Jobs
Interviews

1249 Application Security Jobs - Page 6

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

6.0 - 7.0 years

4 - 7 Lacs

Hyderabad

Work from Office

What you get to do in this role: Identify the important strategic product security focus areas for the team Help lead security discussions with the other engineering teams Participate in research to identify new attack vectors and adopt new methodologies Perform product security testing on ServiceNow products Audit source code of the platform and applications Identify, communicate, and recommend remediation of Security Vulnerabilities To be successful in this role you have: Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving. This may include using AI-powered tools,

Posted 1 week ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Pune

Work from Office

Please find below JD for Akamai/F5 SME.Key Responsibilities:Troubleshoot performance, latency, and availability issues across Akamai CDN and F5 LTM environments to ensure optimal service delivery for end users.Onboard and manage applications on Akamai Web Application Firewall (WAF) and F5 LTM, including:Requirement gathering and solution design with application, security, and DevOps teamsAkamai WAF policy configuration, tuning, and phased enforcement (monitor block mode)F5 LTM configuration for load balancing, SSL offloading, health checks, and URL routingImplementing traffic baselining and validation for security and performanceIntegrate Akamai CDN and F5 LTM with modern web applications, APIs, and microservices across cloud and on prem environments.Deploy and maintain Akamai security solutions, including:App & API ProtectorCustom rules and client reputationDDoS mitigation and advanced bot managementConfigure and optimize F5 LTM features, including:Virtual servers, pools, nodes, profiles (TCP, HTTP, SSL)Health monitoring, persistence profiles, SNAT automap, and iRules as required

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Pune

Work from Office

Our exciting Opportunity We are now looking for a Security Vulnerability Analyst professional for our security team. This job role is responsible for identifying, researching, prioritizing, remediating, and mitigating vulnerabilities as part of the vulnerability management practice. The professional will work alongside a highly Skilled, diverse team, making Sure that the information assets, that we are responsible to protect, are secured! We believe in trust we trust each other to do the right things! We believe in taking decisions as close to the product and technical expertise as possible. We believe in Creativity trying new things and learning from our mistakes. We believe in Sharing our insights and helping one another to build an even better user plane. We truly believe in happiness, we enjoy and feel passionate about what we do and value each other s technical competence deeply. You will Daily operations and maintenance of vulnerability scanning tools and Supporting infrastructure Register the assets in the scanning tool and perform scanning as per the agreed schedule. Perform Vulnerability Management, including but not limited to: Supporting scan tools, executing vulnerability scans, CIS Hardening, performing analysis, recommending / tracking mitigations Monitor ticket / email queue for Vulnerability & Pen test request. Monitor email / Web based reporting of vulnerabilities from outside reporters. Responsible for Completion status and reporting Vulnerability assessment scan. Periodic validation of assets through Central depository. Perform, review and analyze security vulnerability data to identify applicability and false positives, recommend corrective actions for mitigation Publish report as per the defined schedule on identified security vulnerabilities as well the Control gaps identified during security Control review. Manage tracking and remediation of vulnerabilities by leveraging agreed-upon action plans and timelines with responsible technology developers and Support teams. Overall responsible for governance and tracking of Vulnerability Remediation action Plan Plan and handshake Vulnerability schedule with customer & stakeholders. Assist in metrics development and reporting. You must have Solid understanding of security controls (e.g. Access Control, auditing, authentication, encryption, integrity, physical security, and application security). Working knowledge of scanning tools (nessus, qualys, netsparker, Fortify, etc.) Strong understanding of enterprise, network, system and application level security issues understanding of enterprise Computing environments, distributed applications, and a Strong understanding of TCP/IP networks also with available security Control (technical & process Control) for respective layers The ability to provide Support after normal business hours The ability to work constructively under pressure Ability to work both in a team as well as individually participate in the out-of-hours on Call rotation, providing technical Support to the business for major and critical incidents Knowledge Sharing and Collaboration skills Deliver results and meet customer expectations excellent communication skills; English is a must Key qualifications: Bachelors Degree (B.E./B.tech) in Computer science or related field. Experience: 5 years What s in it for you? Here at Ericsson, our Culture is built on over a Century of courageous decisions. With us, you will no longer be dreaming of what the future holds you will be redefining it. You won t develop for the status quo, but will build what replaces it. Joining us is a Way to move your Career in any direction you want; with hundreds of Career opportunities in locations all over the world, in a place where Co-Creation and Collaboration are embedded into the walls. You will find yourself in a Speak-up environment where empathy and humanness Serve as cornerstones for how we work, and where work-life balance is a priority. Welcome to an inclusive, global Company where your opportunity to make an impact is endless. What happens once you apply? To prepare yourself for next steps, please explore here: https: / / www.ericsson.Com / en / careers / job-opportunities / hiring-process Why join Ericsson? What happens once you apply? We are committed to providing reasonable accommodations to all individuals participating in the application and interview process. If you need assistance or to request an accommodation due to a disability please reach out to Contact us We are proud to announce Ericsson India is ranked 19th among all 50 countries and is once again officially Great Place to Work Certified in 2024. Every year, more than 10,000 organizations from over 60 countries partner with the Great Place to Work Institute for assessment, benchmarking and planning actions to strengthen their workplace culture and this Certification acknowledges our employees value their employee experience and our workplace culture. Primary country and city: India (IN) || Noida Req ID: 770318

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Who we are At Twilio, we re shaping the future of communications, all from the comfort of our homes. We deliver innovative solutions to hundreds of thousands of businesses and empower millions of developers worldwide to craft personalized customer experiences. Our dedication to remote-first work , and strong culture of connection and global inclusion means that no matter your location, you re part of a vibrant team with diverse experiences making a global impact each day. As we continue to revolutionize how the world interacts, we re acquiring new skills and experiences that make work feel truly rewarding. Your career at Twilio is in your hands. See yourself at Twilio Join the team as Twilio s next Senior Cloud Security Engineer (L3). About the job The Cloud and Application Security team enables delivery of secure by default products to reduce our attack surface against an evolving threat landscape. This position is needed to enhance Twilio s Cloud Security capabilities to improve visibility, reduce vulnerabilities and foster secure engineering practices. This role is going to help build key aspects of the program in partnership with different InfoSec and Engineering teams. This role will have a high impact Responsibilities In this role, you ll: Lead and Contribute to Cloud Security initiatives across different teams to design, build and implement security best practices and solutions Implement and enhance security automation to enhance Cloud Security Maintain Cloud Security solutions, measure their effectiveness and continuously improve based on strategic priorities Develop and maintain Cloud Security guidelines and best practices to enable Engineers Investigate security vulnerabilities and support incident response as needed Research emerging threats, vulnerabilities, and attack techniques to proactively secure Twilio s Cloud Environments Qualifications Twilio values diverse experiences from all kinds of industries, and we encourage everyone who meets the required qualifications to apply. If your career is just starting or hasnt followed a traditional path, dont let that stop you from considering Twilio. We are always looking for people who will bring something new to the table! Required: 5+ years of experience in Cloud Security Engineering or related fields. Hands on experience with Cloud Security Solutions solutions Deep understanding of security for Containers, Web, APIs, and Cloud-native workloads (AWS, Azure, GCP). Strong knowledge of Cloud Threats and modern attack vectors Excellent communication and presentation skills, including an ability to communicate effectively with a diverse array of stakeholders at different levels Desired: Cloud Security Certifications (AWS, Azure, GCP, GIAC) Experience with Threat Modeling Location This role will be remote, and based in India (Karnataka, Maharashtra, New Delhi, Tamilnadu, Telangana) Travel We prioritize connection and opportunities to build relationships with our customers and each other. For this role, you may be required to travel occasionally to participate in project or team in-person meetings. What We Offer Working at Twilio offers many benefits, including competitive pay, generous time off, ample parental and wellness leave, healthcare, a retirement savings program, and much more. Offerings vary by location. Twilio thinks big. Do you? We like to solve problems, take initiative, pitch in when needed, and are always up for trying new things. Thats why we seek out colleagues who embody our values something we call Twilio Magic . Additionally, we empower employees to build positive change in their communities by supporting their volunteering and donation efforts. So, if youre ready to unleash your full potential, do your best work, and be the best version of yourself, apply now! If this role isnt what youre looking for, please consider other open positions . Twilio is proud to be an equal opportunity employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, reproductive health decisions, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, genetic information, political views or activity, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act. Additionally, Twilio participates in the E-Verify program in certain locations, as required by law.

Posted 1 week ago

Apply

8.0 - 10.0 years

25 - 30 Lacs

Pune

Work from Office

Long Description Our exciting Opportunity We are now looking for a Security Vulnerability Engineer for our security team. This job role is responsible for identifying, researching, prioritizing, remediating, and mitigating vulnerabilities as part of the vulnerability management practice. The professional will work alongside a highly Skilled, diverse team, making Sure that the information assets, that we are responsible to protect, are secured! We believe in trust we trust each other to do the right things! We believe in taking decisions as close to the product and technical expertise as possible. We believe in Creativity trying new things and learning from our mistakes. We believe in Sharing our insights and helping one another to build an even better user plane. We truly believe in happiness, we enjoy and feel passionate about what we do And value each other s technical competence deeply. You will Daily operations and maintenance of vulnerability scanning tools and Supporting infrastructure Register the assets in the scanning tool and perform scanning as per the agreed schedule. Perform Vulnerability Management, including but not limited to: Supporting scan tools, executing vulnerability scans, performing analysis, recommending / tracking mitigations Periodic validation of assets through Central depository. Register assets in scanning tool and perform periodic scans. Perform, review and analyze security vulnerability data & CIS Hardening data to identify applicability and false positives, recommend corrective actions for mitigation Publish report as per the defined schedule on identified security vulnerabilities & CIS Hardening as well the Control gaps identified during security Control review. Overall responsible for governance and tracking of Vulnerability Remediation action Plan Maintain risk register for exploitable Vulnerability & discuss remediation with stakeholders Act on after hours (on-Call Support) for IT security incidents as required Analyze results of Web application assessment and provide executive reports with recommendations for mitigation. Perform, review and analyze security vulnerability data to identify applicability and false positives, recommend corrective actions for mitigation publish report as per the defined schedule on identified security vulnerabilities as well the Control gaps identified during security Control review. Manage tracking and remediation of vulnerabilities by leveraging agreed-upon action plans and timelines with responsible technology developers and Support teams. Assist in metrics development and reporting. Devise methods to automate testing activities and Streamline testing processes Provide oral briefings to leadership and technical Staff, as necessary. Support and run vulnerability management scans of the customer systems (using tools like Tenable nessus, qualys, etc.) Plan and handshake Vulnerability schedule with customer & stakeholders. You must have Solid understanding of security controls (e.g. Access Control, auditing, authentication, encryption, integrity, physical security, and application security). Working knowledge of scanning tools (nessus, qualys, netsparker, Fortify, etc.) Strong understanding of enterprise, network, system and application level security issues Understanding of enterprise Computing environments, distributed applications, and a Strong understanding of TCP/IP networks also with available security Control (technical & process Control) for respective layers Experience writing technical reports and executive summaries. The ability to provide Support after normal business hours The ability to work constructively under pressure Ability to work both in a team as well as individually Participate in the out-of-hours on Call rotation, providing technical Support to the business for major and critical incidents Knowledge Sharing and Collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key qualifications: Bachelors Degree (B.E./B.tech) in Computer science or related field. Experience: 8-10 years What s in it for you? Here at Ericsson, our Culture is built on over a Century of courageous decisions. With us, you will no longer be dreaming of what the future holds you will be redefining it. You won t develop for the status quo, but will build what replaces it. Joining us is a way To move your Career in any direction you want; with hundreds of Career opportunities in locations all over the world, in a place where Co-Creation and Collaboration are embedded into the walls. You will find yourself in a Speak-up environment where empathy and humanness Serve as cornerstones for how we work, and where work-life Balance is a priority. Welcome to an inclusive, global Company where your opportunity to make an impact is endless. What happens once you apply? To prepare yourself for next steps, please explore here: https: / / www.ericsson.Com / en / careers / job-opportunities / hiring-process Why join Ericsson? What happens once you apply? We are committed to providing reasonable accommodations to all individuals participating in the application and interview process. If you need assistance or to request an accommodation due to a disability please reach out to Contact us We are proud to announce Ericsson India is ranked 19th among all 50 countries and is once again officially Great Place to Work Certified in 2024. Every year, more than 10,000 organizations from over 60 countries partner with the Great Place to Work Institute for assessment, benchmarking and planning actions to strengthen their workplace culture and this Certification acknowledges our employees value their employee experience and our workplace culture. Primary country and city: India (IN) || Noida Req ID: 770317

Posted 1 week ago

Apply

2.0 - 5.0 years

7 - 10 Lacs

Bengaluru

Work from Office

The Advanced Cybersecurity Architect is responsible for providing application and system level security expertise and mentoring to Aerospace products. As an integral member of our global product security community, support product security activities aligned to the Secure Development Lifecycle process across Aero products. Key Responsibilities: Good understanding of Design Objectives DO-178B/C, DO-326A, DO-355, and DO-356A to support continuous Airworthiness of an aircraft from safety and security aspects. Experience in Certifying and meeting the compliance for the Embedded products that run in an Aircraft cockpit with Certifying Authorities like FAA, and EASA. Lead efforts with the development teams to manage product risk and apply the appropriate security controls. Experience in driving secure architecture by design, security risk assessment, defense-in-depth approach, multilayer security controls, identifying the gaps, and defining the remediation approach by using the security controls during the risk assessment. Expert in threat modeling of both Embedded products as well as web applications and effectively communicating the security risks to the program teams in advance. Experience in providing security architecture guidance and support to a large development organization to support security by design principles. Good understanding of Cryptographic principles, Hashing, Certificate Management, Symmetric, and Asymmetric algorithms. Drive best in class security requirements into product and service offerings. Provide architecture and best practices guidance in building secure Honeywell products. Support product security process activities including threat modeling, security requirements, security reviews, threat vulnerability assessments and risk management for Aerospace applications. Must have product architecture and development background with Secure software development lifecycle experience. Understanding of security by design principles and architecture level security concepts up to date knowledge of current and emerging security threats and techniques for exploiting security vulnerabilities Have experience in developing, securing, and driving security requirements recommendations for, Embedded & IIOT based Avionics Products, on RTOS platforms such as VxWorks, Deos. , Experience with securing Commercial Cloud, Hybrid and private cloud deployed applications, Containers, and VMs, through secure configurations and performing periodic security reviews. Lead efforts in mentoring and training the engineering development community and facilitate adoption of shift-security-to-left practice Lead new initiatives that add value to SDL processes and procedures YOU MUST HAVE: Bachelor s degree or equivalent work experience in Cyber Security or Information Technology Strong interpersonal skills with the ability to facilitate diverse groups, help negotiate priorities, and resolve conflicts among stakeholders 6+ years Cyber Security or Information Technology experience WE VALUE: Understanding of Agile software development practices. Understanding DevsecOps and have a good working understanding of tooling specific to CI/CD pipelines and security tooling. Information Security accreditation (CISSP/CSSLP or other security related certifications) Developing secure systems, web application penetration testing or application security consultant Azure, AWS or GCP Security or Solutions Architecture certifications Experience with widely used security tools like SD Elements, BlackDuck Hub, Microsoft Threat modeling tool, SAST (Coverity, SonarQube), DAST (Burp, ZAP, AppSpider), Fuzzing, Vulnerability management and continuous monitoring tools Sound understanding of Cryptography, encryption algorithms, Public Key Infrastructure (PKI), Secure boot and Open-source risk management. An effective communicator with excellent relationship management skills and strong analytical, leadership, decision-making, and problem-solving skills. Ability to lead, motivate and direct a workgroup. Strong leadership and team-building skills. Manage stakeholders across business verticals & regions. Must be a Firm believer in continuous learning, upskilling the team competency on new-age skills and developing the capabilities of new technologies. WE VALUE: Understanding of Agile software development practices. Understanding DevsecOps and have a good working understanding of tooling specific to CI/CD pipelines and security tooling. Information Security accreditation (CISSP/CSSLP or other security related certifications) Developing secure systems, web application penetration testing or application security consultant Azure, AWS or GCP Security or Solutions Architecture certifications Experience with widely used security tools like SD Elements, BlackDuck Hub, Microsoft Threat modeling tool, SAST (Coverity, SonarQube), DAST (Burp, ZAP, AppSpider), Fuzzing, Vulnerability management and continuous monitoring tools Sound understanding of Cryptography, encryption algorithms, Public Key Infrastructure (PKI), Secure boot and Open-source risk management. An effective communicator with excellent relationship management skills and strong analytical, leadership, decision-making, and problem-solving skills. Ability to lead, motivate and direct a workgroup. Strong leadership and team-building skills. Manage stakeholders across business verticals & regions. Must be a Firm believer in continuous learning, upskilling the team competency on new-age skills and developing the capabilities of new technologies.

Posted 1 week ago

Apply

4.0 - 7.0 years

6 - 9 Lacs

Bengaluru

Work from Office

ECMS Requirement Format Number of Openings 1 ECMS ID in sourcing stage Demand 382269Y25 / ECMS ID 534102 Assignment Duration 12 Months Total Yrs. of Experience 8 Relevant Yrs. of experience 5 Detailed JD (Roles and Responsibilities) Senior CASB Engineer/ Cyber Security Specialist Design and implement brand new tool which will be used for providing extensive overview of SaaS applications which are used by Banking employees. This tool will also allow users to find and highlight potential information gaps in inventory tools. Based on processed information we will be preparing policy updates on CASB side. Troubleshoot issues that may arise due to different data flows and API calls Mandatory skills Experience in SW development which used Microsoft Azure Cloud services (AKS, Azure DB) Experience in Python programming Good understanding and practical experience in using / designing SQL DB Experience in developing & managing API integrations with external tools, e. g. , Rest API. Desired/ Secondary skills Basic knowledge about GIT (our software versioning system) and Gitlab (for managing tasks / sprints) Knowledge about Azure OpenAI is a nice to have (we are planning to use it in next iterations) Good understanding in infrastructure components (DHCP, DNS, AD, PKI, virtualization) with experience in either Linux or windows administration or engineering. Proficient in security concepts (data security & application security). Domain FS Max Vendor Rate in Per Day (Currency in relevance to work location) 16000 INR / day Work Location given in ECMS ID Pune WFO/WFH/Hybrid WFO WFO BG Check (Before OR After onboarding) Before Is there any working in shifts from standard Daylight (to avoid confusions post onboarding) YES/ NO NO

Posted 1 week ago

Apply

4.0 - 7.0 years

6 - 9 Lacs

Bengaluru

Work from Office

Description Job Overview : Successful candidates display strong analytical, problem-solving, organizational, and written/oral communication skills. He/She should be a detail-oriented team member who can consistently meet deadlines and possess the ability to work independently as needed. Computer, interpersonal and customer service skills are necessary. He/she must be able to multi-task and demonstrate the ability to work with a diverse work group of stakeholders. Responsibilities and Duties : Work as a Program Analyst/Project Controller in Program Management Department Perform task on Power BI desktop (Basic to Advance) like ETL (Extract Transform and Load), Manage Relationship and creating Visuals. Will establish logic and primary keys for table relationship in Power BI. Setting up meeting and understanding the requirements of internal & external stakeholders. Perform task independently using advance Power Query steps, DAX formula, Measures etc. Should be creative in terms of producing visuals and showing data in presentable format. Effective Verbal & Written Communication, Proactiveness & ownership attitude is required. Will be delivering Quality and Timely deliverables. Keep track of various dashboards created and targets. Execute agile type of task under typical program/portfolio. Work on advance excel & Power BI to carry out any type of project analysis Connecting various data sources to Power BI (Folder, Files, SharePoint folder, Azure, or such databases) Analytical thinking for translating data into meaningful statistics& information Capable of implementing row-level security on data along with an understanding of application security layer models in Power BI. Will create and update Power BI Procedures specific to Project Deployment of Dashboard and Maintenance of Power BI Services for various clients within Workspace. Handling Admin activities of Power BI workspace. Qualifications Any Graduate or Diploma Should have experience in Power BI advance. Power BI Certification preferred. Candidate having working knowledge of Advance Excel is preferred. Interest to learn & develop project controls capabilities. Excellent written & verbal communication skills. Basic understanding about the Project Management Knowledge areas & Planning Terminologies. Ready to work in 2nd shift (12:30 pm to 9:00 PM) to get 3-4 hours to coordinate with US Office. Job Information Technology Primary Location India-Karnataka-Bengaluru Schedule: Contract Travel: No Req ID: 252434 Job Hire Type Contingent Worker (CWK) Not Applicable #BMI N/A

Posted 1 week ago

Apply

3.0 - 8.0 years

6 - 10 Lacs

Coimbatore

Work from Office

Role is SAP subject matter expert/architect role for Security. Key responsibilities will involve working with Business Stakeholders, understanding requirements, translating user requirements into SAP IT scope, assessing impact on application & connected systems, estimating high level schedule and efforts to implement solution and ensure successful technical delivery Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Candidate must have min. 2-4 years of solid SAP Security Implementation experience with focus on Role authorizations. Solid implementation and hands-on experience in ECC 6.0 role build. Experience in working with stakeholders and leading SAP security projects. Sound understanding of SOD - segregation of duties. Support technical requirement gathering, develop prototypes/PoCs/recommend solutions with limited information from the business, delivery quality technical specifications and documentation Preferred technical and professional experience SOX/GRC Control experience

Posted 1 week ago

Apply

7.0 - 12.0 years

30 - 35 Lacs

Noida, Chennai, Bengaluru

Hybrid

Support asset development, process establishment. Conducting application security assessments (web, mobile, web service, Infra etc.). These assessments involve manual testing and analysis as well as the use of automated application vulnerability scanning/testing tools such as Burp Suite Professional and/or code review tools such as HCL AppScan/HP Fortify or CMx. We expect candidate to have experience doing similar assessments, candidate can be trained on any proprietary assessment methodology. Mandatory: 5+ years of strong Application Security experience in S-SDLC Code Review, Vulnerability Assessment, Penetration Testing. Web Service/API security testing Hands on experience into Mobile application Security Android/iOS - reverse engineering/memory analysis etc. Security tool experience - HCLAppScan/CheckMarx/Fortify/Veracode/Burp Suite Good exposure on penetration testing. Good to have one of the given certifications - OSCP/GPEN/GWAPT/CSSLP etc. Independent global client handling AppSec delivery exposure. >=2 years. Excellent interpersonal skill.

Posted 1 week ago

Apply

5.0 - 7.0 years

18 - 30 Lacs

Gurugram

Hybrid

Looking for an Application Security Analyst/Engineer with 5 to 7 years of hands-on experience in application security assessments, including architecture/design review, code analysis, penetration testing, and third-party/vendor risk reviews. The ideal candidate will possess strong expertise in secure coding, security testing tools, and key protocols. Key Responsibilities Conduct application security assessments: architecture/design reviews, code reviews, and penetration testing. Utilize SAST and DAST tools to uncover vulnerabilities in both code and running applications. Analyze and document penetration testing results, highlighting risk areas and recommending countermeasures. Perform vendor risk assessments to ensure compliance and third-party security practices. Collaborate with engineering and QA teams to implement security best practices throughout SDLC. Maintain expertise in HTTP, HTTPS, SSL/TLS, and SFTP protocols for secure communication and file transfer. Keep up with security trends, technologies, and emerging threats. Required Skills & Qualifications Bachelors in Computer Science, Information Security, or relevant field (or equivalent experience). 5-7 years of application security assessment experience. Hands-on with SAST (e.g., SonarQube, Fortify) and DAST (e.g., Burp Suite, OWASP ZAP) tools. Penetration testing skills with real-world scenario simulation. Understanding of security protocols: HTTP, HTTPS, SSL/TLS, SFTP. Familiarity with OWASP Top 10, vulnerability management, and security frameworks. Analytical and communication skills. Preferred Qualifications Security certifications (e.g., OSCP, CEH, CISSP, GIAC). Knowledge of cloud security (AWS, Azure, GCP). Exposure to DevSecOps and CI/CD integration for security.

Posted 1 week ago

Apply

2.0 - 3.0 years

11 - 16 Lacs

Pune

Work from Office

Application Security Risk Classification Analyst Project description Do you have the know-how to apply business analysis techniques to deliver process and control execution in Application Security area? Are you a committed and collaborative team player with an analytical and logical mind-set? Are you motivated to work in a complex, diverse and global environment? ASCA (Application Security Risk Classification (ASCA) is part of a global organization within Technology Information Security Office (TISO). Our services focus on Cyber Hygiene for applications and infrastructure, detecting/remediating/governing measures for cyber threats. . You'll be working as part of our global Application Security team. As an ASCA Analyst, you'll play an important role in ensuring the on-going cyber-security of our client. We offer flexibility in the workplace and equal opportunities to all our team members. Our team is global, diverse and collaborative as we work across organizations to keep our technology, applications and the businesses they support secure. Responsibilities We're looking for a ASCA business analyst to: On-board applications to Application Security Framework (ASF) in cooperation with the Software Component Manager (SWCM) Management of applications in scope of control processes and execution Management of the pipeline of the applications to be onboarded Coordinating entries to Application Security Management System Compliance reporting to stakeholders, including risk and compliance teams. Production Tollgate verification for releasing applications into Production environment. Skills Must have Your expertise Ideally 2-3 years of experience in applying cyber security analysis or administration, preferably in IT Security or Risk Management projects (Application Security area preferred). Experience with data analysis proficiency with Excel is a must. Ability to work independently on assigned tasks and driving them from start to completion. Ability to challenge and propose possible improvements (in various areas, e.g. process, reporting) Ability to explain complex concepts in a clear and concise manner Use to work with stakeholders on different levels of the organization Use to work in a demanding and variable environment Excellent written and verbal communication skills Fluent in English Nice to have Experience within Application Security area preferred

Posted 1 week ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Ping Identity Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We need skilled Ping Identity Engineer with strong experience implementing and supporting customer identity and access management (CIAM) solutions using the Ping Identity suite, including PingOne, Ping DaVinci, and PingFederate. You will design, deploy, and maintain modern CIAM capabilities, working closely with business stakeholders, developers, and security teams to deliver secure and seamless customer authentication experiences. Roles & Responsibilities:-Develop customer authentication and authorization workflows-Integrate with third-party identity providers, directories, and social logins-Configure PingOne platform (PingOne MFA, PingOne Risk, PingOne DaVinci orchestration)-Set up policies for adaptive authentication, step-up authentication, and user journeys-Implement PingFederate for SSO and federation use cases-Support provisioning and lifecycle management via PingOne-Ping DaVinci:Design and build drag-and-drop workflows for identity verification, fraud detection, and progressive profiling-Integrate DaVinci flows with APIs, third-party tools, and identity proofing services Professional & Technical Skills: - Must To Have Skills: Proficiency in Ping Identity.- Strong understanding of cloud security principles and practices.- Experience with identity and access management solutions.- Knowledge of security frameworks such as NIST, ISO 27001, or CIS.- Familiarity with risk assessment methodologies and compliance requirements. Additional Information:- The candidate should have minimum 5 years of experience in Ping Identity.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

6.0 - 10.0 years

0 Lacs

karnataka

On-site

As a Principal Security Testing Engineer at Atlassian, you will have the opportunity to work remotely or from the office, giving you the flexibility to balance your personal and professional life effectively. At Atlassian, we believe in providing our employees with the autonomy to choose where they work, and we hire talent from any country where we have a legal presence. Our interview and onboarding processes are conducted virtually, reflecting our commitment to being a distributed-first company. In this role, you will collaborate closely with the Security Testing Manager to establish and enhance the Security Testing team and capabilities. Your primary responsibilities will include conducting penetration testing, manual code reviews, and driving process improvements within the team. As the Technical Subject Matter Expert (SME), you will equip the team with the latest tools, techniques, and methodologies to identify vulnerabilities that standard off-the-shelf tools may overlook. The Security Testing team at Atlassian is dedicated to safeguarding the security of our products, platforms, and customers. As a Principal Security Testing Engineer, you will lead efforts to validate Atlassian's technical security posture and collaborate with various security and leadership groups. You will have the opportunity to contribute to the growth of a team of penetration testers based in our Bangalore office, providing world-class technical assurance through high-quality testing practices. To excel in this role, you should have a strong background in penetration testing, application security, and code review. Your day-to-day activities will involve providing expert guidance to the team, enhancing testing workflows, recruiting top-tier talent, and analyzing vulnerability data to identify trends and control gaps. Your success will be measured by your ability to identify significant vulnerabilities, build strong relationships across engineering and security teams, and establish effective testing processes that align with strategic objectives. Ideal candidates will have at least 6 years of penetration testing experience, with 2 years in a leadership role. Additionally, experience in white-box application security testing, full-stack application security, and mentoring junior testers will be beneficial. On your first day, you should be capable of conducting penetration tests and code reviews, demonstrating a deep understanding of security testing methodologies and effective collaboration with technical teams. At Atlassian, we offer a range of perks and benefits to support our employees and their families, including health and wellbeing resources and paid volunteer days. Our inclusive culture and collaborative hiring process aim to unleash the potential of every team member. If you are passionate about security testing, enjoy sharing knowledge, and thrive in a collaborative environment, we encourage you to join our growing team at Atlassian.,

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

The role of an Application (software) Security Engineer is an entry-level, hands-on, engineering-focused position with the responsibility of fostering a Secure SDLC and secure by design approach and practice across all software engineering teams. You must possess a good combination of problem-solving and communication skills to effectively support the Application Security, InfoSec, and Software engineering teams. Your main responsibilities will include configuring and fine-tuning Application Security tests and vulnerability scans, integrating security testing into CI/CD pipelines, and collaborating with Senior Application Security engineers on Penetration tests set up and validation. Additionally, you will be expected to document and update processes and procedures, conduct research and consultations with colleagues, deliver secure software development training such as OWASP Top10, and collaborate with Security Analysts on software vulnerabilities and security issues. This will involve determining scope, severity, and potential impact of security issues, recommending next steps, and following through with risk treatment and mitigation. You will also be required to appropriately escalate issues to various teams and levels of authority within the organization. To qualify for this role, you must have a Bachelor's degree in a relevant business or technical discipline, along with a minimum of 3 years of relevant work experience. Demonstrated knowledge of application security concepts, best practices, and methods is essential, as well as experience with various application security tools including SAST, SCA, and DAST. Experience with Web Application security testing like Web Pentesting, Fuzzing, and Automated tests is also required. Ideally, you will also have experience securing cloud infrastructure and cloud applications, working knowledge of various architectures and design patterns, ability to code in at least one programming language (such as python, javascript, or go), familiarity with AWS native security tools, and knowledge of current and emerging security technologies and threats. Experience with threat analysis methodologies and tools, developer tools, project management, bug tracking systems, and integrating security tools into CI/CD pipelines would be considered advantageous for this role. This is a challenging yet rewarding opportunity for an individual with a passion for application security and a drive to contribute to the implementation of secure software practices within a dynamic organization.,

Posted 1 week ago

Apply

7.0 - 11.0 years

0 Lacs

ahmedabad, gujarat

On-site

About us: At Tech Holding, working with us is more than just a job - it's an opportunity to become part of something greater. We are a full-service consulting firm with a foundation built on delivering reliable outcomes and top-notch solutions to our clients. Our team consists of industry veterans who have held senior positions in a diverse range of companies, from startups to Fortune 50 giants. Drawing on our collective experiences, we have crafted a unique approach underscored by deep expertise, integrity, transparency, and dependability. Senior Java Engineer: As a Senior Java Engineer at Tech Holding, you will play a pivotal role in the architectural aspects of our projects. Collaborating closely with the application architect, you will design and develop new architectures, as well as maintain existing ones while ensuring scalability and adhering to coding best practices. The ideal candidate will possess a comprehensive understanding of the entire tech stack, demonstrate proficiency in writing well-tested production-grade code, and be well-versed in CI/CD pipelines and code release processes. Effective communication skills in English are crucial for this remote position. Key Responsibilities: - Work closely with the application architect to design system architecture. - Develop, test, and maintain scalable, high-performance applications following industry best practices. - Quickly troubleshoot and resolve issues, implementing robust solutions and identifying root causes. - Contribute to enhancing the development process continuously. - Keep abreast of emerging technologies, integrating them into existing applications when suitable. - Participate in code reviews to uphold high code quality, security, and maintainability standards. The Essentials: - Possess 7+ years of Java development experience. - Have at least 3 years of experience with JavaScript UI frameworks (Angular preferred). - Strong familiarity with Java frameworks like Spring Boot, Hibernate, etc. - Proficient in HTML5, CSS3, and building responsive web applications (experience with Bootstrap or similar frameworks is preferred). - Excellent English communication skills, both written and spoken. - Expertise in developing high-performance Batch Jobs. - Comprehensive knowledge of system and architecture design principles. - Experience with relational databases (Oracle, MySQL). - Proficient in API development, including designing and consuming REST APIs. - Solid experience with AWS or other cloud platforms, including services like ECS, EC2, S3, Lambda, RDS, etc. - Strong grasp of application security best practices. - Dedicated to writing high-quality, well-tested code with thorough documentation. - Proficient in version control tools like Git (GitHub experience is preferred). - Self-motivated problem solver with the ability to troubleshoot issues until a viable solution is reached. - Capable of working both independently and collaboratively as part of a team. - Some experience in writing unit and integration tests. Other Desired Skillsets: - Hands-on experience with CI/CD pipelines and related tools. - Experience working with Digital Asset Management systems. - Familiarity with NoSQL databases (MongoDB, DynamoDB, etc.). - Understanding of microservices architecture. - Experience with containerization technologies such as Docker and orchestration tools like Kubernetes.,

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

pune, maharashtra

On-site

You will provide technical expertise and support to clients, IT management, and staff in risk assessment and the implementation of appropriate data security procedures. Your role will involve using your specific knowledge of a discipline to achieve goals through your work. You will utilize your expertise to offer guidance to others as a project manager or consultant, drawing from your working knowledge and experience in your job discipline. It is important to continue building knowledge of the company, processes, and clients as you perform a range of assignments related to your job discipline, using prescribed guidelines or policies in analyzing situations. You will receive a moderate level of guidance and direction in your role. Your primary responsibilities will include performing information security risk management processes for new and existing Northern Trusts third-party business partners. You should be well-versed in contract language, analysis, and negotiation processes, with a focus on reviewing master services contracts of third parties to identify information security and related clauses. Collaborating with procurement teams to formulate/renew contracts as per the information security team guidelines will also be a key aspect of your role. It will be your responsibility to document and report to management all findings from risk management processes, as well as to collaborate with internal stakeholders and functional teams to ensure that identified risks within each third party are assigned to business owners and tracked for timely closure. You should demonstrate proven knowledge in domains such as Information Security Governance and Risk Management, Access Control, Network Security, Application Security, Cryptography, Security Architecture and Design, Operations Security, Business Continuity and Disaster Recovery Planning, Legal, Regulations, Investigations, and Compliance, as well as Physical (Environmental) Security. Your ability to interact in a professional manner and develop relationships with individuals and teams at any level in Northern Trust will be essential. You are expected to foster a positive and collaborative environment, showcasing your ability to work well both as an individual contributor and as part of a team. Rapidly and effectively adapting to a highly dynamic and fast-paced work environment is a key requirement for this role.,

Posted 1 week ago

Apply

1.0 - 5.0 years

0 Lacs

thiruvananthapuram, kerala

On-site

You should have experience in performing various security assessments and providing effective hardening and mitigation strategies. Your expertise should include conducting network and web-based application penetration tests, physical security assessments, logical security audits, and hands-on technical security evaluations and implementations. Additionally, you should have subject matter expertise in areas such as database security, wireless security, or application and development security. It is important to be skilled in conducting wireless security assessments, social engineering assessments, and mobile application assessments. You should be familiar with penetration testing tools, network and application security scanners, as well as standards like OWASP Top Ten Security Standard. Knowledge of Linux and Windows Network platforms is essential. Certification in CEH or any recognized cyber security certifications is required. Willingness to travel to client onsite locations is expected. The ideal candidate will have 1 to 3 years of experience in cybersecurity and hold a degree in B.Sc, B.Tech, M.Tech, MCA, or M.Sc-IT with a specialization in CS, IT, Cyber Security, or Cyber Forensics. Candidates with experience in any of the mentioned areas are encouraged to apply. This is a full-time position with a day shift schedule and a hybrid remote work location in Thiruvananthapuram, Kerala. The remuneration offered will be competitive based on industry standards.,

Posted 1 week ago

Apply

8.0 - 20.0 years

0 Lacs

punjab

On-site

The Security Program Manager in Sydney is responsible for leading and managing the Cybersecurity Landscape for clients, ensuring the successful delivery of all contractual obligations through thought leadership and support of cybersecurity strategy. With a minimum of 8 to 10 years of experience in the Cyber Security domain, the ideal candidate will manage various security tracks within the account, including Identity & Access management, Network Security, Endpoint Security, GRC, and Application Security. In this role, you will drive excellent Customer Satisfaction and NPS by collaborating with clients, partners, employees, and agencies to ensure project success. You will support the development, implementation, and communication of cybersecurity activities and programs, as well as lead the set-up and execution of program events, briefings, and meetings. Moreover, the Security Program Manager will liaise with other teams to identify and leverage opportunities with other programs across the organization. You will be responsible for managing multi-functional team coordination, opportunity screening, benefit/cost analysis, issue resolution, and reporting to ensure SLA compliance, process adherence, and process improvisation to achieve operational objectives. Additionally, you will revise and develop processes to enhance the current Security Operations Framework, review policies, and address challenges in managing SLAs. The role also includes the management, administration, and maintenance of security devices comprising state-of-the-art technologies, as well as serving as the single point of contact with the client's CISO for existing landscape and future requirements by acting as a Security Consultant for the client.,

Posted 1 week ago

Apply

10.0 - 14.0 years

0 Lacs

chennai, tamil nadu

On-site

The opportunity: You will be part of a team that is dedicated to advancing the world's energy system to become more sustainable, flexible, and secure, all while considering social, environmental, and economic factors. Hitachi Energy boasts a proven track record and an unparalleled installed base in over 140 countries. How you'll make an impact: You are expected to have a deep understanding of agile and lean product development methodologies. Previous work experience in the power systems environment will be considered a plus. Additionally, a fair understanding of condition monitoring and asset management is required. You will be responsible for ensuring compliance with relevant external and internal regulations, procedures, and guidelines. Living by Hitachi Energy's core values of safety and integrity is crucial, which entails taking responsibility for your actions and showing care for your colleagues and the business. Your background: Ideally, you should hold a Bachelor's or Master's degree in engineering in Computer Science, Information Technology, Electronics and Communication, or M.Sc. in Substation Automation, with documented qualifications in IT technologies and micro-service architectures. You should have a minimum of 10 years of experience in software development. Proficiency in JavaScript frameworks, including React JS, and experience in .NET Core Web API and application design and development are necessary. You should also be adept in microservice-based application design and development using .NET Core, Kubernetes, PostgreSQL DB, Azure Service Bus, or equivalent technologies. Experience in crafting secure cloud-native applications using Azure PaaS services like Azure Function App, AKS, Service Bus, Key Vault, etc., is highly desirable. Familiarity with Agile/Scrum/SAFe Agile methodologies, Azure DevOps for creating build and deployment pipelines, and application security aspects such as secret management, cryptography, secure communication for HTTP and WebSocket, as well as other skills like certificate management and data encryption, is essential. Strong problem-solving skills, the ability to work independently, lead a team, excellent communication, and collaboration skills are crucial. Demonstrated experience in microservice architecture development for the cloud is a definite plus. Qualified individuals with disabilities may request reasonable accommodations if they are unable or limited in their ability to use or access the Hitachi Energy career site due to their disability. Requests for accommodations can be made by completing a general inquiry form on the company's website, including contact information and specific details about the required accommodation to support the job application process. This accommodation process is specifically for job seekers with disabilities requiring accessibility assistance during the application process. Messages left for other purposes will not receive a response.,

Posted 1 week ago

Apply

5.0 - 10.0 years

10 - 18 Lacs

Pune

Work from Office

About Us: Protectt.ai is Indias pioneering Mobile Threat Defense (MTD) platform focused on delivering cutting-edge solutions for mobile app, device, and transaction security. Our platforms advanced security technologies, including Runtime Application Self-Protection (RASP), enables in-app threat detection and real-time defense against sophisticated mobile attacks. We partner with Indias leading enterprises across Banking, Insurance, Finance, FinTech, and EdTech, helping secure their mobile ecosystems. Our platform is unparalleled in scale and innovationuniquely positioned through its comprehensive solution architecture and proprietary technology. Headquartered in Mumbai, with offices in Gurgaon and Chennai, we are rapidly expanding our global footprint with operations now in the Middle East and United States. We are proudly backed by Bessemer Venture Partners (BVP), a globally renowned venture capital firm investing in transformative technology companies and Bajaj Finance, one of Indias leading financial institutions committed to driving innovation in digital security Funding & Recognitions: Protectt.ai successfully closed its Series A funding round in January 2025, marking a significant milestone in our growth journey. Our innovations have earned multiple prestigious awards, including: • Security Product Company of the Year 2023 by Data Security Council of India (DSCI) • Cybersecurity Company of the Year 2023 by BWSECURITY • Innovative Security Product of the Year 2023 by BWSECURITY • DSCI Innovation Box Winner 2023 Role: Application Security Experience: 5+Years Job Location: Pune Qualification: B. E/ B. Tech/ M.E/ MTech/ MCA Requirements: • Proven experience in Mobile/Web application security testing, including both manual, automated techniques, VAPT, Secure Code Review. • Strong understanding of mobile platform architecture, security mechanisms, and common vulnerabilities. • Familiarity with mobile app development frameworks and languages (e.g., Swift, Kotlin, Java). • Experience with security testing tools such as Burp Suite, OWASP ZAP, MobSF, etc. • Excellent analytical and problem-solving skills. • Effective communication skills with the ability to clearly articulate technical findings recommendations. • Relevant certifications (e.g., OSCP, OSWE, CISSP, CEH) are a plus. Key Responsibilities: • Conduct comprehensive security assessments of mobile applications on various platforms (iOS, Android). • Perform offensive mobile application assessments. • Develop custom scripts and tools to assist in the testing process. • Analyze test results, prepare detailed reports, and provide recommendations for remediation. • Collaborate with development teams to integrate security best practices throughout the SDLC. • Stay updated on the latest security threats, vulnerabilities, and industry best practices. • Provide guidance and support to developers and other stakeholders on secure coding practices. • Perform manual and automated security testing to identify vulnerabilities such as OWASP Top 10, authentication flaws, authorization issues, insecure data storage, etc

Posted 1 week ago

Apply

4.0 - 7.0 years

9 - 13 Lacs

Kalyani, Pune

Work from Office

Requirement for Full Stack Senior Developer (PHP) About the Role: We are seeking a highly skilled and motivated Senior Full Stack Developer with deep expertise in PHP to join our growing technology team. In this role, you will collaborate closely with other developers to design, develop, and maintain scalable, secure, and high-performance web applications. As a senior team member, you will play a key role in guiding the technical direction of product development efforts. This includes leading by example in adopting best practices, applying robust design patterns, and ensuring code quality, performance, and security across the stack. You should be proactive, self-driven, and comfortable working in a fast-paced, dynamic environment with cross-functional teams. A strong understanding of platform architecture and the surrounding service ecosystem is essential, as you ll help align technical solutions with broader business goals. Required Qualifications: Bachelor s degree in computer science, engineering, or a related technical field (or equivalent practical experience). Minimum of 5 years of professional experience in software development using PHP, JavaScript, and Angular Minimum of 2 years of experience in a senior software engineering role. Strong proficiency with PHP web applications for backend development Proficient in JavaScript, Angular, HTML5, CSS for frontend development Proven experience building and maintaining RESTful APIs Demonstrated experience developing web applications and services using AWS technology stack. Practical knowledge of object-oriented programming (OOP) principles and design patterns. Experience with version control systems such as Git, and automated build and deployment pipelines using CI/CD tools like Bamboo or Jenkins. Working experience with Agile and Scrum methodologies. Understanding of application security principles and secure coding practices. Strong communication skills and the ability to collaborate effectively across technical and non-technical teams. Comfortable using Jira and Confluence for project tracking and documentation Key Responsibilities: Design and develop robust, scalable web applications and services using the AWS technology stack. Collaborate with software architects to translate business requirements into efficient, maintainable technical solutions. Work closely with product managers, UI/UX designers, and QA engineers to deliver high-quality, end-to-end software solutions. Ensure high code quality through effective development practices, code reviews, and adherence to development standards. Implement and enforce application security best practices to ensure secure software delivery. Ensure web applications meet WCAG 2.1 Level AA accessibility standards. Participate in Agile development cycles, working closely with scrum teams and product owners to meet delivery goals. Coordinate with QA and DevOps teams to ensure compliance with the full software development lifecycle (SDLC). Collaborate effectively with cross-functional teams, including those responsible for system and application integration. Contribute to the adoption and continuous improvement of CI/CD pipelines for reliable and efficient software deployments. Conduct code and security reviews to ensure software meets performance, quality, and compliance standards. Optimize application performance and ensure compatibility across different platforms and devices. Develop comprehensive unit tests to validate code functionality and ensure software reliability. Create and maintain clear, organized technical documentation, including specifications, workflows, and procedures. Troubleshoot and resolve complex software issues, identifying performance bottlenecks and implementing long-term fixes. Continuously assess and recommend improvements to platforms, products, and processes to enhance efficiency and value delivery. Preferred Qualifications: Experience with microservices architecture and containerization (Docker, Kubernetes). Familiarity with authentication and authorization frameworks (OAuth2, JWT). Prior experience working with distributed or remote teams. Applicants may be required to appear onsite at a Wolters Kluwer office as part of the recruitment process.

Posted 1 week ago

Apply

15.0 - 20.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Project Role : Security Delivery Practitioner Project Role Description : Assist in defining requirements, designing and building security components, and testing efforts. Must have skills : Saviynt Identity Platform Good to have skills : Identity Access Management (IAM)Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Practitioner, you will assist in defining requirements, designing and building security components, and testing efforts. A typical day involves collaborating with various teams to ensure that security measures are effectively integrated into the overall system architecture. You will engage in discussions to identify potential security risks and work towards implementing solutions that enhance the security posture of the organization. Your role will also include reviewing and refining security processes to ensure they align with best practices and compliance standards, while continuously seeking opportunities for improvement in security operations. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills in security practices.- Monitor and evaluate the effectiveness of security measures and recommend improvements. Professional & Technical Skills: - Must To Have Skills: Proficiency in Saviynt Identity Platform.- Good To Have Skills: Experience with Identity Access Management (IAM).- Strong understanding of security frameworks and compliance standards.- Experience in designing and implementing security solutions.- Familiarity with risk assessment methodologies and tools. Additional Information:- The candidate should have minimum 5 years of experience in Saviynt Identity Platform.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Application Security Architecture and Design Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. A DevSecOps SME ensures that security is seamlessly integrated into every phase of the software development lifecycle (SDLC). They work at the intersection of development, security, and operations to automate security checks, identify vulnerabilities early, and maintain compliance with security standards, enabling secure, fast, and reliable software delivery. Roles & Responsibilities:-CI/CD Pipelines:Experience with Jenkins, GitLab CI, Azure DevOps, or similar tools.-Infrastructure as Code (IaC):Familiarity with Terraform, Ansible, or CloudFormation.-Automation Scripting:Proficiency in scripting languages like Python, Bash, or PowerShell.-Cloud Platforms:Knowledge of AWS, Azure, or GCP security services and best practices.-Containers & Orchestration:Experience with Docker and Kubernetes, including securing containerized environments.-The DevSecOps SME is responsible for embedding security practices into DevOps workflows. This includes automating security testing, managing secure CI/CD pipelines, and collaborating with development and operations teams to ensure that applications are built and deployed securely. They monitor systems for vulnerabilities, respond to incidents, and continuously improve security controls and processes. -This role requires a strong understanding of application security, cloud infrastructure, automation tools, and secure coding practices. The analyst also plays a key role in educating teams on security best practices and ensuring compliance with industry regulations. Professional & Technical Skills: -Security Integration:Embed security tools and practices into CI/CD pipelines to ensure secure code deployment.-Demonstrate a profound comprehension of security architecture, capable of creating, assessing, and revising secure solutions that promote scalability, adaptability, and reusability. -Act as the subject matter expert (SME) responsible for guiding and making security architecture decisions across all aspects of Accenture client presales, proposal design, and integration within client ecosystems. -Develop and uphold reusable security architecture and design patterns for utilization. -Create, devise, and troubleshoot intricate security implementations, overseeing the development of High-Level Design (HLD) and Low-Level Design (LLD) documents.-Vulnerability Management:Identify, assess, and remediate vulnerabilities in applications and infrastructure.-Automation:Develop and maintain scripts and tools to automate security testing and compliance checks. Additional Information:- The candidate should have minimum 7.5 years of experience in Application Security Architecture and Design.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

Gurugram

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Omada Identity Cloud Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitating the transition to cloud security-managed operations. You will engage in discussions to align security strategies with organizational objectives, ensuring that all security measures are effectively integrated into the cloud environment. Your role will also require you to stay updated on the latest security trends and technologies to enhance the overall security posture of the organization. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills in cloud security.- Evaluate and recommend new security technologies and practices to improve the cloud security framework. Professional & Technical Skills: - Must To Have Skills: Proficiency in Omada Identity Cloud.- Strong understanding of cloud security principles and best practices.- Experience with identity and access management solutions.- Familiarity with regulatory compliance requirements related to cloud security.- Ability to assess and mitigate security risks in cloud environments. Additional Information:- The candidate should have minimum 5 years of experience in Omada Identity Cloud.- This position is based at our Gurugram office.- A 10 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies