Jobs
Interviews

1099 Cryptography Jobs - Page 14

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 10.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Job Description: About Us At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day. One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We’re devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being. Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization. Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us! Global Business Services Global Business Services delivers Technology and Operations capabilities to Lines of Business and Staff Support Functions of Bank of America through a centrally managed, globally integrated delivery model and globally resilient operations. Global Business Services is recognized for flawless execution, sound risk management, operational resiliency, operational excellence and innovation. In India, we are present in five locations and operate as BA Continuum India Private Limited (BACI), a non-banking subsidiary of Bank of America Corporation and the operating company for India operations of Global Business Services. Process Overview* Global Information Security (GIS) functions by analyzing, researching, improving, defining, implementing, and executing information security processes defined, in large part, by past high profile audit issues. Key responsibilities include Data Quality management of closed manually identified P2 vulnerabilities, developing an understanding of the LOBs that report vulnerabilities via manual flat file to GIS, following standard practices and procedures in analyzing situations or data, and supporting team members in performing specialized GIS functions, primarily Data Quality assurance. Job expectations include partnering with teams inside, and outside, of GIS, inclusive of GIS, CTI, EET, APS&E, GT Risk, and others. Job Description* Position will be a member of the Third Party Cyber Security Alternative Assurance Program (TPAAp) organization in Global Information Security (GIS), responsible for conducting information security assessments of third parties by reviewing independent audit reports (e.g., SOC 2 Type 2, ISO 27001, PCI DSS RoC) or Self Attestation / Assessment reports (e.g., SIG, PCI DSS AoC) to document a point of view on the information security posture of the third party. The position will be a key player in driving strategic initiatives focused on the design of Third Party Alternative Assurance (TPAA) program requirements, governance routines, consequence processes, and third party risk metrics and reporting. In addition to supporting strategic initiatives, the position will include analyzing and interpreting diverse information security risk indicators to deliver actionable insights into third party information security risk and enable prioritized cyber security assurance approaches. Position requires interaction with the third party cyber assessment team, technical subject matter experts, GIS Policy, and the internal and external third party management community. Responsibilities* Candidates must have at least 8-10 years of relevant experience. (Previous information technology/security audit/assessment experience is a plus.). Previous security audit/assessment or remediation experience. Previous experience reviewing independent audit reports / certification (e.g., ISO 27001, SOC 2 Type 2, PCI DSS RoC). Previous experience reviewing self attestation / assessment reports (e.g., SIG, PCI DSS AoC). Self-starting, organized, and requiring minimal management oversight. Ability to operate across organizational boundaries and hierarchies to accomplish tasks. Strong analytical skills/problem solving/conceptual thinking/attention to detail. Ability to work effectively with peers and various levels of management. Well organized and thorough, with the ability to balance and prioritize. Excellent verbal and written communication skills across multiple levels of the organization. Requirements* Education* : B.E. / B Tech / M.E. / M Tech / MCA / M.Sc., Certifications (If Any) : ISO 27001 LA, Ethical Hacking, CISA, CISM Experience Range* : 6 - 9 years Foundational Skills* Experience in Information Security Management Experience in Governance, Risk & Compliance Experience in internal or external audits Experience with ISO 27001 and SOC 2 Type 2 control frameworks. Experience in implementing or reviewing ISO 27001, PCI, SOX, etc., controls Strong analytical and problem solving skills Excellent written/verbal communication skills Desired Skills* Knowledge in Vulnerability Assessments and Application Architecture Cloud Security Understanding of Networking, Systems Admin, Cryptography, Access Management Work Timings* : 1:30 PM - 10:30 PM Job Location* : HYD, MUM, CHN

Posted 3 weeks ago

Apply

1.0 - 2.0 years

3 - 4 Lacs

Chennai

Work from Office

Responsibilities: * Collaborate with cross-functional teams on blockchain projects. * Manage cryptocurrency portfolio and investments. * Identify new business opportunities through web technologies.

Posted 3 weeks ago

Apply

0.0 - 5.0 years

1 - 4 Lacs

Hyderabad

Work from Office

Responsibilities: Lead strategic planning & execution Oversee financial management & fundraising efforts Connect with me in call or WhatsApp for shortlisting your profile Office cab/shuttle Food allowance Health insurance Annual bonus Provident fund

Posted 3 weeks ago

Apply

3.0 years

15 - 40 Lacs

Delhi, India

On-site

This role is for one of Weekday's clients Salary range: Rs 1500000 - Rs 4000000 (ie INR 15-40 LPA) Min Experience: 3 years Location: NCR JobType: full-time Requirements About the Role: We are looking for a Senior Blockchain Developer to lead the design, development, and deployment of smart contracts and blockchain infrastructure powering our crypto platform. You will work closely with backend, DevOps, and product teams to create secure, scalable, and production-ready decentralized components that interface seamlessly with the rest of our system. The ideal candidate has hands-on experience with EVM-compatible chains, understands cryptography and consensus, and has built or audited smart contracts in production environments. Key Responsibilities: Design, develop, and deploy smart contracts (primarily Solidity or Vyper) for features such as staking, token issuance, multi-sig, governance, and trading Integrate on-chain contracts with backend systems and off-chain data using oracles and event listeners (e.g., The Graph, Chainlink) Optimize gas usage, ensure contract upgradeability, and maintain test coverage with unit/integration tests using frameworks like Hardhat or Foundry Contribute to wallet integrations, token standards (ERC-20, ERC-721, ERC-1155), and bridging mechanisms across chains Review and audit smart contracts internally and externally, identifying security vulnerabilities and business logic issues Collaborate with product, backend, and frontend teams to deliver blockchain features end-to-end Stay up to date with latest L1/L2 developments, EIPs, and tooling to propose and implement improvements. Required Qualifications: 4+ years of software engineering experience, with 2+ years specifically in blockchain development Strong experience with Solidity, and knowledge of EVM internals, gas optimization, and contract design patterns Familiarity with Ethereum and L2 ecosystems (Polygon, Arbitrum, Optimism, zkSync) Proficient with blockchain development tools: Hardhat, Foundry, Truffle, Web3.js, Ethers.js Deep understanding of token standards, DeFi protocols, and on-chain governance Experience with multisig wallets, time locks, oracles, and decentralized identity (DID) frameworks Comfortable working with Git, CI/CD, Docker, and collaborative environments. Preferred Qualifications: Experience working on Layer 1 or Layer 2 protocol development Knowledge of Rust or Golang for work on non-EVM chains (e.g., Solana, Polkadot, Cosmos) Contributions to open-source blockchain projects or Ethereum Improvement Proposals (EIPs) Experience with zk-rollups, zero-knowledge proofs, or verifiable computation Familiarity with compliance protocols (Travel Rule, KYC/AML on-chain solutions) Previous work with hardware wallets and MPC-based signing (Fireblocks, Safe, etc.)

Posted 3 weeks ago

Apply

0.0 - 2.0 years

0 - 0 Lacs

Chennai, Tamil Nadu

On-site

Required Qualifications & Skills: Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related technical field. A Master's degree is a plus. Experience: Minimum of 2 years of hands-on experience in cybersecurity roles (e.g., Security Analyst, Penetration Tester, Security Engineer, Incident Responder) or dedicated cybersecurity training. Proven track record of successfully delivering training to individuals or teams. Technical Skills: Strong knowledge of core cybersecurity domains, including but not limited to: Network Security (Firewalls, IDS/IPS, VPNs, Network Segmentation, TCP/IP) Operating System Security (Windows, Linux, macOS) Vulnerability Assessment & Penetration Testing (VAPT) methodologies and tools (e.g., Kali Linux, Metasploit, Nmap, Burp Suite) Incident Response & Management Security Operations Center (SOC) functions Cryptography and Encryption Cloud Security (AWS, Azure, GCP) Application Security (OWASP Top 10) Security Frameworks and Compliance (e.g., NIST, ISO 27001) Malware Analysis and Digital Forensics (basic understanding) Proficiency in scripting languages (e.g., Python, PowerShell, Bash) for automation and analysis. Familiarity with SIEM solutions and log analysis. Certifications (Highly Preferred): CompTIA Security+ Certified Ethical Hacker (CEH) CompTIA CySA+ Certified Information Systems Security Professional (CISSP) Offensive Security Certified Professional (OSCP) Any other relevant vendor-specific or domain-specific certifications. Soft Skills: Excellent communication, presentation, and public speaking skills. Ability to explain complex technical concepts clearly and concisely to diverse audiences. Strong analytical and problem-solving abilities. High attention to detail and organizational skills. Passion for teaching and a commitment to learner success. Adaptability and willingness to learn new technologies. Strong interpersonal skills and ability to build rapport. Preferred Qualifications: Prior experience in an educational institution or corporate training department. Experience with Learning Management Systems (LMS). Knowledge of local industry needs and cybersecurity landscape in India/Tamil Nadu. What We Offer: Competitive salary and benefits package. Opportunity to work with cutting-edge cybersecurity technologies. A dynamic and supportive work environment. Continuous professional development and upskilling opportunities. The chance to make a significant impact on the next generation of cybersecurity professionals. franchise@elysiumacadmey.org 7845736974 Job Types: Full-time, Permanent Pay: ₹11,710.30 - ₹18,000.00 per month Schedule: Day shift Work Location: In person

Posted 3 weeks ago

Apply

1.0 - 4.0 years

1 - 3 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Blockchain Developer Financial Transactions Job Title : Blockchain Developer Financial Transactions Location : Chennai, Hyderabad, Bangalore Experience : 1-4 Role Summary: Design and implement blockchain-based solutions for secure and transparent financial transactions, including smart contracts and decentralized applications. Key Responsibilities: Develop smart contracts and D Apps for financial use cases. Integrate blockchain solutions with existing fintech platforms. Ensure transaction integrity, scalability, and security. Stay updated on blockchain trends and regulatory implications. Conduct code reviews and performance audits. Qualifications: 25 years in blockchain development. Proficiency in Solidity, Rust, or Go. Experience with Ethereum, Hyperledger, or other blockchain platforms. Understanding of cryptography, consensus algorithms, and token economics.

Posted 3 weeks ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Description The primary responsibilities of a cloud architect include: Developing cloud strategy: Creating a cloud strategy and plan for adoption Designing cloud architecture: Designing cloud environments that meet the organization's needs Managing cloud resources: Overseeing the integration and migration of systems into the cloud Ensuring security: Developing security frameworks to protect data and applications Monitoring cloud activities: Keeping track of cloud activities and responding to technical issues Advising on cloud use: Providing advice on how to use cloud technology and deal with high-risk situations Developing and implementing cloud governance policies and procedures. Collaborating with teams: Working with IT security, vendors, and other teams Evaluating and selecting cloud applications, hardware, and software that align with business requirements. Designing and organizing cloud systems, including servers, storage, and network infrastructure. Defining best practices for migrating infrastructure, including bulk migrating applications to the cloud. Identifying and recommending cloud architecture solutions that effectively meet the company's needs. Ensuring compliance with relevant industry regulations and security standards. Training and supporting development teams on cloud architecture best practices. Ensuring the security of cloud-based data and applications against unauthorized access, theft, and other threats. Conducting regular security assessments and audits to identify vulnerabilities and develop plans to address them. Collaborating with other IT professionals, including network engineers, developers, and system administrators, to integrate cloud security measures into existing systems and processes. A strong understanding of cloud computing technologies, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Knowledge of security frameworks such as ISO 27001, NIST Cybersecurity Framework, and CIS Controls. Operational experience in Tenable Cloud security application is a must Technical Skills Extensive knowledge of cloud computing technologies and current trends. Proficiency in cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform. Understanding of application architecture, orchestration, virtualization, and security protocols. Familiarity with programming languages like Python, Java, and C#. Experience with infrastructure as code (IaC) and automation technologies. Knowledge of networking concepts, including DNS, TCP/IP, and HTTP. Expertise in big data architecture, cost management, and disaster recovery planning. Familiarity with cloud security best practices, including encryption, access controls, and identity management. Understanding of cloud governance and compliance requirements. Having hands-on experience on Cloud governance which includes Data privacy, Risk management, Security and compliance management, Data quality, Data lifecycle management and ownership Continuous integration and delivery (CI/CD): Writing scripts to automatically integrate new code and features into the deployment environment Automation: Using automation to make software development more consistent, reliable, and efficient Infrastructure as Code (IaC): Using scripts to automatically configure the deployment environment Configuration management: Using tools to automate the provisioning and configuration of infrastructure and servers DevOps engineers use tools like Ansible, Puppet, Chef, Docker, and Kubernetes to perform their duties. Design and implement cloud security architecture, including Identity and Access Management (IAM) Monitor for security risks, vulnerabilities, and controls Analyze, log, and respond to incidents in the cloud environment Conduct threat simulations and penetration tests to identify potential threats Manage cryptography and encryption for cloud-based data Ensure that policies and processes are in place to protect business data Certifications such as Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP), or Certified Cloud Architect (CCA) are preferred. At Nextracker, we are leading in the energy transition, providing the most comprehensive portfolio of intelligent solar tracker and software solutions for solar power plants, as well as strategic services to capture the full value of solar power plants for our customers. Our talented worldwide teams are transforming PV plant performance every day with smart technology, data monitoring and analysis services. For us at Nextracker, sustainability is not just a word. It's a core part of our business, values and our operations. Our sustainability efforts are based on five cornerstones: People, Community, Environment, Innovation, and Integrity. We are creative, collaborative and passionate problem-solvers from diverse backgrounds, driven by our shared mission to provide smart solar and software solutions for our customers and to mitigate climate change for future generations. Culture is our Passion

Posted 3 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

noida, uttar pradesh

On-site

Project Description: We are seeking a talented and experienced Senior .NET Developer to join our team immediately. The ideal candidate will lead development projects, manage client interactions independently, and deliver top-tier software solutions. You will be responsible for designing, developing, and maintaining efficient, reliable software systems and ensuring their optimal performance. This role demands a leader with a strong technical background and the ability to collaborate effectively with cross-functional teams to drive project success. Key Responsibilities: Design, develop, code, and test software systems or applications. Collaborate with developers, designers, and business stakeholders to deliver responsive user experiences on schedule. Design, build, and maintain efficient, reusable, and reliable operational processes and code. Ensure the best possible performance, quality, and responsiveness of applications. Identify bottlenecks and bugs and devise solutions to mitigate and address these issues. Lead and mentor team members, ensuring adherence to Agile methodologies. Drive consistent end-to-end user experience across all deliverables. Required Qualifications & Skills: Experience: 5+ years in developing n-tier web-based distributed applications with a strong proven experience in .NET Framework 4.x and .NET Core. Technical Skills: Proficient in C#, ASP.NET, MVC, WCF, ADO.NET, Web Services, REST API, IIS, and SQL. Experience with Design Patterns, microservices, Service-Oriented Architecture, and developing with Containers like Dockers. Additional Skills: Knowledge of Cloud Technology (AWS Aurora, ECS, SQS, SNS, Kinesis), understanding of Cryptography, and exposure to DevOps tools (Jenkins, Ansible, Nexus). Tools: Strong exposure to GitLab, Jira, and Agile development tools. Education: UG - B.Tech/B.E. or PG - M.S./M.Tech. Soft Skills: Strong leadership abilities, attention to detail, and excellent collaboration skills.,

Posted 3 weeks ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

About Us : In today's world, where data spreads across various clouds and devices, traditional security measures aren't enough. Businesses need a dynamic approach to defend against constant cyber threats and ensure agile data security. Fortanix leads the way in data-centric cybersecurity for hybrid multicloud environments, using advanced cryptography, encryption, and confidential AI solutions. As data breaches become more frequent and traditional defenses fall short, we focus on data exposure management to keep your information safe. Our unified data security platform addresses vulnerabilities in hybrid multicloud environments, defends against threats, and makes it easier to discover, assess, and fix data exposure risks. Whether implementing a Zero Trust model or preparing for the post-quantum computing era, we help businesses worldwide protect their most sensitive data, wherever it is. Our commitment to solving the world's toughest data security challenges has earned Fortanix multiple Cybersecurity Excellence and Innovation Awards, as well as recognition from industry giants such as Microsoft, Intel, ServiceNow, and Snowflake. Our team includes industry leaders and cryptography experts, creating a culture of trust, innovation and collaboration where every voice is valued. Recognized as a Great Place to Work, we're looking for passionate individuals to help us shape the future of data security and work towards a safer digital future. Why work with us? Ready to join the revolution? At Fortanix, we're more than a team - we're a force united in our mission to tackle the world's most formidable data challenges head-on. Our roster boasts industry trailblazers and cryptography virtuosos, fostering a culture of trust and performance where innovation thrives. Recognized as a Great Place to Work, we invite passionate individuals to shape the future of data security alongside us. Dive into a workplace where collaboration knows no bounds and every voice is valued. Together, let's redefine the possibilities of data security and pave the way for a safer digital tomorrow. Job Description: Fortanix is looking for a CSM to ensure customers have a world class experience. As a CSM, you'll be the trusted advisor and primary point of contact for a portfolio of customers. You'll be responsible for instrumenting the post-sale customer journey through collaboration with partners in Customer Success Engineers, Support and Sales. You'll also cultivate and maintain strong relationships with customers, ensuring initial value realization as well as successful adoption and use of Fortanix's DSM solutions. What you will deliver: Partner with Fortanix customers to achieve strong returns on customer investment in Fortanix, by delivering, measuring, and communicating ROI over the customer lifecycle Lead and be accountable for customer retention and customer expansion for all customers in your Book of Business. Partner with Fortanix stakeholders in Sales, Product and Engineering to deliver on customer expectations. Help with customer onboarding and training, thus driving adoption. Understand customer requirements, challenges, and the business outcomes they are expecting from their investment. Develop and execute account plans with a focus on increasing product adoption new routes to value. Conduct periodic Business Reviews to ensure strategic alignment for consistent and timely collaboration with customers. Be the primary escalation point for business and technical issues. In partnership with Success Engineers and Technical Account Managers, be an expert on Fortanix products, customer use cases and platform integrations, while staying current with industry trends in crypto, HSMs and confidential computing Requirements Must Have: 3-5+ years of experience in Account Management, Customer Success, or Technical Support Engineering with a successful track record of execution Experience in leading or enabling change management and product adoption with technical customer personas A knack for learning new technologies and new products, with the ability to communicate technical details with clarity Demonstrated experience fostering relationships with technical and non-technical customer personas Integrity and flexibility: you can patiently and enthusiastically navigate ambiguity in seeking solutions to new challenges Desirable: Experience working in a global organization with customers in different geographies Familiarity with HSM and cryptographic technology. Experience with HSM from another company is a plus Benefits Mediclaim Insurance - Employees and their eligible dependents including dental coverage Personal Accident Insurance Internet Reimbursement Employee Stock Options Fortanix is an equal opportunity employer that celebrates diversity and is committed to creating an inclusive workplace with equal opportunity for all applicants and teammates. Our goal is to recruit the most talented people from a diverse candidate pool regardless of race, color, religion, age, gender, gender identity, sexual orientation or any other status. If you're interested in working in a fast growing, exciting working environment - we encourage you to apply!

Posted 3 weeks ago

Apply

15.0 - 19.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Associate Director-Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Support Contractual Compliance: Review and provide strategic commentary on information security requirements in client contracts, aligning with EY’s Information Security Program. Assist EY Legal Counsel and Client Account Teams in negotiating terms that protect both EY and client interests. Qualifications Minimum 15-19 years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 3 weeks ago

Apply

15.0 - 19.0 years

0 Lacs

Kochi, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Associate Director-Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Support Contractual Compliance: Review and provide strategic commentary on information security requirements in client contracts, aligning with EY’s Information Security Program. Assist EY Legal Counsel and Client Account Teams in negotiating terms that protect both EY and client interests. Qualifications Minimum 15-19 years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 3 weeks ago

Apply

4.0 - 7.0 years

9 - 13 Lacs

Noida

Work from Office

Since our founding, IDEMIA has been on a mission to unlock the world and make it safer through our cutting-edge identity technologies. Our technology leadership makes us the partner of choice for hundreds of governments and thousands of enterprises in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places - at scale and in total security. Our teams work from 5 continents and speak 100+ different languages. We strongly believe that our diversity is a key driver of innovation and performance. Purpose This role transforms requirements into software according to design, to maximize business value and customer satisfaction. Key Missions Uses programming, scripting and database languages to write software code that meets requirements and that optimizes software performances Identifies existing software components, libraries and frameworks to reuse in the solutions Applies knowledge of software development best practices, including coding standards, secure coding, code reviews, source control management, build processes, testing, and operations Contributes to requirement (functional and non-functional) analysis and estimations Supports software testing, deployment, maintenance, and evolution activities by correcting programming errors, responding to scope changes, and coding software enhancements Builds up software structure including functions, design patterns, layers, etc. Documents and demonstrates solutions by developing code comments, layouts, diagrams and charts Designs and codes autonomously complex functions and full modules, within agreed quality, deadline and cost; asking for support of experienced peer when needed Performs code reviews and basic troubleshooting Participates in workshop with customer and external parties Coaches less experienced software developers Profile & Other Information

Posted 3 weeks ago

Apply

4.0 - 5.0 years

8 - 12 Lacs

Mumbai

Work from Office

Responsible for development of new features and fixing defects. Responsible to Perform core technical aspects of software development for assigned applications including, developing prototypes and writing new code Responsible for API Connect, DataPower, configuring API Proxy, JWT, and basic Auth Strong written, oral communication skills and able to manage user / vendor / customer Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise B. Tech / B.E/ MCA / MSc IT with Minimum 4-5 years of experience Candidate with hands on experience with API Connect, DataPower, configuring API Proxy, JWT, and basic Auth Understanding of Rest/SOAP apis. Strong knowledge on xslt/gateway script. Experience with xpath, Http status code, GET/POST methods, CRUD operations Preferred technical and professional experience Ability to test and troubleshoot issue in any environment. Knowledge of cryptography and OAuth. Knowledge of networking concepts

Posted 3 weeks ago

Apply

8.0 - 13.0 years

8 - 12 Lacs

Bengaluru

Work from Office

The IBM Cloud Object Storage team is seeking an experienced Security Developer As a Security developer, you will be part of a highly focused, self-managed team that designs, develops and tests secure solutions created for IBM Cloud Object Storage workloads. Responsible for all aspects of security and compliance activities. Provide feedback to architects regarding any issues that can cause any security and complinace Gaps. Manage projects with various priority levels and timelines from start to finish. Demonstrate best practices in all aspects of administration. Leverage various security tools to secure the offerings and make sure offering is adhered to the best security and compliance priniciples. Continuously stay abreast of new security and complinace guidelines to ensure more secure offering. Must collaborate with other departments to resolve complex issues and be detail oriented. Ability to automate security and complinace solutions to repetitive problems/tasks. Required education Bachelor's Degree Required technical and professional expertise Upto 8+ Years of working experience with Security and Compliance activities Programming Skills: Python Shell Scripting Other Skills: In depth Knowledge of end to end Security and Complinace activities such as Threat Models, Security Privacy by Design. Knowledge of Security scanning tools such as Nessus scanner, SonarQube, NMap. In depth Security concepts (Includes deep understanding of identity mgmt/authentication, authorization, firewall, auditing, secure communication, managing certificates, password management) Excellent presentation and soft skills Security Domain ExpertizeUnderstand of cryptographic key management and it's lifecycle and also security architecture. In depth knowledge of Hardware Security Modules, PKCS #11 APIs, Trusted Execution Environments, Quantum Safe Algorithms Strong English communication skills both written and verbal Preferred technical and professional experience General understanding of private /public / hybrid cloud concepts In depth understanding of HW servers and server components General understanding of open source projects; experience with open source community contribution can be an added advantage Indepth Security concepts and hands on experience on Certificate management/authentication, authorization, firewall, auditing, secure communication, password management)

Posted 3 weeks ago

Apply

7.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

About The Team The Compliance team at Meesho is like the Avengers safeguarding Meesho's S.H.I.E.L.D. As an Associate Compliance Manager, you’ll take the lead in fortifying our systems and ensuring they remain secure and compliant. After all, when 5% of Indian households shop with us, it’s important to build resilient systems to manage millions of orders every day. We’ve done this – with zero downtime! 😎 Sounds impossible? Well, that’s the kind of Engineering muscle that has helped Meesho become the e-commerce giant that it is today. We value speed over perfection, and see failures as opportunities to become better. We’ve taken steps to inculcate a strong ‘Founder’s Mindset’ across our engineering teams, making us grow and move fast. We place special emphasis on the continuous growth of each team member - and we do this with regular 1-1s and open communication. As an AssociateCompliance Manager, you will be part of self-starters who thrive on teamwork and constructive feedback. We know how to party as hard as we work! If we aren’t building unparalleled tech solutions, you can find us debating the plot points of our favourite books and games – or even gossipping over chai. So, if a day filled with building impactful solutions with a fun team sounds appealing to you, join us. About The Role As an Associate Manager , you’ll play a key individual contributor role in driving security policies, ensuring adherence to compliance frameworks, and mitigating risks within Meesho’s internal and external environments. You’ll manage end-to-end compliance activities, oversee audits, and contribute to building a secure and compliant ecosystem. As part of the Security Compliance team, you’ll own and be accountable for the overall Information Security framework and program, helping to uphold the highest standards of security and privacy. What You Will Do Lead and own the end-to-end security compliance and certification charter. Define, roll out, and enforce Information Security policies and procedures. Define and ensure adherence to data privacy and data protection laws (e.g., DPDP). Collaborate with third-party vendors to maintain robust third-party security practices. Ensure compliance with IT Act, e-commerce guidelines, and regulations related to cryptography, information security, and data privacy. Conduct periodic information security awareness training programs for employees. Oversee information security risk management and privacy impact assessments. Develop and maintain Business Continuity Plans (BCP) and conduct Business Impact Assessments (BIA) to ensure organizational resilience Draft and enforce Data Protection Agreements and Information Security Agreements. Manage and coordinate internal and external audit-related activities. Collect and present audit evidence to ensure successful compliance assessments. Develop, implement, and maintain internal audit policies and procedures in line with standards such as ISO 27001, SOC 2, PCI DSS, or any other opted frameworks. Audit data, systems, and processes for policy and regulatory compliance. Provide actionable insights and reporting on the effectiveness of compliance programs. Conduct vendor audits and produce comprehensive reports. Plan and execute ad-hoc audits as necessary. What You Will Need Educational Qualification: Bachelor's/Master's degree in Computer Science, Information Security, or a related technical field. Experience: 4–7 years in information security, compliance, or audit roles. Demonstrated experience in startup environments or knowledge of regulatory frameworks (e.g., PCI DSS, ISO 27001). Strong problem-solving skills and hands-on experience implementing compliance standards. Familiarity with frameworks like ISO27001, NIST, Cyber Kill Chain, and MITRE ATT&CK. Working knowledge of cloud platforms (AWS, GCP) is highly advantageous. Excellent project planning, stakeholder management, and communication skills. Ability to adapt to evolving regulatory landscapes and implement best practices. Certifications like ISO Lead Auditor/Implementer, CISSP, CISM, CISA, or CCSP are a plus.

Posted 3 weeks ago

Apply

0 years

0 Lacs

Bengaluru East, Karnataka, India

On-site

Applied Research Center [Emerging Areas] Advanced AI [SLM, Inference Scaling, Synthetic Data, Distributed Learning, Agentic AI, ANI] New Interaction Models [Spatial computing, Mixed Reality, 3D visualizations, New Experiences] Platforms and Protocols [Architecting and engineering for Performance, Uptime, Low-latency, Scalability, Efficiency, Data, Interoperability and Low cost, Beckn, CDPI] Cybersecurity [Ethical hacking, Threat Mgmt, Supply chain security & risk, Cyber Resilience] Quantum [Quantum AI, Stack, Simulation & Optimization, Cryptography, Valued use cases] Autonomous Machines [Humanoids, Industrial Robots, Drones, Smart Products] Emerging Research [Brain, AGI, Space, Semicon ] Emerging Tech Trends Research - Research on emerging tech trends, ecosystem of players, use cases and their applicability and impact to client businesses. Scan & curate startups, universities and tech partnerships needed and create innovation ecosystem. Rapidly design and develop PoCs in Emerging tech areas. Share design specifications with other team members, get the components developed, integrate and test. Build reusable components and develop PoCs using relevant startups and Open-source solutions. 2. Thought Leadership - Develop showcases that demonstrate how emerging technologies can be applied in a business context, demo scenarios for the IP. Contribute towards patents, tier-1 publications, whitepapers, blogs in the relevant emerging tech area Get certified on the emerging technology, frameworks 3. Applied Research Center Activities - Contribute to high level design development, testing and implementation of new proof of concepts in emerging tech areas. 4. Problem Definition, Requirements - Understand technical requirements and define detailed design. Analyze the reusable components to map the given requirement to existing implementation and identify needs for enhancements 5. IP Development - Develop program level design, modular components to implement the proposed design. Design and develop reusable components. Ensure compliance with coding standards, secure coding, KM guidelines while developing the IP 6. Innovation Consulting - Understand client requirements and implement first of kind solutions using emerging tech expertise. Customize and extend IP for client specific features 7. Talent Management - Mentor the team and help them acquire the identified emerging tech skill. Participate in demo sessions, hackathons 8. Emerging Tech Startup Ecosystem – Work with startups in providing innovative solutions to client problems and augmenting Infosys offerings Technical Competencies Advanced theoretical knowledge in specific domain Experimental design and methodology expertise Data analysis and interpretation skills Prototype development capabilities Research tool proficiency relevant to domain Soft Skills and Attributes Collaborative mindset for cross-disciplinary research Communication skills for knowledge dissemination Creative problem-solving approach Intellectual curiosity and innovation focus Commercial awareness for translational research

Posted 3 weeks ago

Apply

140.0 years

0 Lacs

Greater Kolkata Area

On-site

About NCR VOYIX NCR VOYIX Corporation (NYSE: VYX) is a leading global provider of digital commerce solutions for the retail, restaurant and banking industries. NCR VOYIX is headquartered in Atlanta, Georgia, with approximately 16,000 employees in 35 countries across the globe. For nearly 140 years, we have been the global leader in consumer transaction technologies, turning everyday consumer interactions into meaningful moments. Today, NCR VOYIX transforms the stores, restaurants and digital banking experiences with cloud-based, platform-led SaaS and services capabilities. Not only are we the leader in the market segments we serve and the technology we deliver, but we create exceptional consumer experiences in partnership with the world’s leading retailers, restaurants and financial institutions. We leverage our expertise, R&D capabilities and unique platform to help navigate, simplify and run our customers’ technology systems. Our customers are at the center of everything we do. Our mission is to enable stores, restaurants and financial institutions to exceed their goals – from customer satisfaction to revenue growth, to operational excellence, to reduced costs and profit growth. Our solutions empower our customers to succeed in today’s competitive landscape. Our unique perspective brings innovative, industry-leading tech to all the moving parts of business across industries. NCR VOYIX has earned the trust of businesses large and small — from the best-known brands around the world to your local favorite around the corner. Key Responsibilities Develop and deploy automated processes for the issuance, renewal, revocation, and monitoring of digital certificates across various platforms. Collaborate with cross-functional teams to integrate certificate management solutions into existing infrastructure, including cloud, on-premises, and hybrid environments. Implement and maintain automations scripts and tools using platforms such as Hashicorp Vault, Venafi, or similar certificate management systems. Monitor and manage the health of digital certificates to prevent expirations and ensure compliance with security policies. Manage and mentor a team of engineers responsible for certificate management, providing technical guidance and professional development opportunities. Troubleshoot and resolve issues related to certificate management, including SSL/ TLS configurations, certificate chains, and trust stores. Create and maintain comprehensive documentation for automated certificate management processes, configurations, and best practices. Stay updated with latest trends in PKI, cryptography, and security automation to continuously improve the organization’s certificate management strategy. Work closely with security and compliance teams to ensure that all certificate management practices meet regulatory and internal security requirements. Lead incident response efforts related to certificate management issues, ensuring minimal disruptions to the services. Lead the design, implementation, and maintenance of automated certificate management solutions to support the organization’s security infrastructure. Oversee the lifecycle management of digital certificates, ensuring time. Complex troubleshooting, Root cause analysis, performance tuning, Tuning, diagnostics, and maintenance of IT security related Equipment Ensuring adherence to process. Following the SLA’s and procedures already defined for security device management. Procedures and KB, known incident resolution, Known Error handling. Hands on experience and ability to do Root cause analysis, Problem & Capacity Management As an active member of the team, monitor and process response for security events on a 24x7 basis. Support 24/7 operations Skills And Qualifications Minimum of 8 years of experience in certificate management, PKI, or related fields. Proven experience in automating certificate management processes using tools like HashiCorp Vault, Venafi, or similar. Strong understanding of cryptographic protocols (SSL/ TLS), certificate authorities, and digital signatures. Experience with scripting and automation using languages such as Python, PowerShell, or Bash. Familiarity with DevOps practices and automation tools – Ansible, Terraform, Jenkins. Relevant certifications (e.g. CISSP, CEH, Cloud – Azure, GCP, AWS) are a plus. Experience leading and mentoring technical teams, with a demonstrated ability to manage multiple projects simultaneously. Ability to assimilate, understand and utilize various security technologies. Strong attention to detail Ability to deal with ambiguity and translate high level objectives into detailed tasks. Ability to prioritize work with multiple, simultaneous work assignments. Ability and willingness to learn new tools and processes. Experience documenting business processes or technical procedures preferred. Excellent communication and interpersonal skills, with the ability to articulate complex concepts to non-technical stakeholders. Experience with managing certificate authorities and HSMs (Hardware Security Modules). Offers of employment are conditional upon passage of screening criteria applicable to the job EEO Statement Integrated into our shared values is NCR Voyix’s commitment to diversity and equal employment opportunity. All qualified applicants will receive consideration for employment without regard to sex, age, race, color, creed, religion, national origin, disability, sexual orientation, gender identity, veteran status, military service, genetic information, or any other characteristic or conduct protected by law. NCR Voyix is committed to being a globally inclusive company where all people are treated fairly, recognized for their individuality, promoted based on performance and encouraged to strive to reach their full potential. We believe in understanding and respecting differences among all people. Every individual at NCR Voyix has an ongoing responsibility to respect and support a globally diverse environment. Statement to Third Party Agencies To ALL recruitment agencies: NCR Voyix only accepts resumes from agencies on the preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Voyix employees, or any NCR Voyix facility. NCR Voyix is not responsible for any fees or charges associated with unsolicited resumes “When applying for a job, please make sure to only open emails that you will receive during your application process that come from a @ncrvoyix.com email domain.”

Posted 3 weeks ago

Apply

0 years

0 Lacs

Mohali

On-site

About the Role We are seeking a talented and enthusiastic Blockchain Developer to join our growing team. You will work on developing and optimizing blockchain-based applications and smart contracts, contributing to innovative projects that are shaping the future of decentralized technology. Key Responsibilities Design, develop, test, and deploy smart contracts on platforms like Ethereum, Solana, Polygon, etc. Build decentralized applications (DApps) using web3.js, ethers.js, or similar libraries. Collaborate with the frontend team to integrate blockchain functionalities into UI. Monitor and optimize gas usage and transaction performance. Stay updated on the latest developments in blockchain technology. Requirements Strong understanding of blockchain fundamentals and decentralized systems. Experience with Solidity, smart contract development, and Ethereum tools like Truffle or Hardhat. Familiarity with EVM, gas optimization, and security best practices in blockchain. Proficiency in programming languages like JavaScript/TypeScript, Python, or Go. Experience with Git and version control. Excellent problem-solving and debugging skills. ✅ Nice to Have Experience with Layer 2 solutions or alternative blockchain platforms (e.g., Solana, Polkadot). Understanding of cryptography and token standards (ERC-20, ERC-721, ERC-1155). Familiarity with IPFS, The Graph, Chainlink, oracles, and other Web3 technologies. Why Join Us? Opportunity to work on cutting-edge projects in the blockchain space. Supportive team and learning environment. Flexible working hours and a culture of innovation. Possibility for long-term growth and leadership opportunities. Job Type: Full-time Pay: ₹5,000.00 - ₹30,000.00 per month Work Location: In person

Posted 3 weeks ago

Apply

6.0 - 10.0 years

0 Lacs

Chennai

On-site

Job ID: 33758 Location: Chennai, IN Area of interest: Technology Job type: Regular Employee Work style: Office Working Opening date: 9 Jul 2025 Job Summary The role will be responsible for handling the Project Delivery for the Cards and Payment domain. Will be responsible for developing project plans, define project scope, tracking and monitoring the projects from inception to closure, must adhere to groups standards and controls for successful delivery. Ability to Identifying and managing risks, including developing contingency plans to mitigate potential issues. Knowledge on card issuing and transaction acquiring processing and standards. Knowledge on ISO8583 messaging standard protocols. Will be responsible for developing solutions, stake holder management, vendor and financial management, developing project costs, and delivering the developed solutions. Ability to Identifying and managing risks, including developing contingency plans to mitigate potential issues. Knowledge on card issuing and transaction acquiring processing and standards. Knowledge on ISO8583 messaging standard protocols. Hand on experience with VISA, MasterCard Card, UPI and other national card schemes Issuing & Acquiring, Scheme compliance requirement. Desirable to have knowledge on national schemes and processor integrations. Knowledge about API’s (SOAP, JSON, REST..ETC) and Web Service Integration. Knowledge about Back Office integration. Knowledge about HSM protocols and configuration, Knowledge about encryption Keys/Cryptography both symmetric and asymmetric keys, 3DES, AES, SM4, SHA. Key Responsibilities Familiarity with EMV technologies and standards, and PCI DSS and PA DSS standards. Familiarity with Contact and Contactless technologies, Familiarity with 3DS and Tokenization standards. Experience with an EFT transaction switching or on-line banking environment. Hands-on experience with automated test tools and simulators. Experience on Google Pay/Samsung Pay/Apple Pay Wallets and QR Code and Emerging payments will be an added Advantage. Strong design and programming knowledge on CICS, COBOL, JCL, VSAM, MVS Knowledge of end-to-end systems development life cycles (i.e., waterfall, Agile and other modern approaches to software development) Excellent verbal and written communication skills to technical and non-technical audiences of various levels in the organization Willingly shares relevant technical and/or industry knowledge and expertise to other resources Excellent problem-solving, team, and time management skills. Resourceful and proactive in gathering information and sharing ideas. Experience in banking or financial services industry. Working experience in Cloud and Digital transformation Skills and Experience Good knowledge skill on open banking is a plus. Ability to review the requirement, impact analysis, gap analysis, high level design, cost estimation, propose timeline, obtain project approval, and draft solution architecture/function spec/technical spec document. Be an excellent leader, Subject matter expert on the technical and functional knowledge Good team collaboration, relationships within & outside POD to all levels of the organization Strong influencing, conflict resolution & negotiation skills. Regulatory & Business Conduct Display exemplary conduct and live by the Group’s Values and Code of Conduct. Take personal responsibility for embedding the highest standards of ethics, including regulatory and business conduct, across Standard Chartered Bank. This includes understanding and ensuring compliance with, in letter and spirit, all applicable laws, regulations, guidelines and the Group Code of Conduct. Effectively and collaboratively identify, escalate, mitigate and resolve risk, conduct and compliance matters. Qualifications B TECH or BE or MBA grade in Computer Science/ Information Systems or related IT Area; 6 to 10 Years SKILLS AND COMPETENCIES Knowledge of Card Issuance/Management, Digital Channels interface, Encryption, HSM and ISO8583 messaging standards Familiarity with EMV Contact/Contactless, VISA and mastercard Card Issuing & Acquiring, Scheme compliance requirements Familiarity on PCI DSS and PA DSS compliance requirements Experience on Switch integration with VISA/Mastercard is mandatory. Others such as UPI, JCB and National switches. Experience on Google Pay/Samsung Pay/Apple Pay Wallets and QR Code and Emerging payments will be a added Advantage Experience in Web Service integration and API’s Knowledge of end-to-end systems development life cycles (i.e., waterfall, Agile and other modern approaches to software development) Excellent in preparing the Solution Architecture document, Functional and technical spec Excellent problem-solving, team, and time management skills. Experience in Programming Languages and other emerging technologies About Standard Chartered We're an international bank, nimble enough to act, big enough for impact. For more than 170 years, we've worked to make a positive difference for our clients, communities, and each other. We question the status quo, love a challenge and enjoy finding new opportunities to grow and do better than before. If you're looking for a career with purpose and you want to work for a bank making a difference, we want to hear from you. You can count on us to celebrate your unique talents and we can't wait to see the talents you can bring us. Our purpose, to drive commerce and prosperity through our unique diversity, together with our brand promise, to be here for good are achieved by how we each live our valued behaviours. When you work with us, you'll see how we value difference and advocate inclusion. Together we: Do the right thing and are assertive, challenge one another, and live with integrity, while putting the client at the heart of what we do Never settle, continuously striving to improve and innovate, keeping things simple and learning from doing well, and not so well Are better together, we can be ourselves, be inclusive, see more good in others, and work collectively to build for the long term What we offer In line with our Fair Pay Charter, we offer a competitive salary and benefits to support your mental, physical, financial and social wellbeing. Core bank funding for retirement savings, medical and life insurance, with flexible and voluntary benefits available in some locations. Time-off including annual leave, parental/maternity (20 weeks), sabbatical (12 months maximum) and volunteering leave (3 days), along with minimum global standards for annual and public holiday, which is combined to 30 days minimum. Flexible working options based around home and office locations, with flexible working patterns. Proactive wellbeing support through Unmind, a market-leading digital wellbeing platform, development courses for resilience and other human skills, global Employee Assistance Programme, sick leave, mental health first-aiders and all sorts of self-help toolkits A continuous learning culture to support your growth, with opportunities to reskill and upskill and access to physical, virtual and digital learning. Being part of an inclusive and values driven organisation, one that embraces and celebrates our unique diversity, across our teams, business functions and geographies - everyone feels respected and can realise their full potential. www.sc.com/careers

Posted 3 weeks ago

Apply

0 years

2 Lacs

Chennai

On-site

JOB DESCRIPTION: Job Overview: As a Junior Software Engineer Fresher in our Cyber Security division, you will embark on a learning journey in a fast-paced, challenging environment. You will work alongside seasoned professionals across the globe in the design, development, and testing of security solutions. This is an exciting opportunity to gain hands-on experience in the rapidly evolving futuristic world of cybersecurity, while contributing to the development of innovative software that addresses critical security threats. Key Responsibilities: Develop and implement security software solutions for enterprise-grade applications and systems. Work with fellow and senior engineers to design secure software architectures and troubleshoot vulnerabilities. Collaborate with the security operations team to identify, assess, and mitigate potential security risks. Assist in conducting security audits and vulnerability assessments to ensure compliance with security standards. Write clean, maintainable, and efficient code while adhering to best practices in cybersecurity. Stay up to date with the latest trends, threats, and technologies in the cybersecurity landscape. Engage in continuous learning through internal training and mentorship programs provided by the firm by robust professionals across the globe. Participate in the creation of security protocols, policies, and procedures to strengthen system defenses. Skills & Qualifications: Bachelor’s degree in Computer Science, Information Technology, or a related field, i.e BE, B Tech or any. Understanding of software development fundamentals and coding principles. Basic knowledge of common programming languages such as Java and Python. Familiarity with web security concepts, cryptography, and encryption protocols is a plus. Interest in cybersecurity and an eagerness to learn about security tools and methodologies. Good problem-solving skills and ability to troubleshoot software and security issues. Strong communication skills and the ability to work well in a team environment . Ability to quickly adapt to new technologies and tools. Must be based in or willing to relocate to CHENNAI. ADDITIONAL INFORMATION: At NAVAT, fraternity is a core principle, ensuring dignity and respect for all stakeholders. We foster unity, integrity, and a strong sense of brotherhood, creating an environment where discrimination—whether based on religion, race, caste, gender, or ethnicity —has no place. We also uphold a strict stance against hate speech. Built on a foundation of diversity, equity, and inclusivity, NAVAT is a dynamic, forward-thinking firm capable of thriving in global landscape. Job Type: Full-time Pay: From ₹270,000.00 per year Benefits: Leave encashment Paid time off Provident Fund Schedule: Day shift Ability to commute/relocate: Chennai, Tamil Nadu: Reliably commute or planning to relocate before starting work (Required) Education: Bachelor's (Preferred) Work Location: In person

Posted 3 weeks ago

Apply

3.0 - 8.0 years

10 - 15 Lacs

Mumbai, Thane

Work from Office

Job Description: We are seeking an experienced and highly skilled Penetration Tester with expertise in mobile application security, specifically for both Android and iOS platforms. As a Senior Penetration Tester, you will be responsible for identifying and exploiting vulnerabilities in mobile applications, networks, APIs, and other critical systems. Your primary responsibility will be performing thorough security assessments, including reverse engineering, malware analysis, and incident forensics, to ensure the security and resilience of mobile applications and systems. The ideal candidate should have hands-on experience with penetration testing tools, mobile application testing, and advanced exploitation techniques. You will also be expected to collaborate with various teams, including Red Teams, to develop strategic security initiatives and offer expert-level recommendations for security improvements. Key Responsibilities: Mobile Application Penetration Testing: Conduct in-depth security assessments of mobile applications for both Android and iOS platforms, identifying vulnerabilities and recommending remediation strategies. Red Team Activities: Participate in Red Team exercises to simulate real-world attacks, uncover hidden threats, and assess the effectiveness of security controls. Security Assessments: Perform penetration testing on applications, networks, mobile platforms, APIs, cloud environments, and critical systems to identify advanced threats and vulnerabilities. Custom Exploit Development: Develop custom exploit code and scripts to demonstrate potential security risks to stakeholders and stakeholders, providing hands-on demonstrations of vulnerabilities. Reverse Engineering & Malware Analysis: Use reverse engineering techniques and tools to analyze complex threats, malware, and incidents, providing detailed reports on findings. Collaboration with Leadership: Collaborate with executive leadership and senior management to develop and execute strategic security initiatives and roadmaps to mitigate security risks. Security Architecture Guidance: Provide expert-level guidance on secure coding practices, cryptography, architecture design principles, and implementation to mitigate risks effectively. Tool Development & Automation: Develop custom penetration testing tools and scripts to automate testing processes and enhance capabilities for thorough assessments. Incident Forensics: Lead efforts to analyze and investigate security incidents, determining the root causes and recommending improvements for better prevention. Required Skills and Qualifications: Mobile Pen Testing Expertise: Strong experience in mobile application penetration testing for both Android and iOS platforms. Penetration Testing Tools: Expertise in tools and frameworks such as Metasploit, Burp Suite, Nessus, NMAP, and custom/open-source tools. Red Teaming & Advanced Exploitation: Advanced proficiency in red teaming, black box testing, and using advanced exploitation techniques to identify vulnerabilities. Malware Analysis & Reverse Engineering: Experience in malware analysis and reverse engineering to assess complex threats and incidents. Cryptography & Secure Coding: In-depth knowledge of cryptography, secure coding practices, and secure architecture design principles. Custom Tools & Scripting: Hands-on experience in developing custom scripts and tools to automate testing processes and enhance the effectiveness of assessments. Penetration Testing Methodologies: Expertise in applying penetration testing methodologies, including both network and application-level security assessments. Certifications (Preferred): o OSCP (Offensive Security Certified Professional) o CRTP (Certified Red Team Professional) o eLearn Security Certified Professional Penetration Tester V2.0 o Any other relevant certifications are a plus. Required Experience: Overall Experience: 12+ years in penetration testing, security assessments, and threat analysis. Relevant Experience: 10 years of hands-on experience specifically in penetration testing for mobile applications (Android & iOS), network security, cloud environments, and APIs. Experience working in Red Team environments is a plus.

Posted 3 weeks ago

Apply

2.0 - 4.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Key Responsibilities: Develop and deploy smart contracts using Solidity on EVM chains. Work on DeFi projects, trading bots, and blockchain infrastructure. Integrate Python for blockchain tools and applications. Must-Have Skills: Blockchain development with DeFi and EVM chains. Smart contract development (Solidity). Experience with trading bots and Python. Good-to-Have: YAML, open-source contributions. Location- Remote, Delhi NCR, Bangalore, Chennai, Pune, Kolkata, Ahmedabad, Mumbai, Hyderabad Education- Bachelors degree in Computer Science, Engineering, or a related technical field.

Posted 3 weeks ago

Apply

80.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Your Journey at Crowe Starts Here: At Crowe, you can build a meaningful and rewarding career. With real flexibility to balance work with life moments, you’re trusted to deliver results and make an impact. We embrace you for who you are, care for your well-being, and nurture your career. Everyone has equitable access to opportunities for career growth and leadership. Over our 80-year history, delivering excellent service through innovation has been a core part of our DNA across our audit, tax, and consulting groups. That’s why we continuously invest in innovative ideas, such as AI-enabled insights and technology-powered solutions, to enhance our services. Join us at Crowe and embark on a career where you can help shape the future of our industry. Job Description: Job purpose : Senior Staff / Senior Consultant in the Crowe’s Third-Party Risk Management team to work on various TPRM projects for our customers / Clients across the globe. You will be responsible for delivering on accounts in accordance with Crowe’s quality guidelines & methodologies. You will need to execute and coordinate on accounts and relationships on a day-to-day basis for the firm. Establishing, strengthening, and nurturing relationships with Vendors, Clients and internally across service lines and proactively will also be a part of your day-to-day activities. You will assist in developing new methodologies and internal initiatives and help in creating a positive learning culture within the Organization. In line with Crowe’s commitment to quality, you’ll confirm that work is of the highest quality as per Crowe’s quality standards. What you'll do : Your client responsibilities : Assess cybersecurity controls, programs and strategies using our proprietary framework and industry frameworks. NIST Risk Management Framework and Assessment and Authorization enhancement, operations, and governance. Cybersecurity focused Supply Chain Risk Management and/or Third-Party Risk management operations, assessment, and enablement. Maintain relationships with client management to manage expectations of service, including work products, timing, and deliverables. Demonstrate a thorough understanding of complex information systems and apply it to client / Vendor situations. Plan & deliver on client / Vendor engagements. Provide regular status updates on the engagements and work products. Actively contribute to improving operational efficiency on projects & internal initiatives. Demonstrate industry expertise (deep understanding of the industry, emerging trends, issues/challenges, key players & leading practices). Maintain a strong client focus by effectively serving client needs and developing productive working relationships with client personnel. Drive high-quality work products within expected timeframes while ensuring stakeholders are kept informed about progress and expected outcomes. Your people responsibilities : Demonstrate teamwork, integrity, values, principles, and work ethic and lead by example. Driving the quality culture agenda at Crowe. Participating in the organization-wide people initiatives. Desired / Required skills : Relevant 4-7 years’ experience in Information security, vendor/ supplier/ third-party risk assessment. Industry certifications – ISO 27001 Lead Auditor, CISA, CISSP, CISM, CCSP, CTPRA and any cloud Certifications is an added advantage. Good knowledge on Privacy, Governance and reporting. Excellent written and verbal communication skills. Strong Auditing skills is desired. Strong problem solving and logical approach skills. Consistent display of technical proficiency. Ability to work under pressure with stringent deadlines and tough client conditions which may demand extended working hours. Willingness to travel, when required. Technical Skills : Expertise in cyber security including standards such as IS0 27001, PCI-DSS, IS0 22301, Privacy etc. Hands on experience in assessing Audit reports like SOC2 Type2 reports, Penetration testing reports, Vulnerability assessment reports, PCI DSS reports etc. Sound knowledge of technical domains such as network security, cloud security, application security, control testing, legal and compliance, data privacy, human resource related controls, supply chain, environmental security, cryptography. Knowledge of concepts such as vendor risk profiling, country risk assessment, outsourcing/ technology regulations exposure. Good knowledge of IT infrastructure. Knowledge of incident management, disaster recovery and business continuity management. Sound familiarity with Secure SDLC standards / frameworks. We expect the candidate to uphold Crowe’s values of Care, Trust, Courage, and Stewardship. These values define who we are. We expect all of our people to act ethically and with integrity at all times. Our Benefits: At Crowe, we know that great people are what makes a great firm. We value our people and offer employees a comprehensive benefits package. Learn more about what working at Crowe can mean for you! How You Can Grow: We will nurture your talent in an inclusive culture that values diversity. You will have the chance to meet on a consistent basis with your Career Coach that will guide you in your career goals and aspirations. Learn more about where talent can prosper! More about Crowe: C3 India Delivery Centre LLP formerly known as Crowe Howarth IT Services LLP is a wholly owned subsidiary of Crowe LLP (U.S.A.), a public accounting, consulting and technology firm with offices around the world. Crowe LLP is an independent member firm of Crowe Global, one of the largest global accounting networks in the world. The network consists of more than 200 independent accounting and advisory firms in more than 130 countries around the world. Crowe does not accept unsolicited candidates, referrals or resumes from any staffing agency, recruiting service, sourcing entity or any other third-party paid service at any time. Any referrals, resumes or candidates submitted to Crowe, or any employee or owner of Crowe without a pre-existing agreement signed by both parties covering the submission will be considered the property of Crowe, and free of charge.

Posted 3 weeks ago

Apply

0.0 years

0 Lacs

Chennai, Tamil Nadu

On-site

JOB DESCRIPTION: Job Overview: As a Junior Software Engineer Fresher in our Cyber Security division, you will embark on a learning journey in a fast-paced, challenging environment. You will work alongside seasoned professionals across the globe in the design, development, and testing of security solutions. This is an exciting opportunity to gain hands-on experience in the rapidly evolving futuristic world of cybersecurity, while contributing to the development of innovative software that addresses critical security threats. Key Responsibilities: Develop and implement security software solutions for enterprise-grade applications and systems. Work with fellow and senior engineers to design secure software architectures and troubleshoot vulnerabilities. Collaborate with the security operations team to identify, assess, and mitigate potential security risks. Assist in conducting security audits and vulnerability assessments to ensure compliance with security standards. Write clean, maintainable, and efficient code while adhering to best practices in cybersecurity. Stay up to date with the latest trends, threats, and technologies in the cybersecurity landscape. Engage in continuous learning through internal training and mentorship programs provided by the firm by robust professionals across the globe. Participate in the creation of security protocols, policies, and procedures to strengthen system defenses. Skills & Qualifications: Bachelor’s degree in Computer Science, Information Technology, or a related field, i.e BE, B Tech or any. Understanding of software development fundamentals and coding principles. Basic knowledge of common programming languages such as Java and Python. Familiarity with web security concepts, cryptography, and encryption protocols is a plus. Interest in cybersecurity and an eagerness to learn about security tools and methodologies. Good problem-solving skills and ability to troubleshoot software and security issues. Strong communication skills and the ability to work well in a team environment . Ability to quickly adapt to new technologies and tools. Must be based in or willing to relocate to CHENNAI. ADDITIONAL INFORMATION: At NAVAT, fraternity is a core principle, ensuring dignity and respect for all stakeholders. We foster unity, integrity, and a strong sense of brotherhood, creating an environment where discrimination—whether based on religion, race, caste, gender, or ethnicity —has no place. We also uphold a strict stance against hate speech. Built on a foundation of diversity, equity, and inclusivity, NAVAT is a dynamic, forward-thinking firm capable of thriving in global landscape. Job Type: Full-time Pay: From ₹270,000.00 per year Benefits: Leave encashment Paid time off Provident Fund Schedule: Day shift Ability to commute/relocate: Chennai, Tamil Nadu: Reliably commute or planning to relocate before starting work (Required) Education: Bachelor's (Preferred) Work Location: In person

Posted 3 weeks ago

Apply

25.0 years

0 Lacs

Itanagar, Arunachal Pradesh, India

On-site

The Company Dexcom Corporation (NASDAQ DXCM) is a pioneer and global leader in continuous glucose monitoring (CGM). Dexcom began as a small company with a big dream: To forever change how diabetes is managed. To unlock information and insights that drive better health outcomes. Here we are 25 years later, having pioneered an industry. And we're just getting started. We are broadening our vision beyond diabetes to empower people to take control of health. That means personalized, actionable insights aimed at solving important health challenges. To continue what we've started: Improving human health. We are driven by thousands of ambitious, passionate people worldwide who are willing to fight like warriors to earn the trust of our customers by listening, serving with integrity, thinking big, and being dependable. We've already changed millions of lives and we're ready to change millions more. Our future ambition is to become a leading consumer health technology company while continuing to develop solutions for serious health conditions. We'll get there by constantly reinventing unique biosensing-technology experiences. Though we've come a long way from our small company days, our dreams are bigger than ever. The opportunity to improve health on a global scale stands before us. Meet The Team Dexcom is a high-growth, fast-paced environment where you work with leading-edge, highly motivated cloud and cybersecurity teams to develop modern diabetes medical device systems. We’re seeking a highly skilled cloud systems engineer with a specialized focus on Google Cloud Platform (GCP) and PKI operations to help in deploying and operating our next generation of software for cloud-based services. You will work alongside highly skilled and passionate innovators who know how to deliver exceptional results while also having some fun along the way. For this role, you will be working as a Cloud Operations Engineer on our rapidly growing Dexcom PKI team, supporting the secure design, development, and deployment of our products and services. Experience with cloud architecture design, cloud implementation, and cloud operations is needed. As a member of the R&D Cybersecurity PKI team, you will be responsible for working with the various product development teams, the cloud dev/sec/ops team, product owners, and product managers to ensure that the PKI system is securely deployed, configured, and operated in the cloud. The ideal candidate is one who has experience with PKI, identity management, and key management solutions. Where You Come In Support designs and architectures for enterprise cloud-based systems in GCP, ensuring that changes are carefully planned and considered with respect to their interdependencies within our internal platform ecosystem. You deploy and support PKI, device identity management, and key management solutions with respect to Dexcom and commercial software and associated services. Support software building and delivering processes using CI/CD tools, especially with respect to automation of release documentation, build traceability, and artifact promotion. You support production system observability, maintenance, operations, and troubleshooting. Participate in an on-call rotation to respond to service outages, performance degradation, and diagnose complex issues under pressure to restore systems and minimize impact. You collaborate with stakeholders and development teams to integrate capabilities into the overall system architecture, considering both technical and operational aspects, and align delivery plans with overall project timelines and milestones. You work with other engineering and QA teams to support system testing, system integration, and system deployment in a production capacity. You provide cloud training to other team members. What Makes You Successful Experience with the CI/CD process and GitHub actions Experience with common scripting languages such as Bash, Python, etc. Experience with automating routine operational work. Experience with cloud development and containerized Docker applications Experience with GKE and other cloud services Experience with Datadog, especially creating monitors, installation and configuration on GKE, and visualization through dashboards. Hands-on experience of developing and deploying a cloud-based system via the CI/CD pipeline and cloud-native tools such as Helm, Crossplane, and ArgoCD. 2+ years of GCP and other cloud platforms. Demonstrate cloud security expertise in interactions related to both cloud system engineering and implementation. Additionally, it is strongly preferred to have: Good knowledge of PKI fundamentals and best practices Good understanding of cryptography, including the principles related to PKI, private keys, encryption methods, and digital signing algorithms. What You’ll Get A front row seat to life changing CGM technology. Learn about our brave #dexcomwarriors community . A full and comprehensive benefits program. Growth opportunities on a global scale. Access to career development through in-house learning programs and/or qualified tuition reimbursement. An exciting and innovative, industry-leading organization committed to our employees, customers, and the communities we serve. Travel Required 0-5% Experience And Education Requirements Typically requires a Bachelor’s degree in a technical discipline, and a minimum of 5-8 years related experience or Master’s degree and 2-5 years equivalent industry experience or a PhD and 0-2 years experience. To all Staffing and Recruiting Agencies: Our Careers Site is only for individuals seeking a job at Dexcom. Only authorized staffing and recruiting agencies may use this site or to submit profiles, applications or resumes on specific requisitions. Dexcom does not accept unsolicited resumes or applications from agencies. Please do not forward resumes to the Talent Acquisition team, Dexcom employees or any other company location. Dexcom is not responsible for any fees related to unsolicited resumes/applications.

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies