Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Pune |
Education | Not Mentioned |
Salary | Not Disclosed |
Industry | Banking / Financial Services |
Functional Area | General / Other Software |
EmploymentType | Full-time |
Information Security Operations Analyst II Overview Employee Identity Access Management teams are responsible for end to end providing services to support internal employees and external customers capabilities to retrieve access to Mastercard systems and applications, including physical security access. This position is on the Identity Governance Lifecycle (IGL) team which is responsible for production readiness and response to customer impacting incidents for the Identity Access Management systems. This position will involve taking focus on analysis, implementation and maintenance of all identity access management security systems that protect and ensure the safety of enterprise information assets. Shift left to be more proactive and upfront in the development process This position will include being involved in design of project requirements to identify any potential impact to the department and prepare recommendations detailing those efforts. This will include being involved in the update of security patches for products, appliances, and platforms under the responsibility of IGL Be able to think strategically two steps forward on what is next focus area for the team Be able to understand technically the tasks that they are working on & dig in to ask challenging questions to make sure that objectives are being executive efficiently What interests you about Corporate Security Give an example of when you have thought outside of the box to solve a problem What experience do you bring to the table that will drive this team to the next level Role Leads specific projects of Business Operations for a platform Proactive manages production and change activities to maximize customer experience, and increase the overall value of supported applications Support security applications for identity, authorization, and policy management in a multi-tiered infrastructure Streamlining and standardizing traditional application specific support activities Develops plans to improve quality for each project that impacts the platform and leads implementation Reviews and signs off platform procedures are well documented Demonstrate strong knowledge across a broad range of identity and access management technologies Challenge the status quo processes and identifies way to automate through implementation Participate, as part of a global team, to transition any open items to global team members Helps to innovate on new methodologies to align with security best practices and Business Operations Partners with other peers in the Identity Access Management organization to ensure governance processes are in place, enabling access to the business with least privileges Researches new methodologies to improve security within the identity access management space Coaches junior level employees on security and Business Operations best practicesAll About You Must be high-energy, detail-oriented, and proactive Must have the ability to function under pressure in an independent environment Must provide the necessary skills to have a high degree of initiative and self-motivation to drive results Intermediate to strong skills in Information Security Expert skills to troubleshoot, problem solve, and follow documented procedures Strong strategic thoughtful risk taking experience Strong technical background (Windows, AIX, Linux, UNIX, databases (Oracle, DB2), web applications) including basic network fundamentals Intermediate to strong skills in BASH, PERLPython and automation tools (not limited to Ruby, Chef, Jenkins 2, Puppet),
Keyskills :
customer relationsreportingmisslaaccountshigh degree of initiativeidentity access managementequal employment opportunitynew hiresdigital economysecurity systems