Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
10.0 - 17.0 years
40 - 50 Lacs
Bengaluru
Work from Office
Are you ready to elevate your career in the rapidly growing field of cloud securityJoin our Aumni Cloud Security team, where your expertise in Infrastructure as Code (IaC), Kubernetes, and CI/CD security gates will drive innovation and protect our mission-critical systems. We offer unparalleled opportunities for career growth and a collaborative environment where you can thrive and contribute to meaningful projects. As a Lead Software Engineer at JPMorgan Chase within the Aumni Cloud Security team, your role will be instrumental in safeguarding the security, availability, and integrity of our cloud-based infrastructure and applications. You will work in collaboration with various teams to enforce robust security measures, pinpoint vulnerabilities, and effectively handle security incidents. Your pivotal role will ensure the protection of our organizations sensitive data and uphold a strong security stance in the constantly changing cloud environment. Job Responsibilities Design, write, implement, and review security controls for IaC frameworks (e. g. , Terraform, CloudFormation) to ensure secure provisioning and management of cloud resources. Collaborate with development teams to integrate security best practices into the IaC and IaC pipelines. Develop and implement security controls for Kubernetes clusters, ensuring secure configuration, network policies, authentication, and authorization. Conduct regular vulnerability assessments and penetration tests on Kubernetes infrastructure and applications. Define and enforce security gates and best practices for continuous integration and continuous deployment (CI/CD) pipelines. Automate security checks and code analysis to identify and remediate vulnerabilities early in the development lifecycle. Participate in an on-call rotation for security incidents and respond to security events promptly. Conduct root cause analysis of security incidents, document lessons learned, and propose improvements to prevent future incidents. Assist in conducting security assessments, audits, and compliance reviews to ensure adherence to industry standards and regulatory requirements. Implement and maintain security monitoring and logging systems to detect and respond to security events in real-time. Required Qualifications, Capabilities, and Skills Formal training or certification on Cloud Security Engineer concepts and 5+ years applied experience. Strong knowledge of cloud security principles, best practices, and technologies (AWS). Hands-on experience with IaC frameworks (Terraform, CloudFormation) and configuration management tools. Proficiency in securing Kubernetes clusters, containerization, and microservices architectures. Familiarity with CI/CD pipelines, automated security testing, and secure code review practices. In-depth understanding of incident response methodologies, including detection, analysis, containment, and recovery. Experience with security audits, compliance frameworks, and regulatory requirements. Knowledge of network security, firewalls, IDS/IPS, and vulnerability management tools. Excellent analytical and problem-solving skills, with a keen attention to detail. Preferred Qualifications, Capabilities, and Skills Proven experience interacting with major institutional Emerging investors. Experience with government bond obligations in the region. Bachelors degree in Engineering, Finance, Math, or a related quantitative field.
Posted 2 weeks ago
8.0 - 13.0 years
15 - 25 Lacs
Noida
Work from Office
At IDEMIA we are passionate about shaping the future of secure identity and authentication solutions. Our innovative technologies play a crucial role in enhancing security, privacy, and convenience for individuals and organizations worldwide. You may not know our name, but you have surely used our innovations and solutions. Our mission is to unlock the world and make it safer through cutting-edge identity technologies. Every day, around the globe, we are enabling citizens and consumers alike to perform their daily critical activities (such as pay, connect and travel), in the physical as well as digital space. We are transforming their lives by making the world more secure and yet also more streamlined. We have brought together complementary know-how and technologies that have never been combined before for both the physical and digital era: secured connectivity, secured payments and secured identity management. Cybersecurity, biometrics, large scale distributed systems and Cloud computing, analytics and smart devices are at the core of both our physical products and our software and systems. We serve our clients in 180 countries thanks to our 15,000 employees worldwide. work Location: Noida Sector 73 Nearest Metro station: Sector 52 Noida About IDEMIA Public Security We are dedicated to serving government and public security entities and, in so doing, IDEMIA is committed to the responsible use of technology for public safety. We develop cutting-edge biometrics technologies and identity verification systems that prioritize privacy, human rights and ensure fair and unbiased application. We are also committed to building an inclusive and diverse culture and our impact on sustainability. For example, in 2023, the Life Cycle Assessment for Vision Pass SP revealed a 38% energy reduction, attributed to its sustainable smart power-saving mode Purpose We are seeking a highly skilled and experienced Cloud Security Officer to join our team. The ideal candidate will be responsible for reviewing, implementing, and enforcing the security posture of our cloud environments on AWS and Azure. This role requires a deep understanding of cloud security principles, hands-on technical expertise to design and test solutions, and the ability to collaborate effectively across teams. Additionally, the Cloud Security Specialist will work closely with the Chief Information Security Officer (CISO) to align cloud security strategies with the organizations overall security vision and goals. The candidate will integrate the CPE (Cloud Platform Engineering) team which mission is to drive the governance of usage of cloud services and to build services to help product and program delivering to the cloud their services Required Skills and Qualifications: Proven experience in cloud architecture design and operations, with a focus on AWS and Azure. Proven experience in cloud security Strong understanding of cloud architecture, security controls, and best practices. Hands-on experience with tools such as AWS IAM, AWS Security Hub, AWS Firewall manager, Azure Defender, Azure Entra ID, Azure Firewall, etc. Proficiency in scripting or programming languages (e.g., Python, PowerShell, Bash). Experience with automation tools and frameworks (e.g., Terraform, Ansible). Experience with third-party CNAPP Familiarity with cloud compliance frameworks and risk management principles. Strong problem-solving and analytical skills, with the ability to test and validate solutions through proof of concept. Relevant certifications, such as AWS Certified Security Specialty, Microsoft Certified: Azure Security Engineer Associate, CISSP, or CCSP, are preferred. Key Missions 1. Cloud Security Management: - Assess and enforce security policies, standards, and controls in AWS and Azure environments. - Continuously monitor and improve the organizations cloud security posture through audits, assessments, and threat analysis. - Implement and manage cloud-native security tools, such as AWS Security Hub, Azure Security Center, and also third party solution such as Crowdstrike 2. Solution Design and Implementation: - Design secure cloud solutions, addressing key areas like identity and access management (IAM), encryption, network security, and compliance. - Create detailed architecture diagrams and documentation for proposed solutions. - Develop and test proof of concepts (POCs) to validate security solutions before full-scale implementation. - Contribute to development of final solution and coordonate teams 3. Collaboration with CISO: - Partner with the CISO to ensure cloud security initiatives align with the broader security strategy and organizational objectives. - Provide regular updates to the CISO on the cloud security posture, risks, and mitigation plans. - Assist the CISO in developing long-term security roadmaps for cloud environments. 4. Incident Response and Monitoring: - Investigate and respond to security incidents within cloud environments. - Set up automated alerts and monitoring mechanisms to detect potential vulnerabilities or misconfigurations. - Collaborate with the IT and security teams to develop and maintain a robust incident response plan. 5. Compliance and Risk Management: - Ensure compliance with industry standards such as ISO 27001, GDPR, SOC 2, or similar frameworks. - Conduct regular risk assessments and provide recommendations for mitigating identified risks. - Stay informed about the latest regulatory changes and emerging cloud security threats. 6. Collaboration and Training: - Work closely with DevOps, IT, and development teams to integrate security best practices into CI/CD pipelines. - Provide training and awareness programs to internal stakeholders on cloud security.
Posted 2 weeks ago
4.0 - 7.0 years
1 - 4 Lacs
Hyderabad
Work from Office
Application Security Perform security reviews, code audits, and threat modeling of web and mobile applications. Work with DevOps and development teams to integrate secure coding practices and tools (e.g., SAST, DAST, SCA). Conduct penetration testing and vulnerability assessments on internal and external applications. Remediate OWASP Top 10 and other emerging threats. Infrastructure & Server Security Harden Linux and Windows servers following CIS/NIST benchmarks. Implement endpoint security solutions (AV, EDR, MDM). Monitor, detect, and respond to system anomalies and unauthorized access. Manage patching and update cycles in coordination with system teams. Network Security Secure network architecture, firewall policies, VPNs, NAT, and VLAN segmentation. Analyze and mitigate threats like DDoS, MITM, spoofing, etc. Configure and manage intrusion detection/prevention systems (IDS/IPS). Perform routine audits and packet-level analysis for suspicious activity. Cloud Security Secure cloud infrastructure (Alibaba Cloud/AWS/Azure/GCP). Manage IAM, WAF, Security Groups, and cloud-native threat detection tools. Audit and improve security configurations in containers, CI/CD pipelines, and serverless deployments. Monitoring, Audit, and Compliance Work closely with compliance teams to meet standards like SAMA-CSF, ISO 27001, and PCI-DSS. Implement and tune SIEM/SOAR systems for proactive monitoring and incident response. Maintain audit trails, security reports, and logs for investigations and audits. Qualifications & Requirements Bachelors degree in computer science, Cybersecurity, or a related field. 4+ years of experience in cybersecurity roles with exposure to infrastructure and application security. Proficiency in tools like Burp Suite, Nessus, Wireshark, Nmap, Suricata, OSSEC/Wazuh, etc. Strong knowledge of TCP/IP, Linux security, cloud security, and secure coding principles. Experience with at least one cloud platform (Alibaba Cloud preferred). Familiarity with regulatory and compliance standards in the GCC region is a plus. Security certifications such as CEH, OSCP, CISSP, or CISM are a plus. Preferred Strong problem-solving and analytical skills. Ability to work under pressure in a fast-paced environment. Excellent communication skills to interface with technical and non-technical stakeholders. Self-motivated and able to work independently or as part of a team.
Posted 2 weeks ago
7.0 - 12.0 years
18 - 33 Lacs
Pune
Remote
Role & responsibilities Application & product security, including threat modeling and secure SDLC Cloud security (AWS/GCP/Azure), container security (Docker, Kubernetes & API protection DevSecOps- automation in IaC & CI/CD pipelines Scripting (Python/Shell), Linux security Preferred candidate profile With more than 7+ years of Total industry experience Advanced experience in securing applications and application settings Advanced experience in app and product security Advanced understanding in securing cloud technologies Experience with technologies from at least one public cloud (AWS, GCP, Azure) Experience in securing containerization (Docker, K8s, etc) and API Experience with modern DevSecOps practices including implementing automated security in IaC and CI/CD pipelines Strong scripting skills Python/Shell Scripting experience Mid to advanced level Linux knowledge in a physical, virtual, or public cloud environment. Exceptional verbal and written communication skills are necessary to effectively collaborate with peers, and to present and explain highly technical information to stakeholders who may have limited technical knowledge. Bonus Points: CISSP, CASP+, GSLC, CISM certified. Qualifications Bachelor's or Master's degree in Computer Science, Engineering, or a related field.
Posted 2 weeks ago
6.0 - 8.0 years
20 - 30 Lacs
Gurugram
Work from Office
Key Skills : Cloud Security, Cyber Security, AI Artificial intelligence. Roles and Responsibilities: Security Engineering: Build and integrate security solutions such as firewalls, encryption tools, and intrusion detection systems to safeguard critical infrastructure and data. Collaborate with development teams to embed security measures throughout the software development lifecycle (SDLC). Automate security workflows, vulnerability management, and incident response processes to enhance efficiency and response time. Lead security initiatives to address emerging threats and ensure systems are resilient to evolving cyber risks. Cloud Security: Design, implement, and manage secure cloud architectures across AWS, Azure, and Google Cloud platforms. Leverage AI/ML-driven security tools for enhanced cloud monitoring, threat detection, and automated incident response. Automate cloud security configurations and utilize AI to conduct predictive vulnerability assessments. Work closely with DevOps and infrastructure teams to implement robust, automated security controls in cloud environments. Data Protection Controls: Design and manage comprehensive data protection strategies including encryption, tokenization, and data masking practices to ensure data confidentiality and integrity. Experience Requirement: 6-8 years of experience in building and integrating security solutions across diverse environments. Strong knowledge of cloud platforms such as AWS, Azure, and Google Cloud, including cloud security frameworks and best practices. Hands-on experience with AI/ML-powered security tools for monitoring, detection, and response. Proficiency in automating security operations and infrastructure configurations. Experience working in cross-functional teams, including DevOps and software engineering, to enforce security standards throughout the development lifecycle. Familiarity with industry-standard protocols, tools, and methodologies in vulnerability assessment and incident management. Education: B.Tech M.Tech (Dual), B.Tech.
Posted 2 weeks ago
7.0 - 10.0 years
27 - 42 Lacs
Bengaluru
Work from Office
Job Summary Proven hands on experience in Cloud Security technology and suites with Platforms GCP Azure OCI GCP and Kubernetes is a must Hands on experience and expertise with Prisma Cloud suite with CSPM and Compute modules CI or CD pipeline integration and security tooling SAST DAST OSS scanning Strong understanding of Kubernetes architecture clusters workloads RBAC networking auto scaling deployment Familiarity with cloud native DevOps environments Azure OCI and GCP Responsibilities Hands on experience working with various Cloud platforms GCP Azure and OCI GCP is a must with an understanding of native controls suite part of Google. Drive Cloud security initiatives around particularly around Prisma Cloud controls into CI or CD workflows runtime and CSPM. Define and enforce policies for secure build and deploy processes across cloud and various enforcement points CI or CD CSPM Runtime Gatekeep policies Azure tenant policies Assess and monitor Kubernetes environments for misconfigurations and risks Respond to security alerts and recommend remediation strategies Partner with DevOps and engineering to strengthen security posture across SDLC Strong understanding of cloud-native security concepts including network security identity and access management IAM container security vulnerability scanning threat management and incident response.
Posted 2 weeks ago
5.0 - 7.0 years
7 - 10 Lacs
Pune
Remote
What You'll Do Avalara is looking for Detection Engineer to join the Detection and Response Team. The ideal candidate will have a track record in incident response, demonstrating advanced technical expertise and leadership capabilities. Your role will be of an Incident Response Analyst, you will help protect Avalara. This includes detecting, investigating, and mitigating security incidents. You will also be a key contributor in improving our incident response capabilities. You will report to Security leadership at Avalara. This is a remote position. What Your Responsibilities Will Be You will perform incident response activities and workstreams as the Incident Response Senior Analyst. You will monitor security systems, including Intrusion Detection Systems (IDS), Endpoint Detection and Response (EDR) platforms, software firewalls, and Security Information and Event Management (SIEM) platforms. Gather and analyze evidence from affected systems, logs, and network traffic. You will conduct detailed investigations of security incidents to determine the root cause, scope, and impact. Document all aspects of security incidents, including timelines, actions taken, and lessons learned. Perform forensic analysis of compromised systems to identify the techniques and tactics used by attackers, or as directed by Legal. Collaborate with cross-functional teams including Engineering, IT, Security Operations, Legal, HR, and Compliance to manage and mitigate incidents. Strengthen KPIs and metrics for measuring response effectiveness and provide clear and consistent reporting to internal stakeholders. Participate in rotating On Call shifts that utilize a paging system in case a security event requires attention. What You'll Need to be Successful 5+ years experience in Security Incident Response. Experience across the information security domain, including familiarity with endpoint, email, network, cloud security, vulnerability management, incident response, and threat intelligence. Experience with log analysis, network security, digital forensics, and incident response investigations. Ability to script / code using Python or an equivalent language. Bachelor's degree in computer science, information security, or relevant experience. Certifications related to digital forensics and incident response.
Posted 2 weeks ago
2.0 - 7.0 years
8 - 12 Lacs
Bengaluru
Work from Office
Req ID: 310924 We are currently seeking a Technical Lead - Data Foundations Squad to join our team in Bangalore, Karntaka (IN-KA), India (IN). Technical Lead We are looking for a highly experienced technical lead to run (jointly with a solution architect) a medium sized squad delivering data as a product integrations and flows. This squad will be the first squad to utilise new standards and tools as they are delivered by the squads working on the core platform, both delivering value, and working with upstream teams to ensure that the baseline you are being asked to follow is high quality and fit for purpose. As a technical lead at NTT DATA UK, you will be expected to mentor and lead quality across the engineering activities with your team, working closely with the program wide engineering lead to ensure consistent standards across the platform. As this team will be having to deliver fully end to end data products, it is highly likely that there will be unfamiliar technologies needing to be handled at times, and a successful candidate will need to be comfortable with not just quickly upskilling themselves as requirements evolve, but to bring there team along with them. Required skills A deep understanding of data products and or DAAP concepts A willingness and ability to quickly upskill yourself and others on new technologies Experience at the level of technical lead, or lead engineer for 2+ years Significant expertise with Python, including design paradigms Experience with Kafka (or significant experience with another log based streaming technology) Experience with Snowflake (or significant experience with another cloud scale warehousing solution) Experience with Terraform (or significant experience with another IaC tool) Experience with unit testing within a data landscape Experience of an agile workflow Strong communication skills Extra useful skills Experience with working in a multi-vendor requirement A working understanding of cloud security An understanding of architectural patterns for real time data A history of authoring formal documentation and low level designs for a wide range of target audiences
Posted 2 weeks ago
2.0 - 5.0 years
1 - 6 Lacs
Noida, Hyderabad
Work from Office
We are currently seeking a GCP Dev Ops Engr to join our team in Ban/Hyd/Chn/Gur/Noida, Karntaka (IN-KA), India (IN). Responsibilities Design, implement, and manage GCP infrastructure using Infrastructure as Code (IaC) tools. Develop and maintain CI/CD pipelines to improve development workflows. Monitor system performance and ensure high availability of cloud resources. Collaborate with development teams to streamline application deployments. Maintain security best practices and compliance across the cloud environment. Automate repetitive tasks to enhance operational efficiency. Troubleshoot and resolve infrastructure-related issues in a timely manner. Document procedures, policies, and configurations for the infrastructure. Skills Google Cloud Platform (GCP) Terraform Ansible CI/CD Kubernetes Docker Python Bash/Shell Scripting Monitoring tools (e.g., Prometheus, Grafana) Cloud Security Jenkins Git
Posted 2 weeks ago
2.0 - 5.0 years
5 - 9 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Cloud Managed Services Engineer (L3) is a seasoned engineering role, responsible for providing a managed service to clients by proactively identifying and resolving cloud-based incident and problems. Through pre-emptive service incident and resolution activities, as well as product reviews, operational improvements, operational practices, and quality assurance this role maintains a high level of service to clients. The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and is responsible for managing tickets of high complexity, conducts advanced and complicated tasks, and provides resolution to a diverse range of complex problems. This position uses considerable judgment and independent analysis within defined policies and practices and applies analytical thinking and deep technical expertise in achieving client outcomes, while coaching and mentoring junior team members across functions. The Cloud Managed Services Engineer (L3) may also contribute to support on project work as and when required. What you'll be doing Job Description: Experience of 7+ years with relevant experience of 4+ years in GCP. Good understanding of cloud architecture. Deployment of cloud services using Terraform Defining and configuring the alert thresholds as directed by the Cloud CoE. Monitoring Incident triggered and responding to the relevant team basis the RCA. Report Generation and Data Submission basis the requirement raised by various teams. Implementation of Cloud Security controls as directed by Info-Sec team. Follow-up for audit and compliance point closure post implementation. Cloud Process Automation and Standardization Golden AMI creation and patching of the golden images. Updating the AMI access across accounts for latest image deployment. Detailed understanding of the Cloud (IaaS and PaaS) industry and associated various technologies. Deep understanding of Service Management best practices frameworks such as ITIL. Effective troubleshooting and analytical skills and ability to manage complex and technical projects. Good communication skills and an ability to develop relationships with customer external stakeholders levels. Basic understanding of network & security, data center architecture Professional cloud certifications preferred Workplace type : On-site Working
Posted 2 weeks ago
8.0 - 13.0 years
35 - 50 Lacs
Gurugram
Work from Office
Exp- 8 yrs NP- Immediate or 30 days only Information Security, with hands-on experience in Azure Security. Expertise in Terraform for secure infrastructure provisioning. experience in securing Kubernetes clusters and containerized environments.
Posted 2 weeks ago
10.0 - 15.0 years
12 - 17 Lacs
Pune
Work from Office
Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 weeks ago
10.0 - 20.0 years
12 - 22 Lacs
Bengaluru
Work from Office
About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Posted 2 weeks ago
10.0 - 20.0 years
12 - 22 Lacs
Hyderabad
Work from Office
About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Posted 2 weeks ago
8.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role _x000D_ Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats ? _x000D_ Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFP’s received from clients and ensure overall design assurance ? _x000D_ i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs ? _x000D_ 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails ? _x000D_ Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Cloud Security Posture Management_x000D_. Experience8-10 Years_x000D_. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 2 weeks ago
8.0 - 13.0 years
16 - 22 Lacs
Noida, Gurugram, Delhi / NCR
Hybrid
Role & responsibilities Lead - Endpoint Security & Tooling The Lead - Endpoint Security & Tooling plays a pivotal role in overseeing and optimizing a diverse array of endpoint security tools and technologies. The Lead will spearhead the configuration, troubleshooting, and maintenance of security tools, develop and implement robust security policies, conduct in-depth threat intelligence analysis, design secure endpoint architectures, and assess and mitigate risks to endpoints. Roles and Responsibilities Expertise in Security Tools: Lead the management and optimization of the Zscaler suite of applications, including Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), Browser Isolation, Firewall (Tunnel 2.0), Deception, and other endpoint security tools. Demonstrate proficiency in Microsoft Intune for advanced endpoint security management, encompassing policy configuration, device management, compliance enforcement, and performance optimization. Exhibit familiarity with Endpoint Detection and Response (EDR) solutions, encompassing advanced threat detection, configuration management, policy enforcement, and performance monitoring. Display proficiency in Application Control solutions for managing and controlling application execution on endpoints, including policy management and application behavior monitoring. Endpoint Security Tooling Management: Oversee the configuration, troubleshooting, and maintenance of security tools to ensure optimal performance and effectiveness. Conduct regular assessments and audits of endpoint security configurations. Stay updated with new releases, versions, changes, and breaking changes in Microsoft Intune and other endpoint security tools. Assess the impact of new releases and changes on endpoints and security policies. Security Policy Development: Lead the development and implementation of comprehensive endpoint security policies, configurations, and best practices. Ensure strict compliance with industry standards and regulations. Secure Architecture Design: Apply expert security architecture principles to design and implement highly secure endpoint architectures. Implement sophisticated network segmentation, access controls, and secure configurations for endpoints. Risk Assessment and Mitigation: Conduct comprehensive risk assessments for endpoints to identify potential risks and vulnerabilities. Lead the implementation of robust risk mitigation strategies and controls to reduce risks to endpoints. Communication and Collaboration: Collaborate seamlessly with cross-functional teams, including IT, security, compliance, and business stakeholders. Communicate complex technical concepts related to endpoint security effectively to non-technical audiences. Continuous Learning and Adaptability: Stay at the forefront of the latest trends, threats, and technologies in endpoint security. Adapt swiftly to the evolving security landscape and emerging threats in endpoint security. Problem-solving and Critical Thinking: Apply advanced problem-solving skills and critical thinking to analyze and resolve complex security issues related to endpoints. Lead the troubleshooting of endpoint security incidents and drive the development of innovative solutions. Preferred candidate profile Bachelor's degree in Computer Science, Information Technology, or related field (Master's degree preferred). Proven leadership experience (7+ years) in endpoint security management, including extensive expertise in Microsoft Intune and other endpoint security tools. Advanced understanding of endpoint security principles, technologies, and best practices. Familiarity with network security concepts, firewalls, VPNs, and secure web gateways. Outstanding analytical, problem-solving, and communication skills. Ability to lead collaboratively in a team environment, manage multiple projects simultaneously, and drive results effectively. Advanced skills in threat intelligence analysis, incident response, security architecture design, risk assessment, communication, continuous learning, adaptability, problem-solving, and critical thinking. Good to have : Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Endpoint Security Professional (CESP). Benefits Benefits which make us unique At EZ, we know that great people are what makes a great firm. We value our people and offer employees a comprehensive benefits package. Learn more about what working at Egon Zehnder can mean for you! Benefits Highlights: 5 Days working in a Fast-paced work environment Work directly with the senior management team Reward and Recognition Employee friendly policies Personal development and training Health Benefits, Accident Insurance Potential Growth for you! We will nurture your talent in an inclusive culture that values diversity. You will be doing regular catchups with your Manager who will act as your career coach and guide you in your career goals and aspirations. EZ commitment to Diversity & Inclusion Egon Zehnder aims for a diverse workplace and strive to continuously lead with our firm values. We respect personal values of every individual irrespective of race, national or social origin, gender, religion, political or other opinion, disability, age and sexual orientation as warranted by basic rights enshrined in the UN Declaration of Human Rights. We believe diversity of our firm is central to the success and enables us to deliver better solutions for our clients. We are committed to creating an inclusive environment and supportive work environment, where everyone feels comfortable to be themselves and treated with dignity and respect and there is no unlawful discrimination related to employment, recruitment, training, promotion, or remuneration. Egon Zehnder is an Equal Opportunity Employer Egon Zehnder provides equal employment opportunities to all applicants and employees without regard to race, color, creed, religion, sex, sexual orientation, gender identity, marital status, citizenship status, age, national origin, disability, or any other legally protected status and to affirmatively seek to advance the principles of equal employment opportunity.
Posted 2 weeks ago
8.0 - 10.0 years
15 - 30 Lacs
Hyderabad
Work from Office
Must Have Skills: Design, administration, customization of any Access Management system(IBM Security Access Manager(ISAM)/OKTA/ForgeRock/OAM). Hands on experience in Java and Ansible. Strong knowledge on OAUTH,OIDC,SAML protocols Good To Have Skills :Python What will you be doing? Work with a great team of enthusiasts to integrate various APIs, web-based applications, Mobile Applications with the Access Management system(ISAM) and customize as per the requirements. Participate in requirement analysis, low level design, administration, deployment, of ISAM. Manage existing Ansible playbooks/create new playbooks to deploy changes to ISAM. Administer ISAM and resolve incidents, service requests within SLA. Key Responsibilities: Candidate must be willing to learn and work on IBM Security Access Manager(ISAM,ISVA). Subject Matter Expert in OAUTH,OIDC,SAML protocols. Develop customized solutions using Java, ISAM-API, Java script. Experience in working with DevOps tools like Ansible in CI/CD pipeline. Experience in automating installation and upgrades of an Access Management system through Ansible. Candidate must have experience interacting with various teams like Infrastructure, firewall teams etc. Prior experience on development of access policies in ISVA/ISAM is a plus. Must have excellent troubleshooting skills on SSO failures, authentication/authorization issues. Good working knowledge on SSO and API protection. Working knowledge of Advanced Authentication mechanisms like MFA, certificate authentication etc. Professional and process-specific Attributes: Experience with Change Management, Release Management, ServiceNow is a must. Prior experience in working in Agile/Scrum SDLC models is a plus. Prior experience in ensuring SLAs/KPIs are always met. Ability to interact with all levels of team members and management Strong verbal, written, and interpersonal communication skills. Strong analytical skills with high attention to detail and accuracy. Should be able to segregate issues with respect to ISAM and other applications in the event of incidents.
Posted 2 weeks ago
8.0 - 12.0 years
30 - 35 Lacs
Pune
Hybrid
Job description (high level summary): Job Description” We are looking for an enterprise architecture analyst to support our architecture team with developing and maintaining reference architectures, standards, and best practices. It is an excellent opportunity to gain hands-on experience with enterprise architecture in Financial Services undergoing digital transformation. Responsibilities: Assist in developing/documenting reference architectures, technology standards, and best practices Analyze current systems and document their architecture, processes, and dependencies Create roadmaps to adopt reference architectures from the current state to a target state Participate in the architecture design review and provide input on aligning solutions with the reference architecture and technology standards Identify opportunities for improving architecture governance across various initiatives and propose process enhancements Research new technologies, industry trends/best practices and propose innovative solutions for complex architectural challenges Identify opportunities for improving and enhancing architecture processes and governance Assist in evaluating new technologies and their alignment with the enterprise architecture Work closely with cross-functional teams, architects, developers, and business stakeholders to ensure architectural alignment with business needs Qualifications: Enrolled in or recently graduated from a Bachelor's or Master's degree program in Computer Science, Information Technology, or a related field Knowledge of cloud computing concepts (IaaS/PaaS/SaaS), AWS, Azure, Google Cloud, and Oracle Cloud Infrastructure Understanding of application design patterns and microservices architectures Familiarity with application modernization processes, tools, and techniques is a plus Experience with architecture design and modeling tools (Lucid chart, Drawio, ArchiMate, Visio) is a plus Knowledge of AI/ML concepts, techniques, and platforms is a plus Strong understanding of architectural principles, standards, patterns, and best practices Strong analytical and documentation skills Excellent verbal and written communication skills Ability to work collaboratively in a team environment Eagerness to learn and adapt to new technologies and concepts Interested Candidates Kindly share your updated CV at Sayali.va@peoplefy.com
Posted 2 weeks ago
5.0 - 10.0 years
7 - 12 Lacs
Bengaluru
Work from Office
Scopely is looking for a Senior Security Operations Center Engineer to join our Information Technology team in Bangalore on a hybrid basis. At Scopely, we care deeply about what we do and want to inspire play, every day - whether in our work environments alongside our talented colleagues, or through our deep connections with our communities of players. We are a global team of game lovers who are developing, publishing and innovating the mobile games industry, connecting millions of people around the world daily. What You Will Do You will be part of the Security Operations & Cloud Security team supporting all security operations at Scopely and will be at the forefront of identifying and reacting to new threats, risks and vulnerabilities that affect the industry. This role also requires collaboration and engagement with game teams, information technology, business partners, and vendors. You should enjoy working with an international team, embrace a fast-paced environment, and champion teamwork. Related activities would include: Support the execution of Scopelys security operations strategy, including daily monitoring and analysis of security events Manage and triage security alerts, reduce false positives, and continuously fine-tune detection rules, playbooks, and use cases Participate in the coordination, escalation, and resolution of security incidents in collaboration with internal stakeholders and external partners Perform security investigations from escalated alerts, threat hunting, or reports Perform digital forensics applied to incident response, to support case investigations Conduct network scans to identify vulnerabilities across internal and perimeter environments, and monitor for signs of exploitation or misconfiguration Contribute to vulnerability and patch management efforts by tracking open issues, validating remediations, and supporting mitigation activities Participate in proof-of-concept (PoC), proof-of-value (PoV), and project initiatives aimed at enhancing SOC tools, workflows, and detection capabilities Maintain SOC tools and platforms in an up-to-date and operationally ready state Document security investigations and incidents, including lessons learned / post-mortem analysis, and team processes. Contribute to the development and refinement of incident response playbooks and knowledge base articles Assist with the creation and delivery of security operations performance reports using predefined KPIs, including both operational metrics and risk indicators Foster strong relationships with business units, development teams, and external security vendors to align security operations with broader organizational goals Provide on-call support as part of a rotating schedule to ensure 24/7 incident readiness What We re Looking For Bachelor s degree in Information Security, Computer Science, or a related field. Equivalent practical experience will also be considered 5+ years of experience in a security operations or similar role, with proven exposure to incident detection, investigation, and response Strong understanding of core security topics, including incident response, threat hunting, threat intelligence, malware analysis, advanced persistent threats (APT), forensic analysis, and vulnerability management Solid knowledge of security frameworks and standards such as NIST Cybersecurity Framework (CSF), MITRE ATT&CK, Cyber Kill Chain, and ISO/IEC 27001/27002, as well as familiarity with relevant international regulations and compliance requirements Proficiency with Security Information and Event Management (SIEM) platforms, including experience deploying, configuring, and optimizing tools Hands-on experience with Managed Detection and Response (MDR), Endpoint Detection and Response (EDR), and Cloud Security Posture Management (CSPM) tools Experience working with open-source and commercial Security Orchestration, Automation, and Response (SOAR) platforms Familiarity with network and vulnerability scanning tools Strong practical experience in multi-cloud environments, including cloud-native security tooling Strong collaboration skills and ability to work effectively within a team environment; capable of following procedures and escalating issues appropriately Excellent verbal and written communication skills with the ability to convey complex security topics to both technical and non-technical audiences Security certifications such as CISSP, CEH, GSOC, GCIH, or equivalent are highly desirable. Bonus Points Development and/or scripting experience (e.g., Python, Bash, PowerShell) At Scopely, we create games for everyone - and want to ensure that the people behind our games reflect that! We are committed to creating a diverse, supportive work environment where everyone is treated with respect. We are committed to providing equal employment opportunities and welcome individuals from all backgrounds to join us & embrace the adventure! About Us Scopely is a global interactive entertainment and mobile-first video game company, home to many top, award-winning experiences such as "MONOPOLY GO!," Star Trek Fleet Command, Stumble Guys, MARVEL Strike Force, and Yahtzee With Buddies, among others. Scopely creates, publishes, and live-operates immersive games that empower a directed-by-consumer experience across multiple platforms--from mobile, web, PC and beyond. Founded in 2011, Scopely is fueled by a world-class team and a proprietary technology platform Playgami that supports one of the most diversified portfolios in the games industry. Recognized multiple times as one of Fast Company s World s Most Innovative Companies, Scopely is a multi-billion-dollar business due to its ability to create long-lasting game experiences that players enjoy for years. Scopely has global operations in more than a dozen markets across Asia, EMEA, and North America, and is home to many internal game development teams, referred to as Scopely Studios, with additional game studio partners across four continents. Scopely was acquired by Savvy Games Group in July 2023 for $4.9 billion, and is now an independent subsidiary of Savvy. For more information on Scopely, visit: scopely.com Notice to candidates: Scopely, Inc and its affiliates will never request payment or ask for financial information as a condition for applying to a position or receiving an offer of employment. All official Scopely, Inc. recruiters only use email domains that end with @scopely.com. Our official website is www.scopely.com. Please only apply to positions posted on our official website and ensure the recruiter only communicates via the official email domain. Should you have any questions or encounter any fraudulent requests/emails/websites, please immediately contact recruiting@scopely.com . Our job applicant privacy policies are available here: California Privacy Notice and EEA/UK Privacy Notice .
Posted 2 weeks ago
7.0 - 12.0 years
11 - 15 Lacs
Hyderabad
Work from Office
We are seeking a highly skilled Lead Azure DevOps Engineer to join our team and drive the end-to-end deployment, scalability, and operationalization of machine learning models in production. You will collaborate closely with data scientists, data engineers, and DevOps teams to ensure seamless CI/CD, reproducibility, monitoring, and governance of ML pipelines Key Responsibilities Design, implement, and maintain CI/CD pipelines for deploying and monitoring microservices efficiently. Manage infrastructure as code using Terraform for repeatable and scalable provisioning. Deploy and optimize containerized applications using Docker and Azure services (Container Apps, Container Registry, Key Vault, Service Bus, Blob Storage). Apply best practices for securing Docker images, including vulnerability scanning, reducing image size, and optimizing build efficiency. Implement and maintain Azure Monitor for logging, monitoring, and alerting to ensure system reliability. Ensure security best practices across cloud environments, including secrets management, access control, and compliance. (Nice to have) Design and manage multi-client architectures within shared pipelines and storage accounts in Azure Blob Storage 6+ years of experience in DevOps or MLOps with a strong focus on production-grade ML solutions. Strong expertise in Azure, particularly with CI/CD, container orchestration, and cloud security. Proficiency in Terraform for infrastructu
Posted 2 weeks ago
4.0 - 9.0 years
6 - 10 Lacs
Pune
Work from Office
Job Description About Leapfrog Leapfrog is on a mission to be a role model technology company Since 2010, we have relentlessly worked on crafting better digital products with our team of superior engineers Were a full-stack company specializing in SaaS products and have served over 100 clients with our mastery of emerging technologies Were thinkers and doers, creatives and coders, makers and builders? but most importantly, we are trusted partners with world-class engineers Hundreds of companies in Boston, Seattle, Silicon Valley, and San Francisco choose us to gain speed, agility, quality, and stability, giving them an edge over their competitors About The Role We are seeking a highly skilled DevOps Engineer with strong expertise in AWS Serverless technologies, TypeScript, and Python This role is critical to supporting our transition towards cloud-native architectures and ensuring scalable, event-driven solutions The ideal candidate will be passionate about automation, cloud infrastructure, and real-time system synchronization, and will work closely with cross-functional teams to deliver resilient, serverless applications Job Description Design, develop, and deploy AWS Lambda functions for event-driven, short-lived application processes Build and manage Amazon Event-bridge workflows for real-time, serverless event management Integrate and optimize AWS AppSync (GraphQL services) for real-time data synchronization Architect and manage scalable storage solutions using Amazon S3 for data lakes, backups, and high-availability storage needs Develop and maintain RESTful APIs using Amazon API Gateway with high security and performance standards Implement and optimize Amazon DynamoDB for low-latency, high-throughput NoSQL database needs Automate deployment pipelines and enhance CI/CD strategies for serverless applications Monitor system performance and troubleshoot incidents using cloud-native tools and observability frameworks Collaborate closely with engineering teams to promote DevOps best practices, security, and scalability principles Job requirements Strong proficiency in TypeScript and Python for infrastructure automation and serverless development Hands-on experience with AWS services, particularly serverless stack: Lambda, EventBridge, AppSync, S3, DynamoDB, API Gateway Experience with Infrastructure as Code (IaC) tools such as AWS CloudFormation, Terraform, or CDK Familiarity with CI/CD tooling like GitHub Actions, AWS CodePipeline, or equivalent Solid understanding of cloud security best practices and event-driven architectures Strong troubleshooting and performance tuning skills for distributed systems Agile mindset with experience working in fast-paced, iterative development environments Skills GraphQL Dynamo DB AWS Lambda or My information Fill out the information below Full name * Email address * Phone number * International Afghanistan Afghanistan CV or resume * Upload your CV or resume file Upload a file or drag and drop here Upload a file or drag and drop hereAccepted files: PDF, DOC, DOCX, JPEG and PNG up to 50MB Cover letter Upload your cover letter Upload a file or drag and drop here Upload a file or drag and drop hereAccepted files: PDF, DOC, DOCX, JPEG and PNG up to 50MB Questions Please fill in additional questions How many years of experience do you have as a DevOps Engineer* Which cloud platforms have you worked with * How many years of experience do you have with your primary cloud platform* How many years of experience do you have with containerization and orchestration* Which CI/CD tools or frameworks are you an expert in* Have you worked with Infrastructure as Code (IaC)If yes, which tools or frameworks* Do you have experience with security hardening and implementation* Please list any relevant certifications you may have * Do you have any experience working with Large Language Models (LLMs) and their deployment or applicationsIf yes, please specify the duration of your experience, the specific tasks you worked on, and the platforms or models you used How did you come to know about the program* Facebook Instagram Linked-In Family Friends Leapfrog Events Newsletter Leap Network Others If you have been referred by someone from Leapfrog, please do mention their full name All fields marked with are required All done! Your application has been successfully submitted! Other jobs Show more Show less
Posted 2 weeks ago
5.0 - 10.0 years
7 - 12 Lacs
Bengaluru
Work from Office
1. Must have completed CEH certification 2. Must have expertise in DAST/SAST/API security, Network security, Mobile Security/DevSecops/Cloud Security/Vulnerability Management Mandatory Skills DAST (using Burp Suite), API security testing Good to Have Skills Network security, SAST
Posted 2 weeks ago
5.0 - 10.0 years
7 - 11 Lacs
Bengaluru
Work from Office
The Group Security (GS) Cybersecurity Defense Center (CDC) team is looking for a Security Operations Center (SOC) Analyst, responsible for execution of incident response, investigative analysis of security incidents, reporting, continuous improvement, and post-incident activities. Will work closely with the CDC Engineering Team, internal Nokia teams, external Security Suppliers, and various technology vendors. Group Security (GS) is part of Strategy & Technology and Nokias central knowledge center for Nokias cybersecurity policies and standards, the cybersecurity architecture and roadmap, and the monitoring and alerting of security incidents. You have: 5+ years of experience in a Security Operations Center (SOC) or similar role 2+ years of experience working with one or more of following systemsMicrosoft Sentinel, Microsoft Defender for Endpoint (MDE), Microsoft Defender for Identity (MDI), SentinelOne or Rapid7 Deep knowledge of incident response methodologies and forensic analysis techniques Strong understanding of cloud security principles and experience with major cloud platforms (AWS, Azure, GCP) Expertise in leveraging automation tools for enhancing security operations It would be nice if you also had: Certifications such as CompTIA Cybersecurity Analyst (CySA+), GIAC Certified Incident Handler (GCIH), or Certified SOC Analyst (CSA) Mentoring experience with junior analysts Execute complex security investigations using log analysis and threat intelligence across all Nokia assets Collaborate with SOC Engineers to drive automation and implement AI-powered security solutions Apply cloud security best practices and zero-trust architecture principles in security operations Engage with senior stakeholders to communicate security risks and improve incident response efforts Lead advanced threat hunting initiatives leveraging expertise in security tools and techniques Contribute to the continuous development of SOC processes, technologies, and techniques for enhanced security Mentor and guide junior analysts to foster a culture of learning and professional growth Facilitate post-incident activities, ensuring comprehensive reporting and continuous improvement of security measures
Posted 2 weeks ago
7.0 - 10.0 years
12 - 17 Lacs
Bengaluru
Work from Office
As a R&D Technical Lead in the Product & Engineering, Subscriber Signaling and Policy (NPC/CSD) team at Nokia, you will play a pivotal role in driving innovation in cloud-native applications and architectures. You'll work closely with cross-functional teams to problem-solve requirements, design system components, and guide the end-to-end development of features and functionalities. Our work environment thrives on agility and a startup culture, where you will be encouraged to contribute your expertise in Core Java, cloud security, and containerization using Docker and Kubernetes. Your insights will directly impact our efforts to enhance signaling protocols and address the dynamic demands within 4G/5G networks. You have 7 to 10 years of hands-on development experience in Core Java. Expertise in Linux and familiarity with debugging tools like gcov and valgrind. Experience with cloud native technologies including Docker and Kubernetes. It would be nice if you also had Knowledge of 2G/3G/4G/5G Core Network and 3GPP standards. Experience with open-source PaaS environments such as OpenShift. Knowledge of Cloud Infrastructure and hyperscale cloud capabilities like AWS and Azure. Develop and implement cloud-native applications, ensuring performance, scalability, and security. Conduct requirement problem-solving and component design using advanced system engineering processes. Facilitate the software and hardware architecture at the system component level, ensuring robust design. Deploy, test, and troubleshoot cloud applications solo in an agile, fast-paced environment. Utilize containerization technologies like Docker and Kubernetes for efficient application management.
Posted 2 weeks ago
2.0 - 6.0 years
6 - 8 Lacs
Chennai
Work from Office
Hi , We are hiring for the ITES Company for Carbon Black Role. Overview The Carbon Black Specialist is responsible for supporting and managing Carbon Black security products, with experience and certification in one or more Carbon Black solutions. This role involves independently working with customers through virtual platforms like Webex, providing expert training, mentoring, and exceptional customer service. The Carbon Black Cyber Security professional specializes in deploying, managing, and optimizing Carbon Black endpoint security solutions to protect organizations from cyber threats. Their responsibilities include monitoring security alerts, analyzing threats, and responding to incidents to ensure robust endpoint protection. Attention to detail, professionalism, and adaptability are key, with analysis, debugging, and programming in the enterprise security domain. Key Skills : Any Graduate Minimum 2 years of experience working with all Carbon Black products. Deeper knowledge with at least one of the Carbon Black products Familiarity with analysis and debugging skill a plus Programming experience a plus To Apply, WhatsApp 'Hi' @ 9151555419 Follow the Steps Below: >Click on Start option to Apply and fill the details >Select the location as Other ( to get multiple location option ) a) To Apply for above Job Role ( Chennai ) Type : Job Code # 274 Job description: Minimum 2 years of experience working with all Carbon Black products. Deeper knowledge with at least one of the Carbon Black products Certification obtained on the product(s) of expertise Ability and motivation to work with customers independently via Webex Excellent training and mentoring skills Team motivator who currently serves as an example for their team mates Consistently exceeds personal goal expectations Certification in the enterprise security space Good time management skills and ability to multi task Adaptable, professional, courteous, motivated and works well on their own or as a member of a team Excellent Customer Service skills and a demonstrated success exceeding customer expectations Strong communication (verbal and written) and customer handling skills Strong attention to detail and focus on producing quality work products and results Familiarity with analysis and debugging skill a plus Programming experience a plus
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane