🔔 FCM Loaded

PAM Analyst

Crescendo Global

3 - 5 years

Gurugram

Posted: 26/02/2026

Getting a referral is 5x more effective than applying directly

Job Description

The Privileged Access Management (PAM) Analyst Security Engineer

Experience - 3-5 Years

Location - Gurugram


ROLE PURPOSE

The Privileged Access Management (PAM) Analyst Security Engineer reports to the offshore PAM Lead within the CISO Identity and Access Management team. The role will play a key role in ensuring privileged identities are appropriately controlled and utilised based on a defined business need.


This role forms a key part of our Cyber Defence function and will require closely work across key functions within CISO, CIO and third-party partners. The successful applicant will be a strong communicator, with excellent written skills.The role requires strong knowledge of implementing and maintaining both traditional enterprise PAM technologies (such as CyberArk) but also managing cloud identity across multiple providers.


The role holder will have a sound knowledge of both traditional infrastructure and cloud technologies. The role requires working across multiple stakeholders, both internally and across partner infrastructure and cloud teams to ensure complete coverage of PAM controls and verify that the use of privilege is appropriate and in line with Security standards and policies.


The location of the role is flexible, with remote working available.There will be an expectation to work within the office on a periodic basis and to attend team meetings. There will also be a requirement to provide regular out of hours standby technical support as Privilege Access Management is a 24*7 service. Think youd be great at this role, but dont have all the skills? Wed still love to hear from you. Youll be joining a team who are passionate in their field, with a great opportunity to further develop your career and make a real difference.



KEY ACCOUNTABILITIES

  • Design, develop, and implement PAM solutions for privileged lifecycle management, session security, and compliance.
  • Configure and customize CyberArk components (Safes, Platforms, CPM policies, PSM connectors, workflows, plugins) for enterprise integration.
  • Improve and scale the CyberArk environment through automation and standardization.
  • Integrate CyberArk Privilege Cloud with enterprise applications, directories, and hybrid cloud services.
  • Develop technical documentation, including architecture diagrams, configuration standards, onboarding guides, and integration specs.
  • Monitor and troubleshoot CyberArk issues (CPM, PSM, platform/plugin errors, authentication failures).
  • Collaborate with internal teams and thirdparty vendors to address risks, audits, compliance, and security incidents.
  • Contribute to PAM strategy and roadmap, including Privilege Cloud, Secrets Management, and cloudbased PAM adoption.


Regulatory Requirements

  • Industry codes of practice
  • Relevant legislative and regulatory requirements including DPA/GDPR, PCI-DSS, NI52-109 and FCA guidance


FUNCTIONAL / TECHNICAL SKILLS

  • Configure CPM, PSM, PSMP, Cloud Connectors, and platform plug-ins.
  • Onboard and manage privileged accounts across servers, databases, networks, and applications.
  • Maintain CPM policies, password lifecycle, and PSM connectors with session recording.
  • Integrate CyberArk with AD/Entra ID, LDAP, MFA, SIEM, and ITSM tools.
  • Automate tasks using REST APIs and PowerShell; troubleshoot CPM/PSM/PVWA issues.
  • Manage safes, access controls, dual-control workflows, and least-privilege policies.
  • Deliver end-to-end PAM implementations and maintain architecture/SOPs/runbooks.
  • Perform health checks, upgrades, DR drills, hardening, and compliance support.
  • Collaborate with teams and vendors on incident response and risk remediation.
  • Contribute to PAM roadmap and cloud adoption (PCloud, AAM, Conjur).


A good contributor in this role will typically be able to demonstrate

  • Core CompetenciesInfluencing Others Advanced
  • Building Effective Relationships Advanced
  • Making Change Happen Intermediate
  • Planning Advanced
  • Using Judgement Advanced
  • Leading People Intermediate
  • Communicating Effectively (Written & Verbal) Advanced
  • Presentation Skills Intermediate
  • Ability to clearly report risks and issues to nontechnical stakeholders
  • Positive, cando attitude with strong attention to detail
  • Highly motivated and driven by engaging with modern cyberattacks


  • Technical SkillsUnderstanding IT / IS Advanced
  • Infrastructure Security Advanced
  • IT Risk / IT Audit / IT Controls Intermediate
  • Knowledge of emerging technologies


  • Experience Requirements
  • Experience working in Financial Services
  • Preferably 3+ years of experience within Financial Services, actively working with cybersecurity tooling
  • Experience delivering threat intelligence services within large organisations

Services you might be interested in

Improve Your Resume Today

Boost your chances with professional resume services!

Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.