Cybersecurity Jobs at Wipro with Visa Sponsorship
Wipro hires Cybersecurity professionals across roles like threat analysis, cloud security, and compliance consulting, and actively sponsors work visas for qualified candidates. If you're targeting a role in tech-driven security at a global IT services firm, Wipro is worth pursuing.
See All Cybersecurity at Wipro JobsOverview
Showing 5 of 10+ Cybersecurity Jobs at Wipro jobs


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?


Have you applied for this role?
See all 10+ Cybersecurity Jobs at Wipro
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cybersecurity Jobs at Wipro.
Get Access To All Jobs
Job Title: OIM Developer
Location: Dallas TX – onsite only
Duration: Full Time
Description:
Join our Security Operations team, where you'll drive strategic initiatives and support enterprise-wide identity and access management. You’ll be at the forefront of:
- Security operations strategy and governance
- Leading Security Operations teams and fostering development
- Strategic leadership and forward-thinking planning
BASIC QUALIFICATIONS
- Proven expertise in end-to-end deployment of Oracle Identity Manager solutions, including requirements analysis, solution design, configuration, customization, integration, migration, and ongoing support
- Strong understanding of identity lifecycle management, access certifications, compliance management, and application onboarding using Oracle Identity Manager
- Demonstrated experience integrating Oracle Identity Manager with major enterprise applications (e.g., SAP, ServiceNow, Workday etc.)
- Proficiency with core technologies relevant to Oracle Identity Manager implementation, such as Java, RESTful APIs, SQL/RDBMS, and Linux
- Experience in designing and implementing cloud security solutions
- Familiarity with cloud platforms (e.g. AWS, Azure, Google Cloud) and their security features
- Knowledge about regulatory compliance and industry standards (e.g. GDPR, PSI-DSS, ISO 27001)
- Strong understanding of directory services such as Active Directory, LDAP, Ping and Azure AD
- Knowledge of authentication protocols (e.g. SAML, OAuth, OpenID Connect, Kerberos)
- Understanding of network security principles and practices
- Strong problem-solving skills to address security challenges and incidents
- Excellent written and verbal communication skills to articulate security concepts
- Ability to collaborate effectively with cross-functional teams
- Experience in supporting security projects including planning, execution, and monitoring
- Ability to assist in designing and implementing access control policies and procedures
- Strong problem solving and analytical skills to identify and address access management issues
PREFERRED QUALIFICATIONS
Key Responsibilities
- Design and implement large-scale identity and access management (IAM) solutions
- Serve as the technical subject matter expert (SME) for IAM solutions, providing guidance on best practices, solution optimization, and future-state architectures
- Oversee end-to-end lifecycle management of identities (human and non-human), including onboarding, access provisioning, deprovisioning, and certification campaigns
- Design and implement advanced workflows, connectors, and automations within the IGA platform to streamline access requests, approvals, and policy enforcement
- Integrate IGA platform with a diverse technology stack (e.g., directories, cloud platforms, HR systems, databases, and SaaS applications), ensuring seamless interoperability
- Lead technical troubleshooting, incident resolution, and root cause analysis for escalated IAM issues, engaging with third-party vendors as needed
- Establish and enforce IAM governance policies, controls, and standards in collaboration with security, risk, audit, and compliance teams
- Drive continuous improvement initiatives, process automation, and adoption of emerging IAM tools and technologies
- Develop and maintain comprehensive documentation for IAM architectures, standard operating procedures, and security controls
- Communicate complex technical solutions and IAM strategies to technical and non-technical stakeholders, including presentations, status reports, and executive briefings
- Stay updated with current industry trends, emerging threats, and regulatory changes to ensure the organization's IAM capabilities evolve accordingly
Do
- Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24x7 rotational shifts
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks associated with this engagement
- Analyses all the attacks and come up with remedial attack analysis
- Conduct detailed analysis of incidents and create reports and dashboards
Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails
Deliver
No.
Performance Parameter
Measure
-
Customer centricity
Timely security breach solutioning to end users, Internal stakeholders & external customers experience -
Process Adherence
Adherence to SLAs (90-95%), response time and resolution time TAT
Mandatory Skills: IDAM Security Consulting
Experience: 3-5 Years
The expected compensation for this role ranges from $45,000 to $121,000.
Final compensation will depend on various factors, including your geographical location, minimum wage obligations, skills, and relevant experience. Based on the position, the role is also eligible for Wipro's standard benefits including a full range of medical and dental benefits options, disability insurance, paid time off (inclusive of sick leave), other paid and unpaid leave options.
Applicants are advised that employment in some roles may be conditioned on successful completion of a post-offer drug screening, subject to applicable state law.
Wipro provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Applications from veterans and people with disabilities are explicitly welcome.
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.

Job Title: OIM Developer
Location: Dallas TX – onsite only
Duration: Full Time
Description:
Join our Security Operations team, where you'll drive strategic initiatives and support enterprise-wide identity and access management. You’ll be at the forefront of:
- Security operations strategy and governance
- Leading Security Operations teams and fostering development
- Strategic leadership and forward-thinking planning
BASIC QUALIFICATIONS
- Proven expertise in end-to-end deployment of Oracle Identity Manager solutions, including requirements analysis, solution design, configuration, customization, integration, migration, and ongoing support
- Strong understanding of identity lifecycle management, access certifications, compliance management, and application onboarding using Oracle Identity Manager
- Demonstrated experience integrating Oracle Identity Manager with major enterprise applications (e.g., SAP, ServiceNow, Workday etc.)
- Proficiency with core technologies relevant to Oracle Identity Manager implementation, such as Java, RESTful APIs, SQL/RDBMS, and Linux
- Experience in designing and implementing cloud security solutions
- Familiarity with cloud platforms (e.g. AWS, Azure, Google Cloud) and their security features
- Knowledge about regulatory compliance and industry standards (e.g. GDPR, PSI-DSS, ISO 27001)
- Strong understanding of directory services such as Active Directory, LDAP, Ping and Azure AD
- Knowledge of authentication protocols (e.g. SAML, OAuth, OpenID Connect, Kerberos)
- Understanding of network security principles and practices
- Strong problem-solving skills to address security challenges and incidents
- Excellent written and verbal communication skills to articulate security concepts
- Ability to collaborate effectively with cross-functional teams
- Experience in supporting security projects including planning, execution, and monitoring
- Ability to assist in designing and implementing access control policies and procedures
- Strong problem solving and analytical skills to identify and address access management issues
PREFERRED QUALIFICATIONS
Key Responsibilities
- Design and implement large-scale identity and access management (IAM) solutions
- Serve as the technical subject matter expert (SME) for IAM solutions, providing guidance on best practices, solution optimization, and future-state architectures
- Oversee end-to-end lifecycle management of identities (human and non-human), including onboarding, access provisioning, deprovisioning, and certification campaigns
- Design and implement advanced workflows, connectors, and automations within the IGA platform to streamline access requests, approvals, and policy enforcement
- Integrate IGA platform with a diverse technology stack (e.g., directories, cloud platforms, HR systems, databases, and SaaS applications), ensuring seamless interoperability
- Lead technical troubleshooting, incident resolution, and root cause analysis for escalated IAM issues, engaging with third-party vendors as needed
- Establish and enforce IAM governance policies, controls, and standards in collaboration with security, risk, audit, and compliance teams
- Drive continuous improvement initiatives, process automation, and adoption of emerging IAM tools and technologies
- Develop and maintain comprehensive documentation for IAM architectures, standard operating procedures, and security controls
- Communicate complex technical solutions and IAM strategies to technical and non-technical stakeholders, including presentations, status reports, and executive briefings
- Stay updated with current industry trends, emerging threats, and regulatory changes to ensure the organization's IAM capabilities evolve accordingly
Do
- Ensuring customer centricity by providing apt cybersecurity
- Monitoring and safeguarding the log sources and security access
- Planning for disaster recovery in the event of any security breaches
- Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
- Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
- Conduct security assessments, risk analysis and root cause analysis of security incidents
- Handling incidents escalated by the L1 team in 24x7 rotational shifts
- Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
- Completing all tactical security operations tasks associated with this engagement
- Analyses all the attacks and come up with remedial attack analysis
- Conduct detailed analysis of incidents and create reports and dashboards
Stakeholder coordination & audit assistance
- Liaise with stakeholders in relation to cyber security issues and provide future recommendations
- Maintain an information security risk register and assist with internal and external audits relating to information security
- Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues
- Advice and guidance to employees on issues such as spam and unwanted or malicious emails
Deliver
No.
Performance Parameter
Measure
-
Customer centricity
Timely security breach solutioning to end users, Internal stakeholders & external customers experience -
Process Adherence
Adherence to SLAs (90-95%), response time and resolution time TAT
Mandatory Skills: IDAM Security Consulting
Experience: 3-5 Years
The expected compensation for this role ranges from $45,000 to $121,000.
Final compensation will depend on various factors, including your geographical location, minimum wage obligations, skills, and relevant experience. Based on the position, the role is also eligible for Wipro's standard benefits including a full range of medical and dental benefits options, disability insurance, paid time off (inclusive of sick leave), other paid and unpaid leave options.
Applicants are advised that employment in some roles may be conditioned on successful completion of a post-offer drug screening, subject to applicable state law.
Wipro provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Applications from veterans and people with disabilities are explicitly welcome.
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.
See all 10+ Cybersecurity at Wipro jobs
Sign up for free to unlock all listings, filter by visa type, and get alerts for new Cybersecurity at Wipro roles.
Get Access To All JobsTips for Finding Cybersecurity Jobs at Wipro Jobs
Align Your Certifications to Wipro's Security Stack
Wipro's Cybersecurity engagements lean heavily on cloud and managed security services. Credentials like CISSP, CCSP, or CompTIA Security+ tied to AWS or Azure environments signal direct fit for the roles they're actively staffing.
Target Wipro's Managed Security Service Openings
Wipro fills a large share of its Cybersecurity headcount through its managed security and cyber defense practice. Filtering your search to those business units puts you in front of hiring managers with established visa sponsorship workflows.
Clarify Specialty Occupation Standing Before Applying
H-1B eligibility for Cybersecurity roles depends on USCIS treating the position as a specialty occupation. Roles scoped around specific technical domains like penetration testing or SOC operations are stronger candidates than broadly defined security generalist titles.
Ask About LCA Filing Timelines During Offer Negotiation
Your employer must file a certified Labor Condition Application with DOL before the H-1B petition goes to USCIS. Ask your Wipro recruiter which pay level will be listed on the LCA so your offered salary is benchmarked correctly from day one.
Use Migrate Mate to Surface Wipro Cybersecurity Openings
Wipro posts Cybersecurity roles across multiple channels and they move quickly. Use Migrate Mate to filter specifically for visa-sponsored positions at Wipro so you're applying to roles where sponsorship is already confirmed, not assumed.
Leverage OPT Cap-Gap Protection if You're on F-1
If your OPT expires before October 1 and Wipro files your H-1B petition before April 1, you're eligible for cap-gap protection that extends your work authorization. Confirm Wipro's petition filing schedule with your HR contact before your OPT end date approaches.
Cybersecurity at Wipro jobs are hiring across the US. Find yours.
Find Cybersecurity at Wipro JobsFrequently Asked Questions
Does Wipro sponsor H-1B visas for Cybersecurity roles?
Yes, Wipro sponsors H-1B visas for Cybersecurity positions, particularly within its managed security and cyber defense service lines. The role must qualify as a specialty occupation under USCIS standards, which means the position needs to require at minimum a bachelor's degree in a specific technical field like computer science, information security, or a related discipline.
How do I apply for Cybersecurity jobs at Wipro?
You can apply directly through Wipro's careers portal or browse visa-sponsored Cybersecurity openings at Wipro through Migrate Mate, which filters specifically for roles where sponsorship is available. When applying, tailor your resume to the specific security domain the role covers, whether that's cloud security, threat intelligence, or compliance, since Wipro's Cybersecurity practice is segmented by specialization.
Which visa types does Wipro commonly use for Cybersecurity professionals?
Wipro sponsors several visa categories for Cybersecurity roles. H-1B is the most common for full-time hires. F-1 OPT and CPT are used for students and recent graduates entering security roles before H-1B eligibility. Australian citizens may qualify for the E-3 visa, and Canadian and Mexican nationals may be eligible for TN status. Wipro also supports EB-2 and EB-3 Green Card pathways for longer-term employees.
What qualifications does Wipro expect for sponsored Cybersecurity positions?
Wipro's Cybersecurity roles generally require a bachelor's degree in computer science, information systems, or a related field, along with hands-on experience in areas like SIEM platforms, vulnerability management, endpoint security, or cloud security architecture. Industry certifications such as CISSP, CEH, CompTIA Security+, or cloud security credentials strengthen your application and help establish specialty occupation eligibility for H-1B purposes.
How do I handle timing if Wipro offers me a Cybersecurity role that requires H-1B sponsorship?
H-1B petitions are filed in April for an October 1 start date, following a lottery in March. If you receive an offer outside this window, Wipro may be able to sponsor a cap-exempt filing if the role is based at a qualifying institution, or bridge your status through OPT or another visa category. Clarify the timeline with Wipro's immigration team as soon as you receive an offer.
See which Cybersecurity at Wipro employers are hiring and sponsoring visas right now.
Search Cybersecurity at Wipro Jobs