Line of Service
AdvisoryIndustry/Sector
Not ApplicableSpecialism
Cybersecurity & PrivacyManagement Level
Senior AssociateJob Description & Summary
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.In identity and access management at PwC, you will focus on confirming secure and efficient access to systems and data for employees and/or clients. Your work will involve the design and implementation of strategies to protect sensitive information and manage user identities.
Focused on relationships, you are building meaningful client connections, and learning how to manage and inspire others. Navigating increasingly complex situations, you are growing your personal brand, deepening technical expertise and awareness of your strengths. You are expected to anticipate the needs of your teams and clients, and to deliver quality. Embracing increased ambiguity, you are comfortable when the path forward isn’t clear, you ask questions, and you use these moments as opportunities to grow.
Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to:
Respond effectively to the diverse perspectives, needs, and feelings of others.Use a broad range of tools, methodologies and techniques to generate new ideas and solve problems.Use critical thinking to break down complex concepts.Understand the broader objectives of your project or role and how your work fits into the overall strategy.Develop a deeper understanding of the business context and how it is changing.Use reflection to develop self awareness, enhance strengths and address development areas.Interpret data to inform insights and recommendations.Uphold and reinforce professional and technical standards (e.g. refer to specific PwC tax and audit guidance), the Firm's code of conduct, and independence requirements.Responsibilities:
Troubleshoot and resolve complex technical problems related to CyberArk reported by our customers.Perform PIM (CyberArk) support operations on day-to-day basisLead the incident call with diverse stakeholderApply and test fixes in Non-Prod, and Production environmentDocument problem solutions in knowledge base.Meticulously document case progress and technical details throughout the support case lifecycle.Provide 24x7 on-call support via rotational schedule.Participate in recurring support review meetings, present challengesand mitigation plan to Product owners
Ensuring Incident is resolved within defined SLA’s,Provide input to assist with continual improvementResponsible to plan all new activities and deliver the same as per timelinesAuditing Accounts and work on various reports, users’ server login issues and user permission issues as per requirementsRequirement:
3+ years’ Hands-on experience in CyberArk components CPM, PSM, and PVWA.Good to have CDE /CyberArk Sentry (Certification)Experience in working with CyberArk solutions with different tools like SIEM, 2FAHands on experience in applying patches and fixesHands-on experience in conducting CyberArk DR Drill & setupWell versed in resolving CyberArk issues related to unavailability, replication.Hands-on experience in supporting platforms with CyberArk, such as Windows servers, UNIX servers, DatabasesHands-on experience in CPM policies management or redistribution.Understanding typical Enterprise Change Management processesKnowledge on CPM and PSM connector customizationUphold the firm's code of ethics and business conduct.Additional Job Description
Open to work in rotational shift from 6PM to 3 AM IST/ 9PM to 6AM ISTProfessional and Educational Background
• Bachelor's Degree Preferred.
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required:Degrees/Field of Study preferred:Certifications (if blank, certifications not specified)
Required Skills
Optional Skills
Accepting Feedback, Accepting Feedback, Access Control Models, Access Control System, Access Management, Active Listening, Analytical Thinking, Authorization Compliance, Authorization Management Systems, Azure Active Directory, Cloud Identity and Access Management (IAM), Communication, Creativity, CyberArk Management, Cybersecurity, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Federated Identity Management, ForgeRock Identity Platform, Identity and Access Management (IAM), Identity-Based Encryption, Identity Federation, Identity Governance Framework (IGF) {+ 22 more}Desired Languages (If blank, desired languages not specified)
Travel Requirements
0%Available for Work Visa Sponsorship?
NoGovernment Clearance Required?
NoJob Posting End Date