Senior Information Security Engineer CyberArk development for Technology & Data BENGALURU Recruitment 2025
In This Position, You Will
- Oversee or take part in the response to computer security incidents involving situations that are moderately complex.
- To determine the reasons and suggest future mitigation techniques, do technical investigation and post-event digital forensics on security-related incidents.
- To guarantee compliance with company information, security policy, and standards, offer security consultancy for medium-sized projects to internal clients.
- For fairly complicated security solutions pertaining to networking, cryptography, cloud, authentication and directory services, email, the internet, applications, and endpoint security, design, document, test, maintain, and offer suggestions for resolving issues.
- Examine and compare security logs.
- Implement one or more information security components, such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity, by applying your subject matter expertise in industry-leading security solutions and best practices.
- Determine security flaws and vulnerabilities, do risk analyses, and weigh your options for fixing them.
- To solve problems and accomplish objectives, cooperate and confer with peers, coworkers, and managers.

Senior Information Security Engineer CyberArk development for Technology & Data BENGALURU Recruitment 2025
Essential Requirements:
Experience in information security engineering for at least four years, or an equivalent amount of time, as shown by one or more of the following: education, training, military experience, and work experience
Ideal Requirements:
- Working on big, complicated CyberArk environments requires at least four years of implementation and administration experience.
- a bachelor’s or master’s degree in engineering or technology.
- strong familiarity with Alero, DR, CPM, PVWA, AAM, PTA, and the PAM CyberArk tool/CyberArk PAS Vault.
- four or more years of experience managing credentials and advanced credential management system administration.
- Three or more years of experience managing credentials and secrets in a cloud or DevOps setting; advanced technical capabilities in information security; and knowledge of information security policies and procedures.
- Three or more years of experience administering Linux and Windows-based operating systems
- Two or more years of expertise automating processes using tools like Java, PowerShell, VBScript, Shell, etc.
- the capacity to oversee and create answers for complicated problems.
- Outstanding communication skills both in writing and speaking; familiarity with databases (Oracle, Sybase, MSSQL, MySQL, etc.)
- Working knowledge of directories (LDAP, AD)
- Confluence and Jira experience
- Technical configuration documentation
- familiarity with incident and event management for security (SEIM) Splunk-like tools
- familiarity with firewalls, load balancers, and high availability solutions
- It will be beneficial to have prior experience with certificate management systems such as Venafi CyberArk certification.
Expectations for the job:
- Create, record, test, maintain, and collaborate with other teams to implement solutions for extremely complicated security issues pertaining to credential management.
- Diagnose and fix automation problems and service requests (bugs, fixes, and connectors).
- Know the CyberArk privileged account security suite very well.
- CyberArk can be integrated with a variety of platforms, including databases, UNIX and Windows servers, websites, SAP apps, networking equipment, and more.
- To avoid solution outages, engage in proactive monitoring.
- Accounts with privileged access onboard
- CyberArk onboarding applications
- Improvements and advancements for connectors and plugins
- Determine new risk areas and assess current data security guidelines.
- Implement one or more information security components, such as availability, integrity, confidentiality, risk management, threat detection, modelling, monitoring, and incident response, by applying your subject matter expertise in industry-leading security solutions and best practices.
- Implement one or more information security components, such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity, by applying your subject matter expertise in industry-leading security solutions and best practices.
- Conduct integration testing for newly added functionality and asset types.
- Safe creation, alteration, and deletion, including membership in Sage.
- Plan and implement frequent technological updates, such as security fixes, major software releases, and service enhancements.
- Execute the discovery scan procedure and upload privileged accounts in bulk.
- Participate in testing for disaster recovery.
- Offer assistance with Level 2 technical solutions.
- Apply your subject-matter expertise in industry-leading security solutions and best practices to implement one or more information security components, including risk management, threat identification, availability, integrity, confidentiality, modeling, monitoring, incident response, access management, and business continuity.
- When integrating new asset types and functionality, conduct integration testing.
- creation, modification, and removal that is safe, including membership in Sage.
- Plan and execute routine technological updates, such as security patches, significant software releases, and service improvements.
- Execute the procedure of discovery scanning and upload privileged accounts in bulk.
- Help with testing for disaster recovery.
- Support Level 2 technical solutions.
Date of Posting End: August 9,2025 The number of candidates may cause the job ad to expire early.
Equal opportunity is important to us.
An equal opportunity employer is Wells Fargo. Regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other legally protected trait, all eligible candidates will be given consideration for employment for Sarkari jobs.
Workers back our emphasis on creating enduring connections with customers while maintaining a strong culture of risk mitigation and compliance, which firmly defines those standards as essential to the success of both our clients and our business. Effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, promptly and effectively escalating and remediating issues, and making prudent risk decisions are all part of their accountability for the execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance). Proactive monitoring, governance, identifying and escalating risks, and making prudent risk decisions in line with the business unit is risk appetite and all risk and compliance program needs are prioritized.
Staff members back our emphasis on fostering enduring connections with customers while maintaining a strong risk-reduction and compliance-oriented culture, which firmly defines those areas as essential to the success of both our clients and our business. In addition to effectively following and adhering to applicable Wells Fargo policies and procedures, they are also responsible for the timely and effective escalation and remediation of issues, the execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), and the making of sound risk decisions. Making wise risk decisions in line with the business unit is risk appetite and all risk and compliance program needs, as well as proactive monitoring, governance, risk detection, and escalation, are all important.
Applicants with Disabilities
Visit Wells Fargo’s Disability Inclusion page to request a medical accommodation during the application or interview process.
Drug and Alcohol Policy
Policy on Drugs and Alcohol Drugs are not allowed at Wells Fargo. For further information, please refer to our Drug and Alcohol Policy.
Wells Fargo Recruitment and Hiring Requirements
- It is forbidden to videotape other parties unless Wells Fargo has given permission.
- During the employment and recruitment process, Wells Fargo requires you to speak freely about your personal experiences.