Required Experience About 10+ years of experience in Identity and Access Management domain. At least 5 + years' experience of Saviynt IGA tool including experience around high level design, Low level design and Implementation Design and Implementation experience of complex IAM solutions for large scale customers across various industry verticals. Play active role in the execution of the project and demonstrate strong technical leadership Demonstrate knowledge of market trends and competition in Identity and Access Management Domain. Demonstrate the capabilities in understanding the clients' business environment and map the requirements into IAM solutions and proactively suggest alterna...
PKI experience including hands on experience with: Certificate Authority Administration Certificate Enrollment Web Service & Policy Web Service Active Directory Certificate Services (ADCS) monitoring Understanding of: Cryptography Next Generation (CNG) Key archival Understanding of crafting and maintaining PKI policy documentation (CP/CPS) Understanding of PKIX, PKCS, SSL, TLS, S/MIME standards Experience troubleshooting digital certificate issues Familiarity with browser and application keystores Understanding of smart card technologies IT system administration experience (systems management, networks, firewalls) in an enterprise environment. Infrastructure IT (Systems Administration, Netw...
7-10 years’ experience Security Technology SAP implementation with strong experience in SAP Security administration Should have done On-boarding, off-boarding, new role setup, change of roles per SOD violation, assignment of SAP roles per business functions Work with business & IT teams in designing new security roles and recommend security standards across systems for new projects and initiations. Review and remediate any security risks with roles and assignment of roles, segregation of duties, any potential Audit concerns. Develop procedures, processes, and guidelines that are efficient and focused on the quality of the process and adhere to corporate security standards. Interact with seni...
• Experience applying threat and data modeling, advanced data correlation, and statistical analysis to develop alerts, notable events, investigative dashboards, and metrics driven reports. • Assist in the development and execution of cyber threat-hunting tactics, techniques, and procedures (TTPs). • Translate analytical findings into security use cases that can be implemented within available security tool capabilities. • Analyze network and host activity associated with both successful and unsuccessful intrusions by advanced attackers. • Support enterprise incident response efforts • Leverage understanding of tactics, techniques and procedures associated with advanced threats to create and ...
Bachelor’s degree in IT or relevant field preferred or equivalent experience 4+ years hands-on experience on Workday security configuration e.g. data domains; Security groups; security roles including role based, user based, segmented and intersecting security roles; migration of security configurations. 2+ years hands-on experience in configuring custom security in Workday 2+ years of experience in Workday system administration e.g. tenant management, version releases, regression testing. Strongly preferred: Within past 2-4 years, has completed relevant Workday training on security such as Configurable Security Fundamentals, Advanced Configurable Security, Integration Security, etc.