Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 7.0 years
0 - 3 Lacs
Noida, Greater Noida
Work from Office
Job Summary: We are seeking a skilled and detail-oriented CyberArk Implementation Engineer to join our cybersecurity team. The ideal candidate will be responsible for the design, deployment, configuration, and support of CyberArk Privileged Access Management (PAM) solutions. This role requires deep technical expertise in CyberArk and a strong understanding of identity and access management (IAM) principles. Key Responsibilities: Design and implement CyberArk solutions including Enterprise Password Vault (EPV), Privileged Session Manager (PSM), Central Policy Manager (CPM), and Privileged Threat Analytics (PTA). Integrate CyberArk with various platforms such as Windows, UNIX/Linux, databases, network devices, and cloud environments. Configure and manage CyberArk components, policies, safes, and user access. Perform upgrades, patches, and health checks of CyberArk infrastructure. Collaborate with security architects and stakeholders to define PAM strategies and roadmaps. Develop and maintain documentation including architecture diagrams, configuration guides, and operational procedures. Troubleshoot and resolve CyberArk-related issues and incidents. Conduct training and knowledge transfer sessions for internal teams. Ensure compliance with security policies, standards, and regulatory requirements. Required Qualifications: Bachelors degree in Computer Science, Information Technology, or related field. 2 to 10 years of experience in implementing and managing CyberArk solutions. Strong knowledge of IAM concepts and privileged access management. Hands-on experience with CyberArk components (EPV, PSM, CPM, PTA, PVWA). Familiarity with scripting languages (PowerShell, Python, etc.) for automation. Experience with Active Directory, LDAP, and cloud platforms (AWS, Azure, GCP). CyberArk certification (e.g., Defender, Sentry) is highly desirable.
Posted 1 month ago
2.0 - 7.0 years
0 - 3 Lacs
Bangalore Rural, Bengaluru
Work from Office
Job Summary: We are seeking a skilled and detail-oriented CyberArk Implementation Engineer to join our cybersecurity team. The ideal candidate will be responsible for the design, deployment, configuration, and support of CyberArk Privileged Access Management (PAM) solutions. This role requires deep technical expertise in CyberArk and a strong understanding of identity and access management (IAM) principles. Key Responsibilities: Design and implement CyberArk solutions including Enterprise Password Vault (EPV), Privileged Session Manager (PSM), Central Policy Manager (CPM), and Privileged Threat Analytics (PTA). Integrate CyberArk with various platforms such as Windows, UNIX/Linux, databases, network devices, and cloud environments. Configure and manage CyberArk components, policies, safes, and user access. Perform upgrades, patches, and health checks of CyberArk infrastructure. Collaborate with security architects and stakeholders to define PAM strategies and roadmaps. Develop and maintain documentation including architecture diagrams, configuration guides, and operational procedures. Troubleshoot and resolve CyberArk-related issues and incidents. Conduct training and knowledge transfer sessions for internal teams. Ensure compliance with security policies, standards, and regulatory requirements. Required Qualifications: Bachelors degree in Computer Science, Information Technology, or related field. 2 to 10 years of experience in implementing and managing CyberArk solutions. Strong knowledge of IAM concepts and privileged access management. Hands-on experience with CyberArk components (EPV, PSM, CPM, PTA, PVWA). Familiarity with scripting languages (PowerShell, Python, etc.) for automation. Experience with Active Directory, LDAP, and cloud platforms (AWS, Azure, GCP). CyberArk certification (e.g., Defender, Sentry) is highly desirable.
Posted 1 month ago
2.0 - 7.0 years
0 - 1 Lacs
Thane, Navi Mumbai, Mumbai (All Areas)
Work from Office
Job Summary: We are seeking a skilled and detail-oriented CyberArk Implementation Engineer to join our cybersecurity team. The ideal candidate will be responsible for the design, deployment, configuration, and support of CyberArk Privileged Access Management (PAM) solutions. This role requires deep technical expertise in CyberArk and a strong understanding of identity and access management (IAM) principles. Key Responsibilities: Design and implement CyberArk solutions including Enterprise Password Vault (EPV), Privileged Session Manager (PSM), Central Policy Manager (CPM), and Privileged Threat Analytics (PTA). Integrate CyberArk with various platforms such as Windows, UNIX/Linux, databases, network devices, and cloud environments. Configure and manage CyberArk components, policies, safes, and user access. Perform upgrades, patches, and health checks of CyberArk infrastructure. Collaborate with security architects and stakeholders to define PAM strategies and roadmaps. Develop and maintain documentation including architecture diagrams, configuration guides, and operational procedures. Troubleshoot and resolve CyberArk-related issues and incidents. Conduct training and knowledge transfer sessions for internal teams. Ensure compliance with security policies, standards, and regulatory requirements. Required Qualifications: Bachelors degree in Computer Science, Information Technology, or related field. 2 to 10 years of experience in implementing and managing CyberArk solutions. Strong knowledge of IAM concepts and privileged access management. Hands-on experience with CyberArk components (EPV, PSM, CPM, PTA, PVWA). Familiarity with scripting languages (PowerShell, Python, etc.) for automation. Experience with Active Directory, LDAP, and cloud platforms (AWS, Azure, GCP). CyberArk certification (e.g., Defender, Sentry) is highly desirable.
Posted 1 month ago
3.0 - 7.0 years
15 - 19 Lacs
Bengaluru
Work from Office
locationsIndia, BangaloreMalaysia, Penang time typeFull time posted onPosted 30+ Days Ago job requisition idJR0269409 Job Details: About The Role : As PAM Engineer it will need CyberArk and Conjur Role and Responsibilities Hands on experience in Installing, Upgrading and Setting up CyberArk EPM, CPM, PSM, PSMP, AIM to Customizing, configuring it for given Policies and procedures. Hands-on experience in Installing and Setup CyberArk Conjur Enterprise Hands on experience in integrating Conjur with Jenkins, GitHub Action Kubernetes. Strong Knowledge in Docker Container management. Good Knowledge in Linux administration and Patching Design, architecture, and migration experience on Cyber Ark Provisioning, creating workflows, custom connectors, policies Integrating various platforms with Cyber Ark, such as different LDAP providers, Windows servers, UNIX servers, Databases, and networking Devices Creation of automation scripts using PACLI and REST API experience on customization of CyberArk Platforms Custom PSM Connectors CPM Plugins with AutoIT Shell Scripting. Good knowledge on auto detection configuration and usage of Discovery Scanning tools. Experience on AIM CP and CCP agents installation and upgradation experience on CyberArk version upgrade experience on DR Drill activities knowledge on HSM and PTA integration would be an added advantage. Qualifications: Knowledge and Skill needed to perform this job: Windows and Linux server management, Proficient in PAM/ Conjur/ CyberArk tools DevOps integration with Jenkins, GitHub , Kubernetes , Puppet, Docker ? Shell scripting Understanding of REST API work model. Education and experience needed to perform this job: Minimum 5-7 years hands on working experience are necessary. Certificates on required skillset like Linux and Conjur etc. will add value. Job Type: Experienced Hire Shift: Shift 1 (India) Primary Location: India, Bangalore Additional Locations: Malaysia, Penang Business group: Intel's Information Technology Group (IT) designs, deploys and supports the information technology architecture and hardware/software applications for Intel. This includes the LAN, WAN, telephony, data centers, client PCs, backup and restore, and enterprise applications. IT is also responsible for e-Commerce development, data hosting and delivery of Web content and services. Posting Statement: All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance. Position of Trust N/A Work Model for this Role This role will be eligible for our hybrid work model which allows employees to split their time between working on-site at their assigned Intel site and off-site. *
Posted 1 month ago
2.0 - 6.0 years
6 - 9 Lacs
Hyderabad
Work from Office
Diverse Lynx is looking for Cyber Ark Engineer to join our dynamic team and embark on a rewarding career journey. Analyzing customer needs to determine appropriate solutions for complex technical issues Creating technical diagrams, flowcharts, formulas, and other written documentation to support projects Providing guidance to junior engineers on projects within their areas of expertise Conducting research on new technologies and products in order to recommend improvements to current processes Developing designs for new products or systems based on customer specifications Researching existing technologies to determine how they could be applied in new ways to solve problems Reviewing existing products or concepts to ensure compliance with industry standards, regulations, and company policies Preparing proposals for new projects, identifying potential problems, and proposing solutions Estimating costs and scheduling requirements for projects and evaluating results
Posted 1 month ago
2.0 - 7.0 years
6 - 10 Lacs
Mumbai
Work from Office
Work Schedule: Shift-Rotational Responsibilities Provide CyberArk expert technical services to enterprise customers Lead and manage the successful implementations of CyberArk solutions at strategic customers Understand and ensure successful delivery of the customer's objectives Provide technical expertise and support to regional customers and partners Understand current requirements and processes, identifying additional opportunities within the account Solve technical issues through research, reproduction, and troubleshooting while applying acquired knowledge Document all technical inquiries Develop and review content for knowledge sharing for both internal purposes and customer-facing platforms Help expand the usage of our solutions with our customers Hands on experience in Connector Handle L2 level issues Good knowledge in CyberArk Architecture Need hands on experience in Customization Key Requirements Candidate should have implemented CyberArk PIM suite solution in production or LAB environment Must have knowledge on Integration of Active Directory, SMTP, and third-party tools with CyberArk Good understanding of CyberArk concepts 5+ years' experience as a windows administrator 5+ years' experience with Active Directory, Group policy and RDS services Demonstrable knowledge of Information Security and Network Architecture concepts Mastery of Windows Operating Systems and environments, IIS and LDAP Experience with UNIX/Linux Experience with virtualization Experience with Cloud Services - AWS, Google, Azure (advantage) Excellent written and verbal communications skills Scripting/Development experience (Advantage) Knowledge of developing a custom connector for CPM and PSM Auto IT, PowerShell Scripting/Development experience (Advantage) Experience in upgrading CyberArk PAM solution (Advantage) Demonstrable knowledge of Information Security and Network Architecture concepts Experience with the following technologies: IDM, SSO, SIEM, Application Servers, Authentication Products and Ticketing System (Advantage) Strong knowledge of Windows Servers Must have Excellent written and verbal communications skills Must be able to work independently as well as with others Must be willing to work in shift-rotational schedule Priority for cyber ark certified persons
Posted 1 month ago
3.0 - 8.0 years
10 - 20 Lacs
Mumbai, Pune, Bengaluru
Work from Office
As a PAM Engineer , you will be a part of an Agile team to build healthcare centric solutions for Identity Access & Privileged Identity Lifecycle Management. Responsibilities: - Deploy and configure PAM tools across the organization, integrating with existing systems like Active Directory and ticketing platforms. Define access policies, including session recording, least privilege principles, and multi-factor authentication for privileged accounts. Regularly review and audit privileged accounts, identifying and removing unnecessary access. Manage account lifecycles, including provisioning, deprovisioning, and password rotations. Conduct access reviews with stakeholders to ensure appropriate privilege levels. Monitor PAM system logs for suspicious activity, identifying potential security breaches related to privileged access. Investigate security incidents involving privileged accounts and escalate critical issues to relevant teams. Provide training to users on PAM policies, procedures, and best practices for accessing privileged accounts. Troubleshoot user issues related to privileged access and provide technical support. Ensure PAM system adheres to relevant security standards and regulations (e.g., SOX, HIPAA, GDPR). Maintain comprehensive documentation of PAM configurations, policies, and procedures. Experience: - 3 - 8 Years Location: - Mumbai Bangalore Pune Reporting: AVP Identity and Access Manager Practice Head Educational Qualifications: - Graduation Degree – BE/BTech/ME/B.Sc in Computer Science/MTech in Computer Science. Certifications as CISSP, CIMP, CIAM, CIGE, Microsoft Identity and Access Administrator Associate, or IAM CIAM vendor specific (as SailPoint, PING, Okta certifications) , any two of these will be a plus Mandatory Technical Skills: 3+ years of experience with Privileged Access Management solutions, including advanced configuration and troubleshooting. In-depth knowledge of PAM solutions (e.g., CyberArk, BeyondTrust, Delinea) Understanding of identity and access management (IAM) concepts Familiarity with scripting languages (e.g., PowerShell, Bash) for automation Strong grasp of security principles like least privilege, separation of duties, and access control mechanisms Awareness of common cyber threats and mitigation strategies Ability to effectively communicate technical concepts to both technical and non-technical stakeholders Collaborate with IT teams, security teams, and business units to implement PAM solutions Proven experience managing and administering PAM systems in a complex enterprise environment Experience with security audits and compliance requirements related to privileged access Excellent written and verbal communication skills, with the ability to translate technical concepts for non-technical audiences. Strong customer-facing skills, including experience in conducting client meetings, presentations, and training sessions. Experience with related tools such as Active Directory, Azure AD, or other identity management platforms is a plus. Hands-on experience of implementation and engineering in CyberArk, Delinea or one of the similar PAM tools. Experience in creating solutions for PAM and supporting sales. Knowledge of the evolution in product and technology space including solutions for the cloud.
Posted 1 month ago
8.0 - 10.0 years
16 - 27 Lacs
Navi Mumbai, Mumbai (All Areas)
Work from Office
Role & responsibilities: Work independently on Privileged access management pre-sales activities , which include response to RFPs, solution design & proposals ,solution presentations. Lead and Architect large scale Privileged access management(PAM) solutions, which include PAM strategy, roadmaps , assessments , vendor evaluations & implementations. Manage project deliveries and teams to mitigate project risks. Assist senior leadership in PAM practice development activities. Interact with client teams and help in identifying the process improvements . Lead requirement gathering, design by conducting workshops with client teams for multiple projects. Mentor junior members of the team. Involve in research areas and conduct product proof of concepts to achieve best product functionality and lead technical initiatives. Preferred candidate profile: Must have- Should have experience in implementing multiple PAM projects in any one of the following Access Management products CyberArk App plugin development Identity and access management & Privileged Access Management technologies. Privileged access management pre-sales activities , which include response to RFPs, solution design & proposals ,solution presentations Yrs of Exp: 8-10 yrs Exp CTC Range : 27-29 LPA Level: Manager Location: Mumbai
Posted 1 month ago
8.0 - 10.0 years
12 - 17 Lacs
Coimbatore
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.
Posted 1 month ago
8.0 - 10.0 years
12 - 17 Lacs
Noida
Work from Office
Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Privilege Password Management CyberArk. Experience8-10 Years.
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years.
Posted 1 month ago
2.0 - 7.0 years
5 - 9 Lacs
Bengaluru
Work from Office
CyberArk Developer who is we'll versed in creating components, plugins and we'll versed in L3 engineering activities in CyberARK Good knowledge in cybersecurity,PAM domain Excellent communication skills
Posted 1 month ago
8.0 - 13.0 years
20 - 35 Lacs
Hyderabad, Chennai, Bengaluru
Work from Office
Job Title: Senior Cybersecurity Engineer Cloud & Network Security Perm Opportunity . Location: Dubai Experience: 8+ years Employment Type: Full-time Industry: Information Technology & Services Functional Area: Information Security Education: Bachelors/Masters in Computer Science, Information Security, or related field Job Description: We are seeking an experienced Senior Cybersecurity Engineer to strengthen our cloud and network security infrastructure. The ideal candidate will have a strong background in enterprise security solutions and a passion for safeguarding digital assets. Key Responsibilities: Design and manage Zscaler ZIA/ZPA for secure cloud access and zero-trust networking. Administer CyberArk PAM solutions, including vault management and session monitoring. Configure and optimize Web Application Firewalls (WAF) to mitigate OWASP Top 10 threats. Deploy and troubleshoot FortiGate firewalls with NGFW features like IPS/IDS and VPN. Manage Forcepoint Secure Web Gateway for URL filtering and threat prevention. Operate CrowdStrike Falcon for EDR/XDR, including threat hunting and incident response. Conduct security assessments and ensure compliance with NIST and ISO 27001 standards. Key Skills: Zscaler (ZIA, ZPA, ZDX) CyberArk Web Application Firewall (WAF) FortiGate Forcepoint CrowdStrike Falcon Python/PowerShell scripting for automation Preferred Certifications: CISSP CCSP Fortinet NSE4+ CrowdStrike Certified Falcon Administrator Role & responsibilities Preferred candidate profile
Posted 1 month ago
5 - 8 years
5 - 9 Lacs
Hyderabad
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 1 month ago
3 - 8 years
3 - 7 Lacs
Bengaluru
Work from Office
Hiring PAM Administrator with 4–5 yrs experience for HPE (Bangalore, WFO). Must have CyberArk skills in upgradation, patching & troubleshooting. Immediate joiners/notice period candidates preferred.
Posted 1 month ago
5 - 10 years
12 - 22 Lacs
Pune
Work from Office
Job description We are looking for an Identity and Access Management Architect. The main scope of work includes everything from IAM project design and development, implementation, administration and support. Expertise in more than 5 years into Saviynt. Roles and Responsibilities: Design and implement Saviynt solutions to meet the security and compliance requirements of our organization. Configure the REST connector with different platform applications. Hands-on experience on JAVA with respect to IGA. Good to have experience who worked on heavy Saviynt instance of 1L+ users. Configure the child applications and direct integrations. Good to have knowledge on SAP, ABAP connect, SCIM connector and SAP cloud application provisioning. Must hands on experience on Success factor, SAP HANA connector and JDBC connector. Must hands-on experience on Saviynt features like Custom action, Technical and user update rules, endpoints, analytics, SODs, Certifications, Service Accounts, custom integrations, connections, roles, RBAC, DB structure and SSO etc. Collaborate with cross-functional teams to gather requirements and define the scope of Saviynt projects. Develop and maintain technical documentation, including architecture diagrams, design specifications, and implementation plans. Configure and customize Saviynt modules to align with our organization's security policies and procedures. Conduct regular audits and assessments to identify vulnerabilities and recommend remediation actions. Provide technical guidance and support to the Saviynt implementation team, ensuring successful deployment and integration of Saviynt solutions. Stay up to date with the latest industry trends and best practices in Saviynt architecture and enterprise security. Preferred candidate profile Bachelors degree in computer science, Information Technology, or a related field. 5 to 10 years of experience in the Enterprise Security domain, with a focus on Saviynt architecture and implementation. Strong knowledge of Saviynt modules, including Identity Governance and Administration (IGA), Access Request and Certification, and Access Analytics. Experience in designing and implementing Saviynt solutions for large-scale organizations. Proficient in programming languages such as Java, Python, or PowerShell. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams
Posted 1 month ago
5 - 8 years
15 - 27 Lacs
Pune
Hybrid
Job description- We are looking for an Identity and Access Management Senior Consultant. The main scope of work includes everything from IAM project design and development, implementation. Should have expertise in CyberArk PAM. Skill Sets: Hands on Experience with CyberArk. Hands on experience with Connector Configuration like Active Directory, Azure Active directory, SAP R/3, SCIM and Custom PowerShell connector. Should have implemented requirement (with minimum customizations) based on use cases. Should be familiar with IAM technologies (OAuth/SAML/REST/SCIM/SSO/WebSSO). Roles & Responsibilities: Support head of PAM by solving issues resulting from incidents and developing solutions based on requests by customer. Taking care of run topics. Suitable candidate will work in a project independently. Analyzing customer requirements, designing and implementing solutions. Conduct walkthrough session with client for developed functionality. Support deployment process to promote code in higher environments. Debugging and troubleshooting of issues in CyberArk. Analyze issue, provide recommendations and implement the solution. Provide support for ongoing project.
Posted 1 month ago
6 - 10 years
15 - 25 Lacs
Bengaluru
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all – at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science – taking information that has been gathered and looking for areas to have that “Ah Ha” moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity – governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience Experience: Minimum of 4-6 years of relevant experience in CyberArk administration and cybersecurity practices, with proven hands-on experience in Privileged Access Management (PAM) using PSM/PSMP. CyberArk Privilege Cloud Management : Proven experience managing CyberArk SaaS Privilege Cloud and its associated components infrastructure. Tenant Management and Cloud Connectors: Strong understanding of Tenant Management, Secure Tunnel, and Cloud Connectors within CyberArk. CyberArk Onboarding : Experience managing CyberArk onboarding activities, including onboarding accounts via RESTAPI, manual onboarding, and bulk onboarding processes. Platform and Safe Creation: Ability to create new safes, accounts, and platforms in CyberArk and link new platforms to the CyberArk environment. Privileged Account Management: Securely managing and monitoring privileged account access to target hosts using Privileged Session Manager (PSM) and Privileged Session Manager Proxy (PSMP). LDAP & AD Federation : Strong knowledge of LDAP and AD Federation. Familiarity with secure integrations with external services such as LDAP/S and RADIUS. CyberArk PAS Components Knowledge: Familiarity with various CyberArk PAS components, including: Privilege Access Suite (PAS) Secure Password Vault and Safes Password Vault Web Access (PVWA) Central Policy Manager (CPM) Privileged Session Manager (PSM & PSMP) Application Identity Manager (AIM), Central Policy (CP), and Central Credential Provider (CCP). Password Management & Compliance: Experience managing privileged account passwords, including verification, change, and reconciliation, ensuring compliance with organizational policies. Session Management: Understanding of user sessions directed through PSM and PSMP for monitoring and auditing. Policy and Reporting: Experience in creating/modifying master policies, and generating reports on safes and user activity. Health Checks & Monitoring: Performing health checks on CyberArk infrastructure and monitoring various components to ensure system integrity and uptime. Troubleshooting & Configuration: Ability to troubleshoot configuration and connectivity issues related to PAM services and components, including network connectivity issues and load balancing. Server Administration: Proficient in Linux Red Hat 7/8, Windows Server 2016/2019/2022 administration. Database and Directory Services: Knowledge of managing database targets, LDAP, AD, and IAM systems. PowerShell & Python Knowledge: Basic knowledge of PowerShell and Python scripting for automation and system integration is a strong advantage. Networking Concepts: Understanding of networking concepts, including firewalls, routing, and load balancing. Disaster Recovery & Failover: Solid knowledge of CyberArk disaster recovery, failover, and failback mechanisms to ensure availability and business continuity. Vault Data Backup: Experience in Vault Data Backup processes for ensuring critical data is securely backed up and protected. Change Management: Proven experience in managing change processes, including preparing and executing delivery plans during Change Advisory Board (CAB) reviews. Incident Handling: Responsible for managing complex and escalated incidents and requests with a focus on resolving issues efficiently. KPI Compliance: Ensuring adherence to KPI metrics for incident and service request resolution, including timely communication and escalation procedures. Stakeholder Communication: Providing input and updates to stakeholders involved in critical incidents, particularly during outages or system failures. Preferred Technical and Professional Experience CyberArk Certifications: Certification as CyberArk Defender, Sentry, or CPC-PAM would be a plus. Troubleshooting Expertise: Advanced troubleshooting skills for identifying and resolving configuration, connectivity, and system performance issues related to PAM services. Report Generation: Experience using CyberArk’s PAS Reporter and Telemetry tools to generate and analyze operational reports. Team Collaboration: Ability to work as a key team player, participating in regular team reviews and contributing to continuous improvement. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 1 month ago
3 - 7 years
5 - 9 Lacs
Gurugram
Work from Office
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. Requirements: Proficient with Active Directory and related concepts Familiar with access control methods (RBAC/ABAC) Working knowledge of identity lifecycle management processes and challenges Hands-on experience with cybersecurity tools that function in the following spacesPAM / PIM / IAM, DLP, SOAR (XSIAM), Microsoft Security, AWS Security, Red Teaming / AppSec, Isolated Recovery Environments (IREs) Experience with identity federation and SSO solutions PAM experience or familiarity with specific vendor tools Able to speak to PAM best practices Understanding of the principle of least privilege, separation of duties Experience with REST API and app integration Experience configuring, guiding, or overseeing access review and certification, role management Past participation in identity steering committee Understanding of PIM, JIT, conditional access Familiarity with US compliance and regulatory frameworks that inform identity requirements Qualifications: 6+ years of working knowledge of one or more Identity-Based Security SolutionsOkta, Sailpoint, Delinea, BeyondTrust, CyberArk, etc. Any of the following preferred but not required Security+, CISSP, any vendor-specific certifications related to Identity products Willingness to travel to support client projects and shadowing opportunities (50+ % of the time) Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (OTE) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.
Posted 1 month ago
6 - 10 years
5 - 9 Lacs
Gurugram
Work from Office
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. The Senior Consultant, ADDM (Application Discovery and Dependency Mapping) is responsible for leading and delivering Application Discovery and Dependency Mapping project workstreams. They are the subject matter expert (SME) for Application Discovery and Dependency Mapping. The SME works closely with other technology SMEs to build and validate accurate application affinity groups and associated business applications within the ADDM platform. Key Responsibilities Use of Application Discovery and Dependency Mapping platforms including but not limited to Device42. Creates and maintains ADDM platform configurations to accommodate Client requirements. Configures and maintains automated discovery jobs and associated scheduling. Coordinate efforts with other SMEs, Client resources, and vendors to remediate discovery job errors. Lead ADDM workstreams including assisting in project plan development, project status reporting, coordination of Client and internal resources, and adhering to established project schedules and timelines. Independently work with Client stakeholders to ensure affinity groups and associated business applications are accurately developed and validated in the ADDM platform. Generate standard and custom reporting to support the development of project deliverables. Participate as a subject matter expert in project workshops. Maintain close communication with Client stakeholders including senior leadership on matters that require explanation, interpretation, or advice. Develop and promote relationships both internally and with client stakeholders. Participate in business development efforts for ADDM opportunities including assisting or leading POCs and demos, project scoping, and proposal development. Mentor other internal resources on the use of ADDM platforms by leading training and knowledge transfer sessions. Qualifications At least five (5) years as an IT Manager, Director, or Consultant at a Management Consultant Organization (Big 4, Slalom, etc.). At least two (2) years of experience in conducting Application Discovery and Dependency Mapping with Device42. Experience with other platforms such as Flexera Foundation/Cloudscape, ServiceNow Discovery/MID, AWS Migration Evaluator, Microsoft Azure Migrate, and/or Google StratoZone is also highly preferred. Experience with other systems of record such as ServiceNow CMDB, LeanIX, Confluence, Jira, SolarWinds, Datadog, Dynatrace, etc. are also important skills used in the delivery of ADDM services. Knowledge of ITSM and ITOM processes including CMDB. Understanding of authentication technologies such as Active Directory, LDAP, TACACS, CyberArk, etc. Basic understanding of Linux/Unix shell commands. Understanding of networking topics including IP Addressing, TCP/UDP Ports, TCP/IP Protocols, load balancers, firewalls, NAT, etc. Ability to troubleshoot a network connection by using ping, traceroute, netstat and other commands. Understanding of common application architectures and components (database, middleware, web, etc.) Basic understanding of IaaS/PaaS cloud computing. Experience and/or familiarity with AWS, Azure, Google are a plus. Ability to manipulate and analyze large data sets in Microsoft Excel and Microsoft PowerBI for data visualizations. Ability to communicate esoteric technical concepts to business leaders using verbal communication and visual aids such as PowerPoint or PowerBI. Education Undergraduate degree in Computer Science, Mathematics, or similar discipline. Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (OTE) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.
Posted 1 month ago
2 - 7 years
4 - 9 Lacs
Pune, Bengaluru
Work from Office
Job Title: Conjur Admin Secrets Management & DevSecOps Location: Pune / Bangalore Experience: 2–8 Years Employment Type: Full-Time Job Description We are looking for a skilled and motivated Conjur Admin to join our cybersecurity and DevSecOps team. In this role, you will be responsible for implementing and managing CyberArk Conjur solutions to secure and automate secrets management across our cloud infrastructure, CI/CD pipelines, and application environments. You will work closely with security, DevOps, and cloud engineering teams to design scalable and compliant secret access solutions, ensuring secure credential storage and governance throughout the development lifecycle. Key Responsibilities Deploy, configure, and manage CyberArk Conjur (Open Source or Enterprise). Implement secure secret injection for applications, services, and pipelines. Create and manage policies, roles, authentication layers (LDAP, Kubernetes, AWS IAM, etc.). Automate secret lifecycle: generation, rotation, expiration, and revocation. Integrate Conjur with CI/CD tools (Jenkins, GitLab, GitHub Actions). Secure cloud-native and containerized environments (AWS, Azure, GCP, Kubernetes, OpenShift). Support audits, compliance reviews, and security assessments. Enforce least-privilege and Zero Trust principles. Required Skills Hands-on experience with CyberArk Conjur (Open Source or Enterprise). Strong Linux/Unix administration and scripting skills. Familiarity with IAM, TLS/SSL, PKI, and REST APIs. Experience with DevOps and automation tools (Docker, Kubernetes, Terraform, Ansible, Jenkins). Solid understanding of secrets management and application security best practices. Preferred Qualifications CyberArk or relevant security certifications. Experience with other secret management tools (Vault, AWS Secrets Manager, etc.). Familiarity with compliance standards like SOC 2, HIPAA, ISO 27001. Why Join Us? Work on cutting-edge DevSecOps and cloud security initiatives. Collaborate in a high-impact, security-first engineering culture. Competitive salary, flexible work environment, and professional growth opportunities.
Posted 1 month ago
5 - 8 years
10 - 14 Lacs
Kolkata
Work from Office
Project Role : Application Lead Project Role Description : Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have skills : Informatica Product 360 (PIM) Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : a:Should have excellent communication and presentation skills b:Should be a good team player/lead c: Project Role :Application Lead Project Role Description :Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have Skills :Informatica Product 360 (PIM), SSI:No Technology Specialization NON SSI:Good to Have Skills :SSI: NON SSI:Job Requirements :Key Responsibilities :a:Testing source code and debugging code b:Writing high-quality code to complete application development on schedule c:Strong analytical and problem-solving skills d:Possessing specialist knowledge of operating systems, devices, applications and software e:Manage all production system and recommend ways to optimize performance and provide solution to problems and prepare reports for all problems f:Administer and resolve applications issues, provide updates and perform root cause analysis Technical Experience :a:Experience with Informatica MDM and PIM Implementation b:In-depth understanding of PIM features and capabilities, propose solutions based on Informatica P360 platform capabilities c:Create end-to-end specifications for PIM solutions Lead project team members through the activities required to implement Informatica PIM solution make specific recommendations to bring the PIM implementation into conformance with best practices Informatica P360 PIM Certification is recommended Professional Attributes :a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:Strong articulation skills are mandatory Educational Qualification:a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:Additional Info : Qualification a:Should have excellent communication and presentation skills b:Should be a good team player/lead c:
Posted 1 month ago
2 - 7 years
10 - 15 Lacs
Pune, Bengaluru
Work from Office
Role Overview: We are looking for a skilled Conjur Admin to manage and maintain our secrets management infrastructure using CyberArk Conjur . The role is critical to ensuring secure credential storage, access policies, and integrations across development, operations, and cloud environments. The ideal candidate will have a strong background in DevSecOps, cloud security, and infrastructure automation. Key Responsibilities: Secrets Management & Platform Administration: Install, configure, and administer CyberArk Conjur Open Source/Enterprise . Manage secret injection mechanisms for applications, services, and CI/CD pipelines. Set up and maintain policies, roles, permissions, and authentication layers (e.g., LDAP, Kubernetes, AWS IAM). Rotate, revoke, and audit secrets across systems and services. Cloud & DevOps Integration: Integrate Conjur with CI/CD tools (e.g., Jenkins, GitLab, GitHub Actions). Implement secret management in cloud-native and containerized environments (AWS, Azure, GCP, Kubernetes, OpenShift). Collaborate with DevOps teams to secure automated workflows and deployments. Enable applications to securely retrieve credentials using API or sidecar containers. Security & Compliance: Maintain audit trails, logs, and reports for compliance and incident response. Ensure best practices for least privilege access and Zero Trust architecture. Support security assessments and penetration testing activities involving secret access. Required Skills & Qualifications: Hands-on experience with CyberArk Conjur (Open Source or Enterprise). Proficiency in managing secrets lifecycle : generation, rotation, expiration, and revocation. Experience with Linux/Unix administration , shell scripting, and RESTful APIs. Familiarity with IAM concepts , LDAP , RBAC , TLS/SSL , and PKI . Experience working with DevOps tools like Docker, Kubernetes, Jenkins, Ansible, Terraform, etc. Understanding of network and application security principles. Strong problem-solving and documentation skills. Preferred Qualifications: CyberArk or relevant security certifications (e.g., CyberArk Defender/Conjur Certified). Knowledge of other secrets management tools (e.g., HashiCorp Vault, AWS Secrets Manager). Experience in regulated environments (e.g., financial services, healthcare) with compliance standards like SOC 2 , HIPAA , ISO 27001 .
Posted 1 month ago
3 - 8 years
4 - 9 Lacs
Pune, Bengaluru, Hyderabad
Hybrid
Hands-on experience in Installing/Upgrading and Setting up CyberArk Components (EPV, PWV, EPM, CPM, PVWA, PSM, PSMP, AIM) to customizing/configuring it for given Policies and procedures. Design, architecture, and migration experience on CyberArk. Provisioning, creating workflows, custom connectors and policies. Integrating various platforms with CyberArk, such as different LDAP providers, Windows servers, UNIX servers, databases and networking devices. Creation of automation scripts using PACLI and REST API. Experience on customization of CyberArk Platforms. Custom PSM Connectors/CPM Plugins (with AutoIT/Shell Scripting) and good knowledge on auto-detection configuration and usage of Discovery Scanning tools. Experience on AIM (CP and CCP) Credential Provider agents installation/upgradation. Experience on CyberArk version upgrade. Experience on DR Drill activities. Knowledge on HSM and PTA integration would be an added advantage. Exposure to CyberArk Pcloud is an added advantage. Primary skills: CyberArk PAM/Pcloud design and implementation CyberArk Sentry/Defender certification is good to have. Preferably CyberArk PAM experience is preferred else good to have PAM experience in any of these platforms viz. StrongDM/OneIdentityLLC/BeyondTrust/ManageEngine/Foxpass/ JumpCloud/ARCON/ Centrify/Microsoft Purview Experience Required: 5-8 Years in CyberArk PAM and EPM deployment preferred or candidates who have worked on similar solutions from other OEMs with overall 10-13 years of IT experience.
Posted 1 month ago
7 - 12 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:-mplement, configure, and manage PAM solutions such as CyberArk or BeyondTrust to ensure privileged access is secure, auditable, and compliant with regulatory standards.Work closely with IT, DevOps, and security teams to design and integrate secure access control systems into existing IT infrastructure.Perform security assessments and identify potential vulnerabilities in privileged accounts, systems, and services.Develop and enforce policies for privileged account management, password rotation, and access control.Monitor the activity of privileged accounts to detect any unusual or unauthorized behavior, escalating issues when necessary.Work with auditing teams to ensure compliance with security regulations and standards (e.g., NIST, PCI-DSS, GDPR).Provide guidance and support to the organization regarding security best practices for privileged access.Develop and maintain detailed documentation on the configuration, deployment, and operational procedures for PAM solutions.Participate in incident response efforts, identifying, containing, and mitigating security incidents involving privileged accounts.Stay current on emerging security threats and PAM technologies, applying this knowledge to enhance the organization's security posture. Professional & Technical Skills: Must To Have Skills: Proficiency in CyberArk Privileged Identity Access Management Strong understanding of cloud security principles Experience in designing and implementing security solutions Knowledge of security compliance standards Hands-on experience with security tools and technologies Additional Information: The candidate should have a minimum of 7.5 years of experience in CyberArk Privileged Identity Access Management This position is based at our Bengaluru office A 15 years full time education is required Qualification 15 years full time education
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
23751 Jobs | Dublin
Wipro
12469 Jobs | Bengaluru
EY
8625 Jobs | London
Accenture in India
7339 Jobs | Dublin 2
Uplers
7127 Jobs | Ahmedabad
Amazon
6778 Jobs | Seattle,WA
IBM
6514 Jobs | Armonk
Oracle
6388 Jobs | Redwood City
Muthoot FinCorp (MFL)
5532 Jobs | New Delhi
Capgemini
4741 Jobs | Paris,France