Home
Jobs

651 Cryptography Jobs - Page 6

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

20.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Job Description We at Publicis Sapient, enable our clients to Thrive in Next and to create business value through expert strategies, customer-centric experience design, and world class product engineering.The future of business is disruptive; transformative; and becoming digital to the core.In our 20 + years in IT, never have we seen such a dire need for transformation in every major industry, from financial services to automotive, consumer products, retail, energy, and travel. Your Impact You will work in the spirit of agile & a product engineering mindset - delivering the sprint outcomes, iteratively & incrementally, following the agile ceremonies You will groom the stories functionally & help define the acceptance criteria (Functional & Non-Functional/NFRs) collaborating actively with stakeholders - locally & in client org., understanding end-to-end customer requirements You will actively contribute in technical grooming, brainstorming & whiteboarding design sessions to define & articulate the solution approaches, to identify tasks & estimates, and to document the module/sub-system design with their interfaces & wireframes You will have breadth of concepts, tools & technologies to address NFRs like security, performance, reliability, maintainability and understand the need for trade-offs You will bring in expertise to optimize and make the relevant design decisions (considering trade-offs) at the module / components level You will be a polyglot with a PE mindset – Open & Curious, learning & adopting new languages, platforms & toolkits constantly Qualifications Your Skills & Experience: You have 3+ years of professional work experience building large-scale, large-volume services & distributed apps., taking them through production and post-production life cycles. You use more than one programming language with expertise in at least one; Ex: Memory Management, GC, Templates/Generics, Closures, etc. Multi-Threading, Sync/A-Sync.; Blocking/Non-Blocking execution styles You practice Imperative, Functional Programming styles You are aware of Cloud Platforms like AWS, GCP, Azure, etc. You are a problem solver choosing the relevant data structures, and algorithms considering the tools for Time & Space Complexity You apply SOLID, DRY design principles, design patterns & practice Clean Code You are an expert at String Manipulation, Data/Time Arithmetic, Collections & Generics You practice & guide on handling failures à Error Management & Exception handling You build reliable & high-performance apps leveraging Eventing, Streaming, Concurrency, Multi-Threading & Synchronization libraries and frameworks You develop web apps using HTML, CSS, Javascript & relevant frameworks (Angular, React, Vue) You design and build microservices from the ground up, considering all NFRs & applying DDD, Bounded Contexts You use one or more databases (RDBMS or NoSQL) based on the needs You deploy to production, troubleshoot problems & provide live support You understand the significance of security aspects & compliance to data, code & application security policies; You write secure code to prevent known vulnerabilities; You understand HTTPS/TLS, Symmetric/Asymmetric Cryptography, Certificates You use one or more Web Application Frameworks Spring or Spring Boot or Micronaut (Java) Flask or Django (Python) Express or Meteor or Koa (Node) Asp.net MVC, WebApi or Nancy (.Net) You use one or more messaging platforms (e.g. JMS/RabbitMQ/Kafka/Tibco/Camel) You use Mocks & Stubs & related frameworks (Moq) You use logging frameworks like Log4j, NLog, etc. You use build tools like MSBuild, Maven, Gradle, Gulp, etc. You understand and use containers, virtualization You use proactive monitoring & alerting, dashboards You use Logging/Monitoring solutions (Splunk, ELK, Grafana) Additional Information Set Yourself Apart With You understand infra. as code (cattle over pets) You understand reactive programming concepts, Actor models & use RX Java / Spring React / Akka / Play, etc. You are able to set up a CI/CD pipeline infrastructure & stack from grounds-up You are able to articulate the pros, cons of designs & tradeoffs You are aware of distributed tracing, debugging, and troubleshooting You are aware of side-car, service mesh usage along with microservices You are aware of distributed, cloud design patterns & architectural styles You are aware of gateways, load-balancers, CDNs, Edge caching You are aware of gherkin and cucumber for BDD automation You are aware of performance testing tools like JMeter, Gatling You are aware of one search solution like ElasticSearch, SOLR, Endeca You are aware of one distributed caching solution like Redis, MemCache, etc. You are aware of selenium for UI automation You are aware of Rules engines like Drools, Easy Rules, etc. A Tip From The Hiring Manager Software Development Engineers (SDE-I) are bright, talented, and motivated young minds with strong technical skills, developing software applications and services that make life easier for customers. The SDE-I is expected to work with an agile team to develop, test, and maintain digital business applications. As an SDE-I you will get an opportunity to work with industry-leading clients and global teams to solve complex business problems and build your skills on the full stack of application development technologies Education Bachelor’s/Master’s Degree in Computer Engineering, Computer Science, or a related field Additional Information Gender Neutral Policy 18 paid holidays throughout the year. Generous parental leave and new parent transition program Flexible work arrangements Employee Assistance Programs to help you in wellness and well being Company Description Publicis Sapient is a digital transformation partner helping established organizations get to their future, digitally-enabled state, both in the way they work and the way they serve their customers. We help unlock value through a start-up mindset and modern methods, fusing strategy, consulting, and customer experience with agile engineering and problem-solving creativity. United by our core values and our purpose of helping people thrive in the brave pursuit of the next, our 20,000+ people in 53 offices around the world combine experience across technology, data sciences, consulting and customer obsession to accelerate our clients’ businesses through designing the products and services their customers truly value. Show more Show less

Posted 1 week ago

Apply

13.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description Publicis Sapient is looking for a Software Development Engineers (SDE-III) to join our team of bright thinkers and doers. Software Development Engineers (SDE-III) are bright, talented and motivated young minds with strong technical skills, developing software applications and services that make life easier for customers. The SDE-III is expected to work with multiple agile teams in one or more client accounts to develop, test, and maintain digital business applications. As an SDE-III you will get an opportunity to work with industry leading clients and global teams to solve complex business problems and build your skills on the full stack of application development technologies Your Impact You will work in the spirit of agile & a product engineering mindset - driving the sprint outcomes, iteratively & incrementally, following the agile ceremonies You will help define & prioritize Epics and Business Roadmap; Govern the Epics functionally & address both Functional & Non-Functional/NFRs collaborating actively with stakeholders - locally & in client org., shaping end-to-end customer requirements You will govern the technical grooming, brainstorming & whiteboarding design sessions to define & articulate the solution approaches, to identify tasks & estimates, to design and document E2E system(s) along with interfaces, contracts & wireframes You will have breadth of concepts, tools & technologies to address NFRs like security, performance, reliability, maintainability and advocate relevant trade-offs You will bring in expertise to optimize and make the relevant design decisions (considering trade-offs) at the E2E system(s) level & challenge the status-quo You will be a polyglot with a PE mindset – Open & Curious, learning & adopting new languages, platforms & toolkits constantly You will work with HoE’s to define & understand the overall system architecture, standards & guidelines, helping with the details of the E2E system(s) landscape You will mentor & guide, actively evangelize and inculcate the engineering mindset and culture, share knowledge within Peer groups, SDE-IIs, while providing and receiving constructive feedback You will drive change with a continuous improvement mindset working on opportunities to shift left; Proactive about reduction of tech. debts, eliminating waste, increasing automation, using the right productivity tools, understanding client business, using dashboards for monitoring & alerts You will be accountable for E2E system design, Governance, Evangelization, Advocacy, Quality with an E2E focus, establishing engineering best practices, standards: Solve problems at a Roadmap level, driving and influencing the overall business requirements Design & Integrate Systems focused on solving business problems; Ensure Implementations are well integrated with all other parts of the enterprise. Evangelize adoption of Test First approach & TDD; Apply BDD for Functional & Integration testing; Govern Engg. Metrics focus & adoption within all teams in an account. Govern elimination of Tech. Debts Govern Engineering Maturing Model Adoption, within cross cultural teams spread across Geo’s Perform Reviews of E2E system integration & Architectural validation Identify & adopt new and relevant tools, practices, platforms taking the technology & solution focus to the next level in the spirit of Continuous Improvement Practice & Inculcate the PE & DevOps mindset, with automation as core-focus Devise Training strategies; Evaluate and Appraise technical talent within team Work with other departments in the organization like Recruitment, Hiring, People Success to Identify, Nurture & Recognize talent Qualifications Your Skills & Experience: You have 13+ years of professional work experience building large scale, large volume services & distributed apps., taking them through production and post-production life cycles Strong expertise in Gen AI/ML space. You Identify & create POC’s on new business segments, technologies; building quick and usable solutions You use more than one programming language with deep expertise in language features, concepts and protocols; Ex: Memory Management, GC, Templates/Generics, Closures etc. Multi-Threading, Sync/A-Sync.; Blocking/Non-Blocking execution styles Lambdas, Streams, Performance Tuning, NIO, HTTP2, Websockets, gRPC, ProtoBuf You practice Imperative, Functional Programming styles You use Cloud Platforms like AWS, GCP, Azure etc. You practice distributed, cloud design patterns & architectural styles You use API gateways and Management Tools, load-balancers, CDNs, Edge caching, reverse proxies You use search solutions like Elastic Search, SOLR, Endeca You use performance testing tools like JMeter, Gatling You use distributed tracing apps/platforms, debug and troubleshoot with relevant tools You use distributed caching solutions like Redis, Memcache etc. You use side-cars, service mesh along with microservices You practice reactive programming, observables (e.g. Spring Reactor/RX Java), Actor models, Akka, Play etc. You use GraphQL, Aggregate services, API Composition, SAGA pattern You use K8S, Container Orchestration, Mesos, Consensus algorithms like PAXOS You are a problem solver - choosing the relevant data structures, algorithms considering the tools for Time & Space Complexity You Govern & Steer relevant technology & tools selection, build/buy decisions to solve the business problems You are an expert at reviewing & guiding the adoption of SOLID, DRY design principles, design patterns & Clean Code You are an expert at String Manipulation, Data/Time Arithmetic, Collections & Generics You practice & guide on handling failures à Error Management & Exception handling You build reliable, scalable & high-performance apps, services leveraging relevant architectural styles and patterns like Eventing Sourcing, CEP, Restful APIs, CQRS etc. You develop web apps using HTML, CSS, Java-script & relevant frameworks (Angular, React, Vue) You design and build microservices from grounds up applying DDD, Bounded Contexts; Considering multiple perspectives and tradeoffs to meet the NFRs You define real-time solutions to scale up/scale out/Auto Scale as relevant, with robustness and resilience, applying patterns like circuit breakers & back propagation You understand CAP theorem and work with multiple databases (RDBMS or NoSQL) You deploy to production, trouble shoot problems & provide live support You practice and ensure coverage of security aspects & compliance to data, code & application security policies; You write secure code to prevent known vulnerabilities; You understand HTTPS/TLS, Symmetric/Asymmetric Cryptography, Certificates, SAML, Vaults, Key rotation, OAuth, JWT, MFA, DDOS etc. You are an expert & advocate the use of the relevant Web Application Frameworks Spring or Spring Boot or Micronaut (Java) Flask or Django (Python) Express or Meteor or Koa (Node) Asp.net MVC, WebApi or Nancy (.Net) You use one or more messaging platforms (e.g. JMS/RabbitMQ/Kafka/Tibco/Camel) You use Mocks & Stubs & related frameworks (Moq) You use logging frameworks like Log4j, NLog etc. You use build tools like MsBuild, Maven, Gradle, Gulp etc. You understand and use containers, virtualization You use proactive monitoring & alerting, dashboards You use Logging/Monitoring solutions (Splunk, ELK, Grafana) You practice & ensure infra. as code (cattle over pets) using tools like terraform, cloud-formation, ansible etc. You set-up a CI/CD pipeline infrastructure & stack from grounds-up You articulate the pro’s, con’s of designs; along with tradeoffs influencing key stakeholders You use gherkin and cucumber for BDD automation You use selenium for UI automation You use rules engines like Drools, Easy Rules etc. Growth Culture Learning is part of our DNA. We always support exploratory behavior to help you deliver innovative solutions, staying ahead in the curve. You also get opportunity to share your knowledge across the organization through technical sessions and active contribution to various engineering groups. Education Bachelor’s/Master’s Degree in Computer Engineering, Computer Science, or a related field Additional Information Gender-Neutral Policy 18 paid holidays throughout the year. Generous parental leave and new parent transition program Flexible work arrangements Employee Assistance Programs to help you in wellness and well being Company Description Publicis Sapient is a digital transformation partner helping established organizations get to their future, digitally enabled state, both in the way they work and the way they serve their customers. We help unlock value through a start-up mindset and modern methods, fusing strategy, consulting and customer experience with agile engineering and problem-solving creativity. United by our core values and our purpose of helping people thrive in the brave pursuit of next, our 20,000+ people in 53 offices around the world combine experience across technology, data sciences, consulting and customer obsession to accelerate our clients’ businesses through designing the products and services their customers truly value. Show more Show less

Posted 1 week ago

Apply

8.0 - 10.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Key Responsibilities The role will be responsible to creating a roadmap for application which are robust and futuristic solutions for ATM Switch and Cards & Payment domain. The role will be responsible for handling the Solution Architecture designing and delivery for the ATM Switch, Cards and Payment domain. Will be responsible for developing solutions, stake holder management, vendor and financial management, developing project costs, and delivering the developed solutions. Ability to Identifying and managing risks, including developing contingency plans to mitigate potential issues. Knowledge on card issuing and transaction acquiring processing and standards. Knowledge on ISO8583 messaging standard protocols. Hand on experience with VISA, MasterCard Card, UPI and other national card schemes Issuing & Acquiring, Scheme compliance requirement. Desirable to have knowledge on national schemes and processor integrations. Knowledge about API’s (SOAP, JSON, REST..ETC) and Web Service Integration. Knowledge about Back Office integration. Knowledge about HSM protocols and configuration, Knowledge about encryption Keys/Cryptography both symmetric and asymmetric keys, 3DES, AES, SM4, SHA. Familiarity with EMV technologies and standards, and PCI DSS and PA DSS standards. Familiarity with Contact and Contactless technologies, Familiarity with 3DS and Tokenization standards. Experience with an EFT transaction switching or on-line banking environment. Hands-on experience with automated test tools and simulators. Experience on Google Pay/Samsung Pay/Apple Pay Wallets and QR Code and Emerging payments will be an added Advantage. Strong design and programming knowledge on Unix/Linux environment, Unix Shell Scripting Knowledge of end-to-end systems development life cycles (i.e., waterfall, Agile and other modern approaches to software development) Excellent verbal and written communication skills to technical and non-technical audiences of various levels in the organization Willingly shares relevant technical and/or industry knowledge and expertise to other resources Excellent problem-solving, team, and time management skills. Resourceful and proactive in gathering information and sharing ideas. Experience in banking or financial services industry. Working experience in Cloud and Digital transformation projects is an advantage. Good knowledge skill on open banking is a plus. Ability to review the requirement, impact analysis, gap analysis, high level design, cost estimation, propose timeline, obtain project approval, and draft solution architecture/function spec/technical spec document. Be an excellent leader, Subject matter expert on the technical and functional knowledge Good team collaboration, relationships within & outside POD to all levels of the organization Strong influencing, conflict resolution & negotiation skills. Regulatory & Business Conduct Display exemplary conduct and live by the Group’s Values and Code of Conduct. Take personal responsibility for embedding the highest standards of ethics, including regulatory and business conduct, across Standard Chartered Bank. This includes understanding and ensuring compliance with, in letter and spirit, all applicable laws, regulations, guidelines and the Group Code of Conduct. Effectively and collaboratively identify, escalate, mitigate and resolve risk, conduct and compliance matters. [Fill in for regulated roles] Lead the [country / business unit / function/XXX [team] to achieve the outcomes set out in the Bank’s Conduct Principles: [Fair Outcomes for Clients; Effective Financial Markets; Financial Crime Compliance; The Right Environment.] * [Insert local regulator e.g. PRA/FCA prescribed responsibilities and Rationale for allocation]. [Where relevant - Additionally, for subsidiaries or relevant non -subsidiaries] Serve as a Director of the Board of [insert name of entities] Exercise authorities delegated by the Board of Directors and act in accordance with Articles of Association (or equivalent) Other Responsibilities Embed Here for good and Group’s brand and values in XXXX [country / business unit / team]; Perform other responsibilities assigned under Group, Country, Business or Functional policies and procedures; Multiple functions (double hats); [List all responsibilities associated with the role] Skills And Experience Knowledge of ATM/POS switching, Debit Card Issuance/Management, Digital Channels interface, Encryption, HSM and ISO8583 messaging standards Familiarity with EMV Contact/Contactless, VISA and MasterCard Card Issuing & Acquiring, Scheme compliance requirements Experience with an EFT transaction switching and processing. Familiarity on PCI DSS and PA DSS compliance requirements Experience on Switch integration with VISA/Mastercard is mandatory. Others such as UPI, JCB and National switches. Experience on Google Pay/Samsung Pay/Apple Pay Wallets and QR Code and Emerging payments will be a added Advantage Experience in Web Service integration and API’s Knowledge of end-to-end systems development life cycles (i.e., waterfall, Agile and other modern approaches to software development) Excellent in preparing the Solution Architecture document, Functional and technical spec Excellent problem-solving, team, and time management skills. Experience In Programming Languages And Other Emerging Technologies Experience in Cloud Services Qualifications B TECH or BE or MBA grade in Computer Science/ Information Systems or related IT Area; 8-10years About Standard Chartered We're an international bank, nimble enough to act, big enough for impact. For more than 170 years, we've worked to make a positive difference for our clients, communities, and each other. We question the status quo, love a challenge and enjoy finding new opportunities to grow and do better than before. If you're looking for a career with purpose and you want to work for a bank making a difference, we want to hear from you. You can count on us to celebrate your unique talents and we can't wait to see the talents you can bring us. Our purpose, to drive commerce and prosperity through our unique diversity, together with our brand promise, to be here for good are achieved by how we each live our valued behaviours. When you work with us, you'll see how we value difference and advocate inclusion. Together We Do the right thing and are assertive, challenge one another, and live with integrity, while putting the client at the heart of what we do Never settle, continuously striving to improve and innovate, keeping things simple and learning from doing well, and not so well Are better together, we can be ourselves, be inclusive, see more good in others, and work collectively to build for the long term What We Offer In line with our Fair Pay Charter, we offer a competitive salary and benefits to support your mental, physical, financial and social wellbeing. Core bank funding for retirement savings, medical and life insurance, with flexible and voluntary benefits available in some locations. Time-off including annual leave, parental/maternity (20 weeks), sabbatical (12 months maximum) and volunteering leave (3 days), along with minimum global standards for annual and public holiday, which is combined to 30 days minimum. Flexible working options based around home and office locations, with flexible working patterns. Proactive wellbeing support through Unmind, a market-leading digital wellbeing platform, development courses for resilience and other human skills, global Employee Assistance Programme, sick leave, mental health first-aiders and all sorts of self-help toolkits A continuous learning culture to support your growth, with opportunities to reskill and upskill and access to physical, virtual and digital learning. Being part of an inclusive and values driven organisation, one that embraces and celebrates our unique diversity, across our teams, business functions and geographies - everyone feels respected and can realise their full potential. Show more Show less

Posted 1 week ago

Apply

8.0 - 10.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Key Responsibilities The role will be responsible to creating a roadmap for application which are robust and futuristic solutions for ATM Switch and Cards & Payment domain. The role will be responsible for handling the Solution Architecture designing and delivery for the ATM Switch, Cards and Payment domain. Will be responsible for developing solutions, stake holder management, vendor and financial management, developing project costs, and delivering the developed solutions. Ability to Identifying and managing risks, including developing contingency plans to mitigate potential issues. Knowledge on card issuing and transaction acquiring processing and standards. Knowledge on ISO8583 messaging standard protocols. Hand on experience with VISA, MasterCard Card, UPI and other national card schemes Issuing & Acquiring, Scheme compliance requirement. Desirable to have knowledge on national schemes and processor integrations. Knowledge about API’s (SOAP, JSON, REST..ETC) and Web Service Integration. Knowledge about Back Office integration. Knowledge about HSM protocols and configuration, Knowledge about encryption Keys/Cryptography both symmetric and asymmetric keys, 3DES, AES, SM4, SHA. Familiarity with EMV technologies and standards, and PCI DSS and PA DSS standards. Familiarity with Contact and Contactless technologies, Familiarity with 3DS and Tokenization standards. Experience with an EFT transaction switching or on-line banking environment. Hands-on experience with automated test tools and simulators. Experience on Google Pay/Samsung Pay/Apple Pay Wallets and QR Code and Emerging payments will be an added Advantage. Strong design and programming knowledge on Unix/Linux environment, Unix Shell Scripting Knowledge of end-to-end systems development life cycles (i.e., waterfall, Agile and other modern approaches to software development) Excellent verbal and written communication skills to technical and non-technical audiences of various levels in the organization Willingly shares relevant technical and/or industry knowledge and expertise to other resources Excellent problem-solving, team, and time management skills. Resourceful and proactive in gathering information and sharing ideas. Experience in banking or financial services industry. Working experience in Cloud and Digital transformation projects is an advantage. Good knowledge skill on open banking is a plus. Ability to review the requirement, impact analysis, gap analysis, high level design, cost estimation, propose timeline, obtain project approval, and draft solution architecture/function spec/technical spec document. Be an excellent leader, Subject matter expert on the technical and functional knowledge Good team collaboration, relationships within & outside POD to all levels of the organization Strong influencing, conflict resolution & negotiation skills Regulatory & Business Conduct Display exemplary conduct and live by the Group’s Values and Code of Conduct. Take personal responsibility for embedding the highest standards of ethics, including regulatory and business conduct, across Standard Chartered Bank. This includes understanding and ensuring compliance with, in letter and spirit, all applicable laws, regulations, guidelines and the Group Code of Conduct. Lead the team to achieve the outcomes set out in the Bank’s Conduct Principles: [Fair Outcomes for Clients; Effective Financial Markets; Financial Crime Compliance; The Right Environment.] Effectively and collaboratively identify, escalate, mitigate and resolve risk, conduct and compliance matters. Serve as a Director of the Board Exercise authorities delegated by the Board of Directors and act in accordance with Articles of Association (or equivalent) Other Responsibilities Embed Here for good and Group’s brand and values in team Perform other responsibilities assigned under Group, Country, Business or Functional policies and procedures Multiple functions (double hats) Skills And Experience Knowledge of ATM/POS switching, Debit Card Issuance/Management, Digital Channels interface, Encryption, HSM and ISO8583 messaging standards Familiarity with EMV Contact/Contactless, VISA and MasterCard Card Issuing & Acquiring, Scheme compliance requirements Experience with an EFT transaction switching and processing. Familiarity on PCI DSS and PA DSS compliance requirements Experience on Switch integration with VISA/Mastercard is mandatory. Others such as UPI, JCB and National switches. Experience on Google Pay/Samsung Pay/Apple Pay Wallets and QR Code and Emerging payments will be a added Advantage Experience in Web Service integration and API’s Knowledge of end-to-end systems development life cycles (i.e., waterfall, Agile and other modern approaches to software development) Excellent in preparing the Solution Architecture document, Functional and technical spec Excellent problem-solving, team, and time management skills. Experience In Programming Languages And Other Emerging Technologies Experience in Cloud Services Qualifications B TECH or BE or MBA grade in Computer Science/ Information Systems or related IT Area; 8-10years About Standard Chartered We're an international bank, nimble enough to act, big enough for impact. For more than 170 years, we've worked to make a positive difference for our clients, communities, and each other. We question the status quo, love a challenge and enjoy finding new opportunities to grow and do better than before. If you're looking for a career with purpose and you want to work for a bank making a difference, we want to hear from you. You can count on us to celebrate your unique talents and we can't wait to see the talents you can bring us. Our purpose, to drive commerce and prosperity through our unique diversity, together with our brand promise, to be here for good are achieved by how we each live our valued behaviours. When you work with us, you'll see how we value difference and advocate inclusion. Together We Do the right thing and are assertive, challenge one another, and live with integrity, while putting the client at the heart of what we do Never settle, continuously striving to improve and innovate, keeping things simple and learning from doing well, and not so well Are better together, we can be ourselves, be inclusive, see more good in others, and work collectively to build for the long term What We Offer In line with our Fair Pay Charter, we offer a competitive salary and benefits to support your mental, physical, financial and social wellbeing. Core bank funding for retirement savings, medical and life insurance, with flexible and voluntary benefits available in some locations. Time-off including annual leave, parental/maternity (20 weeks), sabbatical (12 months maximum) and volunteering leave (3 days), along with minimum global standards for annual and public holiday, which is combined to 30 days minimum. Flexible working options based around home and office locations, with flexible working patterns. Proactive wellbeing support through Unmind, a market-leading digital wellbeing platform, development courses for resilience and other human skills, global Employee Assistance Programme, sick leave, mental health first-aiders and all sorts of self-help toolkits A continuous learning culture to support your growth, with opportunities to reskill and upskill and access to physical, virtual and digital learning. Being part of an inclusive and values driven organisation, one that embraces and celebrates our unique diversity, across our teams, business functions and geographies - everyone feels respected and can realise their full potential. Show more Show less

Posted 1 week ago

Apply

4.0 - 8.0 years

0 Lacs

Kanayannur, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Third-Party Risk as a Service (TPRaaS) – Senior As part of our EY- NFS TPRM team, you will help clients enhance their business performance by translating their strategies into realities. Working with EY-high performing teams, you will help clients to grow, innovate, protect, and optimize their business performance. The opportunity We’re looking for Seniors with expertise in Third-Party Risk Management to join the leadership group of our TPRaaS team . It is a fantastic opportunity to be part of a leading firm while being instrumental in the growth of a new service offering. Your Key Responsibilities Lead and work closely with the manager in the delivery of Third-Party Risk Management (TPRM) engagements. Assist / Mentor team members in vendor calls / client interactions by providing delivery updates. Perform Quality Checks on work products before delivering it to the end clients. Follow policies and procedures that support the successful implementation of TPRM operating models. Facilitate process walkthrough discussions to document end-to-end business processes and functional requirements. Assess the application of legal and regulatory requirements to clients TPRM practices. Lead/Participate in technology enhancement requirements such as Automation, Data Analytics, AI to support TPRM processes. Assist in the selection and tailoring of approaches, methods, and tools to support service offering or industry projects. Build and nurture positive working relationships with clients to achieve exceptional client service. Contribute to Identifying opportunities to improve engagement profitability. Assist leadership in driving business development initiatives and account management. Participate in building strong internal relationships within GMS Services and with other services across the organization. Skills And Attributes For Success Maintain an educational program to develop personal skills continually. Constantly upskilling as per market trends. Understand and follow workplace policies and procedures. Exhibit initiative and participate in corporate social and team events. To qualify for the role, you must have 4 to 8 years of demonstrated experience with Risk Management across the Third-Party engagement lifecycle (pre-contracting, contracting, and post contracting) and an understanding of the associated organizational infrastructure (e.g., relevant internal controls, business processes, governance structures). Strong understanding of the TPRM framework, Risk Management, Information Security practices. Demonstrate a good understanding of the Contract Risk Review management process. Hands-on exposure to TPRM tools and technology solutions (e.g., GRC enablement solutions, such as Process Unity, Prevalent, Archer, ServiceNow, etc.). Demonstrated knowledge of standards such as ISO 27001/2, ISO 22301, ISO 27018, PCI – DSS, HITRUST, etc. Good knowledge of privacy regulations such as GDPR, CCPA, etc. Good knowledge of regulations such as FISMA, HIPAA, Reg SCI, MAS, etc. Good knowledge of TCP/IP, concepts of OSI layer and protocols, networking and security concepts, Physical & Environmental Security, Asset Security and Identity & Access Management. Good knowledge of OS (Windows / Linux) security, Database security, IT infrastructure (switches, routers, firewalls, IDS, IPS, etc.), Security architecture design, and review. Good familiarity with OWASP, and Secure SDLC standards/frameworks, anti-virus solutions (e.g., Symantec, McAfee, etc.). Good experience in LAN/WAN architectures and reviews. Good knowledge of incident management, disaster recovery, and business continuity management, cryptography. Good to have prior Big-4 experience. Good to have certifications - CISSP, CISA, CISM, CTPRP, CIPP, ISO 27001 Lead Auditor or Lead Implementer Ideally, you’ll also have Project Management skills. Exposure to tools like ProcessUnity, ServiceNow, Archer. What We Look For A Team of people with enthusiasm to develop new skills and knowledge and experience to succeed and inquisitiveness to learn new things in this fast-moving environment. Actively tracks and communicates engagement performance and planning to EY engagement management, ensuring project milestones remain on track and are completed timely. Actively mentors and trains team members on Third-Party Risk Management processes, governance, and frameworks. Works cross-functionally with team members to support and drive a collaborative team environment. Creates and design effective presentations as a means for communicating project and deliverable progress to clients. Performs sophisticated data analyses to understand client s business and identify risk Executes advanced services and supervise staff in delivering essential services. Understands client s business environment and basic risk management approaches Actively participates in decision making with engagement management and seek to understand the broader impact of current decisions. Actively contributes to improving operational efficiency on projects & internal initiatives. What Working At EY Offers At EY, we’re dedicated to helping our clients, from the startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is on education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your progress with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching, and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

4.0 - 8.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Third-Party Risk as a Service (TPRaaS) – Senior As part of our EY- NFS TPRM team, you will help clients enhance their business performance by translating their strategies into realities. Working with EY-high performing teams, you will help clients to grow, innovate, protect, and optimize their business performance. The opportunity We’re looking for Seniors with expertise in Third-Party Risk Management to join the leadership group of our TPRaaS team . It is a fantastic opportunity to be part of a leading firm while being instrumental in the growth of a new service offering. Your Key Responsibilities Lead and work closely with the manager in the delivery of Third-Party Risk Management (TPRM) engagements. Assist / Mentor team members in vendor calls / client interactions by providing delivery updates. Perform Quality Checks on work products before delivering it to the end clients. Follow policies and procedures that support the successful implementation of TPRM operating models. Facilitate process walkthrough discussions to document end-to-end business processes and functional requirements. Assess the application of legal and regulatory requirements to clients TPRM practices. Lead/Participate in technology enhancement requirements such as Automation, Data Analytics, AI to support TPRM processes. Assist in the selection and tailoring of approaches, methods, and tools to support service offering or industry projects. Build and nurture positive working relationships with clients to achieve exceptional client service. Contribute to Identifying opportunities to improve engagement profitability. Assist leadership in driving business development initiatives and account management. Participate in building strong internal relationships within GMS Services and with other services across the organization. Skills And Attributes For Success Maintain an educational program to develop personal skills continually. Constantly upskilling as per market trends. Understand and follow workplace policies and procedures. Exhibit initiative and participate in corporate social and team events. To qualify for the role, you must have 4 to 8 years of demonstrated experience with Risk Management across the Third-Party engagement lifecycle (pre-contracting, contracting, and post contracting) and an understanding of the associated organizational infrastructure (e.g., relevant internal controls, business processes, governance structures). Strong understanding of the TPRM framework, Risk Management, Information Security practices. Demonstrate a good understanding of the Contract Risk Review management process. Hands-on exposure to TPRM tools and technology solutions (e.g., GRC enablement solutions, such as Process Unity, Prevalent, Archer, ServiceNow, etc.). Demonstrated knowledge of standards such as ISO 27001/2, ISO 22301, ISO 27018, PCI – DSS, HITRUST, etc. Good knowledge of privacy regulations such as GDPR, CCPA, etc. Good knowledge of regulations such as FISMA, HIPAA, Reg SCI, MAS, etc. Good knowledge of TCP/IP, concepts of OSI layer and protocols, networking and security concepts, Physical & Environmental Security, Asset Security and Identity & Access Management. Good knowledge of OS (Windows / Linux) security, Database security, IT infrastructure (switches, routers, firewalls, IDS, IPS, etc.), Security architecture design, and review. Good familiarity with OWASP, and Secure SDLC standards/frameworks, anti-virus solutions (e.g., Symantec, McAfee, etc.). Good experience in LAN/WAN architectures and reviews. Good knowledge of incident management, disaster recovery, and business continuity management, cryptography. Good to have prior Big-4 experience. Good to have certifications - CISSP, CISA, CISM, CTPRP, CIPP, ISO 27001 Lead Auditor or Lead Implementer Ideally, you’ll also have Project Management skills. Exposure to tools like ProcessUnity, ServiceNow, Archer. What We Look For A Team of people with enthusiasm to develop new skills and knowledge and experience to succeed and inquisitiveness to learn new things in this fast-moving environment. Actively tracks and communicates engagement performance and planning to EY engagement management, ensuring project milestones remain on track and are completed timely. Actively mentors and trains team members on Third-Party Risk Management processes, governance, and frameworks. Works cross-functionally with team members to support and drive a collaborative team environment. Creates and design effective presentations as a means for communicating project and deliverable progress to clients. Performs sophisticated data analyses to understand client s business and identify risk Executes advanced services and supervise staff in delivering essential services. Understands client s business environment and basic risk management approaches Actively participates in decision making with engagement management and seek to understand the broader impact of current decisions. Actively contributes to improving operational efficiency on projects & internal initiatives. What Working At EY Offers At EY, we’re dedicated to helping our clients, from the startups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is on education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your progress with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching, and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

0.0 - 12.0 years

0 Lacs

Delhi, Delhi

On-site

Indeed logo

New Delhi,Delhi,India +1 more Job ID 765706 Our Exciting Opportunity: We are now looking for a Product Architect in our Encryption tools area in Ericsson IT. You will lead the Product Lifecycle together with the IT product Owner, with alignment with the product portfolio strategy and plan., together with Ericsson Business units you will collect and maintain requirements. Other parts of your role; will be safeguarding and governing the product Total Cost of Ownership, (TCO) solution design, integrations and architecture in adherence to overarching principles and frameworks. You will: Define product strategy, roadmap and optimize product TCO Prepare product decisions and initiate execution of product development Safeguard the product design, integrations and architecture Document and maintain product information To be successful in the role you must have: Knowledge on encryption toolsets such as Key Management Systems - KMS, Public Key Infrastructure – PKI, Certificate LifeCycle Management- CLM, Strong Authentication. Experience in IT design, development, and architecture as well as in Product Management Full understanding of cryptography and its protocols like X.509 standard, PKI, RSA, AES, SHA, SSL/TLS and general certificate management pcesses. Strong understanding of User certificates for implementations like Citrix FAS, Certificate based authentication fulfilling MFA requirements. Strong understanding PKI and Certification Authority (CA). Solid & broad understanding of Cyber Security, Zero Trust & Passwordless Solid understanding of Active Directory together with Legacy & modern modes of Authentication. Strong understanding Public Key Cryptography Standards (PKCS5, PKCS7, PKCS11, PKCS12, PKCS15). Strong understanding of HSM (Entrust), Smart cards, OpenSSL. Good knowledge of Encryption Algorithms (RSA, DSA, ECDSA, DH, AES, DES, 3DES, Blowfish, CAST5, RC4, RC5, SHA1, SHA2, MD5, ECDH). Strong Understanding of protocols like CMP, CRL, OCSP, SCEP, LDAP, PGP, ACME, FIDO2 Working knowledge of any certificate lifecycle manager, Cloud PKI. Working knowledge of certificates for Blockchain, certificate for IoT Devices, code-signing. IT processes, tools and infrastructure knowledge Negotiation and argumentation Skills Knowledge sharing and collaboration skills Key Qualifications: Education: Bachelor’s degree or equivalent Minimum of experience: 12 years Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply?

Posted 1 week ago

Apply

2.0 - 7.0 years

5 - 8 Lacs

Gurugram

Work from Office

Naukri logo

Seeking an experienced Cryptocurrency Launch Specialist to spearhead the creation and launch of our blockchain-based token. experience in tokenomics, and crypto exchange listing, understanding of blockchain technology and DeFi trends. Required Candidate profile Proven experience in launching at least one crypto token or NFT project Deep knowledge of blockchain protocols (Ethereum, BSC, Solana, Polygon, etc. send resume at vikas@capitalplacementservices.com

Posted 1 week ago

Apply

6.0 - 8.0 years

12 - 16 Lacs

Pune, Ahmedabad

Work from Office

Naukri logo

Good hands on towards design, development maintenance of secure software solutions for Linux-based systems on embedded and automotive systems also security controls e.g (Secure Boot, secure unlock, secure reprogramming, message authentication) Good understanding on configuration of AppArmor profiles to enforce security policies and mitigate risks in Linux environments. Hands on towards development and integration of Trusted Execution Environment (TEE) solutions Good knowledge of development and implementation in Cryptography and Key Management. Experience in working with Client Product teams and collaboration with hardware and software team members. Incorporate secure coding standards and practices in DevSecOps, conduct security assessment and code reviews, enforce Static Application Security Testing (SAST), Open Source SW vulnerability scanning and license analysis to ensure SW security. Collect, generate, maintain and update SW bill of materials and contribute to GIT repositories Participate in PI planning, provide effort estimation to implement security controls and contribute to the Feature Roll Out Plan (FROP)

Posted 1 week ago

Apply

8.0 - 13.0 years

8 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

We are seeking a Senior Cyber Security Consultant with extensive experience in enterprise IT security, risk management, and cloud-based security solutions. The ideal candidate will have a deep understanding of managing cyber security risks during digital transformations and will be responsible for leading hands-on engagements and delivering results that address critical security concerns. This role involves working closely with both technical and business teams to identify and mitigate risks in complex environments. Key Responsibilities Leadership in Execution & DeliveryLead hands-on engagements, managing the development of deliverables from start to finish. Work with teams to analyze requirements and produce prioritized results aligned with client needs and risk profiles. Expert Cyber Security AdvisoryProvide expert advice on best practices for managing cyber security risks during digital transformation, including adoption of cloud, DevOps, containerization, microservices, and zero trust frameworks. Security Reviews & AssessmentsConduct security reviews and maturity assessments across technology and business teams to identify and address cyber risks. Provide clear, organized findings and actionable recommendations for risk mitigation. Trusted Engineer for ClientsAct as a trusted advisor and security engineer for customers' engineering teams, ensuring that security is integrated into every phase of digital transformation. Risk and Vulnerability AnalysisAssess and implement security measures to safeguard IT environments. Identify vulnerabilities, focusing on security protocols, cryptography, authentication, authorization, and performance. Security ImplementationLead the implementation of security solutions, including multi-factor authentication (MFA), single sign-on (SSO), identity management, and related technologies. Client Interaction & CommunicationEffectively communicate security measures and solutions to a broad audience, including both technical and executive teams. Manage client expectations with clear, concise verbal and written communication. Continuous Learning & InnovationStay updated with the latest security protocols, vulnerabilities, and best practices to ensure the adoption of the most effective security controls and technologies. Security MaturityWork with clients to evaluate and improve their security maturity, providing insights into the current cyber threat landscape. Minimum Qualifications 8+ years of total IT experience. 5+ years of consulting experience in enterprise security environments. Expertise in information security, IT risk management, and performance reliability. Solid understanding of security protocols, cryptography, and authentication technologies. Experience in implementing multi-factor authentication, SSO, and identity management. Ability to explain and enforce security measures to a broad range of stakeholders. Excellent verbal and written communication skills. Degree in Information Technology, Computer Science, or related fields. Preferred Qualifications Google Cloud Security Engineer certification. Strong knowledge of infrastructure, OS, application vulnerabilities, security architecture, and controls. 5+ years of experience with cloud computing security concepts and solutions. Security-related certifications such as CISSP, CISM, or GCIH.

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

Whole stack performance analysis to optimize Java security applications through benchmarking, tracing, profiling and debugging for inefficiencies and bottlenecks Develop and support one or more of several components that provide Security within the IBM Semeru Runtime for Java via cryptographic related capabilities Become a subject matter expert both inside and outside of IBM to help thousands of IBM products and their many customers provide Secure transactions Work with a small team of experts in the field to develop these components and collaborate with other experts in the field in other developments groups and IBM research around the world Stay ahead of the latest development tools, technologies, and methodologies to stay up to date with these evolving technologies and new threats Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Strong background in software development, demonstrating expertise in Java and C++ programming languages with minimum 5+ years of experience Strong understanding of program execution stack for whole stack performance analysis and problem determination A self-starter with a proactive mindset, able to initiate and drive projects independently. Ability to work seamlessly as part of a team, contributing to collective goals and fostering a collaborative work environment. Knowledge and interest in Java Security framework development and performance. Preferred technical and professional experience Experience in Cryptography, TLS, FIPS and Java security framework Experience in understanding security vulnerabilities and implementing the resolutions Understanding of the Agile development process Excellent communication skills and proven ability in influencing open-source community developers, academic and industry partners

Posted 1 week ago

Apply

4.0 - 9.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Crypto Express Adapter on z Systems allows companies to protect data and workloads from physical and logical attacks through cryptography. Cryptography is crucial for secure processing when applications must communicate with distributed elements or assess the validity of the data being processed. Candidate will be part of world class high-performance hardware security module (HSM) firmware team. The responsibility of the firmware team is to provide top-level security for processing and high-speed cryptographic offload We are Firmware professional working on Z systems ( IBM Advanced Mainframes ) and we build the most secure systems for our customers to deploy their enterprise applications. IBM z Systems are deployed with workloads where intensive IO Operations are getting executed. IBM Lab works on IO enablement firmware as well as boot firmware for z Servers. Work area would be Initial program load that is Boot firmware which enables the z Systems to boot and load supported Operating systems( Linux, zOS, zVM ) on Logical partitions. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 4+ years of relevant Industry experience Very strong in C and data structures, preferably in developing multi-core or multi-threaded applications. Deep knowledge of Linux kernel internals (process scheduler, memory management, concurrency/synchronization, memory allocation, file systems) and profiling. Experience in device driver development and support for NIC, HBA or Graphics cards Understanding of riscv / arm architecture and micro architecture features likes Caches, MMU, SMP, coherency Strong debugging skills Experience with exercising/validation of system from user space, and knowledge of user space API Preferred technical and professional experience Cryptography knowledge or working experience

Posted 1 week ago

Apply

4.0 - 5.0 years

8 - 12 Lacs

Mumbai

Work from Office

Naukri logo

Responsible for development of new features and fixing defects. Responsible to Perform core technical aspects of software development for assigned applications including, developing prototypes and writing new code Responsible for API Connect, DataPower, configuring API Proxy, JWT, and basic Auth Strong written, oral communication skills and able to manage user / vendor / customer Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise B.Tech / B.E/ MCA / MSc IT with Minimum 4-5 years of experience Candidate with hands on experience with API Connect, DataPower, configuring API Proxy, JWT, and basic Auth Understanding of Rest/SOAP apis. Strong knowledge on xslt/gateway script. Experience with xpath, Http status code, GET/POST methods, CRUD operations Preferred technical and professional experience Ability to test and troubleshoot issue in any environment. Knowledge of cryptography and OAuth. Knowledge of networking concepts

Posted 1 week ago

Apply

0 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Qualifications Minimum ten years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Qualifications Minimum ten years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

6.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Introduction IBM Security Verify is placed in Gartner Leadership Quadrant as a cloud-based Identity and Access Management (IAM) solution that helps organizations manage user identities and access to applications and resources. It provides features like multi-factor authentication, single sign-on, risk-based authentication, and adaptive access as well as user lifecycle journeys along with associated governance, aiming to protect customer, workforce, and privileged identities. The solution also offers identity analytics to provide insights into user behaviour and potential risks. Your Role And Responsibilities Design, develop, and maintain, reusable React-based UI features and components integrated with backend APIs in a cloud-native environment. Design, iterate, and refine UI and UX concepts for our products Collaborate closely with cross-functional teams including product, design, DevOps, and QA. Contribute to architecture discussions and recommend technical improvements. Translate designs and wireframes into high quality code. Implement and maintain test automation to ensure product reliability. Troubleshoot and resolve production issues in collaboration with other engineers. Actively participate in Agile ceremonies (daily stand-ups, sprint planning, retrospectives) and contribute to continuous improvement. Mentor junior developers and provide code reviews to ensure best practices. Preferred Education Master's Degree Required Technical And Professional Expertise 6+ years of hands-on experience in designing and developing cloud-based frontend components for enterprise applications. Proficient in front-end technologies such as React, Typescript, JavaScript (ES6+), HTML5, and CSS3 for building responsive user interfaces. Knowledge of modern authorization mechanisms, such as JSON Web Token Experience in building and deploying full stack solutions on AWS or RedHat OpenShift (OCP/ROSA). Good knowledge of CI/CD pipelines (e.g., GitHub Actions, Jenkins), and experience with version control systems like Git. Understanding of monitoring/logging tools such as Grafana, ELK Stack, or Instana. Experience writing and maintaining automated tests using tools like JUnit, Selenium, Cucumber, SonarQube, and familiarity with frontend testing tools (e.g., Jest). Exposure to containerization (Docker) and basic Kubernetes deployment workflows. Understanding of Agile methodologies, including participation in daily stand-ups, sprint planning, and retrospectives. Effective team collaboration and communication skills. Preferred Technical And Professional Experience Experience in implementing or designing microservices, micro-frontend and reusable frontend components. Familiarity with design systems (e.g., Carbon Design, Material UI). Awareness of accessibility standards like WCAG or Section 508. Exposure to security practices, including privacy by design, secure coding, or basic cryptography as well as cryptographic algorithms, protocols (e.g., TLS, FIPS), and Java security frameworks. Experience with Shell scripting or Node.js is a plus. Understanding of basic DevSecOps practices or interest in expanding security expertise. Ability to create pixel-perfect visual elements including icons, UI themes, color palettes, etc., for different devices & screen resolutions – browsers, desktop, iPad Experience in mobile app development and design. Show more Show less

Posted 1 week ago

Apply

6.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Introduction IBM Security Verify is placed in Gartner Leadership Quadrant as a cloud-based Identity and Access Management (IAM) solution that helps organizations manage user identities and access to applications and resources. It provides features like multi-factor authentication, single sign-on, risk-based authentication, and adaptive access as well as user lifecycle journeys along with associated governance, aiming to protect customer, workforce, and privileged identities. The solution also offers identity analytics to provide insights into user behaviour and potential risks. Your Role And Responsibilities Take ownership of end-to-end development of full-stack features across the application lifecycle. Develop modern, reusable React-based UI components integrated with backend APIs. Design, implement, and maintain scalable REST APIs using Java or GoLang. Collaborate closely with cross-functional teams including product, design, DevOps, and QA. Contribute to architecture discussions and recommend technical improvements. Implement and maintain test automation to ensure product reliability. Troubleshoot and resolve production issues in collaboration with other engineers. Actively participate in Agile ceremonies (daily stand-ups, sprint planning, retrospectives) and contribute to continuous improvement. Mentor junior developers and provide code reviews to ensure best practices. Preferred Education Master's Degree Required Technical And Professional Expertise 6+ years of hands-on experience in designing and developing cloud-based enterprise applications with both frontend and backend components. Proficient in front-end technologies such as React, JavaScript (ES6+), HTML5, and CSS3 for building responsive user interfaces. Backend development experience using Java and GoLang, with understanding of RESTful service integration and API consumption. Hands-on experience with Postgres or similar databases including data modeling and query optimization. Experience in building and deploying full stack solutions on AWS or RedHat OpenShift (OCP/ROSA). Good knowledge of CI/CD pipelines (e.g., GitHub Actions, Jenkins), and experience with version control systems like Git. Understanding of to monitoring/logging tools such as Grafana, ELK Stack, or Instana. Experience writing and maintaining automated tests using tools like JUnit, Selenium, SonarQube, and familiarity with frontend testing tools (e.g., Jest). Exposure to containerization (Docker) and basic Kubernetes deployment workflows. Understanding of Agile methodologies, including participation in daily stand-ups, sprint planning, and retrospectives. Effective team collaboration and communication skills. Experience with Shell scripting and basic Node.js utilities would be added advantage Preferred Technical And Professional Experience Experience in implementing or designing microservices and reusable backend components. Familiarity with design systems (e.g., Carbon Design, Material UI). Awareness of accessibility standards like WCAG or Section 508. Exposure to security practices, including privacy by design, secure coding, or basic cryptography as well as cryptographic algorithms, protocols (e.g., TLS, FIPS), and Java security frameworks. Experience with Shell scripting or Node.js is a plus. Understanding of basic DevSecOps practices or interest in expanding security expertise. Show more Show less

Posted 1 week ago

Apply

6.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Introduction IBM Security Verify is placed in Gartner Leadership Quadrant as a cloud-based Identity and Access Management (IAM) solution that helps organizations manage user identities and access to applications and resources. It provides features like multi-factor authentication, single sign-on, risk-based authentication, and adaptive access as well as user lifecycle journeys along with associated governance, aiming to protect customer, workforce, and privileged identities. The solution also offers identity analytics to provide insights into user behaviour and potential risks. Your Role And Responsibilities Design, develop, and maintain, reusable React-based UI features and components integrated with backend APIs in a cloud-native environment. Design, iterate, and refine UI and UX concepts for our products Collaborate closely with cross-functional teams including product, design, DevOps, and QA. Contribute to architecture discussions and recommend technical improvements. Translate designs and wireframes into high quality code. Implement and maintain test automation to ensure product reliability. Troubleshoot and resolve production issues in collaboration with other engineers. Actively participate in Agile ceremonies (daily stand-ups, sprint planning, retrospectives) and contribute to continuous improvement. Mentor junior developers and provide code reviews to ensure best practices. Preferred Education Master's Degree Required Technical And Professional Expertise 6+ years of hands-on experience in designing and developing cloud-based frontend components for enterprise applications. Proficient in front-end technologies such as React, Typescript, JavaScript (ES6+), HTML5, and CSS3 for building responsive user interfaces. Knowledge of modern authorization mechanisms, such as JSON Web Token Experience in building and deploying full stack solutions on AWS or RedHat OpenShift (OCP/ROSA). Good knowledge of CI/CD pipelines (e.g., GitHub Actions, Jenkins), and experience with version control systems like Git. Understanding of monitoring/logging tools such as Grafana, ELK Stack, or Instana. Experience writing and maintaining automated tests using tools like JUnit, Selenium, Cucumber, SonarQube, and familiarity with frontend testing tools (e.g., Jest). Exposure to containerization (Docker) and basic Kubernetes deployment workflows. Understanding of Agile methodologies, including participation in daily stand-ups, sprint planning, and retrospectives. Effective team collaboration and communication skills. Preferred Technical And Professional Experience Experience in implementing or designing microservices, micro-frontend and reusable frontend components. Familiarity with design systems (e.g., Carbon Design, Material UI). Awareness of accessibility standards like WCAG or Section 508. Exposure to security practices, including privacy by design, secure coding, or basic cryptography as well as cryptographic algorithms, protocols (e.g., TLS, FIPS), and Java security frameworks. Experience with Shell scripting or Node.js is a plus. Understanding of basic DevSecOps practices or interest in expanding security expertise. Ability to create pixel-perfect visual elements including icons, UI themes, color palettes, etc., for different devices & screen resolutions – browsers, desktop, iPad Experience in mobile app development and design. Show more Show less

Posted 1 week ago

Apply

4.0 - 7.0 years

2 - 7 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Naukri logo

Role & responsibilities Detailed JD (Roles and Responsibilities) Public Key Infrastructure (PKI) Mandatory skills Public Key Infrastructure (PKI) Basic understanding of certificate-based authentication principles, including the use of digital certificates, private/public key pairs, and smart card technology. Familiarity with the process of validating user identity using certificates and the role of certificate authorities (CAs). Experience troubleshooting hardware (E.g., card readers) and software issues on Windows and/or Mac laptops. Familiar with Cryptographic concepts (E.g.,- symmetric/Asymmetric encryption, digital signatures). Good experience on technologies like (E.g., - MS ADCS, OpenSSL, Venafi),external vendors (GoDaddy, DigiCert etc..) Extensive knowledge on SSL/TLS ,OCSP ,AIA,CDP concepts. Good to have scripting or automation (PowerShell) experience. Types of signing the certificate (Secure email, document signing, code signing, excel signing). Manage the lifecycle of digital certificates, including issuance, revocation, renewal. Good understanding of HSM(Hardware Security Module). CRL Renewal process /CRL and delta CRL concepts. Configure and maintain NDES(Network Device Enrollment Services) to support certificate enrollment for mobile devices /Intune/mas360,Troubleshooting NDES related issues. Manage root and issuing CA key ceremonies. PKI architecture ,CP(Certificate policies ) ,CPS(certificate Practice Statement) documents. Good knowledge on wild card certificates. Additional skills in PCI DSS(payment card industry data security standard) Good understanding of HSM in PCI DSS Knowledge on Types of Tokenization (Token generation, Token storage, Token retrieval) Review and validate software requests and tickets. Strong problem-solving skills and attention to detail. Excellent interpersonal and communication skills, both written and verbal. Ability to explain technical concepts to non-technical users in a clear and patient manner. Experience with help desk or ticketing systems is a plus. Prior experience in IT support, desktop support, or a similar technical support role preferred

Posted 1 week ago

Apply

8.0 - 10.0 years

0 Lacs

Bengaluru

On-site

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Join the innovative team at Kyndryl as a Client Technical Solutioner and unlock your potential to shape the future of technology solutions. As a key player in our organization, you will embark on an exciting journey where you get to work closely with customers, understand their unique challenges, and provide them with cutting-edge technical solutions and services. Picture yourself as a trusted advisor – collaborating directly with customers to unravel their business needs, pain points, and technical requirements. Your expertise and deep understanding of our solutions will empower you to craft tailored solutions that address their specific challenges and drive their success. Your role as a Client Technical Solutioner is pivotal in developing domain-specific solutions for our cutting-edge services and offerings. You will be at the forefront of crafting tailored domain solutions and cost cases for both simple and complex, long-term opportunities, demonstrating we meet our customers' requirements while helping them overcome their business challenges. At Kyndryl, we believe in the power of collaboration and your expertise will be essential in supporting our Technical Solutioning and Solutioning Managers during customer technology and business discussions, even at the highest levels of Business/IT Director/LOB. You will have the chance to demonstrate the value of our solutions and products, effectively communicating their business and technical benefits to decision makers and customers. In this role, you will thrive as you create innovative technical solutions that align with industry trends and exceed customer expectations. Your ability to collaborate seamlessly with internal stakeholders will enable you to gather the necessary documents and technical insights to deliver compelling bid submissions. Not only will you define winning cost models for deals, but you will also lead these deals to profitability, ensuring the ultimate success of both our customers and Kyndryl. You will play an essential role in contract negotiations, up to the point of signature, and facilitate a smooth engagement hand-over process. As the primary source of engagement management and solution design within your technical domain, you will compile, refine, and take ownership of final solution documents. Your technical expertise will shine through as you present these documents in a professional and concise manner, showcasing your mastery of the subject matter. You’ll have the opportunity to contribute to the growth and success of Kyndryl by standardizing our go-to-market pitches across various industries. By creating differentiated propositions that align with market requirements, you will position Kyndryl as a leader in the industry, opening new avenues of success for our customers and our organization. Join us as a Client Technical Solutioner at Kyndryl and unleash your potential to shape the future of technical solutions while enjoying a stimulating and rewarding career journey filled with innovation, collaboration, and growth. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others Required Skills and Experience Amazon/Azure Cloud Services : Experience and knowledge of Private Cloud environments and solutions on Vmware VCF/Vsphere, Nutanix, KVM, Openshift etc. Deep architectural and solutioning knowledge with AWS/Azure services whether IaaS, PaaS or Cloud Native services, Kubernetes and microservices. Landing zone architectures, Public Cloud Network and Security capabilities/services across AWS, GCP, Azure. AWS/Azure Architectural framework for applications, resiliency/disaster recovery, Kubernetes services and other PaaS Services for Cloud native applications etc. Kubernetes services for application modernization and microservices and containers Experience architecting solutions within Amazon Web Services (AWS), Azure, VMware & Hybrid cloud environment, AWS Outpost etc. Cloud CLI, APIs, CloudFormation templates and Management Console, Cloud Watch, Azure Monitor, Monitoring & Logging, Cloud Optimization, Cloud native Security Services Cloud Build Services, Cloud Migration (CSP to CSP, On-prem to CSP), Cloud Managed Services Competitive understanding of services from CSPs and costing · Multi-Cloud Managed Services, Cloud native services for Cloud operations and management. Modern Cloud operations using AI/ML framework, AIOps, Observability and analytics. Service level agreements, Key Performance indicators for Cloud Services, Cloud managed services. Application Services on Cloud : Architect Cloud native applications on AWS/Azure cloud services, microservices, containerization on Kubernetes, DevOps and CI/CD pipelines Understanding of industry specific architectures on Cloud, Cloud native resiliency for platforms and applications SAP / Oracle ERP Services on AWS/Azure Cloud · Data lake, Data Analytics, Data Management solutions on AWS/Azure Cloud, Data warehousing and Big data processing Experience with assessment, development, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes for Cloud native apps, data protection, cryptography, key management, identity and access management (IAM), API security, Key management) within SaaS, IaaS, PaaS, and other cloud environments Review technology designs with technology architects and engineers, taking local and regional regulatory requirements into account Professional Skills Lead and Contribute to the design, development and implementation of winning technical solutions for customers to introduce and establish new technology solutions into their business and business processes. Should have experience in writing proposals, responding to RFPs, RFIs and quality client presentations. Work closely with OEMs and partners to support the development of winning solutions at optimum cost. Teaming & Collaboration with Sales and bid-management teams. Other Required Skills: Network and relationships among in the external environment among strategic partner organizations. Strong technical and analytical capabilities and understanding of complexities of large IT environments Excellent oral and written communication and presentation skills required in English. A self-starter who is customer focused with high energy level and positive disposition Ability to execute performance through self-motivation and with minimum supervision. Proven ability to initiate action, and complete challenging assignments. Ability to multi-task and exhibit a high level of enthusiasm, common sense, initiative, collaboration, and creativity. Ability to exercise authority appropriately and effectively. Basic Qualifications: Formal College Level education with Major in Engineering. and proven experience of solution design in Multi Cloud Services & Hybrid Cloud Services. Advanced/Professional/Expert certifications from AWS/Azure/GCP etc. Desirable experience of 8-10 years with proven skills and capabilities and experience for 5-6 years on Cloud Services Knowledge of Processes like Technical Assurance/Delivery Assurance, Quality Assurance, Costing, etc. will be an added advantage. Prior experience of working in a matrix organization Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 1 week ago

Apply

2.0 - 6.0 years

3 - 5 Lacs

Bengaluru

On-site

Cloud Automation Test Engineer This role has been designed as ‘’Onsite’ with an expectation that you will primarily work from an HPE office. Who We Are: Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in today’s complex world. Our culture thrives on finding new and better ways to accelerate what’s next. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE. Job Description: Aruba is an HPE Company, and a leading provider of next-generation network access solutions for the mobile enterprise. Helping some of the largest companies in the world modernize their networks to meet the demands of a digital future, Aruba is redefining the “Intelligent Edge” – and creating new customer experiences across intelligent spaces and digital workspaces. Join us redefine what’s next for you. What you’ll do: Design and execute complex penetration tests against cloud-native applications, infrastructure, and data stores. Exploit vulnerabilities in cloud platforms, such as AWS, Azure, and GCP, using advanced techniques and tools. Assess the security posture of cloud-native applications, microservices, and serverless architectures. Develop and execute attack scenarios that simulate real-world threats, including supply chain attacks, privilege escalation, and lateral movement. Lead and mentor a team of experienced penetration testers, providing guidance and support on advanced techniques and tools. Assign tasks, review deliverables, and ensure project timelines are met. Develop and maintain standard operating procedures for complex penetration testing activities. Must have B.E / B.Tech / M.Tech / MCA in Computer Science or Information Technology Must have a minimum of 2 to 6 years penetration testing, with a strong focus on cloud environments. In-depth understanding of cloud technologies (AWS, Azure, GCP) and their security implications. Proficiency in advanced penetration testing tools and techniques, such as Burp ,ZAP,Metasploit, Cobalt Strike, and PowerSploit. Experience with container technologies (Docker, Kubernetes) and serverless architectures. Strong scripting skills (Python, PowerShell) for automation and custom tool development. Experience with security orchestration, automation, and response (SOAR) platforms. Active security certifications such as OSCP, CSSLP or related is strongly desired . Ability to work well under minimal supervision. Requires strong interpersonal, organizational, written and verbal communication skills. What you need to bring: 4-8 years’ ofexperience Experience with threat hunting, red team assessments and intelligence gathering techniques. Knowledge of emerging security threats and vulnerabilities. Experience with cloud-native security controls and best practices. Strong understanding of cryptography and network protocols. Ability to think critically and creatively to identify and exploit vulnerabilities Additional Skills: Cloud Architectures, Cross Domain Knowledge, Design Thinking, Development Fundamentals, DevOps, Distributed Computing, Microservices Fluency, Full Stack Development, Release Management, Security-First Mindset, User Experience (UX) What We Can Offer You: Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have — whether you want to become a knowledge expert in your field or apply your skills to another division. Unconditional Inclusion We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Let's Stay Connected: Follow @HPECareers on Instagram to see the latest on people, culture and tech at HPE. #india #aruba Job: Engineering Job Level: TCP_03 HPE is an Equal Employment Opportunity/ Veterans/Disabled/LGBT employer. We do not discriminate on the basis of race, gender, or any other protected category, and all decisions we make are made on the basis of qualifications, merit, and business need. Our goal is to be one global team that is representative of our customers, in an inclusive environment where we can continue to innovate and grow together. Please click here: Equal Employment Opportunity. Hewlett Packard Enterprise is EEO Protected Veteran/ Individual with Disabilities. HPE will comply with all applicable laws related to employer use of arrest and conviction records, including laws requiring employers to consider for employment qualified applicants with criminal histories.

Posted 1 week ago

Apply

1.0 - 3.0 years

0 - 0 Lacs

Chennai

On-site

Blockchain Developer – Chennai location - Immediate Joiner Key Responsibilities & Requirements Design Blockchain Systems – Architect secure and scalable blockchain solutions, including smart contracts and consensus mechanisms. Smart Contract Development – Build and deploy smart contracts using Solidity, Python, or similar languages. Develop dApps – Create intuitive decentralized applications that integrate with blockchain networks. Security & Auditing – Apply cryptographic methods and perform audits to secure blockchain infrastructure. Cross-Functional Collaboration – Coordinate with front-end, back-end teams, and stakeholders for seamless integration. Testing & Debugging – Execute rigorous testing and resolve issues to maintain performance and compliance. System Optimization – Continuously enhance blockchain performance and scalability. Platform Maintenance – Monitor and update blockchain applications post-deployment. R&D – Stay current with emerging blockchain technologies and trends. Technical Skills – Proficient in Solidity, Python, Java; familiar with Ethereum, Hyperledger, APIs, and frameworks. Education & Experience – Bachelor’s degree in CS/Engineering with 1–3 years of blockchain development experience. Bonus – Cryptography expertise, certified blockchain credentials (e.g., CBD), and strong communication/project skills. Job Type: Full-time Pay: ₹20,000.00 - ₹50,000.00 per month Schedule: Day shift Application Question(s): Are you available to Join within 7 days? Work Location: In person Expected Start Date: 11/06/2025

Posted 1 week ago

Apply

8.0 years

6 - 10 Lacs

Calcutta

On-site

Overview Job Description: The Software Security Architect 4 plays a critical role in safeguarding the company's products and services by ensuring secure design rigorous testing and proactive vulnerability management. This position will work closely to promote secure coding practices and identify potential risks. Responsibilities: Define and implement education programs that ensure software and test engineers understand secure software development practices and how to identify insecure code. Regularly monitor the effectiveness of these programs and update as needed. Review software designs and test plans on the company's software to ensure they meet established security standards. Maintain threat models for all company products and services ensuring they are current and comprehensive. Lead the definition and review of security controls in products and services to align with the latest threat models. Develop review and maintain up-to-date documentation on all security controls used across company products and services. Ensure that all tools used in the development of products are secure and meet industry standards. Regularly review and validate the effectiveness of security verification tools ensuring they are consistently applied. Foster and participate in a community of security best practices within the company promoting a culture of security. Promptly assess and prioritize remediation for both internally and externally discovered vulnerabilities within the company's software. Assess and prioritize remediation for vulnerabilities in third-party software used within company products coordinating fixes as needed. Serve as the primary contact for security-related questions ensuring all employees know where to direct security inquiries. Operate as a trusted advisor on issues and trends; provide general consulting services leveraging expertise and significant best practice knowledge. Operate as an innovative thought leader; contribute significantly to the overall growth and quality of the department through knowledge sharing and coaching on current best practices and market trends. Mentor coach train and provide feedback to other team members; provide feedback to leadership on abilities of team. Minimum Qualifications: Bachelor's degree in Computer Science or related field Minimum of 8 years of progressive security architecture experience; preferably within a professional services company or similar environment working with startups and large security mature companies Minimum of 8 years of application security experience designing building or testing web and API-based architectures 3+ years of experience working with stakeholders across many functions Understanding of security vulnerabilities attacker exploit techniques and methods for remediation of such Capacity and tolerance for extreme context switching and interruptions while remaining productive and able to provide effective safe guidance Experience communicating technical concepts to a non-technical audience Prior working experience in or with a Software Development Team Demonstrated experience in areas such as system security network and/or application security experience Understanding of best practices in one or more security engineering specialties: secure development cryptography network security security operations systems security policy and incident response Experience developing and interpreting security compliance standards and guidance Scripting skills (e.g. Python C C++ Java Ruby or PowerShell) Microsoft Windows and Office proficient Excellent oral and written communications skills that demonstrate a professional demeanor and the ability to interact with executive presence Excellent organizational multi-tasking and time management skills Excellent collaboration skills applied successfully within team as well as with all levels of employees in other areas Excellent Microsoft Excel skills Excellent leadership sound judgement and business acumen skills Excellent facilitation and project management skill Excellent interpersonal skills; able to maintain solid rapport with team members as well as maintain professionalism with those outside of department Excellent data gathering interviewing and analytical/problem solving skills Excellent critical thinking and problem solving skills Excellent ability to use original thinking to translate goals into the implementation of new ideas and design solutions Self-motivated with the ability to manage projects to completion independently Able to thrive in a fast paced deadline driven environment Excellent attention to detail Demonstrated ability to influence motivate and mobilize team members and business partners Excellent ability to develop and use engaging informative and compelling presentation methodologies Excellent ability to handle sensitive information with discretion and tact Excellent ability to establish rapport and gain the trust of others; effective at gaining consensus Ability to work independently and in a team environment Ability to coach mentor and provide feedback to team members in a timely manner Ability to provide guidance and support to developing team members Up to 5% travel time required

Posted 1 week ago

Apply

8.0 years

0 Lacs

India

On-site

Linkedin logo

Overview Job Description: The Software Security Architect 4 plays a critical role in safeguarding the company's products and services by ensuring secure design rigorous testing and proactive vulnerability management. This position will work closely to promote secure coding practices and identify potential risks. Responsibilities Define and implement education programs that ensure software and test engineers understand secure software development practices and how to identify insecure code. Regularly monitor the effectiveness of these programs and update as needed. Review software designs and test plans on the company's software to ensure they meet established security standards. Maintain threat models for all company products and services ensuring they are current and comprehensive. Lead the definition and review of security controls in products and services to align with the latest threat models. Develop review and maintain up-to-date documentation on all security controls used across company products and services. Ensure that all tools used in the development of products are secure and meet industry standards. Regularly review and validate the effectiveness of security verification tools ensuring they are consistently applied. Foster and participate in a community of security best practices within the company promoting a culture of security. Promptly assess and prioritize remediation for both internally and externally discovered vulnerabilities within the company's software. Assess and prioritize remediation for vulnerabilities in third-party software used within company products coordinating fixes as needed. Serve as the primary contact for security-related questions ensuring all employees know where to direct security inquiries. Operate as a trusted advisor on issues and trends; provide general consulting services leveraging expertise and significant best practice knowledge. Operate as an innovative thought leader; contribute significantly to the overall growth and quality of the department through knowledge sharing and coaching on current best practices and market trends. Mentor coach train and provide feedback to other team members; provide feedback to leadership on abilities of team. Minimum Qualifications Bachelor's degree in Computer Science or related field Minimum of 8 years of progressive security architecture experience; preferably within a professional services company or similar environment working with startups and large security mature companies Minimum of 8 years of application security experience designing building or testing web and API-based architectures 3+ years of experience working with stakeholders across many functions Understanding of security vulnerabilities attacker exploit techniques and methods for remediation of such Capacity and tolerance for extreme context switching and interruptions while remaining productive and able to provide effective safe guidance Experience communicating technical concepts to a non-technical audience Prior working experience in or with a Software Development Team Demonstrated experience in areas such as system security network and/or application security experience Understanding of best practices in one or more security engineering specialties: secure development cryptography network security security operations systems security policy and incident response Experience developing and interpreting security compliance standards and guidance Scripting skills (e.g. Python C C++ Java Ruby or PowerShell) Microsoft Windows and Office proficient Excellent oral and written communications skills that demonstrate a professional demeanor and the ability to interact with executive presence Excellent organizational multi-tasking and time management skills Excellent collaboration skills applied successfully within team as well as with all levels of employees in other areas Excellent Microsoft Excel skills Excellent leadership sound judgement and business acumen skills Excellent facilitation and project management skill Excellent interpersonal skills; able to maintain solid rapport with team members as well as maintain professionalism with those outside of department Excellent data gathering interviewing and analytical/problem solving skills Excellent critical thinking and problem solving skills Excellent ability to use original thinking to translate goals into the implementation of new ideas and design solutions Self-motivated with the ability to manage projects to completion independently Able to thrive in a fast paced deadline driven environment Excellent attention to detail Demonstrated ability to influence motivate and mobilize team members and business partners Excellent ability to develop and use engaging informative and compelling presentation methodologies Excellent ability to handle sensitive information with discretion and tact Excellent ability to establish rapport and gain the trust of others; effective at gaining consensus Ability to work independently and in a team environment Ability to coach mentor and provide feedback to team members in a timely manner Ability to provide guidance and support to developing team members Up to 5% travel time required Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Qualifications Minimum ten years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies