|
Search Jobvertise Jobs
|
Jobvertise
|
IGA, Saviynt implementation Location: IN-VasanthaNagar Jobcode: t2dxva Email Job
| Report Job
#hiring #hiringnow Alert ! Exciting Title : IGA, Saviynt implementation Location: Hyderabad, Bangalore,Pune (Hybrid Mode) Exp: 7 + Years REl: 7+ Years NP: 30 Days
#Mandatory skills: IGA, Saviynt implementation
Detailed job description:
Cyber Security Lead Consultant
Candidate should have bachelors degree in computer engineering with 10-15+ years of relevant experience in Cyber Security. Candidate should have good understanding of design, development, customization, configuration, deployment of any Identity Management and Governance products (Saviynt / SailPoint IdentityNow) Candidate should be able to understand and implement security enhancements in line with organizations goals and objectives. Design, deploy, implement, and integrate Identity Management and Governance products (Saviynt / SailPoint IdentityNow) with critical applications and infrastructure. Follow approved life cycle methodologies, create documentation for design and testing. Interact/coordinate with customers as required. Assist operations team as required, coordinate with product engineering team. Resolve technical issues through debugging, research, and investigation. Technical pre-sales support for direct and partner sales teams Conduct research and use knowledge of competitive solutions to effectively address reported issues. Designing and implementing integrations between Saviynt's security and compliance solutions and an organization's IT infrastructure, including cloud services, enterprise applications, and other systems, to ensure seamless and secure access management. Customizing and configuring the Saviynt platform according to specific organizational needs, policies, and security requirements, ensuring that the solution aligns with business processes and governance frameworks. Design, develop, and manage enterprise roles within the Saviynt platform, ensuring that they align with the organization's business processes, security policies, and compliance requirements. Perform role mining activities to identify and create optimal role models that accurately reflect job functions and access patterns. Continuously assess and refine roles to accommodate organizational changes or to improve efficiency and security. Oversee the governance of access through the proper definition and assignment of roles. Ensure that roles provide appropriate access levels to resources across the IT ecosystem
If You are Interested please share your Resumes to
Contact Number : 8297000905
Burgeon IT Services-Client based
|