Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 8.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Third-Party Risk as a Service (TPRaaS) – Senior As part of our EY- NFS TPRM team, you will help clients enhance their business performance by translating their strategies into realities. Working with EY-high performing teams, you will help clients to grow, innovate, protect, and optimize their business performance. The opportunity We’re looking for Seniors with expertise in Third-Party Risk Management to join the leadership group of our TPRaaS team . It is a fantastic opportunity to be part of a leading firm while being instrumental in the growth of a new service offering. Your Key Responsibilities Lead and work closely with the manager in the delivery of Third-Party Risk Management (TPRM) engagements. Assist / Mentor team members in vendor calls / client interactions by providing delivery updates. Perform Quality Checks on work products before delivering it to the end clients. Follow policies and procedures that support the successful implementation of TPRM operating models. Facilitate process walkthrough discussions to document end-to-end business processes and functional requirements. Assess the application of legal and regulatory requirements to clients TPRM practices. Lead/Participate in technology enhancement requirements such as Automation, Data Analytics, AI to support TPRM processes. Assist in the selection and tailoring of approaches, methods, and tools to support service offering or industry projects. Build and nurture positive working relationships with clients to achieve exceptional client service. Contribute to Identifying opportunities to improve engagement profitability. Assist leadership in driving business development initiatives and account management. Participate in building strong internal relationships within GMS Services and with other services across the organization. Skills And Attributes For Success Maintain an educational program to develop personal skills continually. Constantly upskilling as per market trends. Understand and follow workplace policies and procedures. Exhibit initiative and participate in corporate social and team events. To qualify for the role, you must have 4 to 8 years of demonstrated experience with Risk Management across the Third-Party engagement lifecycle (pre-contracting, contracting, and post contracting) and an understanding of the associated organizational infrastructure (e.g., relevant internal controls, business processes, governance structures). Strong understanding of the TPRM framework, Risk Management, Information Security practices. Demonstrate a good understanding of the Contract Risk Review management process. Hands-on exposure to TPRM tools and technology solutions (e.g., GRC enablement solutions, such as Process Unity, Prevalent, Archer, ServiceNow, etc.). Demonstrated knowledge of standards such as ISO 27001/2, ISO 22301, ISO 27018, PCI – DSS, HITRUST, etc. Good knowledge of privacy regulations such as GDPR, CCPA, etc. Good knowledge of regulations such as FISMA, HIPAA, Reg SCI, MAS, etc. Good knowledge of TCP/IP, concepts of OSI layer and protocols, networking and security concepts, Physical & Environmental Security, Asset Security and Identity & Access Management. Good knowledge of OS (Windows / Linux) security, Database security, IT infrastructure (switches, routers, firewalls, IDS, IPS, etc.), Security architecture design, and review. Good familiarity with OWASP, and Secure SDLC standards/frameworks, anti-virus solutions (e.g., Symantec, McAfee, etc.). Good experience in LAN/WAN architectures and reviews. Good knowledge of incident management, disaster recovery, and business continuity management, cryptography. Good to have prior Big-4 experience. Good to have certifications - CISSP, CISA, CISM, CTPRP, CIPP, ISO 27001 Lead Auditor or Lead Implementer Ideally, you’ll also have Project Management skills. Exposure to tools like ProcessUnity, ServiceNow, Archer. What We Look For A Team of people with enthusiasm to develop new skills and knowledge and experience to succeed and inquisitiveness to learn new things in this fast-moving environment. Actively tracks and communicates engagement performance and planning to EY engagement management, ensuring project milestones remain on track and are completed timely. Actively mentors and trains team members on Third-Party Risk Management processes, governance, and frameworks. Works cross-functionally with team members to support and drive a collaborative team environment. Creates and design effective presentations as a means for communicating project and deliverable progress to clients. Performs sophisticated data analyses to understand client s business and identify risk Executes advanced services and supervise staff in delivering essential services. Understands client s business environment and basic risk management approaches Actively participates in decision making with engagement management and seek to understand the broader impact of current decisions. Actively contributes to improving operational efficiency on projects & internal initiatives. What Working At EY Offers At EY, we’re dedicated to helping our clients, from the startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is on education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your progress with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching, and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
0.0 - 12.0 years
0 Lacs
Delhi, Delhi
On-site
New Delhi,Delhi,India +1 more Job ID 765706 Our Exciting Opportunity: We are now looking for a Product Architect in our Encryption tools area in Ericsson IT. You will lead the Product Lifecycle together with the IT product Owner, with alignment with the product portfolio strategy and plan., together with Ericsson Business units you will collect and maintain requirements. Other parts of your role; will be safeguarding and governing the product Total Cost of Ownership, (TCO) solution design, integrations and architecture in adherence to overarching principles and frameworks. You will: Define product strategy, roadmap and optimize product TCO Prepare product decisions and initiate execution of product development Safeguard the product design, integrations and architecture Document and maintain product information To be successful in the role you must have: Knowledge on encryption toolsets such as Key Management Systems - KMS, Public Key Infrastructure – PKI, Certificate LifeCycle Management- CLM, Strong Authentication. Experience in IT design, development, and architecture as well as in Product Management Full understanding of cryptography and its protocols like X.509 standard, PKI, RSA, AES, SHA, SSL/TLS and general certificate management pcesses. Strong understanding of User certificates for implementations like Citrix FAS, Certificate based authentication fulfilling MFA requirements. Strong understanding PKI and Certification Authority (CA). Solid & broad understanding of Cyber Security, Zero Trust & Passwordless Solid understanding of Active Directory together with Legacy & modern modes of Authentication. Strong understanding Public Key Cryptography Standards (PKCS5, PKCS7, PKCS11, PKCS12, PKCS15). Strong understanding of HSM (Entrust), Smart cards, OpenSSL. Good knowledge of Encryption Algorithms (RSA, DSA, ECDSA, DH, AES, DES, 3DES, Blowfish, CAST5, RC4, RC5, SHA1, SHA2, MD5, ECDH). Strong Understanding of protocols like CMP, CRL, OCSP, SCEP, LDAP, PGP, ACME, FIDO2 Working knowledge of any certificate lifecycle manager, Cloud PKI. Working knowledge of certificates for Blockchain, certificate for IoT Devices, code-signing. IT processes, tools and infrastructure knowledge Negotiation and argumentation Skills Knowledge sharing and collaboration skills Key Qualifications: Education: Bachelor’s degree or equivalent Minimum of experience: 12 years Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply?
Posted 1 month ago
2.0 - 7.0 years
5 - 8 Lacs
Gurugram
Work from Office
Seeking an experienced Cryptocurrency Launch Specialist to spearhead the creation and launch of our blockchain-based token. experience in tokenomics, and crypto exchange listing, understanding of blockchain technology and DeFi trends. Required Candidate profile Proven experience in launching at least one crypto token or NFT project Deep knowledge of blockchain protocols (Ethereum, BSC, Solana, Polygon, etc. send resume at vikas@capitalplacementservices.com
Posted 1 month ago
6.0 - 8.0 years
12 - 16 Lacs
Pune, Ahmedabad
Work from Office
Good hands on towards design, development maintenance of secure software solutions for Linux-based systems on embedded and automotive systems also security controls e.g (Secure Boot, secure unlock, secure reprogramming, message authentication) Good understanding on configuration of AppArmor profiles to enforce security policies and mitigate risks in Linux environments. Hands on towards development and integration of Trusted Execution Environment (TEE) solutions Good knowledge of development and implementation in Cryptography and Key Management. Experience in working with Client Product teams and collaboration with hardware and software team members. Incorporate secure coding standards and practices in DevSecOps, conduct security assessment and code reviews, enforce Static Application Security Testing (SAST), Open Source SW vulnerability scanning and license analysis to ensure SW security. Collect, generate, maintain and update SW bill of materials and contribute to GIT repositories Participate in PI planning, provide effort estimation to implement security controls and contribute to the Feature Roll Out Plan (FROP)
Posted 1 month ago
8.0 - 13.0 years
8 - 12 Lacs
Hyderabad
Work from Office
We are seeking a Senior Cyber Security Consultant with extensive experience in enterprise IT security, risk management, and cloud-based security solutions. The ideal candidate will have a deep understanding of managing cyber security risks during digital transformations and will be responsible for leading hands-on engagements and delivering results that address critical security concerns. This role involves working closely with both technical and business teams to identify and mitigate risks in complex environments. Key Responsibilities Leadership in Execution & DeliveryLead hands-on engagements, managing the development of deliverables from start to finish. Work with teams to analyze requirements and produce prioritized results aligned with client needs and risk profiles. Expert Cyber Security AdvisoryProvide expert advice on best practices for managing cyber security risks during digital transformation, including adoption of cloud, DevOps, containerization, microservices, and zero trust frameworks. Security Reviews & AssessmentsConduct security reviews and maturity assessments across technology and business teams to identify and address cyber risks. Provide clear, organized findings and actionable recommendations for risk mitigation. Trusted Engineer for ClientsAct as a trusted advisor and security engineer for customers' engineering teams, ensuring that security is integrated into every phase of digital transformation. Risk and Vulnerability AnalysisAssess and implement security measures to safeguard IT environments. Identify vulnerabilities, focusing on security protocols, cryptography, authentication, authorization, and performance. Security ImplementationLead the implementation of security solutions, including multi-factor authentication (MFA), single sign-on (SSO), identity management, and related technologies. Client Interaction & CommunicationEffectively communicate security measures and solutions to a broad audience, including both technical and executive teams. Manage client expectations with clear, concise verbal and written communication. Continuous Learning & InnovationStay updated with the latest security protocols, vulnerabilities, and best practices to ensure the adoption of the most effective security controls and technologies. Security MaturityWork with clients to evaluate and improve their security maturity, providing insights into the current cyber threat landscape. Minimum Qualifications 8+ years of total IT experience. 5+ years of consulting experience in enterprise security environments. Expertise in information security, IT risk management, and performance reliability. Solid understanding of security protocols, cryptography, and authentication technologies. Experience in implementing multi-factor authentication, SSO, and identity management. Ability to explain and enforce security measures to a broad range of stakeholders. Excellent verbal and written communication skills. Degree in Information Technology, Computer Science, or related fields. Preferred Qualifications Google Cloud Security Engineer certification. Strong knowledge of infrastructure, OS, application vulnerabilities, security architecture, and controls. 5+ years of experience with cloud computing security concepts and solutions. Security-related certifications such as CISSP, CISM, or GCIH.
Posted 1 month ago
5.0 - 10.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Whole stack performance analysis to optimize Java security applications through benchmarking, tracing, profiling and debugging for inefficiencies and bottlenecks Develop and support one or more of several components that provide Security within the IBM Semeru Runtime for Java via cryptographic related capabilities Become a subject matter expert both inside and outside of IBM to help thousands of IBM products and their many customers provide Secure transactions Work with a small team of experts in the field to develop these components and collaborate with other experts in the field in other developments groups and IBM research around the world Stay ahead of the latest development tools, technologies, and methodologies to stay up to date with these evolving technologies and new threats Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Strong background in software development, demonstrating expertise in Java and C++ programming languages with minimum 5+ years of experience Strong understanding of program execution stack for whole stack performance analysis and problem determination A self-starter with a proactive mindset, able to initiate and drive projects independently. Ability to work seamlessly as part of a team, contributing to collective goals and fostering a collaborative work environment. Knowledge and interest in Java Security framework development and performance. Preferred technical and professional experience Experience in Cryptography, TLS, FIPS and Java security framework Experience in understanding security vulnerabilities and implementing the resolutions Understanding of the Agile development process Excellent communication skills and proven ability in influencing open-source community developers, academic and industry partners
Posted 1 month ago
4.0 - 9.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Crypto Express Adapter on z Systems allows companies to protect data and workloads from physical and logical attacks through cryptography. Cryptography is crucial for secure processing when applications must communicate with distributed elements or assess the validity of the data being processed. Candidate will be part of world class high-performance hardware security module (HSM) firmware team. The responsibility of the firmware team is to provide top-level security for processing and high-speed cryptographic offload We are Firmware professional working on Z systems ( IBM Advanced Mainframes ) and we build the most secure systems for our customers to deploy their enterprise applications. IBM z Systems are deployed with workloads where intensive IO Operations are getting executed. IBM Lab works on IO enablement firmware as well as boot firmware for z Servers. Work area would be Initial program load that is Boot firmware which enables the z Systems to boot and load supported Operating systems( Linux, zOS, zVM ) on Logical partitions. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 4+ years of relevant Industry experience Very strong in C and data structures, preferably in developing multi-core or multi-threaded applications. Deep knowledge of Linux kernel internals (process scheduler, memory management, concurrency/synchronization, memory allocation, file systems) and profiling. Experience in device driver development and support for NIC, HBA or Graphics cards Understanding of riscv / arm architecture and micro architecture features likes Caches, MMU, SMP, coherency Strong debugging skills Experience with exercising/validation of system from user space, and knowledge of user space API Preferred technical and professional experience Cryptography knowledge or working experience
Posted 1 month ago
4.0 - 5.0 years
8 - 12 Lacs
Mumbai
Work from Office
Responsible for development of new features and fixing defects. Responsible to Perform core technical aspects of software development for assigned applications including, developing prototypes and writing new code Responsible for API Connect, DataPower, configuring API Proxy, JWT, and basic Auth Strong written, oral communication skills and able to manage user / vendor / customer Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise B.Tech / B.E/ MCA / MSc IT with Minimum 4-5 years of experience Candidate with hands on experience with API Connect, DataPower, configuring API Proxy, JWT, and basic Auth Understanding of Rest/SOAP apis. Strong knowledge on xslt/gateway script. Experience with xpath, Http status code, GET/POST methods, CRUD operations Preferred technical and professional experience Ability to test and troubleshoot issue in any environment. Knowledge of cryptography and OAuth. Knowledge of networking concepts
Posted 1 month ago
0 years
0 Lacs
Kochi, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Qualifications Minimum ten years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Qualifications Minimum ten years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
6.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Introduction IBM Security Verify is placed in Gartner Leadership Quadrant as a cloud-based Identity and Access Management (IAM) solution that helps organizations manage user identities and access to applications and resources. It provides features like multi-factor authentication, single sign-on, risk-based authentication, and adaptive access as well as user lifecycle journeys along with associated governance, aiming to protect customer, workforce, and privileged identities. The solution also offers identity analytics to provide insights into user behaviour and potential risks. Your Role And Responsibilities Design, develop, and maintain, reusable React-based UI features and components integrated with backend APIs in a cloud-native environment. Design, iterate, and refine UI and UX concepts for our products Collaborate closely with cross-functional teams including product, design, DevOps, and QA. Contribute to architecture discussions and recommend technical improvements. Translate designs and wireframes into high quality code. Implement and maintain test automation to ensure product reliability. Troubleshoot and resolve production issues in collaboration with other engineers. Actively participate in Agile ceremonies (daily stand-ups, sprint planning, retrospectives) and contribute to continuous improvement. Mentor junior developers and provide code reviews to ensure best practices. Preferred Education Master's Degree Required Technical And Professional Expertise 6+ years of hands-on experience in designing and developing cloud-based frontend components for enterprise applications. Proficient in front-end technologies such as React, Typescript, JavaScript (ES6+), HTML5, and CSS3 for building responsive user interfaces. Knowledge of modern authorization mechanisms, such as JSON Web Token Experience in building and deploying full stack solutions on AWS or RedHat OpenShift (OCP/ROSA). Good knowledge of CI/CD pipelines (e.g., GitHub Actions, Jenkins), and experience with version control systems like Git. Understanding of monitoring/logging tools such as Grafana, ELK Stack, or Instana. Experience writing and maintaining automated tests using tools like JUnit, Selenium, Cucumber, SonarQube, and familiarity with frontend testing tools (e.g., Jest). Exposure to containerization (Docker) and basic Kubernetes deployment workflows. Understanding of Agile methodologies, including participation in daily stand-ups, sprint planning, and retrospectives. Effective team collaboration and communication skills. Preferred Technical And Professional Experience Experience in implementing or designing microservices, micro-frontend and reusable frontend components. Familiarity with design systems (e.g., Carbon Design, Material UI). Awareness of accessibility standards like WCAG or Section 508. Exposure to security practices, including privacy by design, secure coding, or basic cryptography as well as cryptographic algorithms, protocols (e.g., TLS, FIPS), and Java security frameworks. Experience with Shell scripting or Node.js is a plus. Understanding of basic DevSecOps practices or interest in expanding security expertise. Ability to create pixel-perfect visual elements including icons, UI themes, color palettes, etc., for different devices & screen resolutions – browsers, desktop, iPad Experience in mobile app development and design. Show more Show less
Posted 1 month ago
6.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Introduction IBM Security Verify is placed in Gartner Leadership Quadrant as a cloud-based Identity and Access Management (IAM) solution that helps organizations manage user identities and access to applications and resources. It provides features like multi-factor authentication, single sign-on, risk-based authentication, and adaptive access as well as user lifecycle journeys along with associated governance, aiming to protect customer, workforce, and privileged identities. The solution also offers identity analytics to provide insights into user behaviour and potential risks. Your Role And Responsibilities Take ownership of end-to-end development of full-stack features across the application lifecycle. Develop modern, reusable React-based UI components integrated with backend APIs. Design, implement, and maintain scalable REST APIs using Java or GoLang. Collaborate closely with cross-functional teams including product, design, DevOps, and QA. Contribute to architecture discussions and recommend technical improvements. Implement and maintain test automation to ensure product reliability. Troubleshoot and resolve production issues in collaboration with other engineers. Actively participate in Agile ceremonies (daily stand-ups, sprint planning, retrospectives) and contribute to continuous improvement. Mentor junior developers and provide code reviews to ensure best practices. Preferred Education Master's Degree Required Technical And Professional Expertise 6+ years of hands-on experience in designing and developing cloud-based enterprise applications with both frontend and backend components. Proficient in front-end technologies such as React, JavaScript (ES6+), HTML5, and CSS3 for building responsive user interfaces. Backend development experience using Java and GoLang, with understanding of RESTful service integration and API consumption. Hands-on experience with Postgres or similar databases including data modeling and query optimization. Experience in building and deploying full stack solutions on AWS or RedHat OpenShift (OCP/ROSA). Good knowledge of CI/CD pipelines (e.g., GitHub Actions, Jenkins), and experience with version control systems like Git. Understanding of to monitoring/logging tools such as Grafana, ELK Stack, or Instana. Experience writing and maintaining automated tests using tools like JUnit, Selenium, SonarQube, and familiarity with frontend testing tools (e.g., Jest). Exposure to containerization (Docker) and basic Kubernetes deployment workflows. Understanding of Agile methodologies, including participation in daily stand-ups, sprint planning, and retrospectives. Effective team collaboration and communication skills. Experience with Shell scripting and basic Node.js utilities would be added advantage Preferred Technical And Professional Experience Experience in implementing or designing microservices and reusable backend components. Familiarity with design systems (e.g., Carbon Design, Material UI). Awareness of accessibility standards like WCAG or Section 508. Exposure to security practices, including privacy by design, secure coding, or basic cryptography as well as cryptographic algorithms, protocols (e.g., TLS, FIPS), and Java security frameworks. Experience with Shell scripting or Node.js is a plus. Understanding of basic DevSecOps practices or interest in expanding security expertise. Show more Show less
Posted 1 month ago
4.0 - 7.0 years
2 - 7 Lacs
Hyderabad, Chennai, Bengaluru
Work from Office
Role & responsibilities Detailed JD (Roles and Responsibilities) Public Key Infrastructure (PKI) Mandatory skills Public Key Infrastructure (PKI) Basic understanding of certificate-based authentication principles, including the use of digital certificates, private/public key pairs, and smart card technology. Familiarity with the process of validating user identity using certificates and the role of certificate authorities (CAs). Experience troubleshooting hardware (E.g., card readers) and software issues on Windows and/or Mac laptops. Familiar with Cryptographic concepts (E.g.,- symmetric/Asymmetric encryption, digital signatures). Good experience on technologies like (E.g., - MS ADCS, OpenSSL, Venafi),external vendors (GoDaddy, DigiCert etc..) Extensive knowledge on SSL/TLS ,OCSP ,AIA,CDP concepts. Good to have scripting or automation (PowerShell) experience. Types of signing the certificate (Secure email, document signing, code signing, excel signing). Manage the lifecycle of digital certificates, including issuance, revocation, renewal. Good understanding of HSM(Hardware Security Module). CRL Renewal process /CRL and delta CRL concepts. Configure and maintain NDES(Network Device Enrollment Services) to support certificate enrollment for mobile devices /Intune/mas360,Troubleshooting NDES related issues. Manage root and issuing CA key ceremonies. PKI architecture ,CP(Certificate policies ) ,CPS(certificate Practice Statement) documents. Good knowledge on wild card certificates. Additional skills in PCI DSS(payment card industry data security standard) Good understanding of HSM in PCI DSS Knowledge on Types of Tokenization (Token generation, Token storage, Token retrieval) Review and validate software requests and tickets. Strong problem-solving skills and attention to detail. Excellent interpersonal and communication skills, both written and verbal. Ability to explain technical concepts to non-technical users in a clear and patient manner. Experience with help desk or ticketing systems is a plus. Prior experience in IT support, desktop support, or a similar technical support role preferred
Posted 1 month ago
8.0 - 10.0 years
0 Lacs
Bengaluru
On-site
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Join the innovative team at Kyndryl as a Client Technical Solutioner and unlock your potential to shape the future of technology solutions. As a key player in our organization, you will embark on an exciting journey where you get to work closely with customers, understand their unique challenges, and provide them with cutting-edge technical solutions and services. Picture yourself as a trusted advisor – collaborating directly with customers to unravel their business needs, pain points, and technical requirements. Your expertise and deep understanding of our solutions will empower you to craft tailored solutions that address their specific challenges and drive their success. Your role as a Client Technical Solutioner is pivotal in developing domain-specific solutions for our cutting-edge services and offerings. You will be at the forefront of crafting tailored domain solutions and cost cases for both simple and complex, long-term opportunities, demonstrating we meet our customers' requirements while helping them overcome their business challenges. At Kyndryl, we believe in the power of collaboration and your expertise will be essential in supporting our Technical Solutioning and Solutioning Managers during customer technology and business discussions, even at the highest levels of Business/IT Director/LOB. You will have the chance to demonstrate the value of our solutions and products, effectively communicating their business and technical benefits to decision makers and customers. In this role, you will thrive as you create innovative technical solutions that align with industry trends and exceed customer expectations. Your ability to collaborate seamlessly with internal stakeholders will enable you to gather the necessary documents and technical insights to deliver compelling bid submissions. Not only will you define winning cost models for deals, but you will also lead these deals to profitability, ensuring the ultimate success of both our customers and Kyndryl. You will play an essential role in contract negotiations, up to the point of signature, and facilitate a smooth engagement hand-over process. As the primary source of engagement management and solution design within your technical domain, you will compile, refine, and take ownership of final solution documents. Your technical expertise will shine through as you present these documents in a professional and concise manner, showcasing your mastery of the subject matter. You’ll have the opportunity to contribute to the growth and success of Kyndryl by standardizing our go-to-market pitches across various industries. By creating differentiated propositions that align with market requirements, you will position Kyndryl as a leader in the industry, opening new avenues of success for our customers and our organization. Join us as a Client Technical Solutioner at Kyndryl and unleash your potential to shape the future of technical solutions while enjoying a stimulating and rewarding career journey filled with innovation, collaboration, and growth. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others Required Skills and Experience Amazon/Azure Cloud Services : Experience and knowledge of Private Cloud environments and solutions on Vmware VCF/Vsphere, Nutanix, KVM, Openshift etc. Deep architectural and solutioning knowledge with AWS/Azure services whether IaaS, PaaS or Cloud Native services, Kubernetes and microservices. Landing zone architectures, Public Cloud Network and Security capabilities/services across AWS, GCP, Azure. AWS/Azure Architectural framework for applications, resiliency/disaster recovery, Kubernetes services and other PaaS Services for Cloud native applications etc. Kubernetes services for application modernization and microservices and containers Experience architecting solutions within Amazon Web Services (AWS), Azure, VMware & Hybrid cloud environment, AWS Outpost etc. Cloud CLI, APIs, CloudFormation templates and Management Console, Cloud Watch, Azure Monitor, Monitoring & Logging, Cloud Optimization, Cloud native Security Services Cloud Build Services, Cloud Migration (CSP to CSP, On-prem to CSP), Cloud Managed Services Competitive understanding of services from CSPs and costing · Multi-Cloud Managed Services, Cloud native services for Cloud operations and management. Modern Cloud operations using AI/ML framework, AIOps, Observability and analytics. Service level agreements, Key Performance indicators for Cloud Services, Cloud managed services. Application Services on Cloud : Architect Cloud native applications on AWS/Azure cloud services, microservices, containerization on Kubernetes, DevOps and CI/CD pipelines Understanding of industry specific architectures on Cloud, Cloud native resiliency for platforms and applications SAP / Oracle ERP Services on AWS/Azure Cloud · Data lake, Data Analytics, Data Management solutions on AWS/Azure Cloud, Data warehousing and Big data processing Experience with assessment, development, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes for Cloud native apps, data protection, cryptography, key management, identity and access management (IAM), API security, Key management) within SaaS, IaaS, PaaS, and other cloud environments Review technology designs with technology architects and engineers, taking local and regional regulatory requirements into account Professional Skills Lead and Contribute to the design, development and implementation of winning technical solutions for customers to introduce and establish new technology solutions into their business and business processes. Should have experience in writing proposals, responding to RFPs, RFIs and quality client presentations. Work closely with OEMs and partners to support the development of winning solutions at optimum cost. Teaming & Collaboration with Sales and bid-management teams. Other Required Skills: Network and relationships among in the external environment among strategic partner organizations. Strong technical and analytical capabilities and understanding of complexities of large IT environments Excellent oral and written communication and presentation skills required in English. A self-starter who is customer focused with high energy level and positive disposition Ability to execute performance through self-motivation and with minimum supervision. Proven ability to initiate action, and complete challenging assignments. Ability to multi-task and exhibit a high level of enthusiasm, common sense, initiative, collaboration, and creativity. Ability to exercise authority appropriately and effectively. Basic Qualifications: Formal College Level education with Major in Engineering. and proven experience of solution design in Multi Cloud Services & Hybrid Cloud Services. Advanced/Professional/Expert certifications from AWS/Azure/GCP etc. Desirable experience of 8-10 years with proven skills and capabilities and experience for 5-6 years on Cloud Services Knowledge of Processes like Technical Assurance/Delivery Assurance, Quality Assurance, Costing, etc. will be an added advantage. Prior experience of working in a matrix organization Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 1 month ago
2.0 - 6.0 years
3 - 5 Lacs
Bengaluru
On-site
Cloud Automation Test Engineer This role has been designed as ‘’Onsite’ with an expectation that you will primarily work from an HPE office. Who We Are: Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in today’s complex world. Our culture thrives on finding new and better ways to accelerate what’s next. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE. Job Description: Aruba is an HPE Company, and a leading provider of next-generation network access solutions for the mobile enterprise. Helping some of the largest companies in the world modernize their networks to meet the demands of a digital future, Aruba is redefining the “Intelligent Edge” – and creating new customer experiences across intelligent spaces and digital workspaces. Join us redefine what’s next for you. What you’ll do: Design and execute complex penetration tests against cloud-native applications, infrastructure, and data stores. Exploit vulnerabilities in cloud platforms, such as AWS, Azure, and GCP, using advanced techniques and tools. Assess the security posture of cloud-native applications, microservices, and serverless architectures. Develop and execute attack scenarios that simulate real-world threats, including supply chain attacks, privilege escalation, and lateral movement. Lead and mentor a team of experienced penetration testers, providing guidance and support on advanced techniques and tools. Assign tasks, review deliverables, and ensure project timelines are met. Develop and maintain standard operating procedures for complex penetration testing activities. Must have B.E / B.Tech / M.Tech / MCA in Computer Science or Information Technology Must have a minimum of 2 to 6 years penetration testing, with a strong focus on cloud environments. In-depth understanding of cloud technologies (AWS, Azure, GCP) and their security implications. Proficiency in advanced penetration testing tools and techniques, such as Burp ,ZAP,Metasploit, Cobalt Strike, and PowerSploit. Experience with container technologies (Docker, Kubernetes) and serverless architectures. Strong scripting skills (Python, PowerShell) for automation and custom tool development. Experience with security orchestration, automation, and response (SOAR) platforms. Active security certifications such as OSCP, CSSLP or related is strongly desired . Ability to work well under minimal supervision. Requires strong interpersonal, organizational, written and verbal communication skills. What you need to bring: 4-8 years’ ofexperience Experience with threat hunting, red team assessments and intelligence gathering techniques. Knowledge of emerging security threats and vulnerabilities. Experience with cloud-native security controls and best practices. Strong understanding of cryptography and network protocols. Ability to think critically and creatively to identify and exploit vulnerabilities Additional Skills: Cloud Architectures, Cross Domain Knowledge, Design Thinking, Development Fundamentals, DevOps, Distributed Computing, Microservices Fluency, Full Stack Development, Release Management, Security-First Mindset, User Experience (UX) What We Can Offer You: Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have — whether you want to become a knowledge expert in your field or apply your skills to another division. Unconditional Inclusion We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Let's Stay Connected: Follow @HPECareers on Instagram to see the latest on people, culture and tech at HPE. #india #aruba Job: Engineering Job Level: TCP_03 HPE is an Equal Employment Opportunity/ Veterans/Disabled/LGBT employer. We do not discriminate on the basis of race, gender, or any other protected category, and all decisions we make are made on the basis of qualifications, merit, and business need. Our goal is to be one global team that is representative of our customers, in an inclusive environment where we can continue to innovate and grow together. Please click here: Equal Employment Opportunity. Hewlett Packard Enterprise is EEO Protected Veteran/ Individual with Disabilities. HPE will comply with all applicable laws related to employer use of arrest and conviction records, including laws requiring employers to consider for employment qualified applicants with criminal histories.
Posted 1 month ago
1.0 - 3.0 years
0 - 0 Lacs
Chennai
On-site
Blockchain Developer – Chennai location - Immediate Joiner Key Responsibilities & Requirements Design Blockchain Systems – Architect secure and scalable blockchain solutions, including smart contracts and consensus mechanisms. Smart Contract Development – Build and deploy smart contracts using Solidity, Python, or similar languages. Develop dApps – Create intuitive decentralized applications that integrate with blockchain networks. Security & Auditing – Apply cryptographic methods and perform audits to secure blockchain infrastructure. Cross-Functional Collaboration – Coordinate with front-end, back-end teams, and stakeholders for seamless integration. Testing & Debugging – Execute rigorous testing and resolve issues to maintain performance and compliance. System Optimization – Continuously enhance blockchain performance and scalability. Platform Maintenance – Monitor and update blockchain applications post-deployment. R&D – Stay current with emerging blockchain technologies and trends. Technical Skills – Proficient in Solidity, Python, Java; familiar with Ethereum, Hyperledger, APIs, and frameworks. Education & Experience – Bachelor’s degree in CS/Engineering with 1–3 years of blockchain development experience. Bonus – Cryptography expertise, certified blockchain credentials (e.g., CBD), and strong communication/project skills. Job Type: Full-time Pay: ₹20,000.00 - ₹50,000.00 per month Schedule: Day shift Application Question(s): Are you available to Join within 7 days? Work Location: In person Expected Start Date: 11/06/2025
Posted 1 month ago
8.0 years
6 - 10 Lacs
Calcutta
On-site
Overview Job Description: The Software Security Architect 4 plays a critical role in safeguarding the company's products and services by ensuring secure design rigorous testing and proactive vulnerability management. This position will work closely to promote secure coding practices and identify potential risks. Responsibilities: Define and implement education programs that ensure software and test engineers understand secure software development practices and how to identify insecure code. Regularly monitor the effectiveness of these programs and update as needed. Review software designs and test plans on the company's software to ensure they meet established security standards. Maintain threat models for all company products and services ensuring they are current and comprehensive. Lead the definition and review of security controls in products and services to align with the latest threat models. Develop review and maintain up-to-date documentation on all security controls used across company products and services. Ensure that all tools used in the development of products are secure and meet industry standards. Regularly review and validate the effectiveness of security verification tools ensuring they are consistently applied. Foster and participate in a community of security best practices within the company promoting a culture of security. Promptly assess and prioritize remediation for both internally and externally discovered vulnerabilities within the company's software. Assess and prioritize remediation for vulnerabilities in third-party software used within company products coordinating fixes as needed. Serve as the primary contact for security-related questions ensuring all employees know where to direct security inquiries. Operate as a trusted advisor on issues and trends; provide general consulting services leveraging expertise and significant best practice knowledge. Operate as an innovative thought leader; contribute significantly to the overall growth and quality of the department through knowledge sharing and coaching on current best practices and market trends. Mentor coach train and provide feedback to other team members; provide feedback to leadership on abilities of team. Minimum Qualifications: Bachelor's degree in Computer Science or related field Minimum of 8 years of progressive security architecture experience; preferably within a professional services company or similar environment working with startups and large security mature companies Minimum of 8 years of application security experience designing building or testing web and API-based architectures 3+ years of experience working with stakeholders across many functions Understanding of security vulnerabilities attacker exploit techniques and methods for remediation of such Capacity and tolerance for extreme context switching and interruptions while remaining productive and able to provide effective safe guidance Experience communicating technical concepts to a non-technical audience Prior working experience in or with a Software Development Team Demonstrated experience in areas such as system security network and/or application security experience Understanding of best practices in one or more security engineering specialties: secure development cryptography network security security operations systems security policy and incident response Experience developing and interpreting security compliance standards and guidance Scripting skills (e.g. Python C C++ Java Ruby or PowerShell) Microsoft Windows and Office proficient Excellent oral and written communications skills that demonstrate a professional demeanor and the ability to interact with executive presence Excellent organizational multi-tasking and time management skills Excellent collaboration skills applied successfully within team as well as with all levels of employees in other areas Excellent Microsoft Excel skills Excellent leadership sound judgement and business acumen skills Excellent facilitation and project management skill Excellent interpersonal skills; able to maintain solid rapport with team members as well as maintain professionalism with those outside of department Excellent data gathering interviewing and analytical/problem solving skills Excellent critical thinking and problem solving skills Excellent ability to use original thinking to translate goals into the implementation of new ideas and design solutions Self-motivated with the ability to manage projects to completion independently Able to thrive in a fast paced deadline driven environment Excellent attention to detail Demonstrated ability to influence motivate and mobilize team members and business partners Excellent ability to develop and use engaging informative and compelling presentation methodologies Excellent ability to handle sensitive information with discretion and tact Excellent ability to establish rapport and gain the trust of others; effective at gaining consensus Ability to work independently and in a team environment Ability to coach mentor and provide feedback to team members in a timely manner Ability to provide guidance and support to developing team members Up to 5% travel time required
Posted 1 month ago
8.0 years
0 Lacs
India
On-site
Overview Job Description: The Software Security Architect 4 plays a critical role in safeguarding the company's products and services by ensuring secure design rigorous testing and proactive vulnerability management. This position will work closely to promote secure coding practices and identify potential risks. Responsibilities Define and implement education programs that ensure software and test engineers understand secure software development practices and how to identify insecure code. Regularly monitor the effectiveness of these programs and update as needed. Review software designs and test plans on the company's software to ensure they meet established security standards. Maintain threat models for all company products and services ensuring they are current and comprehensive. Lead the definition and review of security controls in products and services to align with the latest threat models. Develop review and maintain up-to-date documentation on all security controls used across company products and services. Ensure that all tools used in the development of products are secure and meet industry standards. Regularly review and validate the effectiveness of security verification tools ensuring they are consistently applied. Foster and participate in a community of security best practices within the company promoting a culture of security. Promptly assess and prioritize remediation for both internally and externally discovered vulnerabilities within the company's software. Assess and prioritize remediation for vulnerabilities in third-party software used within company products coordinating fixes as needed. Serve as the primary contact for security-related questions ensuring all employees know where to direct security inquiries. Operate as a trusted advisor on issues and trends; provide general consulting services leveraging expertise and significant best practice knowledge. Operate as an innovative thought leader; contribute significantly to the overall growth and quality of the department through knowledge sharing and coaching on current best practices and market trends. Mentor coach train and provide feedback to other team members; provide feedback to leadership on abilities of team. Minimum Qualifications Bachelor's degree in Computer Science or related field Minimum of 8 years of progressive security architecture experience; preferably within a professional services company or similar environment working with startups and large security mature companies Minimum of 8 years of application security experience designing building or testing web and API-based architectures 3+ years of experience working with stakeholders across many functions Understanding of security vulnerabilities attacker exploit techniques and methods for remediation of such Capacity and tolerance for extreme context switching and interruptions while remaining productive and able to provide effective safe guidance Experience communicating technical concepts to a non-technical audience Prior working experience in or with a Software Development Team Demonstrated experience in areas such as system security network and/or application security experience Understanding of best practices in one or more security engineering specialties: secure development cryptography network security security operations systems security policy and incident response Experience developing and interpreting security compliance standards and guidance Scripting skills (e.g. Python C C++ Java Ruby or PowerShell) Microsoft Windows and Office proficient Excellent oral and written communications skills that demonstrate a professional demeanor and the ability to interact with executive presence Excellent organizational multi-tasking and time management skills Excellent collaboration skills applied successfully within team as well as with all levels of employees in other areas Excellent Microsoft Excel skills Excellent leadership sound judgement and business acumen skills Excellent facilitation and project management skill Excellent interpersonal skills; able to maintain solid rapport with team members as well as maintain professionalism with those outside of department Excellent data gathering interviewing and analytical/problem solving skills Excellent critical thinking and problem solving skills Excellent ability to use original thinking to translate goals into the implementation of new ideas and design solutions Self-motivated with the ability to manage projects to completion independently Able to thrive in a fast paced deadline driven environment Excellent attention to detail Demonstrated ability to influence motivate and mobilize team members and business partners Excellent ability to develop and use engaging informative and compelling presentation methodologies Excellent ability to handle sensitive information with discretion and tact Excellent ability to establish rapport and gain the trust of others; effective at gaining consensus Ability to work independently and in a team environment Ability to coach mentor and provide feedback to team members in a timely manner Ability to provide guidance and support to developing team members Up to 5% travel time required Show more Show less
Posted 1 month ago
0 years
0 Lacs
Kochi, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Qualifications Minimum ten years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Qualifications Minimum ten years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
0 years
0 Lacs
Gurugram, Haryana, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Qualifications Minimum ten years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 month ago
2.0 - 3.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Position: Blockchain Developer Experience: 2-3 Years Location: Chennai Job Type: Contract (6 Months) (Extendable based on performance) Role Description The Blockchain Developer will be responsible for tasks related to cryptography, cryptocurrency, back-end web development, blockchain, and software development. Qualifications Cryptography and Blockchain skills Cryptocurrency knowledge Proficiency in Back-End Web Development Strong understanding of Software Development principles Experience with blockchain technologies and frameworks Ability to work collaboratively in a team environment Bachelor's degree in Computer Science, Engineering, or related field Show more Show less
Posted 1 month ago
4.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Since our founding, IDEMIA has been on a mission to unlock the world and make it safer through our cutting-edge identity technologies. Our technology leadership makes us the partner of choice for hundreds of governments and thousands of enterprises in over 180 countries, including some of the biggest and most influential brands in the world. In applying our unique expertise in biometrics and cryptography , we enable our clients to unlock simpler and safer ways to pay, connect, access, identify, travel and protect public places – at scale and in total security. Our teams work from 5 continents and speak 100+ different languages. We strongly believe that our diversity is a key driver of innovation and performance. Purpose This role transforms requirements into software according to design, to maximize business value and customer satisfaction. Key Missions Technical Skill - Candidate is having 4+ Years experience in Asp.Net, MVC, SQL. Good knowledge of Web application development using ASP.Net and C#. Experience in Database MS SQL Good knowledge of Version control (SCM): Git Excellent troubleshooting Good Track record of on time delivery. Angular knowledge will be added advantage Non-technical Skills Written and Verbal communication skills,Team Player. Flexible to adapt as per nature of project or team Problem Solving and Logical thinking Quick learner. Delivery Commitment. Leadership Qualities. By choosing to work at IDEMIA, you will join a unique tech company, offering a wide range of growth opportunities. You will contribute to a safer world, collaborating with an international and global community. We value the diversity of our teams and welcome people from all walks of life, regardless of how they look, where they come from, who they love, or what they think. We deliver cutting edge, future proof innovation that reach the highest technological standards and we’re transforming, fast, to stay a leader in a world that’s changing fast, too. At IDEMIA, people can develop their expertise and feel a sense of ownership and empowerment, in a global environment, as part of a company with the ambition and the ability to change the world. Visit our website to know more about the leader in Identity Technologies www.idemia.com Show more Show less
Posted 1 month ago
0 years
0 Lacs
New Delhi, Delhi, India
On-site
Who We Are At VML, we are a beacon of innovation and growth in an ever-evolving world. Our heritage is built upon a century of combined expertise, where creativity meets technology, and diverse perspectives ignite inspiration. With the merger of VMLY&R and Wunderman Thompson, we have forged a new path as a growth partner that is part creative agency, part consultancy, and part technology powerhouse. Our global family now encompasses over 30,000 employees across 150+ offices in 64 markets, each contributing to a culture that values connection, belonging, and the power of differences. Our expertise spans the entire customer journey, offering deep insights in communications, commerce, consultancy, CRM, CX, data, production, and technology. We deliver end-to-end solutions that result in revolutionary work. The Opportunity MuleSoft Developer with experience designing, delivering and migrating MuleSoft implementations in an enterprise environment required. The successful applicant will take responsibility for the solution they build and, working with a Solution or Application Architect, ensure these are well designed, modular, reusable, performant, scalable and extensible. What You'll Be Doing This is a hands-on role and you will have a keen eye for detail, an intolerance to poor software and interface design and understand methodologies and approaches that result in well tested high-quality systems. You will be involved with all parts of our delivery lifecycle including specification, authoring code, code review, functional testing, performance testing and supporting staging and production launches. This is a client facing role working for a digital consultancy responsible for the delivery and support of many high-profile big data and commerce applications which require someone of excellent technical ability looking to make their mark in a diverse and expanding team. What We Want From You Full project lifecycle experience in delivering complex, high volume solutions Excellent MuleSoft implementation skills, and a strong working knowledge of Anypoint Studio Strong understanding of what MuleSoft can provide, and what it cannot provide Strong opinions of when the IPAAS platform is the correct place to implement functionality, and when it is not Experience with design of interfaces between disparate systems, defining canonical interface forms Experience with design and implementation of highly scalable systems A good understanding of designing complete systems with both front and back end components communicating via REST Strong skills around data interchange formats such as JSON, XML, etc. Experience of using Git or Mercurial distributed source control systems If you know some of this even better: Understanding of object-oriented concepts and UML notation Knowledge of AWS, Azure, Docker, Kubernetes or other cloud deployment paradigms Good understanding of Linux or other Unix based systems Good understanding of commonly used Java libraries such as Log4J, Apache Commons, Google Guava Good understanding of cryptography, certificate management and the development of secure software and protocols What we can offer you: Alongside the opportunity to work with some of the most exciting brands around the world, we'll also prioritise your career development and help you grow your skills. We'll empower you to make a difference, allow you to be yourself, and respect who you are. Our personality and behaviours: We believe that we are what we do, not just what we say. Our shared values and behaviours show how to bring the VML Enterprise Solution's culture to life through the actions we all take every day: Connect Meaningfully Inspire Creatively Include Purposefully Approach Positively Our brilliant, talented people are what makes VML Enterprise Solutions what we are. That's why we look for people who go beyond and always push our thinking to be better than yesterday. AT VML Enterprise Solutions Our Enterprise Solutions division houses strategic consultants, creative and technical architects and skilled developers and operators that together help some of the world's leading organisations to deliver outstanding digital experiences across all major routes to market worldwide: marketplaces, online retailers, D2C, B2B and social platforms. With over 4,200 experts in 55 operational centres across 34 countries, our capabilities span the entire buying journey from customer acquisition, through engagement, to conversion and loyalty, driving multi-channel growth for world-leading brands. We work with some of the most exciting brands such as The Coca-Cola Company, EY, Bosch, Unilever, Ford, DFS, Mercedes-Benz, Johnson & Johnson, Nestlé, Sainsbury's, Selfridges, Shell and Tiffany & Co. We've built over 500 platforms for brands and retailers and generate in excess of $29bn annually for our clients and work with over 50 strategic partners including Adobe, SAP, Salesforce, HCL, Shopify, Sitecore, BigCommerce, commerce tools and Acquia. Our reputation is based on our people, and we believe we have some of the best in the business. As our business grows internationally, we're looking for new people to join us on our journey to inspire and take a key role in shaping some of the best commerce solutions, services, and websites in the world. Working as a team, no problem is insurmountable; we share in our client's successes and believe that anyone can show creative bravery no matter what their role is in the team. WPP (VML Enterprise Solutions) is an equal opportunity employer and considers applicants for all positions without discrimination or regard to characteristics. We are committed to fostering a culture of respect in which everyone feels they belong and has the same opportunities to progress in their careers. VML is a WPP Agency. For more information, please visit our website, and follow VML on our social channels via Instagram, LinkedIn, and X. When you click "Submit Application", this will send any information you add below to VML. Before you do this, we think it's a good idea to read through our Recruitment Privacy Policy. California residents should read our California Recruitment Privacy Notice. This explains what we do with your personal data when you apply for a role with us, and, how you can update the information you have provided us with or how to remove it. Show more Show less
Posted 1 month ago
9.0 - 14.0 years
11 - 16 Lacs
Bengaluru
Work from Office
Strong Network Development Architect who can design complete Firmware and software from scratch for a new customer, covering L2 and L3, exhaustive knowledge on NOS internals, Fast Path, knowledge of multiple L4 to L7 protocols - OpenSSL, NAT, IPSEC, MacSec (all mandatory), knwoledge of IP networking stack, Integration, knowledge of container networking, use of IXIA, very strong in Embedded C, Linux, NOS, Train a trainer profile
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39815 Jobs | Dublin
Wipro
19317 Jobs | Bengaluru
Accenture in India
15105 Jobs | Dublin 2
EY
14860 Jobs | London
Uplers
11139 Jobs | Ahmedabad
Amazon
10431 Jobs | Seattle,WA
IBM
9214 Jobs | Armonk
Oracle
9174 Jobs | Redwood City
Accenture services Pvt Ltd
7676 Jobs |
Capgemini
7672 Jobs | Paris,France