logo

JobNob

Your Career. Our Passion.

CONSULTANT


HCLTech


Location

Noida | India


Job description

Job Description (Posting).

Beyond Trust Password safe - JDJob Description Experience in Design, Installation, Implementation, User Policies, Certifications, Privilege account Provisioning, creating workflows, custom connectors, policies. Managing access to Windows, Unix/Linux, Web portals, and RDP Published applications. Should be capable to deploy/install/configure Beyond Trust PAM Components i.e PBPS/PRA/EPM In-depth understanding to use Account, Service, and task Discovery tools Target system On-boarding and Application on-boarding. Provide inputs into engineering and the architectural design of Access Control, User Entitlements, Application Credentials, User Access Policy Management, enhancing security related to Privileged Access Management, High availability, and Disaster Resiliency Implement Application to Application clients. Serve as the subject matter expert (SME) for the Beyond Trust PAM toolset. Provide overall direction and oversight into the PAM functions across the organization, including Password Vaulting of elevated user and application service accounts. Well versed with automation scripts in Rest-API.Primary Skills BeyondTrust password safe PRA/PBPS (Password safe, Powerbroker) Privileged access managementSecondary Skills Good to have certifications.Qualifications: 5-7 years of strong PAM EPM experience on BeyondTrust Password safe. Strong oral and written communications skills Customer Facing Exposure is must Open to travel requirements (1.) To clealry understand the client's cybersecurity environment and respective technological products. (2.) To identify and mitigate cybersecurity gaps in the client's environment and Skill Enhancement (3.) To complete assigned projects and tuningortechnical enhancement activities within the agreed timelines and support in the maturation of client's security postureorcomplianceorprocesses through idea generation and value creation. (4.) To analyse security concerns in Change Management Process and implement tools for Cyber Security improvement. (5.) To investigate cybersecurity incidents, perform RCA, work and coordinate with teams for all the ongoing critical security issues. (6.) To enable knowledge transfer through creationor maintenance of process documents; and training for specific tools to ensure all team members are updated on the tools and processes used (7.) To update client and stakeholders on current project progress and ongoing critical issues

Qualification

B-Tech

No. of Positions

1

Skill (Primary)

Information Security-Identity and Access Management-Identity Management Operations

Auto req ID

1340433BR


Job tags



Salary

All rights reserved