logo

JobNob

Your Career. Our Passion.

Technical Specialist


HCL Technologies Limited


Location

Noida | India


Job description

Job Description (Posting).

Must Have Skills:( Thycotic ) Should have minimum (5) years of PAM And EPM experience and (1 to 2) Years in Thycotic EPM. Ability to maintain all aspects of Thycotic product delivery and services that include deployments, assessments, strategy especially in Endpoint Privilege Management. Experience in performing Privileged Access Reviews, Compliance Reporting, Access Control Processes, and other associated tasks with Thycotic Good understanding of end point on-boarding and off-boarding processes for different platforms such as Mac, Windows servers, Laptops, VDI. Good understanding of Local accounts administration within Windows/Mac systems. Should have hands-on experience in creating policies, managing the computer groups within Thycotic PMC. Should have good troubleshoot knowledge in understanding the issue and defining policies, whitelist application in EPM policy for user issue. Should have knowledge in the install, uninstall, upgrading and monitoring the Thycotic EPM agent in targets. Maturity and discipline to follow established processes and detailed technical procedures to ensure consistency and predictability.Other Skills good to have: Experience in deployment and implementation of any of the other Thycotic tool: Thycotic EPM Experience in working with the Network devices like firewalls, routers, etc. Should have the ability to understand customer scenario and requirements (may include customized integration situations) and be capable of suggesting solutions. Excellent communication skills and ability to work with global counterparts. Knowledge of basic networking Runbook documentationQualifications: 4-5 years of strong Thycotic experience Strong oral and written communications skills Customer Facing Exposure is must Open to travel requirements 24/7 support (1.) To clearly understand the client's cybersecurity environment and respective product. (2.) To monitor, configure, and troubleshoot cybersecurity issues and related monitoring tools (3.) To analyse and validate cybersecurity incidents in-detail and help the L3 team with RCAordata or logs collection (4.) To enable knowledge transferortrainings through creationor maintenance of configuration documents, test plans, operational manuals and provide operational training to L1 team. (5.) To analyse and fine-tune cybersecurity policies, participate in cybersecurity review calls pertaining to change requests and recommendations on cybersecurity policy changes. (6.) To implement changes, monitor security device performance and implements performance tuning when necessary. (7.) To prepare analyses and reports to highlight the project progressorchallenges and ensure quality and accuracy to the client

Qualification

B-Tech

Skill (Primary)

Information Security-Identity and Access Management-Identity Management Operations


Job tags



Salary

All rights reserved