More jobs:
Job Description & How to Apply Below
Experience - 3-5 Years
Location - Gurugram
ROLE PURPOSE
The Privileged Access Management (PAM) Analyst Security Engineer reports to the offshore PAM Lead within the CISO Identity and Access Management team. The role will play a key role in ensuring privileged identities are appropriately controlled and utilised based on a defined business need.
This role forms a key part of our Cyber Defence function and will require closely work across key functions within CISO, CIO and third-party partners. The successful applicant will be a strong communicator, with excellent written skills.
The role requires strong knowledge of implementing and maintaining both traditional enterprise PAM technologies (such as Cyber Ark) but also managing cloud identity across multiple providers.
The role holder will have a sound knowledge of both traditional infrastructure and cloud technologies. The role requires working across multiple stakeholders, both internally and across partner infrastructure and cloud teams to ensure complete coverage of PAM controls and verify that the use of privilege is appropriate and in line with Security standards and policies.
The location of the role is flexible, with remote working available.
There will be an expectation to work within the office on a periodic basis and to attend team meetings. There will also be a requirement to provide regular out of hours standby technical support as Privilege Access Management is a 24
* 7 service. Think you’d be great at this role, but don’t have all the skills? We’d still love to hear from you. You’ll be joining a team who are passionate in their field, with a great opportunity to further develop your career and make a real difference.
KEY
ACCOUNTABILITIES
Design, develop, and implement PAM solutions for privileged lifecycle management, session security, and compliance.
Configure and customize Cyber Ark components (Safes, Platforms, CPM policies, PSM connectors, workflows, plugins) for enterprise integration.
Improve and scale the Cyber Ark environment through automation and standardization.
Integrate Cyber Ark Privilege Cloud with enterprise applications, directories, and hybrid cloud services.
Develop technical documentation, including architecture diagrams, configuration standards, onboarding guides, and integration specs.
Monitor and troubleshoot Cyber Ark issues (CPM, PSM, platform/plugin errors, authentication failures).
Collaborate with internal teams and third‑party vendors to address risks, audits, compliance, and security incidents.
Contribute to PAM strategy and roadmap, including Privilege Cloud, Secrets Management, and cloud‑based PAM adoption.
Regulatory Requirements
Industry codes of practice
Relevant legislative and regulatory requirements including DPA/GDPR, PCI-DSS, NI52-109 and FCA guidance
FUNCTIONAL / TECHNICAL SKILLS
Configure CPM, PSM, PSMP, Cloud Connectors, and platform plug-ins.
Onboard and manage privileged accounts across servers, databases, networks, and applications.
Maintain CPM policies, password lifecycle, and PSM connectors with session recording.
Integrate Cyber Ark with AD/Entra , LDAP, MFA, SIEM, and ITSM tools.
Automate tasks using REST APIs and Power Shell; troubleshoot CPM/PSM/PVWA issues.
Manage safes, access controls, dual-control workflows, and least-privilege policies.
Deliver end-to-end PAM implementations and maintain architecture/SOPs/runbooks.
Perform health checks, upgrades, DR drills, hardening, and compliance support.
Collaborate with teams and vendors on incident response and risk remediation.
Contribute to PAM roadmap and cloud adoption (P‑Cloud, AAM, Conjur).
A good contributor in this role will typically be able to demonstrate
Core Competencies Influencing Others – Advanced
Building Effective Relationships – Advanced
Making Change Happen – Intermediate
Planning – Advanced
Using Judgement – Advanced
Leading People – Intermediate
Communicating Effectively (Written & Verbal) – Advanced
Presentation Skills – Intermediate
Ability to clearly report risks and issues to non‑technical stakeholders
Positive, can‑do attitude with strong attention to detail
Highly motivated and driven by engaging with modern cyber‑attacks
Technical Skills Understanding IT / IS – Advanced
Infrastructure Security – Advanced
IT Risk / IT Audit / IT Controls – Intermediate
Knowledge of emerging technologies
Experience Requirements
Experience working in Financial Services
Preferably 3+ years of experience within Financial Services, actively working with cybersecurity tooling
Experience delivering threat intelligence services within large organisations
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×