×
Register Here to Apply for Jobs or Post Jobs. X

PAM Analyst

Remote / Online - Candidates ideally in
243601, Gurgaon, Uttar Pradesh, India
Listing for: Crescendo Global
Remote/Work from Home position
Listed on 2026-02-26
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, Data Security
Job Description & How to Apply Below
The Privileged Access Management (PAM) Analyst Security Engineer
Experience - 3-5 Years
Location - Gurugram

ROLE PURPOSE
The Privileged Access Management (PAM) Analyst Security Engineer reports to the offshore PAM Lead within the CISO Identity and Access Management team. The role will play a key role in ensuring privileged identities are appropriately controlled and utilised based on a defined business need.

This role forms a key part of our Cyber Defence function and will require closely work across key functions within CISO, CIO and third-party partners. The successful applicant will be a strong communicator, with excellent written skills.

The role requires strong knowledge of implementing and maintaining both traditional enterprise PAM technologies (such as Cyber Ark) but also managing cloud identity across multiple providers.

The role holder will have a sound knowledge of both traditional infrastructure and cloud technologies. The role requires working across multiple stakeholders, both internally and across partner infrastructure and cloud teams to ensure complete coverage of PAM controls and verify that the use of privilege is appropriate and in line with Security standards and policies.

The location of the role is flexible, with remote working available.

There will be an expectation to work within the office on a periodic basis and to attend team meetings.  There will also be a requirement to provide regular out of hours standby technical support as Privilege Access Management is a 24
* 7 service.  Think you’d be great at this role, but don’t have all the skills? We’d still love to hear from you. You’ll be joining a team who are passionate in their field, with a great opportunity to further develop your career and make a real difference.

KEY

ACCOUNTABILITIES
Design, develop, and implement PAM solutions for privileged lifecycle management, session security, and compliance.
Configure and customize Cyber Ark components (Safes, Platforms, CPM policies, PSM connectors, workflows, plugins) for enterprise integration.
Improve and scale the Cyber Ark environment through automation and standardization.
Integrate Cyber Ark Privilege Cloud with enterprise applications, directories, and hybrid cloud services.
Develop technical documentation, including architecture diagrams, configuration standards, onboarding guides, and integration specs.
Monitor and troubleshoot Cyber Ark issues (CPM, PSM, platform/plugin errors, authentication failures).
Collaborate with internal teams and third‑party vendors to address risks, audits, compliance, and security incidents.
Contribute to PAM strategy and roadmap, including Privilege Cloud, Secrets Management, and cloud‑based PAM adoption.

Regulatory Requirements
Industry codes of practice
Relevant legislative and regulatory requirements including DPA/GDPR, PCI-DSS, NI52-109 and FCA guidance

FUNCTIONAL / TECHNICAL SKILLS
Configure CPM, PSM, PSMP, Cloud Connectors, and platform plug-ins.
Onboard and manage privileged accounts across servers, databases, networks, and applications.
Maintain CPM policies, password lifecycle, and PSM connectors with session recording.
Integrate Cyber Ark with AD/Entra , LDAP, MFA, SIEM, and ITSM tools.
Automate tasks using REST APIs and Power Shell; troubleshoot CPM/PSM/PVWA issues.
Manage safes, access controls, dual-control workflows, and least-privilege policies.
Deliver end-to-end PAM implementations and maintain architecture/SOPs/runbooks.
Perform health checks, upgrades, DR drills, hardening, and compliance support.
Collaborate with teams and vendors on incident response and risk remediation.
Contribute to PAM roadmap and cloud adoption (P‑Cloud, AAM, Conjur).

A good contributor in this role will typically be able to demonstrate
Core Competencies Influencing Others –  Advanced
Building Effective Relationships –  Advanced
Making Change Happen –  Intermediate
Planning –  Advanced
Using Judgement –  Advanced
Leading People –  Intermediate
Communicating Effectively (Written & Verbal) –  Advanced
Presentation Skills –  Intermediate
Ability to clearly report risks and issues to non‑technical stakeholders
Positive, can‑do attitude with strong attention to detail
Highly motivated and driven by engaging with modern cyber‑attacks

Technical Skills Understanding IT / IS –  Advanced
Infrastructure Security –  Advanced
IT Risk / IT Audit / IT Controls –  Intermediate
Knowledge of emerging technologies

Experience Requirements
Experience working in Financial Services
Preferably  3+ years of experience  within Financial Services, actively working with cybersecurity tooling
Experience delivering threat intelligence services within large organisations
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary