Preferred technical and professional experience Experience with Okta ASA, Ping, Saviynt, ForgeRock. Experience with JavaScript and one of the major JavaScript MVC frameworks (preferably Angular). Directory experience (AD, Azure AD, LDAP), SaaS deployment experience. Knowledge of enterprise web technologies, security and cutting-edge infrastructures Knowledge of Cloud architectures and complex enterprise On-Premises IT landscapes and hybrid Cloud/On-Prem architectures. Knowledge of enterprise identity lifecycle management processes and standards Proven track record in working as part of a team, meeting deadlines, tutoring/mentoring. Experience with at least one of the following development environments/languagesJ2EE, Java, JavaScript. Experience in specific industry verticals is preferred
Posted 1 week ago
2.0 - 7.0 years
4 - 9 Lacs
Hyderabad
Work from Office
Candidates must be a CyberArk Certified Delivery Engineer (CCDE) or equivalent. The successful applicant will be an experienced CyberArk PAM consultant to take our client's project forward and support the account. Taking on and further developing/deploying of our client's Privileged Access Management solution based on CyberArk technology. Lead Consultant with demonstrable experience of CyberArk Privileged Access Management solution experience. HLD and LLD experience. Ability to work with the internal Project team and end customer to continue design and deployment activities and further enhance the PAM solution. Documentation skills. Security Policy and Governance experience and appreciation. Identity & Access Management/IDAM experience and knowledge. Design and deliver high quality security architecture and infrastructure setups and/or sub-systems to agreed deadlines. Assist customers in developing a secured privileged access management infrastructure and also to define policies to protect their applications/platforms/targets from unauthorized access Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 2+ years of industry experience with minimum 2+ years relevant experience in CyberArk privileged access solution. Experience in development and implementation, design and architecture of privileged access solution using CyberArk Must possess the technical/functional skills necessary to understand and manage consulting project engagements. Experience in end-to-end implementation lifecycle of CyberArk project Excellent hands-on knowledge on the best practices of deploying CyberArk PAS, including various components like EPV, CPM, PVWA, PSM, PSMP, OPM and PTA. Well versed with Active Directory. Experience in developing custom connectors using automation approaches like AutoIT script Preferred technical and professional experience Experience with Okta ASA, Ping, Saviynt, ForgeRock. Experience with JavaScript and one of the major JavaScript MVC frameworks (preferably Angular). Directory experience (AD, Azure AD, LDAP), SaaS deployment experience. Knowledge of enterprise web technologies, security and cutting-edge infrastructures Knowledge of Cloud architectures and complex enterprise On-Premises IT landscapes and hybrid Cloud/On-Prem architectures. Knowledge of enterprise identity lifecycle management processes and standards Proven track record in working as part of a team, meeting deadlines, tutoring/mentoring. Experience with at least one of the following development environments/languagesJ2EE, Java, JavaScript. Experience in specific industry verticals is preferred
Posted 1 week ago
4.0 - 9.0 years
6 - 11 Lacs
Mumbai
Work from Office
The CyberArk Operation Support Team Lead is a pivotal role responsible for overseeing and managing the day-to-day operations of the CyberArk environment. This position involves leading a team of support professionals, ensuring the availability, performance, and security of CyberArk solutions, and collaborating with cross-functional teams to deliver efficient privileged access management. Key Responsibilities * Team LeadershipSupervise and mentor a team of CyberArk support professionals, fostering collaboration and skill development. * Operational ManagementOversee the operational aspects of CyberArk solutions, ensuring 24/7 availability, scalability, and optimal performance. * Incident ManagementLead the resolution of CyberArk-related incidents and problems, coordinating with technical teams and stakeholders to ensure timely and effective solutions. * Security EnhancementCollaborate with the security team to implement and enhance security controls, policies, and procedures for privileged access management. * Performance MonitoringMonitor system performance, conduct regular health checks, and proactively identify and address potential performance bottlenecks. * Patch and Upgrade ManagementPlan and execute system upgrades, patches, and enhancements, ensuring minimal disruption to ongoing operations. * DocumentationMaintain thorough documentation of configurations, processes, and procedures related to CyberArk operations. * Vendor ManagementCoordinate with CyberArk vendors for support, troubleshooting, and escalations to ensure timely issue resolution. * Continuous ImprovementDrive continuous improvement initiatives to enhance the effectiveness and efficiency of CyberArk operations. * ReportingGenerate regular reports on system performance, incident management, and operational metrics for management review. * Willing to work in 24/7 operations and project support activities Required education Bachelor's Degree Preferred education Associate's Degree/College Diploma Required technical and professional expertise Proven experience in CyberArk operations and support, with a minimum of 4+years of hands-on experience. * Professional certifications such as CyberArk Certified Trustee (CCT) or Certified Delivery Engineer (CDE). Strong knowledge of privileged access management concepts and CyberArk technologies. Experience in organizations control, monitor, and secure privileged access across their IT infrastructure. Good Exposure in endpoint Analytics capabilities to identify unusual or suspicious activities related to privileged access. Preferred technical and professional experience * Leadership skills with the ability to guide and mentor a team effectively. * Problem-solving aptitude with a proactive approach to resolving technical challenges. * Strong communication skills for effective collaboration with cross-functional teams. * Detail-oriented mindset with a commitment to maintaining high standards. * Adaptability to changing requirements and a willingness to stay updated on emerging technologies
Posted 1 week ago
9.0 - 14.0 years
20 - 35 Lacs
Hyderabad, Pune, Bengaluru
Hybrid
CyberArk Certified Delivery Engineer or equivalent demonstrable experience and proven skills such as Defender Sentry. Experience managing or developing within the Cyber Ark toolset Managing secure administration and password management
Posted 1 week ago
4.0 - 9.0 years
7 - 17 Lacs
Nagpur
Work from Office
Work experience: 5+ years of experience Job Responsibility: Support for CyberArk PAM for customers across various industries. Manage the platform for CyberArk PAM. Prepare reports and update knowledge base articles. Work on password vaulting and account on-boarding. Work on incidents and service requests related to CyberArk PAM. Assist end-users with password management issues, resetting passwords, managing accounts and access policies. Understand and work on CyberArk vault configurations, session management, and auditing features. Skills and Qualifications: 2-4 years of experience in supporting or implementing Privilege Access management solutions. Knowledge of privileged access management. Basic understanding of integration with Active Directory and other authentication systems. Troubleshooting and debugging skills. Strong communication skills and ability to work with global teams. Experience with documentation and reporting. PAM L2 JD Work experience: 5+ years of experience Job Responsibility: Interacting with L3 and L1 teams for any tickets and incidents related to PAM solutions. Interacts with L3 teams and application owner for RCA and understanding issues for tickets raised Efficiently manage the CyberArk PAM environment at the organization Work on password vaulting and account on-boarding Platform management for CyberArk Password Safe for large customers. Update password policies, vault configurations, and session management features as per customer requirements. Troubleshoot and debug complex issues related to CyberArk Password Safe. Monitor the health of CyberArk Password Safe agents and integrations. Skills and Qualifications: 5+ years of experience in implementation or support, particularly in privileged access management. Good experience in managing CyberArk remote privilege access Manage and support end-to-end project related to CyberArk PAM. Carrying out server onboarding requests for CyberArk PAM environment. Monitor on premise agents and manage tickets related to CyberArk PAM Configure required workflows & policies within CyberArk PAM. Prepare Documentation for Operations Update SOPs and handbooks at a regular basis. PAM L3 JD Work experience: 8+ years of experience Job Responsibility: Interacts with company stakeholders and application owner for RCA and understanding current pain areas. Efficiently manage the CyberArk PAM environment at the organization. Manage and support end-to-end managed operations engagement. Coordinate with customer for any requirements and dependencies. Review all daily deliverables, reports before they are submitted to customer. Provide guidance to the project team; Provide regular progress reports and participate in management reviews. Organize project progress meetings as per the required frequency. Skills and Qualifications Strong PAM Technology (CyberArk PAM) Landscape Understanding Leadership experience for Governance, Dashboard based reporting and experience of Solutions Good understanding of PAM tools and architecture Delivery excellence Automation, Continuous improvement, Value add initiatives and internal compliances, Contractual obligations, SLA parameters, etc. Operational Excellence - Build teams and manage People parameters like Utilization, Attrition, Hygiene and internal compliances Customer Management Establish relationship at multiple levels in customer organization UAM L1 JD Work Experience: 2+ years of experience Skills required: Monitor ITSM queue for UAM tickets and route to appropriate teams as required. Perform Active Directory account creation and extension. Manually provisioning and deprovisioning user access to AD groups.
Posted 2 weeks ago
5.0 - 10.0 years
7 - 12 Lacs
Noida
Work from Office
RM Cost Management Specialist - Supply planning and Cost Control specialist has to work on wide spectrum in Global Services Delivery Support on supply planning, purchase orders, good receipts, cost analysis and financial reporting with various stakeholders. Are you passionate about solving problems You should have exposure on MBA / bachelors degree Good understanding of the Finance or Accountingstandards Excellent communication skills 5+ years of experience in handling cost management activities. It would be nice if you also had CPM Certification End to End Costing Lifecyle Negotiation skills Presentation skills As part of our team, you will Working with a team of Cost and progress professionals Ensure understanding of business problems Define / develop / deploy solutions under cost & progress Domain. Monitor and continuously enhance efficiency
Posted 2 weeks ago
8.0 - 12.0 years
15 - 20 Lacs
Gurugram
Work from Office
Looking for experts with 8+ years experience in Privilege Access Management (PAM) solution design, implementation, and configuration Must have. Minimum 3 years of experience in Architect PAM Solution Minimum 6 years of experience in implementation & configuration of PAM solution Hands-on experience in design, implementation, configuration, and integration of CyberArk/Thycotic Secret Server/BeyondTrust Hands-on experience in CyberArk/Thycotic Secret Server/BeyondTrust Hands on experience in account onboarding & server onboarding with Thycotic secret Server Hands on experience in Azure AD & Active Directory Good knowledge on Linux, Unix, and Windows Hands on experience in SaaS & cloud Excellent communication skills in English Good to have. Hands on experience in Identity And Access Management (IAM) Hands on experience in scripting such as VB, Power shell etc.
Posted 2 weeks ago
5.0 - 10.0 years
4 - 8 Lacs
Kolkata
Work from Office
Project Role : Security Advisor Project Role Description : Lead the effort and teams to enable development and implementation of proprietary and innovative security solutions. Assess, manage and ensure compliance to risk reducing behaviors and processes. Must have skills : Identity Access Management (IAM), ControlM Administration, CyberArk Privileged Access Management, Google Cloud Platform Administration, Unix, Python, Shell Scripting, Data Lake, MYSQL, Java, JavaSc Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : A Bachelors or Masters Degree in Technology or similar streams as fulltime education is required Summary :As a Security Advisor, you will lead the effort and teams to enable the development and implementation of proprietary and innovative security solutions. Your typical day will involve assessing and managing security risks, ensuring compliance with established processes, and collaborating with various teams to enhance security measures. You will play a crucial role in guiding the organization towards adopting best practices in security management, while also fostering a culture of risk awareness and proactive security measures across the organization. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills in security practices.- Monitor and evaluate the effectiveness of security solutions and recommend improvements. Professional & Technical Skills: - Must To Have Skills: Proficiency in Identity Access Management (IAM), CyberArk Privileged Access Management, Google Cloud Platform Administration, ControlM Administration.- Good To Have Skills: Experience with security compliance frameworks such as ISO 27001 or NIST.- Strong understanding of risk assessment methodologies and security best practices.- Experience in implementing security policies and procedures.- Familiarity with incident response and management processes. Additional Information:- The candidate should have minimum 7.5 years of experience in Identity Access Management (IAM).- This position is based at our Kolkata office.- A Bachelors or Masters Degree in Technology or similar streams as fulltime education is required. Qualification A Bachelors or Masters Degree in Technology or similar streams as fulltime education is required
Posted 2 weeks ago
15.0 - 20.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : SAP Security Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will design, build, and configure applications to meet business process and application requirements. A typical day involves collaborating with various teams to understand their needs, developing solutions that align with business objectives, and ensuring that applications are optimized for performance and usability. You will also engage in problem-solving activities, providing support and guidance to your team members while continuously seeking opportunities for improvement in application functionality and user experience. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate knowledge sharing sessions to enhance team capabilities.- Monitor application performance and implement necessary enhancements. Professional & Technical Skills: - Must To Have Skills: Proficiency in SAP Security.- Good To Have Skills: Experience with SAP GRC.- Strong understanding of user access management and role-based access control.- Experience in configuring and managing SAP security roles and authorizations.- Familiarity with compliance and audit requirements related to SAP security. Qualification 15 years full time education
Posted 2 weeks ago
8.0 - 13.0 years
15 - 30 Lacs
Mumbai
Work from Office
Position: Third Party Risk Management (TPRM) Manager Location: Mumbai Reports to: CISO Key Responsibilities: Due Diligence & Risk Assessment: Perform thorough due diligence on third-party vendors, evaluating operational, security, compliance, and financial risks. Vendor Monitoring & Reporting: Continuously assess and monitor third-party risks, security postures, and contract compliance. Report risk status to senior management. Risk Mitigation & Incident Management: Implement risk mitigation strategies and lead incident management for third-party breaches or failures. Cross-Department Collaboration: Work with procurement, legal, IT, and other business units to ensure third-party contracts and security align with risk management strategies. Technical Skills & Tools: Risk Management Tools: Experience with RSA Archer, MetricStream, or LogicManager for risk assessments, vendor scoring, and compliance tracking. Security Monitoring: Proficiency in SIEM tools like Splunk, IBM QRadar, and ArcSight for detecting, analyzing, and managing third-party security events. Vulnerability Management: Hands-on experience with Tenable.io, Qualys, or Rapid7 Nexpose for vulnerability scanning and management. Third-Party Management Platforms: Familiarity with OneTrust, ProcessUnity, or Prevalent for ongoing third-party risk assessments and monitoring. Incident Response: Experience using tools like ServiceNow or PagerDuty for handling third-party security incidents and coordinating remediation actions. IAM Tools: Working knowledge of Okta, CyberArk for ensuring secure vendor access to bank systems. Qualifications: Education: Bachelor's degree ISO/IEC 27001 Lead Implementer PCI DSS Certified Information Systems Auditor (CISA) Strong analytical skills with the ability to assess and mitigate complex third-party risks. Excellent communication and stakeholder management skills. Ability to navigate regulatory environments and ensure compliance with third-party risk policies. Ability to drive strategic risk management initiatives while handling day-to-day operational challenges. Interested candidates can share CV at jeshant.katoch@paytmbank.com
Posted 2 weeks ago
3.0 - 8.0 years
13 - 17 Lacs
Chennai
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and facilitating the transition to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud security challenges. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular assessments of cloud security measures to identify potential vulnerabilities and recommend improvements.- Collaborate with cross-functional teams to ensure alignment of security practices with business objectives. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Strong understanding of cloud security principles and best practices.- Experience with identity and access management solutions.- Familiarity with compliance frameworks such as ISO 27001, NIST, or GDPR.- Ability to analyze security incidents and develop effective response strategies. Additional Information:- The candidate should have minimum 3 years of experience in CyberArk Privileged Access Management.- This position is based at our Chennai office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 8.0 years
13 - 17 Lacs
Hyderabad
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Develop and implement security architecture solutions.- Conduct security assessments and define security requirements.- Collaborate with cross-functional teams to ensure security measures are integrated.- Stay updated on the latest security trends and technologies.- Provide guidance and support to junior security professionals. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Strong understanding of security architecture principles.- Experience in implementing cloud security controls.- Knowledge of security compliance standards and regulations.- Hands-on experience with security tools and technologies. Additional Information:- The candidate should have a minimum of 3 years of experience in CyberArk Privileged Access Management.- This position is based at our Hyderabad office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane