-
›
- Careers ›
- Careers in India ›
-
Specialist
Job Description
Specialist
Job Summary
-
Location: Bangalore
-
Project role: Specialist
-
Qualification: B-Tech
-
Experience: 2.5-5 Years
-
Skills: Identity Management Implementation
-
No. of positions: 1
Job description:
5+ years of experience in Identity and Access Management Domain as a Microsoft Azure IAM Offshore AnalystRequired Skills Experience upon Entra ID, Microsoft Identity Management and associated components. Stakeholder Engagement to understand Privileged entities and Access Management. Hands on experience on Azure Multifactor Authentication, Conditional Access Policies and SSPR. Working experience on ServiceNow tickets, good experience in creating document, improve SOPs procedures, provide recommendation on current environment, and help in UAT and other testing activities. Good customer handling experience, work closely with other team squad to understand their roadmap & dependencies. Support in defining the tactical Process design & determine how MS Features can support this Collect As-Is data from Source systems, conduct analysis and proposed suitable To-Be options Publish in detail process requirement gathering document. Hands on experience on Azure Log analyticsGood to Have - Support Process for B2B MVP - my IT forms & documentation Support Process for Identity Protection Responsible for gathering business and technical requirements on Microsoft Entra ID platforms
- To clearly understand the client's cybersecurity environment and respective product.
- To monitor, configure, and troubleshoot cybersecurity issues and related monitoring tools
- To analyse and validate cybersecurity incidents in-detail and help the L3 team with RCAordata or logs collection
- To enable knowledge transferortrainings through creationor maintenance of configuration documents, test plans, operational manuals and provide operational training to L1 team.
- To analyse and fine-tune cybersecurity policies, participate in cybersecurity review calls pertaining to change requests and recommendations on cybersecurity policy changes.
- To implement changes, monitor security device performance and implements performance tuning when necessary.
- To prepare analyses and reports to highlight the project progressorchallenges and ensure quality and accuracy to the client