IAM Security Administrator - Weekend shift resource

Bengaluru, KA, IN, 560048

Applications have closed

EY

EY provides consulting, assurance, tax and transaction services that help solve our client’s toughest challenges and build a better working world for all.

View company page

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.

 

 

Today’s world is fueled by vast amounts of information, which means that data is even more valuable than ever before. Protecting data and information systems is central to doing business, and therefore everyone in EY Information Security has an important role to play. Join a global team of almost 900 people who collaborate to support the business of EY by protecting EY and client information assets! Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond when things go wrong. Together, the efforts of our dedicated team help protect the EY brand and build client trust. 

 

Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology service solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through secure solutions and information systems. 
 

The opportunity


Identity and Access Management (IAM) organization, a part of Information Security which, enables over 330,000 individuals across 140+ countries to access systems and information securely. As a member of the Identity and Access Management (IAM) team this position will contribute towards execution of an IAM roadmap that meets security requirements, including but not limited to security for, a complex Active Directory (AD) environment, hybrid cloud deployment, mobile computing, policy driven security, SSO, identity lifecycle management, and federation focusing on multiple protocols. 

 

We offer opportunities to develop new skills and progress your career receiving support, coaching and feedback from colleagues around the world. This role will give you an opportunity to work with some of the best talent in the industry! 
 

Your key responsibilities

 

  • Acts as second and third tier (Levels 2 and 3) technical support for customer account inquiries in optimally resolving or escalating incidents and inquiries related to access or account management services support across multiple environments and technology platforms.
  • Conducts operation-level troubleshooting activities to identify and implement efficient incident resolution action that minimizes end user and/or system downtime.
  • Conducts proper root cause analysis and make recommendations to improve IAM processes or prevent future occurrence of end user access issues.
     

Skills and attributes for success

 

  • Moderate analytical skills are required to probe for understanding and address as appropriate daily operations issues
  • Ability to make sound decisions in addressing operations request and other security related issues and then recommend improvements to address security issues or gaps.
  • Making general decisions without guidance and direction in problem solving based upon a solid knowledge of the IAM functions, processes and procedures.
  • Driving the priority and time management of own efforts to support/resolve assigned activities and communicate results and findings to end users and management as necessary.
     

To qualify for the role, you must have

 

  • Advanced knowledge of Microsoft’s Active Directory 
  • Experience with Azure AD 
  • Support Active Directory Environment including but not limited to user/group maintenance and Service Accounts within Microsoft’s Active Directory 
  • Experience with use of elevated access and necessary security requirements to support such accounts 
  • Deliver accurate and timely responses to requests for related services.
  • Basic knowledge of Outlook/Exchange
  • Knowledge for various desktop environments, applications, standard software, Microsoft Teams, network, servers and general connectivity
  • Document issue details and resolutions into support tracking system
  • Time management skills to prioritize workload in order to work through assignments and activities with efficiency and minimal supervision
  • Moderate consultative skill to optimally analyze and conduct core issue analysis, select and apply appropriate standards, methods, tools and applications to independently resolve complex incidents and problems.
  • Handle issues in a timely and efficient manner while applying good communication and social skills while interacting with requester, management, executives and other personnel
  • Strong oral and written communication skills in the English language to work optimally with requestors and IT peers.
  • Desire for continued process improvement and learning.
     

Ideally, you’ll also have

 

  • Bachelor’s degree in computer science or a related subject area, or equivalent work experience.
  • Approximately 3 to 5 years of security administration experience in support of IT products or security administration and working knowledge of large IT organization operations.
     

What we look for 


We’re looking for someone who can collaborate globally with different regions and cultures. Problem-solves, thinks creatively and has an open mind to new insights. Focus on customer service and building positive relationships with colleagues both across teams and globally. A highly motivated, diligent, and driven individual who seeks development and improvement opportunities and deliver quality services.
 

What we offer


As part of this role, you'll work in a highly integrated, global team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: 

  • Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
  • Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
  • Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.

 

Please apply to this role only through the ‘Apply’ link (not through the local office). Your application will then be routed to the appropriate recruiting team. 

 

The exceptional EY experience. It’s yours to build.
 

 

 

EY | Building a better working world 


 
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.  


 
Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.  


 
Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.  

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Active Directory Application security Azure Cloud Computer Science Cyber defense IAM SSO Strategy

Perks/benefits: Career development Flex hours Team events

Region: Asia/Pacific
Country: India
Job stats:  7  0  0
Categories: Admin Jobs IAM Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.