7 Job openings found

2 Opening(s)
5.0 Year(s) To 9.0 Year(s)
Not Disclosed by Recruiter
  § Following Broadcom/CA tools -> Siteminder, MultiFactor Authentication (MFA) or Advance Authentication , Directory, Identity manager, Access Gateway, API Gateway. § Other tools -> LexiNexis ‘s ThreatMetrix (TMX) § Microsoft -> Active Directory, PKI , Azure AD § Good to have AWS knowledge. Expertise in identity and access management (IAM). • Excellent exposure in working ...
1 Opening(s)
9.0 Year(s) To 13.0 Year(s)
Not Disclosed by Recruiter
• Installation, configuration and upgrading of Oracle server software andproducts 12c and above.• Experience on Migration /Transformation from On-Prem to Cloud.• Cloud IaaS and PaaS knowledge on AWS.• Capable of Planning of Migration /Strategic Documentation.• Creating and sizing database storage structures and database objects• Experience on ExaCC.• Make recommendations involving ...
1 Opening(s)
5.0 Year(s) To 11.0 Year(s)
Not Disclosed by Recruiter
§ SSO SAML federation using CA Siteminder and develop custom Java assertions by calling RESTful services and Spring Java Webservices§ Basid knowledge of IAM Java/J2EE experience§ Good to have AWS knowledge     Strong knowledge of CA SiteMinder architecture, policies, and configurations. Proficiency in LDAP, SAML, OAuth, and related authentication protocols. Experience with web servers ...
10 Opening(s)
7.0 Year(s) To 12.0 Year(s)
10.00 LPA TO 18.00 LPA
AppSec (Application Security) Key Terms: Secure Coding: Writing software with security best practices to prevent vulnerabilities. Vulnerability: Weaknesses in an application that could be exploited. SAST (Static Application Security Testing): Code analysis to find vulnerabilities without executing the program. DAST (Dynamic Application Security Testing): Security testing of running applications to find vulnerabilities. Penetration Testing: Simulated ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
Responsibilities: Assist in the design and implementation of BeyondTrust Privilege Remote Access. Work with stakeholders to identify requirements and convert those requirements intoBeyondTrust Privilege Remote Access configurations. Create detailed documentation, and provide input on technology standards, and informationsecurity and risk practices. Develop internal and external checks and controls to ensure ...
1 Opening(s)
8.0 Year(s) To 13.0 Year(s)
Not Disclosed by Recruiter
Responsibilities Lead the design and implementation of SSH key management technologies and standards tosupport complex enterprise solutions. Create detailed documentation, and provide input on technology standards, and informationsecurity and risk practices. Develop internal and external checks and controls to ensure proper governance, security andquality of information assets. Communicate effectively with ...
1 Opening(s)
5.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Responsibilities Assist in the design and implementation of SSH key management technologies and standards tosupport complex enterprise solutions. Create detailed documentation, and provide input on technology standards, and informationsecurity and risk practices. Develop internal and external checks and controls to ensure proper governance, security andquality of information assets. Communicate effectively ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile