Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 8.0 years
5 - 9 Lacs
Mumbai
Work from Office
Skill required: Marketing Operations - Digital Project Management Designation: Digital Content Management Sr Analyst Qualifications: Any Graduation Years of Experience: 5 to 8 years About Accenture Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Technology and Operations services, and Accenture Song all powered by the worlds largest network of Advanced Technology and Intelligent Operations centers. Our 699,000 people deliver on the promise of technology and human ingenuity every day, serving clients in more than 120 countries. Visit us at www.accenture.com What would you do Help balance increased marketing complexity and diminishing marketing resources. Drive marketing performance with deep functional and technical expertise, while accelerating time-to-market and operating efficiencies at scale through Data and Technology, Next Generation Content Services, Digital Marketing Services & Customer Engagement and Media Growth Services.Role requires Digital Marketing Ads & Promotion creation/designOverseeing the planning, execution, and delivery of projects that primarily rely on digital tools and technologies. It encompasses managing tasks, resources, timelines, and communication channels to ensure successful project outcomes in the digital realm. What are we looking for Strong understanding of ecommerce ecosystems and product data standards.Ability to drive cross-functional meetings with creative, QA, analytics, and tech teams.Experience handling client interactions, escalations, and stakeholder expectations.Clear communication style and ability to translate technical actions into business outcomes.Possible Academic BackgroundBachelor s degree in Marketing, Business, Communications, or Digital Media.PMP/Prince2/Agile or similar project management certification is a plus.3+ years of project management experience in digital marketing, content operations, or syndication.Proven experience working with syndication platforms (Salsify, Syndigo, Alkemics, 1WorldSync, etc.).Strong knowledge of PIM, DAM, and ecommerce content processes.Skilled in project tracking tools (Workfront, Smartsheet, JIRA, or MS Project).Excellent stakeholder management, written and verbal communication skills.Ability to manage distributed teams across geographies.Familiarity with retailer and marketplace requirements (Amazon, Walmart, Target, etc.).Strong analytical mindset with ability to interpret metrics, drive reporting, and derive insights. Roles and Responsibilities: Lead the planning, execution, and monitoring of syndication projects across multiple markets and categories.Define project scope, timelines, dependencies, and resource allocation for syndication activities.Manage coordination between content creators, DAM librarians, QA teams, retailers, and tech teams.Own delivery timelines for syndication across retailers like Amazon, Walmart, Carrefour, etc.Ensure compliance with brand standards, retailer-specific content requirements, and PIM/DAM processes.Monitor the syndication lifecycle:content readiness, asset upload, QA validation, go-live status, and updates.Track KPIs such as live SKU %age, TAT, defect rate, and drive continuous improvement.Provide weekly dashboards, RCA reports, and drive client governance calls and escalations.Identify opportunities to automate, templatize, or streamline syndication workflows. Qualification Any Graduation
Posted 7 hours ago
2.0 - 6.0 years
5 - 8 Lacs
Hyderabad
Work from Office
Providence Global Center leading organization dedicated to delivering innovative solutions in the [Healthcare] We are seeking highly skilled and experienced IAM Engineers to join our dynamic team This role is essential in maintaining and enhancing our security posture through effective management of identity and access controls Key Responsibilities Support deployment, configuration and management of EPM solutions to end-point devices in hybrid environments (on-premises and cloud) Manage endpoint policies to enforce least privilege and reduce the number of attack surfaces using principles of least privilege and role-based access control (RBAC) Work on configuration, development, and maintenance of automation scripts/tools to maintain EPM policies Gather requirements, create implementation plans and implement new policies or versions for EPM to roll out to new devices/users Conduct regular health checks, review/enhance existing implementation, and monitor EPM activities for privileged sessions and enforcement of access policies Perform ongoing activities like testing, upgrading, and patching EPM agents Managing privileged accounts/secrets in Privileged Access Management (PAM) solution Support operational processes for access rotation, auditing, and logging of privileged sessions Conduct access reviews, audit and compliance reporting for privileged accounts/secrets and access policies Implement onboarding of accounts, servers and applications to Privilege Cloud utilizing CyberArk connectors and plugins Resolve incidents related to, and fulfil service requests for access, configurations and artifacts for Privilege Access Management and Endpoint Privilege Management Create and maintain documentation and conduct training sessions for use cases, best practices, and standard operating procedures for Privileged Access Management and Endpoint Privilege Management What Were Looking For 7+ years of experience with PAM and EPM solutions, Design, Engineering and Operations Experience with world class Privileged Identity and Access Management and Endpoint Privilege Management solutions (CyberArk, Beyond Trust or any other tools that add value) Scripting / Automation tools to manage endpoint and privilege policies using scripting like PowerShell, Python, etc and deployment tools like SCCM and JAMF Experience working in an enterprise environment with Incident Management, Change Management, and SOX/PCI controls Experience with setting up logging, monitoring, and troubleshooting tools like Crowdstrike, any other SIEM solution Strong interpersonal and consultative skills Ability to effectively prioritize and execute tasks in a high-pressure environment Excellent written & verbal communication skills Experience working in a team-oriented, collaborative environment Perform their duties under minimal supervision, exercising autonomy to review and fulfil their duties within the scope of their position
Posted 2 days ago
5.0 - 10.0 years
13 - 18 Lacs
Bengaluru
Work from Office
Project description Luxoft DXC Technology Company is an established company focusing on consulting and implementation of complex projects in the financial industry. At the interface between technology and business, we convince with our know-how, well-founded methodology and pleasure in success. As a reliable partner to our renowned customers, we support them in planning, designing and implementing the desired innovations. Together with the customer, we deliver top performance! For one of our Clients in the Insurance Segment we are searching for a Senior CyberArk Engineer. Responsibilities Senior CyberArk Engineer with a strong background in designing and implementing CyberArk PAM and Secrets Management Solutions. Design and implement CyberArk PAM Architecture, including Vault, PVWA, CPM, and PSM ensuring scalability, resilience, and secure access for privileged users across platforms. Architect and Engineer CyberArk Secrets Manager solutions, including Conjur and Secrets Hub, and integrate them with CI/CD pipelines, containerized platforms, and cloud native applications. Establish and enforce secrets governance and automation strategies, focusing on full secrets lifecycle, secure provisioning, access control, rotation, expiration and decommissioning. Develop and execute privileged account onboarding strategies across Windows, Linux/Unix, and databases, with policy driven standardization and automation to scale adoption. Serve as Subject Matter expert for privileged access security, architecture reviews, audits, compliance initiatives and cross functional integration efforts Work with business units and IT team to onboard privileged accounts to CyberArk 2.Perform CyberArk patching, upgrades, and platform stability. 3.Troubleshoot and resolve CyberArk related issues for privileged accounts and service accounts. 4.Lead the implementation and support of CyberArk Secrets Management initiatives. Client is in the USA Mexico candidateswork from 9am EST time zone. India candidatesCandidate should be able to work until 11.00 am EST to overlap a few hours with the client and be able to attend meetings. Skills Must have This role requires at least level of strong L3 engineer. L2 and L1 operational candidate profiles are not suitable for this role. Minimum 5 years of hands-on experience in CyberArk Engineering. Strong familiarity with CyberArk components such as PVWA, CPM, PSM, PTA etc. proven experience with Secrets Management and priviledged account management as per responsibilities section above. Nice to have Insurance industry experience
Posted 2 days ago
4.0 - 7.0 years
4 - 9 Lacs
Hyderabad
Work from Office
CyberArk technical delivery/Architect and advisory work, designing and delivering capabilities to fulfil business requirements. Integrating various platforms with Cyber Ark, such as different LDAP providers, Windows servers, UNIX servers, Databases, and networking Devices Creation of automation scripts using PACLI and REST API experience on customization of CyberArk Platforms Experience on AIM (CP and CCP) CP agents installation/upgradation experience on CyberArk version upgrade experience on DR Drill activities Primary Skills Hands-on experience in Installing/Upgrading and Setting up CyberArk (EPM, CPM, PSM, PSMP, AIM) to customizing/configuring it for given Policies and procedures. Design, architecture, and migration experience on CyberArk Provisioning, creating workflows, custom connectors, policies Custom PSM Connectors/CPM Plugins (with AutoIT/Shell Scripting) and good knowledge on auto-detection configuration and usage of Discovery Scanning tools. Secondary Skills CyberArk Sentry/Defender certification is good to have knowledge on HSM and PTA integration would be an added advantage
Posted 2 days ago
3.0 - 7.0 years
0 Lacs
maharashtra
On-site
The Pre-Sales Engineer plays a crucial role in collaborating with the Sales team to offer technical expertise throughout the Sales Cycle. Understanding the unique technical requirements and business challenges of potential clients is a primary responsibility. Crafting solutions tailored to meet these needs and effectively communicating the value proposition of the company's products or services are key tasks. Industry exposure in Distribution, System Integrators, GSI, Retail, Service Providers, or OEMs is required. Hands-on experience with Cybersecurity Solutions like Perimeter Security (Firewall), Endpoints (AV, EDR, EPP), and IDAM (SSO, MFA, PIM/PAM) is essential. Key responsibilities include collaborating with clients to comprehend their technical needs, developing industry-specific product demonstrations and presentations, and conducting Proofs of Concept. Training Sales and Pre-Sale teams of Partners in the technical aspects of the product is also a significant part of the role. An in-depth understanding of technical concepts is necessary to deliver successful Demos and POCs and configure solutions according to clients" Network Architectures. Experience with Vendor solutions such as Cisco, Palo Alto Networks, Forcepoint, Netskope, CrowdStrike, or CyberArk, in addition to Industry-recognized certifications like CCNA, CCNP, CCIE, AWS, or Azure, is highly advantageous. Key Attributes: - Excellent communication, presentation, and interpersonal skills - Strong problem-solving abilities - Customer-oriented mindset - Effective time management, team collaboration, and multitasking skills This is a Full-time, Permanent position offering benefits such as Paid time off, and Provident Fund. The work schedule is during the Day shift, and the work location is in person.,
Posted 3 days ago
5.0 - 10.0 years
0 Lacs
kolkata, west bengal
On-site
As a Technical Lead for Global Identity Management Services at Linde Global Support Services Pvt. Ltd, you will be responsible for providing ongoing design, development, and support as an expert in Identity Access Management and related Authentication methods. Your role will involve active participation in Global Projects, particularly focusing on Identity Access Management, Privilege Access Management, and Authentication areas. At Linde, we offer a supportive work environment with various benefits to ensure a comfortable and enjoyable workplace. These benefits include loyalty offers, annual leave, on-site eatery, employee resource groups, and team support to foster a sense of community among employees. Your responsibilities will include designing, building, optimizing, and maintaining services globally, ensuring high-quality standards and effective technical responses to team members and customers. You will act as the escalation point for service and project issues, handle the implementation of new technologies, and participate in global projects related to Identity Access Management and Authentication. In this role, you will provide guidance and support to the team, contribute to the development of standards and policies, and coach team members to enhance their skills through cross-skilling and knowledge management activities. Your ability to think, plan, and execute within defined objectives will be crucial in ensuring the highest quality within your subject area. To succeed in this role, you should be self-motivated, a team player, and capable of taking on technical roles in critical projects. Strong communication skills, analytical thinking, and the ability to work across different time zones are essential. You must also be willing to travel based on job demands and work flexible hours as required. Additionally, you should possess a strong technical competence in Identity Access Management & Authentication areas, including IAM, PAM, Active Directory, Azure AD, PKI, and Federation Services. Experience in managing medium to large environments, troubleshooting technical issues, and collaborating with vendors is necessary. Knowledge of Active Directory integration with Microsoft PKI, Azure AD, and experience with certificate-enabled applications will be advantageous. A degree or equivalent from a reputed institute, along with 5-10 years of relevant IT experience, is required. Formal training or certification in IAM, PAM, AD/Azure AD/PKI, and relevant Microsoft Technologies is preferred. Working in a globally distributed team and for global business will be beneficial for this role. Linde Global Support Services Pvt. Ltd, as a subsidiary of Linde Plc., is committed to delivering high-quality IT services critical for the operation of the entire group. Joining our global IT team in Kolkata offers exciting career opportunities to work with leading technologies in a truly global work environment. If you are ready to make an impact and grow your career with us, we look forward to receiving your complete application through our online job market. Let's work together to make our world more productive and sustainable.,
Posted 4 days ago
5.0 - 8.0 years
9 - 14 Lacs
Gurugram
Work from Office
Role Purpose The purpose of the role is to support process delivery by ensuring daily performance of the Production Specialists, resolve technical escalations and develop technical capability within the Production Specialists. Do Oversee and support process by reviewing daily transactions on performance parameters Review performance dashboard and the scores for the team Support the team in improving performance parameters by providing technical support and process guidance Record, track, and document all queries received, problem-solving steps taken and total successful and unsuccessful resolutions Ensure standard processes and procedures are followed to resolve all client queries Resolve client queries as per the SLAs defined in the contract Develop understanding of process/ product for the team members to facilitate better client interaction and troubleshooting Document and analyze call logs to spot most occurring trends to prevent future problems Identify red flags and escalate serious client issues to Team leader in cases of untimely resolution Ensure all product information and disclosures are given to clients before and after the call/email requests Avoids legal challenges by monitoring compliance with service agreements Handle technical escalations through effective diagnosis and troubleshooting of client queries Manage and resolve technical roadblocks/ escalations as per SLA and quality requirements If unable to resolve the issues, timely escalate the issues to TA & SES Provide product support and resolution to clients by performing a question diagnosis while guiding users through step-by-step solutions Troubleshoot all client queries in a user-friendly, courteous and professional manner Offer alternative solutions to clients (where appropriate) with the objective of retaining customers and clients business Organize ideas and effectively communicate oral messages appropriate to listeners and situations Follow up and make scheduled call backs to customers to record feedback and ensure compliance to contract SLAs Build people capability to ensure operational excellence and maintain superior customer service levels of the existing account/client Mentor and guide Production Specialists on improving technical knowledge Collate trainings to be conducted as triage to bridge the skill gaps identified through interviews with the Production Specialist Develop and conduct trainings (Triages) within products for production specialist as per target Inform client about the triages being conducted Undertake product trainings to stay current with product features, changes and updates Enroll in product specific and any other trainings per client requirements/recommendations Identify and document most common problems and recommend appropriate resolutions to the team Update job knowledge by participating in self learning opportunities and maintaining personal networks Mandatory Skills: PIM Inriver. Experience: 5-8 Years.
Posted 5 days ago
7.0 - 10.0 years
20 - 25 Lacs
Bengaluru
Work from Office
The primary focus at EITSI is to develop the next generation LIMS (Lab Information Management system), Customer portals, e-commerce solutions, ERP/CRM system, Mobile Apps & other B2B platforms for various Eurofins Laboratories and businesses. REPORTING TO Cloud Service Operations Lead, Environment Testing Europe GEOGRAPHICAL REPORTING LOCATION: Bengaluru / India WORKING LOCATION: Bengaluru / India OVERALL OBJECTIVES: As part of the IT Infrastructure Support Team for Eurofins Food, Feed and Agro Testing Europe, you will join a growing international team to work on to work on maintenance of newly deployed segregated IT User Zones and Application Availability Groups Cloud infrastructure. Your role will be to support daily Cloud operations tasks and to design & implement new infrastructure or migrate the existing components to Azure cloud. You will collaborate with number of different IT Support and Delivery Teams on daily basis. It will require strong Azure virtualization, O365, AD, Identity & Access, Security and Networking skills. Open mind and ability to cooperate with multiple individuals in a multicultural environment is essential. You will get an opportunity to drive Eurofins major IT Infrastructure transition and transformation across Food, Feed and Agro Testing Europe Businesses. SPECIFIC ASSIGNMENTS : Maintain current IT User Zones and IT Application Availability Groups Cloud infrastructure Design, plan and implement IT Infrastructure Transformation / Integration / Segregation throughout Food, Feed and Agro Testing Businesses across Europe. These projects will be aimed to perform installations, configuration and migrations of enterprise-level IT infrastructure systems to cloud solutions (Azure, Azure AD, Active Directory, Office 365, etc.) Propose and deliver solutions that best meet the business needs in terms of security, cost and effectiveness Work close with Server, Virtualization, Network, Application team members do deliver the IT Infrastructure as wider project. Act based on the end to end view of the Infrastructure Document the solutions delivered and help to transition the service to regional teams in final stage of the project Years of exp 10 to 13 years REQUIRED S : An ideal candidate should have strong experience in all of the below: Strong experience withMS Active Directory administration (GPO, gMSA, SPN, KRBTGT, tiering model) Strong experience withAzure Virtual Machines, Subscriptions, Resource Groups, Storage Accounts, Azure AD Connect, Azure Policies, Conditional Policies, Azure Virtual Desktop Good experience withO365 & Exchange Online (Licensing, Administration, Exchange management experience) Good Azure Networking & Security knowledgeVNETs, Subnets, Peering, Network Security Groups Deep knowledge of Azure Active Directory (AAD) and IAM concepts Good knowledge of Azure DevOps (administration and usage). Powershell scripting (complex scripts/analysis of scripts) A collaborative team playerAbility to read, understand and create technical documentation of the delivered solutions Very good command of English written and spoken Ability to present technical projects on meetings. Azure design at enterprise level Service Endpoints/Private Endpoints Load Balancers Storage availability "“ LRS, ZRS, GRS, RA-GRS, RA-ZRS Ansible for Azure automation Terraform VM Monitoring Familiar with VM availability "“ Availability Zones, Sets, Fault Domain, Update Domain Azure Policy and Conditional Access Policy Enterprise App registration Azure price calculator experienced Accustomed to using ITSM tools, BMC Helix. Below skills will be an advantage: Azure Bastion understanding Other cloud vendors experience (AWS, GCP etc.) PKI PAM
Posted 5 days ago
15.0 - 19.0 years
0 Lacs
ahmedabad, gujarat
On-site
As an experienced professional in the field of Identity and Access Management (IDAM), you will be responsible for various key aspects related to IDAM strategy, solution delivery, client engagement, operational excellence, engineering, technical leadership, and cross-functional collaboration. You will play a crucial role in developing and implementing scalable, secure, and compliance-driven IDAM frameworks tailored to client needs. This includes leading end-to-end execution of IDAM projects, ensuring alignment with industry best practices, regulatory requirements, and emerging cybersecurity trends. Acting as a trusted advisor to clients, you will collaborate closely with CISOs, CIOs, and security teams to design customized access control solutions. Your role will involve driving long-term client relationships by delivering high-quality service and continuous improvement. Additionally, you will be responsible for establishing efficient workflows, processes, and governance models for seamless IDAM implementation and management. Driving continuous improvement initiatives to enhance service quality, scalability, and automation in IDAM solutions will also be a key aspect of your role. As a technical leader, you will lead and mentor IDAM engineering teams in deploying best-in-class authentication, authorization, and access control solutions. You will oversee the integration of various architectures such as IAM, PAM, SSO, MFA, and Zero Trust into client environments. Furthermore, you will collaborate with cybersecurity, cloud, IT infrastructure, and compliance teams to ensure seamless IDAM integration. Working closely with sales and business development teams, you will support pre-sales, RFPs, and solution proposals for clients. It is essential to stay ahead of evolving cybersecurity threats and drive innovation in IDAM service offerings. To qualify for this role, you should hold a Bachelor's degree in IT, Cybersecurity, Engineering, or a related field, with relevant certifications such as CISSP, CISM, or IAM-related certifications preferred. With over 15 years of experience in IDAM service delivery, cybersecurity consulting, or enterprise security architecture, you should have a strong focus on OT/IT environments. Deep expertise in IAM, PAM, MFA, SSO, Zero Trust, and regulatory compliance frameworks is required, along with a proven track record of delivering large-scale IDAM projects for enterprise clients. Strong leadership, client management, and strategic problem-solving abilities are also essential for success in this role.,
Posted 6 days ago
3.0 - 6.0 years
4 - 9 Lacs
Navi Mumbai
Work from Office
We are seeking a skilled and proactive Network Security Engineer with strong expertise in managing and implementing Netskope Proxy Solutions. The ideal candidate will have a solid background in network security, hands-on experience with various proxy tools and protocols, and a proven track record of maintaining, analyzing, and troubleshooting network security environments in complex setups. Key Responsibilities: Manage and maintain Netskope Proxy solutions across enterprise environments including DC, DR, Cloud, and Branch offices. Commission, implement, and integrate Proxy with authentication and authorization systems (AD, IAM, Email, SIEM, etc.). Automate routine processes using scripting/configuration tools and integrate with SOAR platforms. Manage proxy policies, access rules, and exception handling. Perform packet capture analysis and in-depth troubleshooting (OSI Layers 1-7). Respond to and investigate Proxy-related incidents, outages, and compliance findings. Coordinate with users and cross-functional teams for issue resolution and change implementations. Ensure adherence to network security policies, standards, and procedures. Create and maintain technical documentation including SOPs, network diagrams, and audit reports. Monitor network health using tools and proactively identify potential service degradations. Provide mentorship and guidance to L1 and L2 engineers. Ensure timely ticket resolution and SLA compliance. Coordinate with OEMs for RMA, TAC support, firmware upgrades, and patching. Collaborate with helpdesk and IT teams during major incident handling and resolution. Report and track SLA performance and RCA documentation. Required Candidate Profile: Experience: 36 years in network security with minimum 3 years in managing Proxy solutions. Skills: Hands-on with Proxy solutions (deployment, management, policy design) Strong scripting/configuration experience (for automation/SOAR) Expertise in network troubleshooting (Wireshark/PCAP analysis) Good understanding of security integrations (AD, IDAM, PAM, SIEM, SOAR) Experience with incident/problem/change/configuration management practices SLA-based support handling and compliance closures Strong documentation and communication skills Leadership capabilities to manage and mentor junior engineers High level of accountability and ownership of assigned technologies
Posted 1 week ago
3.0 - 8.0 years
9 - 17 Lacs
Hyderabad
Hybrid
a)Experience in CyberArk Privileged Cloud b) Onboard domain, window, Linux, cloud, database administrator target systems to CyberArk c) Bulk account onboarding of privileged accounts d) Onboard and manage application service accounts and other privileged accounts that may impact applications when credentials are rotated via Central Credential Provider e) Onboard secrets in Secrets Hub, create sync policies etc. f) Maintain the underlying infrastructure high-availability, disaster recovery, network management & patching and upgrading the underlying infrastructure. g) Troubleshoot third party-integrations such as Active Directory, SIEM, SMTP. h) Troubleshoot password and session management issues i) Generate reports for password compliance and access certification j) Experience in configuring new load balancer for PSM and CCP k) Provide guidance on configuring master and password policy for password vaulting/rotation, session recording, and whitelist/blacklist commands. l) Train end user administrators on procedures to access PAM tool. m) Document known issues, administrator guide, SOPs for patching, upgrade activities.
Posted 1 week ago
4.0 - 7.0 years
5 - 10 Lacs
Pune
Work from Office
At Capgemini Invent, we believe difference drives change. As inventive transformation consultants, we blend our strategic, creative and scientific capabilities,collaborating closely with clients to deliver cutting-edge solutions. Join us to drive transformation tailored to our client"s challenges of today and tomorrow.Informed and validated by science and data. Superpowered by creativity and design. All underpinned by technology created with purpose. Your Role Drive and ensure business, IT and Security teams are compliant to applicable IAM policy, IAM .standards and instructions. Work closely with IAM team ( Run and Project) to design and deploy monitoring and control systems based on IAM policy and instructions. Ensure critical applications are well integrated with the good level of IAM control and governance ( access review, good approval workflow) based on policy and instruction. Develop and maintain measurable IAM security metrics; ensure metrics provide actionable insights to the applicable stakeholders. Maintain IAM policy & instruction awareness of business, technical, architecture, infrastructure, and end user support Develop and maintain measurable KPIs to showcase IAM governance performance Analyse internal and external threats and recommend remediation actions based on IAM capability. Perform IAM audit / gap assessments of internal systems and processes and provide recommendations to mitigate the same Your Profile Deliverables PAM Audit compliance Dashboard, reporting Analysis, Identity Health Check & governance What you will love about working here We recognize the significance of flexible work arrangements to provide support. Be it remote work, or flexible work hours, you will get an environment to maintain healthy work life balance. At the heart of our mission is your career growth. Our array of career growth programs and diverse professions are crafted to support you in exploring a world of opportunities. Equip yourself with valuable certifications in the latest technologies such as Generative AI.
Posted 1 week ago
5.0 - 10.0 years
3 - 8 Lacs
Bengaluru
Work from Office
Role & responsibilities: Outline the day-to-day responsibilities for this role. Preferred candidate profile: Specify required role expertise, previous job experience, or relevant certifications. Perks and benefits: Mention available facilities and benefits the company is offering with this job.
Posted 1 week ago
6.0 - 11.0 years
18 - 33 Lacs
Hyderabad
Hybrid
Job Description Summary: To coordinate a critical team responsible for the security and smooth operation of our Identity and Access Management (IAM) environment. This leader will be responsible for a team that tackles incidents, problems, tasks, and patching for a diverse set of IAM services, including SailPoint, Active Directory, Azure AD, certificate management, and Privileged Access Management (PAM). The ideal candidate possesses a deep understanding of IAM principles, extensive experience in security operations, and the leadership skills to navigate complex technical challenges. Responsibilities: Incident Response & Security: Lead the team in responding to security incidents related to IAM systems, including user access issues, suspicious activity, and potential breaches. Conduct thorough investigations to identify root causes and implement corrective actions to prevent future incidents. Develop and maintain an effective incident response plan for IAM systems. Stay informed about emerging IAM security threats and vulnerabilities, implementing necessary security patches and updates promptly. Operations & Problem Solving: Manage a team of IAM specialists responsible for day-to-day operations, problem resolution, and task fulfillment within SailPoint, Active Directory, Azure AD, certificate management, and PAM systems. Ensure the team has the understanding of the comprehensive procedures for IAM operations, ensuring efficient user provisioning, access management, and lifecycle processes. Monitor and analyze IAM system performance metrics, identifying and resolving operational issues. Ensure adherence to established IAM policies, standards, and compliance requirements. IAM Process Governance: Through the feedback of incidents & problem cases provide visibility to the IAM & MyAccess teams where processes have issues or can be improved. Ensure the team is supporting the MyAccess project in defining test cases for newly onboarded applications Providing resources from the team to support application onboarding testing and reporting results. With the team, drive the engagement of identity standardization, central processes, and the adoption of concepts such as least privilege and zero trust in the organization Technical Expertise: Possess a strong understanding of IAM best practices, frameworks, and methodologies (e.g., NIST 800-53). Have in-depth knowledge of SailPoint, Active Directory, Azure AD, certificate management solutions, and PAM systems. Stay current on the latest security vulnerabilities and patches related to these IAM services. Work collaboratively with other security teams to ensure comprehensive security controls for user access and entitlements. Leadership & Communication: Foster a high-performing team environment that prioritizes security and operational efficiency. Provide clear direction and guidance to team members, ensuring they have the knowledge and resources to excel in their roles. Communicate effectively with stakeholders at all levels, including business leaders, IT operations, and security teams. Develop and deliver training programs to educate users and team members on IAM processes and security best practices. Qualifications: Bachelor's degree in information technology, Cybersecurity, or a related field (or equivalent experience). Minimum 7 years of experience in IAM operations, with at least 3 years in a leadership role. Proven experience in security operations, including incident response, investigation, and vulnerability management. In-depth knowledge of SailPoint, Active Directory, Azure AD, certificate management solutions, and PAM systems. Strong understanding of IAM best practices and frameworks. Excellent communication, collaboration, problem-solving, and analytical skills. Ability to work independently, manage multiple priorities, and lead a team in a fast-paced environment.
Posted 1 week ago
3.0 - 8.0 years
15 - 30 Lacs
Kolkata, Hyderabad, Bengaluru
Work from Office
Role & responsibilities 1. Strong experience in Cyberark 2. Experiecne PAM Implemetation 3 Certification Mandatory (Defender OR PAM)
Posted 1 week ago
15.0 - 19.0 years
0 Lacs
ahmedabad, gujarat
On-site
As an IDAM Strategy & Solution Delivery professional, you will be responsible for developing and implementing scalable, secure, and compliance-driven frameworks tailored to client needs. Your role will involve leading end-to-end execution of IDAM projects, from requirements gathering to deployment and post-implementation support, ensuring alignment with industry best practices, regulatory requirements, and cybersecurity trends. In client engagement and advisory capacity, you will act as a trusted advisor to clients, understanding their security needs and recommending appropriate IDAM strategies. Collaboration with CISOs, CIOs, and security teams will be essential to design customized access control solutions and drive long-term client relationships through high-quality service delivery. Operational excellence and service delivery will be a key focus area where you will establish efficient workflows, processes, and governance models for seamless IDAM implementation and management. Continuous improvement initiatives will be implemented to enhance service quality, scalability, and automation in IDAM solutions, while monitoring KPIs, SLAs, and compliance adherence to maintain high standards of delivery. Your role will also encompass engineering and technical leadership responsibilities, including leading and mentoring IDAM engineering teams, overseeing integration of various architectures into client environments, and providing technical leadership on complex IDAM challenges for risk mitigation and security compliance. Cross-functional collaboration will be crucial as you work closely with cybersecurity, cloud, IT infrastructure, and compliance teams to ensure seamless IDAM integration. Collaboration with sales and business development teams will be required to support pre-sales activities, RFPs, and solution proposals for clients. Furthermore, staying updated on evolving cybersecurity threats and driving innovation in IDAM service offerings will be expected. To excel in this role, you should possess a Bachelor's degree in IT, Cybersecurity, Engineering, or a related field, with relevant certifications such as CISSP, CISM, or IAM-related certifications preferred. You should have over 15 years of experience in IDAM service delivery, cybersecurity consulting, or enterprise security architecture, with a strong focus on OT/IT environments. Deep expertise in IAM, PAM, MFA, SSO, Zero Trust, and regulatory compliance frameworks, along with a proven track record of delivering large-scale IDAM projects for enterprise clients, will be essential. Strong leadership, client management, and strategic problem-solving abilities are also required for success in this role.,
Posted 1 week ago
8.0 - 12.0 years
0 Lacs
chennai, tamil nadu
On-site
As a Security Architect & Engineer, you will play a crucial role in designing secure architectures, implementing effective security controls, and supporting security operations across IT and cloud environments. Your responsibilities will involve creating long-term security strategies aligned with business goals, evaluating security technologies, and ensuring compliance with regulatory requirements. In the realm of Security Architecture, you will be tasked with designing secure and scalable architectures that seamlessly integrate with existing IT systems. Your role will also involve recommending security technologies, frameworks, and practices across IT, OT, and cloud environments. Implementing access control and identity management measures will be essential, including least privilege, RBAC, MFA, and SSO controls. In terms of Security Engineering, you will apply secure configuration baselines and automation across operating systems, databases, and cloud environments. Supporting security and vulnerability assessments, assisting in patch implementations, and promoting infrastructure-as-code and DevSecOps practices will also fall under your purview. Your involvement in Security Operations will require collaboration with SOC and IT teams to detect, investigate, and respond to security incidents. To enhance security measures, you will support threat hunting, root cause analysis, and the evolution of incident response and disaster recovery plans. Regarding Risk, Compliance & Governance, you will be responsible for identifying and mitigating security risks associated with IT systems. Developing security policies, conducting risk assessments, ensuring compliance with frameworks and regulations, and providing security input into vendor assessments will be crucial aspects of your role. In terms of Collaboration & Communication, you will act as a trusted advisor to internal teams on security best practices and secure solution design. Your ability to translate complex security topics into actionable guidance for technical and business stakeholders will be paramount. To qualify for this role, you should hold a Bachelor's degree in Information Security, Computer Science, or a related field, along with 8-12 years of cybersecurity experience. Strong knowledge of cloud security services, regulatory compliance requirements, IAM concepts, and relevant certifications are required. Additionally, experience with SIEM, EDR, vulnerability scanners, and cloud-native controls is essential. While not mandatory, advanced knowledge in cloud security architecture, experience with automation tools, and relevant certifications like CISSP, CISM, or CEH would be advantageous. This position may offer remote work options and will involve collaboration with diverse teams in a dynamic environment, providing you with the opportunity to contribute to critical security initiatives.,
Posted 1 week ago
17.0 - 20.0 years
35 - 55 Lacs
Hyderabad
Work from Office
Job Title: Head of Identity and Access Management (Healthcare / Pharma industry experience Must) Department: Global Identity & Directory Solutions Reports To: Head of Global IT Infrastructure Technical Skills: (Mandatory Technical & Functional Requirements) SailPoint IdentityIQ / IdentityNow Implementation, governance, policy enforcement, and lifecycle automation. Privileged Access Management (PAM) Hands-on experience with tools like Delinea or CyberArk . Active Directory (AD) & Entra ID (Azure AD) Deep technical understanding of hybrid identity, group policies, federation services (ADFS), and cloud directory management. Authentication Protocols Proficient in OAuth2 , SAML , OpenID Connect , and MFA solutions. Certificate Lifecycle Management (CLM) In-depth experience with PKI , SSL/TLS certificate management , and basic cryptography principles . Integration with Cloud IAM Experience with Azure , AWS , Kubernetes RBAC , DevOps CI/CD tools . ITSM Integration Familiarity with ServiceNow for IAM workflow automation. Security Frameworks Knowledge of NIST 800-53 , ISO 27001 , GDPR , SoD , RBAC policies. Key Responsibilities Define and implement the global IAM strategy, roadmap, and governance model. Lead IAM operations, engineering, and governance teams to deliver secure and scalable IAM services. Ensure operational excellence across IAM services including performance monitoring, incident response, patching, and upgrades. Oversee IAM program compliance with internal controls and external regulations. Drive automation across identity lifecycle processes (Joiner-Mover-Leaver). Foster collaboration with IT, HR, Legal, Compliance, and business units. Own IAM controls during audits and drive timely remediation. Lead IAM-related risk assessments and integrate findings into business planning. Act as the subject matter expert (SME) on identity security in digital transformation initiatives. Education & Certifications Required : Bachelors degree in Computer Science, Cybersecurity, or equivalent. Preferred : Masters degree, CISSP, CISM, or equivalent IAM/security certifications. Experience Minimum 16 years in IT Security or IAM, with 5+ years in IAM leadership roles - Healthcare and pharma industry experience preferred . Demonstrated success managing global IAM programs and operational teams. Proven expertise in handling IAM audits, compliance, and regulatory frameworks. People & Budget Responsibilities Team Size : 7- 14 direct/indirect reports Budget : Responsible for cost planning and financial oversight of IAM services
Posted 1 week ago
6.0 - 11.0 years
25 - 32 Lacs
Noida, Hyderabad
Work from Office
Experience Required: 7+ years in Privileged Access Management (PAM), specifically with BeyondTrust solutions Key Responsibilities: Implementation & Configuration • Gather and analyze requirements for BeyondTrust PAM solutions. • Design, install, configure, and integrate BeyondTrust Password Safe across enterprise environments. • Lead deployment, upgrades, and validation activities to ensure system integrity. Privileged Access Governance • Define and enforce privileged account lifecycle policies. • Automate password rotation and credential management across diverse systems. Integration & Customization • Integrate BeyondTrust with Active Directory, LDAP, SIEM, IAM, DevOps, and cloud platforms. • Develop custom plugins and automation using REST APIs, PowerShell, or Python. • Enhance authentication with MFA and integrate with SSO tools. Security Compliance & Risk Management • Ensure compliance with standards like ISO 27001, NIST, and PCI-DSS. • Conduct security assessments and risk analysis for PAM implementations. Operations & Support • Manage day-to-day operations, upgrades, patching, and backup strategies. • Monitor system health using logs, dashboards, and alert mechanisms. Training & Documentation • Provide user documentation, update runbooks, and deliver knowledge transfer. • Report progress and system status to project leadership. Required Skills: • Strong hands-on experience with BeyondTrust Password Safe and other PAM tools. • Proficiency in PowerShell, Python, and REST API integrations. • Deep understanding of privileged access governance, identity lifecycle, and security compliance. • Experience with SIEM, IAM, and cloud security integrations.
Posted 1 week ago
8.0 - 13.0 years
25 - 32 Lacs
Noida, Hyderabad
Work from Office
Experience Required: 510+ years in Identity and Access Management (IAM), with deep expertise in CyberArk PAM and EPM Key Responsibilities: Architecture & Strategy • Lead the design and implementation of CyberArk PAM and EPM solutions. • Define privileged access policies, least privilege strategies, and endpoint security controls. • Align PAM/EPM architecture with organizational security goals and compliance requirements. Implementation & Integration • Deploy and configure CyberArk components including Vault, PVWA, PSM, CPM, and EPM. • Integrate CyberArk with Active Directory, LDAP, SIEM, cloud platforms, and DevOps pipelines. • Customize policies and workflows to meet specific business and security needs. Endpoint Privilege Management (EPM) • Implement EPM to manage and restrict endpoint privileges across Windows and macOS environments. • Develop policies to prevent privilege escalation and enforce application control. • Monitor endpoint activity and respond to suspicious behavior or policy violations. Operations & Support • Maintain and optimize CyberArk environments, ensuring high availability and performance. • Apply patches, upgrades, and backups regularly. • Troubleshoot issues related to privileged access and endpoint controls. Security & Compliance • Ensure CyberArk implementations comply with standards like ISO 27001, NIST, HIPAA, and PCI-DSS. • Conduct audits, access reviews, and risk assessments. • Generate reports for internal and external compliance requirements. Training & Documentation • Provide training and knowledge transfer to internal teams. • Maintain detailed documentation for configurations, policies, and procedures. Required Skills: • Hands-on experience with CyberArk PAM and EPM modules. • Proficiency in PowerShell, REST APIs, and scripting for automation. • Strong understanding of privileged access governance, endpoint security, and identity lifecycle management. • Familiarity with SIEM, IAM, and cloud security integrations. Preferred Qualifications: • Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field. • Certifications such as CyberArk Defender PAM (PAM-DEF) and CyberArk Defender EPM (EPM-DEF) • Experience with other PAM tools (BeyondTrust, Thycotic) is a plus
Posted 1 week ago
1.0 - 6.0 years
3 - 8 Lacs
Udaipur, Ajmer, Jaipur
Work from Office
Any Sales Experience BFSI/NBFC Managing the banking and investments relationship Customer-service orientation Negotiation and Persuasion skills & Relationship building CASA & Asset Insurance Fintech any financial product sales exp Required Candidate profile Understanding of KYC, AML guidelines and complying with Bank policies for the role and responsibilities Client Handling Ensuring timely opening of accounts and giving smooth on boarding experience Perks and benefits Best In BFSI*
Posted 1 week ago
7.0 - 12.0 years
30 - 35 Lacs
Noida, Chennai, Bengaluru
Hybrid
Must Have Skills: 5 to 7 years of experience in deployment & implementation of Privileged Identity Management using CyberArk solution for large scale customers across various industry verticals Play active role in the execution of the project and demonstrate strong technical leadership Have a strong knowledge of the CyberArk privileged account security suite CyberArkversion 7.x, 8.x, 9.x and 10.x . Experience in the use of CyberArk PACLI to automate tasks related to user and safe management. Good understating of CyberArk components like EPM, OPM, AIM, etc. Capture detailed requirements for the CyberArk solution based on input from platform owners, eco-system owners, the target architecture and high-level requirements. Design and Architecture of the overall CyberArk implementation. Performing compliance checks on CyberArk for IT security safes and to Provide alerts and reports appropriately. Investigate, Provide RCA and resolve Incidents. Open to travel as and when required for deployment at customer sites Be a strong team player Advanced knowledge of windows/VMware administration. Advanced knowledge of Windows Cluster Server Strong grasp of network design, application/infrastructure security concepts, techniques, technologies, and tools Experience in working in an on/offshore environment and proven track record of delivering quality outcomes Customer service background – able to empathize with customer and own the issues raised to resolution Leading team contribution to any queries requiring technical specialist input Other Required Skills: Experience in deployment and implementation of anyof the other PIM tools: CA PAM (Xceedium) BeyondTrust Quest / OneIdentity Thycotic ERPM Good understanding of LDAP concepts and working experience with at least few of the following directories: Oracle Internet Directory/Oracle Virtual Directory Sun Directory Server Active Directory Tivoli Directory Server Novell Directory Server CA Directory Experience in using database client tools like Toad, etc. Experience in using standard protocols like SSH, Telnet, RDP, etc. and related tools like Putty. Experience in working with the Network devices like firewalls, routers, etc. Should have the ability to understand customer scenario and requirements (may include customized integration situations) and be capable of suggesting solutions. Excellent communication skills and ability to work with global counterparts. Knowledge of basic networking Experience in Windows and Linux operating systems from PIM integration and debugging perspective Exposure to virtual environments with experience in integrating ESX, ESX(i) hosts with the PIM solution. Good troubleshooting skills Runbook documentation Qualifications: 5-7 years of strong PAM implementation experience Strong oral and written communications skills Customer Facing Exposure is must Open to travel requirements
Posted 1 week ago
6.0 - 11.0 years
10 - 15 Lacs
Mumbai
Work from Office
Experience with Network Architecture Review and Firewall Rule-base Audit. Strong understanding of OWASP top 10 and SANS top 25 programming errors.Threat Hunting, attack identification, investigation, correlation and suggesting mitigation measures. Required Candidate profile Experience on Vulnerability Assessment and Penetration Testing for Infrastructure / network / web application / databases.Propose, plan, & execute Red Team operations based on threats to organization.
Posted 1 week ago
4.0 - 8.0 years
13 - 17 Lacs
Pune
Work from Office
Project description Are you a DeveloperDo you enjoy writing all sorts of source code (from simple scripts to fully fledged applications and frameworks)Do you like scripting and process automationAre you looking to specialize in IT Security We're looking for software engineers to: providing technical expertise and recommendations in assessing new software projects and initiatives to support and enhance our existing applications produce secure and clean code that is stable, operational, consistent, and well-performing conduct code reviews and test software as needed, along with participating in application architecture and design and other phases of SDLC see that proper operational controls and procedures are implemented in production reduce as much as possible the overhead and manual activities by enhancements and automation Your team Identity and Access Management ('IAM') is a global security organization within Technology Services. As an expert in IAM security and internet technologies, you'll be part of our team working closely with the internal project team. We provide the privileged access invocation solutions. Our team is global, diverse, and collaborative as we work across organizations to keep our technology, applications, and the businesses they support secure. Responsibilities What you'll be doing development of privileged access solution for Linux and mainframe Work within Azure leveraging Azure Resource Manager templates, databases and Load balancing to provide a Privileged Access Management (PAM) solution Build and deploy components leveraging automation, such as CICD pipelines, to create a scalable environment Work within a global team to build a solution that meets the banks security requirements Partner with other teams, including the PAM Operations, to deploy, design and maintain and the PAM environment Skills Must have Experience with Microsoft Azure and application infrastructure related activities including cloud pipelines Git/Gitlab (CI/CD) Linux shell scripting, PowerShell, Bash and Perl/Python scripting/debugging and modifying (on the server) skills Linux basics Package management, service management, network configuration Cronjobs setup File system setup and permissions Code logging/monitoring Oracle & Postgres DB Web Development Nice to have Previous experience with / knowledge of PAM (privileged access management)
Posted 1 week ago
10.0 - 14.0 years
0 Lacs
pune, maharashtra
On-site
As a seasoned PAM (Privileged Access Management) expert with over 10-12 years of experience, you will be responsible for designing and configuring various PAM use cases to enhance the security and efficiency of the organization. Your primary tasks will include setting up PSM (Privileged Session Management) and CPM (Credentials Provider Management), including the establishment of secure tunnels for Active Directory. You will also play a crucial role in onboarding privileged accounts for both Windows and Linux platforms, ensuring a seamless and secure process. Your deep understanding of privileged accounts in Windows and Linux environments will be instrumental in implementing effective PAM solutions. Collaborating with cross-functional teams will be essential to integrate privileged access management solutions successfully. Additionally, your expertise in running DNA scans and analyzing the results will contribute to the continuous improvement of security measures within the organization. To excel in this role, you must demonstrate proficiency in designing and configuring PAM use cases, particularly focusing on password management, session recording, workflow, and safe assignment. Your knowledge and hands-on experience in setting up PSM and CPM, specifically in the context of Active Directory security tunnel setup, will be valuable assets. Strong communication skills are vital for effective collaboration with team members and stakeholders to ensure the successful implementation of PAM solutions.,
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France