Home
Jobs

2117 Encryption Jobs - Page 28

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

Skills: Enterprise and data center IT network specialist, Cisco Certified Network Professional, AWS certified advanced networking Cloud certified, CompTIA Network+, CompTIA Security+, Network Architecture, Cisco Networking, Position: Consultant / Senior Consultant Role: Enterprise and data center IT network specialist / SME Total Experience: Consultant (5+ years), Senior Consultant (7+ years) Base Location: Bangalore, Hyderabad, Mumbai, Pune and Delhi/NCR Company Overview EIL Global is a leading IT services provider, headquartered in Adelaide, Australia, with a reach extending across the Asia Pacific and EMEA regions. We deliver comprehensive digital transformation solutions, including AIOPS, AI-based workforce automation, and blockchain solutions. With a focused team of 11-50 employees, we excel in IT infrastructure support encompassing desktops, servers, networks, and data centre technologies. Certification: Must have any networking domain certification such as Cisco Certified Network Professional (CCNP) Cisco Certified Network Associate (CCNA) CompTIA Network+, CompTIA Security+ AWS certified advanced networking Cloud certified. Role Summary We are looking for an enterprise and data center IT network specialist who poses core IT networking skills, a solid foundation for working in the IT and networking infra management domain and showcase strong experience in deploy, manage, migrate, secure, and troubleshoot a wide range of data center network infrastructures. The role demands to lead or support end to end technology transformation engagements, offering network strategy domain, implementation and optimization services for large enterprises. The Subject matter expert (SME) having proficiency in working with multi-vendor and multi network domain solutions across on-premises and hybrid cloud networking. Youll work closely with client stakeholders, OEM vendors, and internal teams to deliver value-driven, secure, and future-ready infrastructure solutions. Technical Skills Required Strong working experience on LAN, WAN, WLAN, SD-WAN, and firewall networking technologies. Expertise in deploy and configure network devices, routing protocols static, RIP, OSPF, BGP, EIGR), redundancy protocols (HSRP, VRRP, Cluster), IP addressing (IPV4/IPV6, subnetting and CIDR), routing tables, and security policies. Proficiency in setting up access controls (ACLs), encryption protocols (e.g., SSL/TLS, IPSec), Intrusion Detection and Prevention (IPS/IDS) and VPN services. Exposure to SDN and network virtualization technologies and solutions. Wired and Wireless LAN Networking Deploying and configuring Nexus, DC leaf & Spine, Cisco ACI, L2/L3 switches fabric, network segmentations, SD-LAN (Cisco, Aruba & Dell) technologies. Wireless Networking Good knowledge of Wi-Fi standards (e.g., 802.11a/b/g/n/ac/ax) and their respective strengths, limitations, security protocols (WPA2, WPA3). Expertise in installing WLC and access points as per heatmap design and conduct performance optimization and assessment and tunning as per end user traffic requirements. Good exposure to Wi-Fi6/6E and Wi-Fi7 solutions. WAN Networking - Hands on experience of IP routing, Ethernet, MPLS, DIA, P2P, ILL, Mobile Networks (4G/LTE, 5G), QOS, IPSec VPN, Vendor solutions for routers and SD-WAN (Cisco, Juniper, Fortinet, Aruba), Load Balancers (F5, Citrix HA Proxy, Cloud) and traffic engineering. Working with ISPs for connectivity, links terminations, bandwidth optimization and performance. Configurating and managing QoS, Class of services, performance parameters and security policies across the underlay and overlay networks. Cloud Networking Working knowledge of public cloud networking (AWS, Azure and GCP), creating virtual networks (VPCs, VNets), virtual machines, container networking, integrating multi cloud networking systems, Hybrid cloud integrating using IPSec VPN, direct connect /express routes, security groups and load balancing. Experiencing of working as L2/L3 network operation engineer, handling incident and service requests. Creating RCAs and capacity planning. Proficiency with network diagnostic tools and expertise to troubleshoot at L3/ SME level. Working experience of deploying monitoring tools (SolarWinds, ManageEngine, Nagios or Zabbix), integrating with ITSM solutions (i.e. ServiceNow) Good knowledge on setting up Network Security solutions, perimeter Firewall (Palo Alto, Check Point), DMZ, EDR solutions, Antivirus, PAM, SASE enabled SD-WAN Familiarity of cloud managed network services, cloud Meraki solutions. Having multi-vendor end-to-end implementation experience involving network setup and configuration Good To Have Familiarity with tools like Ansible, Puppet, and Chef to automate network configurations and management. Understanding on network automation- Network digital twin, service catalogue, AI/ML enabled solutions, CI/CD Skills in writing network automation scripts using languages like Python, Bash, or PowerShell. 3rd party API integration, configuration, and monitoring Understanding of 5G networks, IoT networking concepts, connectivity protocols and security Network slicing for 5G networks. Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Skills: Enterprise and data center IT network specialist, Cisco Certified Network Professional, AWS certified advanced networking Cloud certified, CompTIA Network+, CompTIA Security+, Network Architecture, Cisco Networking, Position: Consultant / Senior Consultant Role: Enterprise and data center IT network specialist / SME Total Experience: Consultant (5+ years), Senior Consultant (7+ years) Base Location: Bangalore, Hyderabad, Mumbai, Pune and Delhi/NCR Company Overview EIL Global is a leading IT services provider, headquartered in Adelaide, Australia, with a reach extending across the Asia Pacific and EMEA regions. We deliver comprehensive digital transformation solutions, including AIOPS, AI-based workforce automation, and blockchain solutions. With a focused team of 11-50 employees, we excel in IT infrastructure support encompassing desktops, servers, networks, and data centre technologies. Certification: Must have any networking domain certification such as Cisco Certified Network Professional (CCNP) Cisco Certified Network Associate (CCNA) CompTIA Network+, CompTIA Security+ AWS certified advanced networking Cloud certified. Role Summary We are looking for an enterprise and data center IT network specialist who poses core IT networking skills, a solid foundation for working in the IT and networking infra management domain and showcase strong experience in deploy, manage, migrate, secure, and troubleshoot a wide range of data center network infrastructures. The role demands to lead or support end to end technology transformation engagements, offering network strategy domain, implementation and optimization services for large enterprises. The Subject matter expert (SME) having proficiency in working with multi-vendor and multi network domain solutions across on-premises and hybrid cloud networking. Youll work closely with client stakeholders, OEM vendors, and internal teams to deliver value-driven, secure, and future-ready infrastructure solutions. Technical Skills Required Strong working experience on LAN, WAN, WLAN, SD-WAN, and firewall networking technologies. Expertise in deploy and configure network devices, routing protocols static, RIP, OSPF, BGP, EIGR), redundancy protocols (HSRP, VRRP, Cluster), IP addressing (IPV4/IPV6, subnetting and CIDR), routing tables, and security policies. Proficiency in setting up access controls (ACLs), encryption protocols (e.g., SSL/TLS, IPSec), Intrusion Detection and Prevention (IPS/IDS) and VPN services. Exposure to SDN and network virtualization technologies and solutions. Wired and Wireless LAN Networking Deploying and configuring Nexus, DC leaf & Spine, Cisco ACI, L2/L3 switches fabric, network segmentations, SD-LAN (Cisco, Aruba & Dell) technologies. Wireless Networking Good knowledge of Wi-Fi standards (e.g., 802.11a/b/g/n/ac/ax) and their respective strengths, limitations, security protocols (WPA2, WPA3). Expertise in installing WLC and access points as per heatmap design and conduct performance optimization and assessment and tunning as per end user traffic requirements. Good exposure to Wi-Fi6/6E and Wi-Fi7 solutions. WAN Networking - Hands on experience of IP routing, Ethernet, MPLS, DIA, P2P, ILL, Mobile Networks (4G/LTE, 5G), QOS, IPSec VPN, Vendor solutions for routers and SD-WAN (Cisco, Juniper, Fortinet, Aruba), Load Balancers (F5, Citrix HA Proxy, Cloud) and traffic engineering. Working with ISPs for connectivity, links terminations, bandwidth optimization and performance. Configurating and managing QoS, Class of services, performance parameters and security policies across the underlay and overlay networks. Cloud Networking Working knowledge of public cloud networking (AWS, Azure and GCP), creating virtual networks (VPCs, VNets), virtual machines, container networking, integrating multi cloud networking systems, Hybrid cloud integrating using IPSec VPN, direct connect /express routes, security groups and load balancing. Experiencing of working as L2/L3 network operation engineer, handling incident and service requests. Creating RCAs and capacity planning. Proficiency with network diagnostic tools and expertise to troubleshoot at L3/ SME level. Working experience of deploying monitoring tools (SolarWinds, ManageEngine, Nagios or Zabbix), integrating with ITSM solutions (i.e. ServiceNow) Good knowledge on setting up Network Security solutions, perimeter Firewall (Palo Alto, Check Point), DMZ, EDR solutions, Antivirus, PAM, SASE enabled SD-WAN Familiarity of cloud managed network services, cloud Meraki solutions. Having multi-vendor end-to-end implementation experience involving network setup and configuration Good To Have Familiarity with tools like Ansible, Puppet, and Chef to automate network configurations and management. Understanding on network automation- Network digital twin, service catalogue, AI/ML enabled solutions, CI/CD Skills in writing network automation scripts using languages like Python, Bash, or PowerShell. 3rd party API integration, configuration, and monitoring Understanding of 5G networks, IoT networking concepts, connectivity protocols and security Network slicing for 5G networks. Show more Show less

Posted 1 week ago

Apply

15.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Country India Location: Building No: 12C, Floor 9,10,11, Building No: 12B -Stilt floor, Raheja Mindspace, Cyberabad, Madhapur, Hyderabad - 500081, Telangana, India Job Title – Software Architect - IOT Preferred Location - Hyderabad, India Full time/Part Time - Full Time Build a career with confidence Carrier Global Corporation, global leader in intelligent climate and energy solutions is committed to creating solutions that matter for people and our planet for generations to come. From the beginning, we've led in inventing new technologies and entirely new industries. Today, we continue to lead because we have a world-class, diverse workforce that puts the customer at the center of everything we do. Summary An energetic person who is capable of performing all aspects of the Software Development Life Cycle for Carrier Viessmann Climate Solutions business for on IOT solutions. Must be self-motivated and should have demonstrated history of successful IOT architecting and designs. Key Responsibilities Designing, building, and implementing IoT solutions according to business requirements Analyzing and understanding current IoT ecosystems to identify weaknesses and areas for improvement Collaborating with cross-functional teams, including hardware engineers, data scientists, and business stakeholders, to develop comprehensive IoT solutions Creating and maintaining technical documentation, including system architecture, data flow diagrams, and API definitions Ensuring the security, scalability, and reliability of IoT solutions, including implementing appropriate data encryption and privacy measures Conducting testing and troubleshooting to diagnose and resolve IoT system issues Evaluating and integrating new IoT technologies and platforms to enhance system capabilities. Providing technical guidance and support to development teams and stakeholders Monitoring and analyzing the performance of IoT systems to ensure they meet business objectives and user needs Requirements 15+ years extensive experience as a Software Architect with a focus on IoT solutions. BE/ME or BTech/MTech – computer science, Engineering, or a related field. Programming Languages: Proficiency in languages such as Python, JavaScript, C/C++, and Java. Edge Platforms: Experience with edge computing platforms like Raspberry Pi, Arduino, or similar. Cloud Services: Expertise in cloud platforms such as AWS IoT, Azure IoT, or Google Cloud IoT. Networking: Strong understanding of networking protocols and IoT communication standards (e.g., MQTT, CoAP). Database Management: Experience with both SQL and NoSQL databases. DevOps: Knowledge of CI/CD pipelines, containerization (Docker), and orchestration (Kubernetes). Experience with modern DevOps practices and tools: test-driven development, GIT, automated builds and tests, CI/CD with Gitlab/GitHub, Jenkins, AWS etc. Soft Skills: Excellent problem-solving abilities, strong communication skills, and the ability to work collaboratively in a team environment. Benefits We are committed to offering competitive benefits programs for all of our employees, and enhancing our programs when necessary. Have peace of mind and body with our health insurance Make yourself a priority with flexible schedules and leave Policy Drive forward your career through professional development opportunities Achieve your personal goals with our Employee Assistance Program. Our commitment to you Our greatest assets are the expertise, creativity and passion of our employees. We strive to provide a great place to work that attracts, develops and retains the best talent, promotes employee engagement, fosters teamwork and ultimately drives innovation for the benefit of our customers. We strive to create an environment where you feel that you belong, with diversity and inclusion as the engine to growth and innovation. We develop and deploy best-in-class programs and practices, providing enriching career opportunities, listening to employee feedback and always challenging ourselves to do better. This is The Carrier Way. Join us and make a difference. Apply Now ! Carrier is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class. Job Applicant's Privacy Notice Click on this link to read the Job Applicant's Privacy Notice Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

Remote

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Security Consultant Job Summary: As an Information Security Consultant, the individual will be responsible for providing security guidance to IT project teams responsible for delivering business solutions leveraging new market technologies in Travel, Meeting & Events industry. The Information Security Consultant will identify and prioritize security-related requirements, promote secure-by-default designs and ensure information systems and infrastructure will be secured throughout system development life cycle (SDLC). The Information Security Consultant will also be expected to perform risk assessments of 3rd party information systems and infrastructure, develop appropriate risk treatment and mitigation options, and effectively articulate findings and recommendations to IT project teams, Suppliers and management. The successful candidate should have solid background in application and/or infrastructure development, broad experience over an array of information security and technical disciplines and be able to provide pragmatic, business-aligned security guidance. The Information Security Consultant will be expected to work on multiple projects and tasks concurrently. EY Technology: Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 280,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization. EY Technology supports our technology needs through three business units: Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster, and pursue those opportunities more rapidly. Enterprise Technology (ET) – EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience. Information Security (Info Sec) - Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems. The opportunity The Business Enablement Security Consulting group reports to Deputy CISO of Enterprise Workplace Technology in a hands-on role, focused on the secure design, architecture and development for applications. Most of the work will require dealing with 3rd parties, CBS is engaging with, to procure their Cloud based, mobile enabled services to enhance EY employees experience. This will include working on complex Travel solutions, Meetings & Events apps, Ground Transportation, Workplace Experience enhancement etc. These services are evolving & does offer lot of opportunities to be market leader with Security in mind. EY as an organization is big promoter of such innovative ideas & deploy these services across the globe. The Security Consultant works directly with Architects, Developers, IAM engineers, Project Managers, Supplier and other resources (as deem fit); through collaboration and mentoring, they help teams to deliver secure business solutions. The Security Consultant’s role is a technical position which will support the global strategies and architecture vision as it relates to the development of secure design, build, deployment and operation of business applications and related infrastructure. Your Key Responsibilities This position is an individual contributor capable of supporting multiple project teams in the design, implementation and certification of security controls across IT systems – constituting new platforms/products used with in EY. This requires knowledge of various IT system architecture and technology like Travel solutions, Meeting & Events leaders apps etc hosted in different Cloud environments with mobile apps offerings, as well as supporting technology such as IAM, network security, firewalls, user account management, audit & logging, and other security concepts as outlined in ISO27001, OWASP and related security standards. Also consultants should have knowledge of how to assess 3rd Party security assessments and applicability of SOC1, SOC2 reports and concepts of vendor risk management. Skills And Attributes For Success Significant working security experience (with automation platform is a plus) and knowledge in the design, implementation and operation of security controls in any two or more of the following areas (Application Security & Mobile Security preferable): Application Security - Experience with the design of security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging. Working familiarity with REST API and micro services architecture. Cloud Security –Technical understanding of virtualization, cloud infrastructure, and public cloud offerings and experience designing security configuration and controls within cloud-based solutions in Microsoft Azure and Azure PAAS services Mobile Security –Technical understanding of Mobile Security standards, mobile platforms, mobile testing and experience designing security configuration and controls within mobile device-based solutions. Add-on experience of Mobile app integration with Microsoft InTune plaftform will be an advantage. Infrastructure Security – Experience with the integration of common infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions. Agile & DevOps Methodologies – Experience as a contributing member of a balanced team within an Agile development or DevOps environment. Identity and Access Management - Active Directory based Identity and Access Management and Authorization design experience and integration with IDaaS and Federation technologies. To qualify for the role you must have Eight or more years of IT industry experience with minimum eight years of relevant experience in Information Security discipline A Bachelor's/Master’s degree in Computer Science or a related discipline, or equivalent work experience Experiencing in reviewing Mobile applications & platforms, with knowledge of Cloud Environment set up, and knowledge of common information security requirements for such platforms is a plus Experience providing and validating security requirements related to information system design and implementation Experience providing and validating security requirements related to a broad range of operating systems and databases Experience conducting risk assessments, vulnerability assessments, vendor and third party risk assessments and recommending risk remediation strategies Experience in the use of tools and methods to identify security exposures and business risks Familiarity with information system attack methods and vulnerabilities Ideally, you’ll may also have Candidates are preferred to hold or be actively pursuing related professional certifications such as CISSP, CISM or CISA Knowledge of common information security standards, such as: ISO 27001/27002, NIST, PCI DSS, ITIL, COBIT Working experience with the design and engineering of web-based multi-tier information systems and architecture design Working experience with web technologies and programming languages Working experience with operating systems and database platforms Working experience with mobile applications and mobile enterprise application platforms Working experience with more than one of these technologies, i.e. Java, .NET, Oracle, SQL, C++, WebSphere, Sharepoint, IIS, etc. Working experience with Cloud & Mobile solutions. What We Look For Ability to team well with others to facilitate and enhance the understanding & compliance to security policies Ability to work effectively with customers, management, staff members, vendors, and consultants and articulate findings and recommendations Strong English communication and writing skills are required Strong judgment and analytical ability Excellent interpersonal, communication, organizational, and project management skills Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change Demonstrated integrity in a professional environment Willingness to work in CET timezone, to support US & EU initiatives, being flexible when required What Working At EY Offers We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Kochi, Kerala, India

Remote

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Security Consultant Job Summary: As an Information Security Consultant, the individual will be responsible for providing security guidance to IT project teams responsible for delivering business solutions leveraging new market technologies in Travel, Meeting & Events industry. The Information Security Consultant will identify and prioritize security-related requirements, promote secure-by-default designs and ensure information systems and infrastructure will be secured throughout system development life cycle (SDLC). The Information Security Consultant will also be expected to perform risk assessments of 3rd party information systems and infrastructure, develop appropriate risk treatment and mitigation options, and effectively articulate findings and recommendations to IT project teams, Suppliers and management. The successful candidate should have solid background in application and/or infrastructure development, broad experience over an array of information security and technical disciplines and be able to provide pragmatic, business-aligned security guidance. The Information Security Consultant will be expected to work on multiple projects and tasks concurrently. EY Technology: Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 280,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization. EY Technology supports our technology needs through three business units: Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster, and pursue those opportunities more rapidly. Enterprise Technology (ET) – EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience. Information Security (Info Sec) - Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems. The opportunity The Business Enablement Security Consulting group reports to Deputy CISO of Enterprise Workplace Technology in a hands-on role, focused on the secure design, architecture and development for applications. Most of the work will require dealing with 3rd parties, CBS is engaging with, to procure their Cloud based, mobile enabled services to enhance EY employees experience. This will include working on complex Travel solutions, Meetings & Events apps, Ground Transportation, Workplace Experience enhancement etc. These services are evolving & does offer lot of opportunities to be market leader with Security in mind. EY as an organization is big promoter of such innovative ideas & deploy these services across the globe. The Security Consultant works directly with Architects, Developers, IAM engineers, Project Managers, Supplier and other resources (as deem fit); through collaboration and mentoring, they help teams to deliver secure business solutions. The Security Consultant’s role is a technical position which will support the global strategies and architecture vision as it relates to the development of secure design, build, deployment and operation of business applications and related infrastructure. Your Key Responsibilities This position is an individual contributor capable of supporting multiple project teams in the design, implementation and certification of security controls across IT systems – constituting new platforms/products used with in EY. This requires knowledge of various IT system architecture and technology like Travel solutions, Meeting & Events leaders apps etc hosted in different Cloud environments with mobile apps offerings, as well as supporting technology such as IAM, network security, firewalls, user account management, audit & logging, and other security concepts as outlined in ISO27001, OWASP and related security standards. Also consultants should have knowledge of how to assess 3rd Party security assessments and applicability of SOC1, SOC2 reports and concepts of vendor risk management. Skills And Attributes For Success Significant working security experience (with automation platform is a plus) and knowledge in the design, implementation and operation of security controls in any two or more of the following areas (Application Security & Mobile Security preferable): Application Security - Experience with the design of security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging. Working familiarity with REST API and micro services architecture. Cloud Security –Technical understanding of virtualization, cloud infrastructure, and public cloud offerings and experience designing security configuration and controls within cloud-based solutions in Microsoft Azure and Azure PAAS services Mobile Security –Technical understanding of Mobile Security standards, mobile platforms, mobile testing and experience designing security configuration and controls within mobile device-based solutions. Add-on experience of Mobile app integration with Microsoft InTune plaftform will be an advantage. Infrastructure Security – Experience with the integration of common infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions. Agile & DevOps Methodologies – Experience as a contributing member of a balanced team within an Agile development or DevOps environment. Identity and Access Management - Active Directory based Identity and Access Management and Authorization design experience and integration with IDaaS and Federation technologies. To qualify for the role you must have Eight or more years of IT industry experience with minimum eight years of relevant experience in Information Security discipline A Bachelor's/Master’s degree in Computer Science or a related discipline, or equivalent work experience Experiencing in reviewing Mobile applications & platforms, with knowledge of Cloud Environment set up, and knowledge of common information security requirements for such platforms is a plus Experience providing and validating security requirements related to information system design and implementation Experience providing and validating security requirements related to a broad range of operating systems and databases Experience conducting risk assessments, vulnerability assessments, vendor and third party risk assessments and recommending risk remediation strategies Experience in the use of tools and methods to identify security exposures and business risks Familiarity with information system attack methods and vulnerabilities Ideally, you’ll may also have Candidates are preferred to hold or be actively pursuing related professional certifications such as CISSP, CISM or CISA Knowledge of common information security standards, such as: ISO 27001/27002, NIST, PCI DSS, ITIL, COBIT Working experience with the design and engineering of web-based multi-tier information systems and architecture design Working experience with web technologies and programming languages Working experience with operating systems and database platforms Working experience with mobile applications and mobile enterprise application platforms Working experience with more than one of these technologies, i.e. Java, .NET, Oracle, SQL, C++, WebSphere, Sharepoint, IIS, etc. Working experience with Cloud & Mobile solutions. What We Look For Ability to team well with others to facilitate and enhance the understanding & compliance to security policies Ability to work effectively with customers, management, staff members, vendors, and consultants and articulate findings and recommendations Strong English communication and writing skills are required Strong judgment and analytical ability Excellent interpersonal, communication, organizational, and project management skills Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change Demonstrated integrity in a professional environment Willingness to work in CET timezone, to support US & EU initiatives, being flexible when required What Working At EY Offers We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Trivandrum, Kerala, India

Remote

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Security Consultant Job Summary: As an Information Security Consultant, the individual will be responsible for providing security guidance to IT project teams responsible for delivering business solutions leveraging new market technologies in Travel, Meeting & Events industry. The Information Security Consultant will identify and prioritize security-related requirements, promote secure-by-default designs and ensure information systems and infrastructure will be secured throughout system development life cycle (SDLC). The Information Security Consultant will also be expected to perform risk assessments of 3rd party information systems and infrastructure, develop appropriate risk treatment and mitigation options, and effectively articulate findings and recommendations to IT project teams, Suppliers and management. The successful candidate should have solid background in application and/or infrastructure development, broad experience over an array of information security and technical disciplines and be able to provide pragmatic, business-aligned security guidance. The Information Security Consultant will be expected to work on multiple projects and tasks concurrently. EY Technology: Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 280,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization. EY Technology supports our technology needs through three business units: Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster, and pursue those opportunities more rapidly. Enterprise Technology (ET) – EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience. Information Security (Info Sec) - Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems. The opportunity The Business Enablement Security Consulting group reports to Deputy CISO of Enterprise Workplace Technology in a hands-on role, focused on the secure design, architecture and development for applications. Most of the work will require dealing with 3rd parties, CBS is engaging with, to procure their Cloud based, mobile enabled services to enhance EY employees experience. This will include working on complex Travel solutions, Meetings & Events apps, Ground Transportation, Workplace Experience enhancement etc. These services are evolving & does offer lot of opportunities to be market leader with Security in mind. EY as an organization is big promoter of such innovative ideas & deploy these services across the globe. The Security Consultant works directly with Architects, Developers, IAM engineers, Project Managers, Supplier and other resources (as deem fit); through collaboration and mentoring, they help teams to deliver secure business solutions. The Security Consultant’s role is a technical position which will support the global strategies and architecture vision as it relates to the development of secure design, build, deployment and operation of business applications and related infrastructure. Your Key Responsibilities This position is an individual contributor capable of supporting multiple project teams in the design, implementation and certification of security controls across IT systems – constituting new platforms/products used with in EY. This requires knowledge of various IT system architecture and technology like Travel solutions, Meeting & Events leaders apps etc hosted in different Cloud environments with mobile apps offerings, as well as supporting technology such as IAM, network security, firewalls, user account management, audit & logging, and other security concepts as outlined in ISO27001, OWASP and related security standards. Also consultants should have knowledge of how to assess 3rd Party security assessments and applicability of SOC1, SOC2 reports and concepts of vendor risk management. Skills And Attributes For Success Significant working security experience (with automation platform is a plus) and knowledge in the design, implementation and operation of security controls in any two or more of the following areas (Application Security & Mobile Security preferable): Application Security - Experience with the design of security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging. Working familiarity with REST API and micro services architecture. Cloud Security –Technical understanding of virtualization, cloud infrastructure, and public cloud offerings and experience designing security configuration and controls within cloud-based solutions in Microsoft Azure and Azure PAAS services Mobile Security –Technical understanding of Mobile Security standards, mobile platforms, mobile testing and experience designing security configuration and controls within mobile device-based solutions. Add-on experience of Mobile app integration with Microsoft InTune plaftform will be an advantage. Infrastructure Security – Experience with the integration of common infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions. Agile & DevOps Methodologies – Experience as a contributing member of a balanced team within an Agile development or DevOps environment. Identity and Access Management - Active Directory based Identity and Access Management and Authorization design experience and integration with IDaaS and Federation technologies. To qualify for the role you must have Eight or more years of IT industry experience with minimum eight years of relevant experience in Information Security discipline A Bachelor's/Master’s degree in Computer Science or a related discipline, or equivalent work experience Experiencing in reviewing Mobile applications & platforms, with knowledge of Cloud Environment set up, and knowledge of common information security requirements for such platforms is a plus Experience providing and validating security requirements related to information system design and implementation Experience providing and validating security requirements related to a broad range of operating systems and databases Experience conducting risk assessments, vulnerability assessments, vendor and third party risk assessments and recommending risk remediation strategies Experience in the use of tools and methods to identify security exposures and business risks Familiarity with information system attack methods and vulnerabilities Ideally, you’ll may also have Candidates are preferred to hold or be actively pursuing related professional certifications such as CISSP, CISM or CISA Knowledge of common information security standards, such as: ISO 27001/27002, NIST, PCI DSS, ITIL, COBIT Working experience with the design and engineering of web-based multi-tier information systems and architecture design Working experience with web technologies and programming languages Working experience with operating systems and database platforms Working experience with mobile applications and mobile enterprise application platforms Working experience with more than one of these technologies, i.e. Java, .NET, Oracle, SQL, C++, WebSphere, Sharepoint, IIS, etc. Working experience with Cloud & Mobile solutions. What We Look For Ability to team well with others to facilitate and enhance the understanding & compliance to security policies Ability to work effectively with customers, management, staff members, vendors, and consultants and articulate findings and recommendations Strong English communication and writing skills are required Strong judgment and analytical ability Excellent interpersonal, communication, organizational, and project management skills Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change Demonstrated integrity in a professional environment Willingness to work in CET timezone, to support US & EU initiatives, being flexible when required What Working At EY Offers We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

10.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

We have immediate opportunity for Solution Architect 10 to 15 years – Synechron – Pune Synechron – Pune Hinjewaldi Job Role: - Solution Architect Job Location: - Pune About Synechron We began life in 2001 as a small, self-funded team of technology specialists. Since then, we’ve grown our organization to 14,500+ people, across 58 offices, in 21 countries, in key global markets. Innovative tech solutions for business We're now a leading global digital consulting firm, providing innovative technology solutions for business. As a trusted partner, we're always at the forefront of change as we lead digital optimization and modernization journeys for our clients. Customized end-to-end solutions Our expertise in AI, Consulting, Data, Digital, Cloud & DevOps and Software Engineering, delivers customized, end-to-end solutions that drive business value and growth.. For more information on the company, please visit our website or LinkedIn community. Key Responsibilities Develop and maintain architecture standards, guidelines, and best practices. Design and implement end-to-end solutions based on requirements from product owners and business stakeholders. Collaborate with internal departments and subsidiaries to develop and design requirements for web apps, mobile apps, microservices, and their associated ecosystems. Utilize best practices for application design, user interface, and overall architecture. Collaborate with the Information Security team to ensure the confidentiality, integrity, and availability of the bank’s data assets. Experience Requirements: 10+ years of experience designing applications (web & mobile), microservices, and APIs. 5+ years of experience with cloud-native technologies such as containers, Kubernetes/OpenShift, and virtualization. 3+ years of experience in Cyber/Information Security. 2. Technical Competencies Essential: Strong all-round knowledge of software engineering, architecture, and cybersecurity. Proven experience in building end-to-end design patterns and solutions that balance user experience, performance, resiliency, reliability, and security. Experience integrating applications with surrounding ecosystems and technologies, including mobile apps, microservices, containers/cloud-native technologies, event streams, APIs, and message brokers. Deep understanding of architectural patterns such as microservices, APIs, and application development (mobile and web). In-depth knowledge of security concepts including Authentication, Authorization, Encryption, Logging/Monitoring, Application Security (OWASP Top 10), Infrastructure Security, Cloud Security, and Regulatory Compliance. 6. Proficiency with enterprise architecture tools (e.g., Enterprise Architect) and data modeling tools. Experience working with cloud platforms such as OpenShift, Azure, AWS, and OCI. QUALIFICATION: Bachelor’s or Master’s degree in Computer Science, Engineering, or a related field. If you find this this opportunity interesting kindly share your updated profile on Pravin.Chauhan@synechron.com With below details (Mandatory) Total Experience Experience in Solution Architect: - Current CTC Expected CTC Notice period Current Location Ready to relocate to Pune: Open for 12 PM to 9 PM shift If you had gone through any interviews in Synechron before? If Yes when Regards, Pravin Chauhan Pravin.Chauhan@synechron.com Hp & WhatsApp # 8956217056 Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Bengaluru, Karnataka, India

Remote

Linkedin logo

Who we are We're a leading, global security authority that's disrupting our own category. Our encryption is trusted by the major ecommerce brands, the world's largest companies, the major cloud providers, entire country financial systems, entire internets of things and even down to the little things like surgically embedded pacemakers. We help companies put trust - an abstract idea - to work. That's digital trust for the real world. Job summary We are seeking a Senior Backend Engineer with deep experience in Go (Golang) to help build scalable, cloud-native web services that interact with network devices and power our automation pipelines. You’ll work on distributed systems that integrate with PostgreSQL, Kafka, and Prometheus, deploying to public clouds like AWS using modern CI/CD tools. This is a role based in the India time zone. Candidates should be available for partial time zone overlap with global teams across the U.S. What you will do Design, develop, and maintain backend services in Go that interface with networking hardware and automation frameworks. Build and optimize data models using PostgreSQL and manage high-throughput workflows via Kafka. Develop and maintain cloud-native infrastructure and containerized applications (Docker). Interact with tools such as Prometheus, InfluxDB and Clickhouse. Create and enhance CI/CD pipelines to support fast, reliable delivery. Collaborate with global cross-functional teams to deliver secure, observable, and scalable systems. Participate in architecture reviews and code quality initiatives Contribute to operational excellence through logging, alerting, and performance tuning. Be on call to support our infrastructure and services. What you will have 7+ years of backend software development experience. 4+ years of production-level Go (Golang) experience. Hands-on experience with SQL databases and timeseries databases. Familiarity with Kafka for real-time or asynchronous event processing. Experience deploying services to AWS, GCP, or Azure using Docker. Proficiency in building and managing CI/CD pipelines (GitLab CI, Jenkins). Strong understanding of service observability tools like Prometheus Comfortable working remotely with distributed teams and across time zones. Strong communication skills and a collaborative, proactive work style. Nice to have Experience with GraphQL or hybrid API architectures (REST + GraphQL). Exposure to networking protocols or network telemetry. Benefits Generous time off policies Top shelf benefits Education, wellness and lifestyle support __PRESENT __PRESENT Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

India

Remote

Linkedin logo

Who we are We're a leading, global security authority that's disrupting our own category. Our encryption is trusted by the major ecommerce brands, the world's largest companies, the major cloud providers, entire country financial systems, entire internets of things and even down to the little things like surgically embedded pacemakers. We help companies put trust - an abstract idea - to work. That's digital trust for the real world. Job summary We are seeking a seasoned Senior Software Engineer to join our Application Security Engineering team. In this role, you will lead the development of a new analytics platform that supports our Cyber Threat Intelligence initiatives. You’ll be responsible for full-stack development, with a focus on front-end data visualizations, and will collaborate closely with cross-functional teams in a high-autonomy, high-impact environment. What you will do Collaborate with product managers, cybersecurity analysts, UX designers, and other engineers Own deployment workflows and tooling, including serverless solutions where appropriate Write and maintain tests across the stack to ensure reliability and maintainability Develop backend services to power visualizations, starting with prototypes or existing data artifacts (e.g., spreadsheets, notebooks) Build an interactive, web-based data exploration and visualization platform What you will have Excellent communication skills and ability to work autonomously in a remote environment Strong design sensibility and commitment to building user-centric interfaces Experience with cloud-based deployment strategies (preferably serverless like AWS Lambda) Mastery of JavaScript and CSS; strong understanding of modern front-end libraries (React preferred) Proven experience launching and maintaining production-grade applications 5+ years of frontend-heavy, full stack engineering experience Nice to have Exposure to both startup and large-scale enterprise settings Background building data-intensive or analytics-driven applications Experience in cybersecurity or networking-focused environments Benefits Generous time off policies Top shelf benefits Education, wellness and lifestyle support Show more Show less

Posted 1 week ago

Apply

5.0 - 10.0 years

10 - 20 Lacs

Noida, Bengaluru

Work from Office

Naukri logo

Job Title: Vulnerability Engineer Experience: 5 - 12 Years Location: Bengaluru / Noida Employment Type: Full-time About the Role: We are hiring a Vulnerability Engineer to join our Managed Security Services team. You will be responsible for identifying, analyzing, and tracking security vulnerabilities across enterprise environments. The role involves working with scanning tools, coordinating with stakeholders, and ensuring timely remediation to minimize security risk. Key Responsibilities: Perform vulnerability scans using tools like Tenable Nessus, Qualys, IBM AppScan , etc. Analyze scan results, identify false positives, and prioritize risks Track and support remediation efforts with technical teams Register and manage assets in scanning platforms and maintain scan schedules Prepare reports and metrics for leadership and stakeholders Coordinate with customers on scan schedules and mitigation plans Contribute to automation and process optimization Required Skills: Strong knowledge of vulnerability management processes and tools Solid understanding of network, system, and application-level security Experience in report writing and communicating technical findings Familiarity with enterprise IT environments and TCP/IP networking Excellent problem-solving, collaboration, and communication skills Willingness to participate in on-call support rotation Preferred: Experience with scripting/automation for scanning and reporting Security certifications (e.g., CEH, CompTIA Security+, OSCP)

Posted 1 week ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Email Security Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitating the transition to cloud security-managed operations. You will engage in discussions to align security strategies with organizational objectives, ensuring that all security measures are effectively integrated into the cloud environment. Your role will also require you to stay updated on the latest security trends and technologies to enhance the overall security posture of the organization. Roles & Responsibilities:-Monitor email traffic for suspicious activities.-Configure and manage email security platforms-Analyze and respond to phishing attacks, spam, and malware delivered via email-Implement and maintain email authentication protocols (SPF, DKIM, DMARC).-develop and enforce email security policies (e.g., email encryption,-Respond to email-related security incidents.-Conduct forensic analysis of email-based attacks.-Work with SOC teams during breach investigations.-Conduct phishing user training.-Automate detection and response using SOAR tools.-Analysis of Email Header and Email body analysis Professional & Technical Skills: - Email protocols:SMTP, IMAP, POP3 -DNS records:SPF, DKIM, DMARC Additional Information:- The candidate should have minimum 5 years of experience in Email Security.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 week ago

Apply

4.0 - 8.0 years

9 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

As a Software Developer you'll participate in many aspects of the software development lifecycle, such as design, code implementation, testing, and support. You will create software that enables your clients' hybrid-cloud and AI journeys. Your primary responsibilities include Comprehensive Feature Development and Issue ResolutionWorking on the end to end feature development and solving challenges faced in the implementation. Stakeholder Collaboration and Issue ResolutionCollaborate with key stakeholders, internal and external, to understand the problems, issues with the product and features and solve the issues as per SLAs defined. Continuous Learning and Technology IntegrationBeing eager to learn new technologies and implementing the same in feature development Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Creative problem-solving skills and superb communication Skill. Container based solutions. Strong experience with Node.js and AWS stack - AWS Lambda, AWS APIGateway, AWS CDK, AWS DynamoDB, AWS SQS. Experience with infrastructure as a code using AWS CDK.Expertise in encryption and decryption techniques for securing APIs, API Authentication and Authorization Primarily more experience is required on Lambda and APIGateway. Candidates having the AWS Certified Cloud Practitioner / AWS Certified Developer Associate certifications will be preferred Preferred technical and professional experience Experience in distributed/scalable systems Knowledge of standard tools for optimizing and testing code Knowledge/Experience of Development/Build/Deploy/Test life cycle

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

As one of the world’s leading asset managers, Invesco is dedicated to helping investors worldwide achieve their financial objectives. By delivering the combined power of our distinctive investment management capabilities, we provide a wide range of investment strategies and vehicles to our clients around the world. If you're looking for challenging work, smart colleagues, and a global employer with a social conscience, come explore your potential at Invesco. Make a difference every day! Job Description JOB DESCRIPTION Job Title: Sr. Analyst I - VAPT Job Code: Department: Offensive Security Location: Hyderabad Report To: Manager VAPT Direct Reports: No Job Purpose (Job Summary): This role will perform vulnerability assessments against risk-prioritized infrastructure and applications. This position will serve as a security subject matter expert working with technology, and business partners in managing vulnerabilities and implementing adequate security controls to protect Invesco data and network. Key Responsibilities / Duties: Perform vulnerability assessment on various types of technologies and infrastructure using tools (preferably Qualys). This may include: Network infrastructure and wireless networks Servers, platforms, containers, hosting infrastructure and services Application technologies (APIs, middleware, database, enterprise service bus, etc.) Cloud security controls and applications High value assets and critical infrastructure Review and analyze security vulnerability data to identify applicability and false positives. Assist with ongoing assessment of Invesco perimeter assets to identify exposures and weaknesses. Assist with red team assessments to identify security exposures and to evaluate effectiveness of security controls and response. Assist with producing high-quality papers, presentations, recommendations, and findings for Senior Level Management and Enterprise Technology Leaders Execute vulnerability triaging, escalation, and management workflows through innovation and continuous improvement. Provide internal remediation support through the design, implementation and integration of network infrastructure and information security controls. Participate in vulnerability management projects. Track deliverables and provide periodic updates to the leadership team. Escalate security and projects risk timely. Respond appropriately to cyber risk incident, the related investigations, managing situations with discretion, sensitivity, and objectivity, and with due consideration of chain-of-custody. Have a thorough understanding of technological requirements for Invesco’s systems and provide guidelines to effectively mitigate security risks. Have understanding on security compliance and can perform compliance scans through various tools on the IVZ Infrastructure. Review/Analyze the compliance scan reports and help the teams in the remediation activities. Respond timely to ServiceNow tickets as needed. Keep current with industry best practices. Other duties as assigned. Work Experience / Knowledge: Five plus years of Information Security or relevant experience Three plus years of Pen Testing or Vulnerability Assessment experience. Experience in the tool Splunk for vulnerability management automation capabilities. Cloud vulnerability assessment or pen testing experience preferred Experience with security issues in large networks Able to demonstrate experience, knowledge and skills in utilizing common penetration testing and vulnerability assessment tools and techniques Hands on experience with firewalls, routers, bridges, switches and gateway devices, appliances and software Knowledge of security industry best practices (e.g. SANS, NIST, CIS) Technical Skills Required: Good understanding of security controls and common threats and vulnerabilities Knowledge of penetration testing frameworks Knowledge of security industry best practices (e.g. SANS, NIST, CIS) Understanding of common penetration testing methodologies (e.g. OSSTMM, OWASP) Ability to write scripts/tools to assist in automation is preferred Understanding of encryption technologies and common network protocols Ability to review and analyze security vulnerability data to identify applicability and false positives Patch management technologies and processes Wireless protocols and services Sound understanding of security principles, such as infrastructure security, identity and access management, vulnerability management, and secure coding. A keen analytical mind for problem solving, abstract thought, and offensive security tactics. Other Skills Required: Good interpersonal skills (written and oral communication) and ability to articulate complex issues to executives and customers Make fact-based decisions using individual judgement and problem solving. Ability to communicate technical information clearly and concisely, commensurate with the audience Strong analytical skills with ability to define, collect, analyze data, establish facts, draw valid conclusions, and make fact-based decisions. Conceptual thinking and communication skills — the ability to conceptualize complex business and technical requirements into comprehensible models and templates. Good communicator (written and verbal) and listener. Must be a team player and motivated self-starter with ability to work independently and remotely with limited supervision. Possesses diplomacy and cooperative style necessary to interface effectively with all personalities and across functional disciplines. Must be assertive, methodical and detail oriented Maintain strict confidentiality of all security issues including legal investigations, Compliance, and HR data requests License / Registration / Certification: Preferred certification: Security +, Qualys VM certification, Pentest +, AWS Cloud Practitioner Full Time / Part Time Full time Worker Type Employee Job Exempt (Yes / No) No Workplace Model At Invesco, our workplace model supports our culture and meets the needs of our clients while providing flexibility our employees value. As a full-time employee, compliance with the workplace policy means working with your direct manager to create a schedule where you will work in your designated office at least three days a week, with two days working outside an Invesco office. Why Invesco In Invesco, we act with integrity and do meaningful work to create impact for our stakeholders. We believe our culture is stronger when we all feel we belong, and we respect each other’s identities, lives, health, and well-being. We come together to create better solutions for our clients, our business and each other by building on different voices and perspectives. We nurture and encourage each other to ensure our meaningful growth, both personally and professionally. We believe in diverse, inclusive, and supportive workplace where everyone feels equally valued, and this starts at the top with our senior leaders having diversity and inclusion goals. Our global focus on diversity and inclusion has grown exponentially and we encourage connection and community through our many employee-led Business Resource Groups (BRGs). What’s in it for you? As an organization we support personal needs, diverse backgrounds and provide internal networks, as well as opportunities to get involved in the community and in the world. Our benefit policy includes but not limited to: Competitive Compensation Flexible, Hybrid Work 30 days’ Annual Leave + Public Holidays Life Insurance Retirement Planning Group Personal Accident Insurance Medical Insurance for Employee and Family Annual Health Check-up 26 weeks Maternity Leave Paternal Leave Adoption Leave Near site Childcare Facility Employee Assistance Program Study Support Employee Stock Purchase Plan ESG Commitments and Goals Business Resource Groups Career Development Programs Mentoring Programs Invesco Cares Dress for your Day In Invesco, we offer development opportunities that help you thrive as a lifelong learner in a constantly evolving business environment and ensure your constant growth. Our AI enabled learning platform delivers curated content based on your role and interest. We ensure our manager and leaders also have many opportunities to advance their skills and competencies that becomes pivotal in their continuous pursuit of performance excellence. To Know More About Us About Invesco: https://www.invesco.com/corporate/en/home.html About our Culture: https://www.invesco.com/corporate/en/about-us/our-culture.html About our D&I policy: https://www.invesco.com/corporate/en/our-commitments/diversity-and-inclusion.html About our CR program: https://www.invesco.com/corporate/en/our-commitments/corporate-responsibility.html Apply for the role @ Invesco Careers : https://careers.invesco.com/india/ Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Qualifications Minimum ten years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Title : Regional Client Security Assurance Lead Sub Function: Client Security Assurance Objectives of the role The Regional Client Security Assurance Lead, Associate Director, plays a pivotal role in leading a team responding to security risk assessments and due diligence exercises from clients in the IN/MENA region. This position requires extensive collaboration with various global and local functional teams, such as Data Protection, Risk Management, Compliance, Counsel, Procurement, Information Security, Technology, and EY service lines. This role is responsible for leading and supporting client and regulatory inquiries about EY’s Global Information Security program. It assists EY client engagement teams by addressing client requests regarding how EY secures our client information using comprehensive technical controls and governance processes in line with EY Global Information Security requirements. This position involves managing multiple requests and responsibilities while supporting complex security assessments throughout various stages of the engagement life cycle. Additionally, it requires staying current with updates in EY's Information Security posture and technology offerings, thereby contributing to business growth and the development of new business opportunities. Key Responsibilities The Regional Client Security Assurance Lead serves as a dependable client security relationship manager for key EY clients throughout the client engagement lifecycle, aiming to sustain and expand business operations. Furthermore, this position involves leading a team, projects, performing data analytics, and management of operational processes within IN/MENA Client Security Assurance. Team Lead: Lead team members to foster career growth and help them become knowledgeable about the EY Information Security Program and facilitate client security assessments. Implement operating model for the IN/MENA Client Security Assurance team in alignment with our business objectives. Drive the Evolution of Client Security Assurance: Actively participate in the development, implementation, and ongoing enhancement of the Client Security Assurance function in alignment with industry best practices. Facilitate Security Assessments: Act as a key resource for client and engagement teams by providing expert guidance on inbound security assessments related to EY’s Global Information Security Program, fostering trust and confidence in the EY Global Information Security Program, and the controls in place to protect data along with safeguarding the confidentiality of our security controls. This also helps build EY’s reputation and brand in the market. Clearly communicate with clients and their appointed auditors, pertinent and appropriate details of the EY Global Information Security Program. Provide critical support to EY’s approach to winning new business and sustaining existing business relationships. Provide consulting services to account teams related to client security assessments and their Supplier Risk Management framework. Meet with Clients: Participate in client meetings as an Information Security representative, supporting EY account teams by addressing client inquiries related to the EY Global Information Security Program. Support Request for Proposal (RFP) process: Partner with client engagement teams to support the RFP process by addressing information security questions to help secure more business for EY. Engage with Regulators: Support inquiries and assessments from select local regulators, highlighting EY's commitment to transparency and compliance in governance processes, technologies, and information security controls. Qualifications Minimum ten years of recent progressive IT security compliance, risk management or related IT security experience with a large IT organization; preferably within a professional service firm, software product, cloud-based solutions, or other companies serving clients that are highly regulated entities. Bachelor’s degree from an accredited college or university is preferred. A good understanding of cloud infrastructure, networking, modern software development and technical security controls is required. Strong executive presence, negotiation, presentation, and communication skills are required. Excellent analytical and problem-solving skills to assess and solve complex security issues. Ability to work and navigate through EY’s Global firm understanding diverse perspectives and global client requirements. Ability to maintain calm during client assessments and respond to questions consistently and confirming internally the accuracy of responses before presenting them. Proven experience in client-facing roles, particularly in handling security assessments, ideally from client inquiries, but can also be the result of experience performing security assessment of suppliers. Demonstrated ability to adopt and strive for continuous process improvement, particularly in resulting from the innovation and integration of new technologies. Excellent collaboration skills, with the ability to engage effectively with cross-functional teams and stakeholders. Knowledge of various information security frameworks such as ISO27001/2, AICPA System and Organization Controls (SOC) Reports (SOC1, SOC2, and SOC3), NIST, COBIT and relevant regulatory requirements such as GDPR. Certifications such as CISSP, CISM, CISA, ISO 27001 Auditor, CRISC, CIPP are preferred. Keep up to date with industry trends, emerging technologies and best practices. Good understanding in the following concepts and domains: Governance Risk and Compliance: A system that ensures that organizations enforce governance, implement risk management strategies, and ensure regulatory compliance. Multitier Network Architecture: A design separating resources between the Internet and the internal infrastructure, incorporating multiple network layers. For on-premise solutions, this includes a DMZ (Demilitarized Zone) architecture. In cloud environments, it involves a combination of Network Security Groups (NSG), Virtual Networks (VNETs), IP-based restrictions on connections between resources, and Web Application Firewalls (WAF). Cloud security architecture: Cloud security architecture's purpose is to provide a structured framework for securing data, applications, and infrastructure in cloud environments. It includes the definition of security principles and a governance framework for all cloud services and applications from development through production. Distinction of Cloud Service Models such as IaaS, PaaS and SaaS and shared responsibility matrix: Infrastructure as a Service (IaaS): IaaS provides on-demand access to virtualized computing infrastructure, including servers, storage, and networking, allowing subscribers to build and manage their own applications, operating systems, and data while the cloud provider manages the underlying infrastructure. Platform as a Service (PaaS): PaaS offers a platform for developers to build, deploy, and manage applications without the need to manage the underlying operating systems and infrastructure. Software as a Service (SaaS): SaaS delivers software applications to users over the internet, allowing them to access and use the software without installing or managing it on their own devices. We will be dependent on the SaaS providers for the security controls to protect EY and client information. Application security: Measures taken to protect software applications from threats and vulnerabilities that can compromise the confidentiality, integrity, or availability of the data. Identity and access management: Includes use of authentication mechanisms, authorization measures, and privileged account management. Encryption standards: Standards for cryptography, used to protect data-at-rest and data-in-transit as well as provide a means of validating the authenticity, non-repudiation, and integrity of data. Endpoint security capabilities: Standards to protect endpoints such as laptops, desktops, smartphones, and tablets against cyberattacks. Incident response Plan: The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of malicious cyber-attacks against an organization’s information systems(s). Business impact analysis: Predicts the consequences of a disruption to your business, and gathers information needed to develop recovery strategies. Disaster recovery: Understand the disaster recovery plan for the applications used to support our clients. Stakeholder management This role is a combination of technical and business acumen capable of communicating and advocating EY’s brand as it relates to the Information Security Program, across a wide range of stakeholders. This requires communication skills adaptable to the appropriate audiences that address different perspectives, goals, and levels of technical knowledge. It also requires the ability to gain trust and act as a trusted consultant and liaison between clients, account teams and EY internal security functions. Stakeholders include: Product/Application owners – responsible for the full lifecycle of a technology solution that fulfills a business need or objective. Client Security Assurance provide useful feedback from clients to further enhance their products/applications. Architects and Engineers – EY technology leaders who design and build solutions based on business requirements. Information Security Leadership Team – responsible for all matters for security related to the security program. Extended Security Team – responsible for specific domains such as Security Consulting, Application Security Compliance, Supplier Risk Assessment, Cyber Defense, Business Impact Analysis, Information Security Policies related to the security program. EY Partners and Account teams: Ultimately responsible for the relationship with EY clients and the selection and usage of the technology leveraged for their services and deliverables. EY Clients and Client Security Auditors – The ultimate customer for EY’s technology or service delivery who expect EY’s technology solutions to adequately protect their data and maintain appropriate service levels. The Client Security Assurance Senior Consultant will participate in number of client meetings with the engagement team to answer questions and provide clarification on how EY secure client information. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

100.0 years

0 Lacs

Vadodara, Gujarat, India

On-site

Linkedin logo

Accelleron is accelerating sustainability in the marine and energy industries as a global technology leader in turbocharging, fuel injection, and digital solutions for heavy-duty applications. Building on a heritage of over 100 years as a trusted industry partner, the company serves customers in more than 100 locations in over 50 countries. Accelleron’s 3,000 employees are continuously innovating to deliver best-in-class products, services, and solutions that are mission-critical for the energy transition. You will join a team of experts in an exciting international environment, committed to excellence and innovation. Together, we support our customers in driving the transition toward sustainable industries with cutting-edge technology, deep expertise, and smart solutions. At Accelleron, we foster diversity and inclusion, welcoming and celebrating individual differences as a source of strength. We are seeking a motivated and detail-oriented Workplace Engineer to join our global IT Infrastructure team. As part of the Digital Workplace team in our Center of Excellence in Vadodara, you will be instrumental in implementing, maintaining, and supporting end-user technologies, ensuring seamless operations and contributing to the evolution of our digital workplace. You will work closely with the Workplace Architect and internal/external partners to deliver stable, secure, and optimized IT workplace services, testing and analyzing laptops, workstations and related main components, including end-user devices (computers, mobile phones), their configurations, maintenance, patching and troubleshooting activities. Your Responsibilities Participate in incident, problem, and request handling across workplace services, ensuring adherence to agreed-upon Service Level Agreements (SLAs), on time, within budget and at high quality. Create and maintain technical documentation, deployment instructions, and user support materials. Manage operating system deployments (Windows 11), patching, upgrades, and imaging using tools like MDT, MECM (SCCM), and Intune. Follow architectural, process and operational guidelines in projects and initiatives Package and deploy software applications, drivers, BIOS/firmware updates, and troubleshoot related issues. Support Mobile Device Management (MDM) environments and related policies, including iOS and Android device administration. Apply and maintain configuration settings using Group Policy Objects (GPO) and Intune configuration profiles. Ensure endpoint compliance, security, and stability through consistent patching and proactive monitoring. Provide mentorship for support staff Collaborate with the Workplace Architect to run proofs of concept (PoCs), pilot programs, and field tests of new hardware and technologies. Contribute to the development and maintenance of High-Level Design (HLD) and Low-Level Design (LLD) documentation for workplace technologies. Coordinate with external vendors and hardware suppliers to assess compatibility and performance of workplace devices. Support projects involving hardware refresh, OS migrations, and endpoint security enhancements. Your Background Bachelor's degree in computer science, Information Systems, or related field. 2–4 years of hands-on experience in desktop engineering, systems deployment, or endpoint management roles. Proficiency in Windows OS deployment (11), troubleshooting, and support. Working knowledge of MDT, MECM/SCCM, and Intune/Microsoft Endpoint Manager. Experience with software packaging, patching strategies, and automated deployment. Solid understanding of Group Policy, Active Directory, Azure AD, and Microsoft Entra ID. Familiarity with mobile platforms (Android/iOS) and MDM tools. Strong problem-solving, diagnostic, and root-cause analysis skills. Excellent communication skills and ability to collaborate with cross-functional teams. Fluency in English is required Experience with Virtual Desktop Infrastructure (VDI) platforms. Familiarity with security policies, compliance enforcement, and endpoint encryption (e.g., BitLocker). Understanding of ITIL processes; certification is a plus. Basic PowerShell scripting knowledge for task automation and troubleshooting. Your Benefits Attractive compensation & benefits Employee Assistance Program Global parental leave program Flexible working model We look forward to receiving your application. If you want to discover more about Accelleron, take another look at our website accelleron.com. Accelleron Data Privacy Statement: accelleron.com/privacy-notice/candidate Show more Show less

Posted 1 week ago

Apply

5.0 - 9.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Job Description Role : Lead Developer Job Summary – An opening for a highly skilled and motivated developer with expertise in Go (Golang), React, and Cloud Security to join our dynamic team. The ideal candidate will design, develop, and maintain secure, scalable, and high-performance applications while ensuring robust cloud security practices. This role requires a strong understanding of backend and frontend development, cloud infrastructure, and security protocols using Google Cloud Platform (GCP), Go (Golang), React. Years of experience needed – 5-9 year. Technical Skills  Build and maintain scalable APIs and microservices using Go (Golang).  Optimize backend systems for performance and reliability.  Develop responsive and user-friendly interfaces using React.  Collaborate with UI/UX designers to implement seamless user experiences  Strong understanding of RESTful API design and development.  SQL: Advanced knowledge of database management and query optimization.  Participate in code reviews, testing, and deployment processes.  Strong understanding of cloud security principles, encryption, and IAM.  Design and implement secure cloud-based solutions (AWS, Azure, or GCP).  Experience with CI/CD pipelines and DevOps tools like Jenkins or GitHub Actions.  Proficient with Agile methodology and related terminologies  Knowledge of Kubernetes and Docker for containerized application deployment.  Google Cloud Platform (GCP): Hands-on experience with GCP services, tools, and deployment pipelines.  Familiarity with other front-end frameworks like Angular. Key Responsibilities  Design, implement, and manage scalable cloud solutions using GCP services.  Design and implement RESTful APIs to support various applications.  Design, implement, and optimize database schemas and queries.  Develop and maintain deployment pipelines for continuous integration and delivery.  Develop high-performance, scalable applications using Go.  Develop and maintain CI/CD pipelines using tools like Jenkins or GitHub Actions.  Build and maintain user interfaces and single-page applications using React.  Ensure APIs are secure, scalable, and maintainable.  Ensure seamless integration with back-end services.  Ensure the best possible performance, quality, and responsiveness of applications.  Ensure data integrity and security.  Ensure high availability and scalability of applications.  Manage database performance, including indexing and query optimization.  Deploy and manage containerized applications using Kubernetes and Docker.  Implement best practices for container orchestration and management.  Automate build, test, and deployment processes.  Monitor and troubleshoot CI/CD pipeline issues.  Collaborate with cross-functional teams to define and implement new features.  Optimize cloud infrastructure for performance and cost-efficiency.  Optimize applications for maximum speed and scalability.  Lead and participate in Agile ceremonies such as sprint planning, stand-ups, and retrospectives.  Continuously improve development processes and practices. Behavioral Skills  Resolve technical issues of projects and explore alternate designs.  Participates as a team member and fosters teamwork by inter-group coordination within the modules of the project.  Train and coach members of project groups to ensure effective knowledge management activity.  Effective interpersonal, team building and communication skills.  Ability to collaborate; be able to communicate clearly and concisely both to laypeople and peers, be able to follow instructions, make a team stronger for your presence and not weaker.  Ability to see the bigger picture and differing perspectives; to compromise, to balance competing priorities, and to prioritize the user. Certification  NA About Mphasis Mphasis applies next-generation technology to help enterprises transform businesses globally. Customer centricity is foundational to Mphasis and is reflected in the Mphasis’ Front2Back™ Transformation approach. Front2Back™ uses the exponential power of cloud and cognitive to provide hyper-personalized (C=X2C2TM=1) digital experience to clients and their end customers. Mphasis’ Service Transformation approach helps ‘shrink the core’ through the application of digital technologies across legacy environments within an enterprise, enabling businesses to stay ahead in a changing world. Mphasis’ core reference architectures and tools, speed and innovation with domain expertise and specialization are key to building strong relationships with marquee clients. Show more Show less

Posted 1 week ago

Apply

8.0 years

0 Lacs

Tamil Nadu, India

Remote

Linkedin logo

For an international project in Washington, we are urgently looking for a Senior Oracle APEX Developer to lead the design, development, and optimization of complex Oracle APEX applications in a fast-paced enterprise environment. Candidates need to have at least 8 years of hands-on experience in Oracle APEX development. We are looking for a contractor, who is able to work 2 hours US (Washington) time. This position is long-term. Candidates need to be fluent in English. Tasks and responsibilities: Architect, develop, and enhance complex, enterprise-level Oracle APEX applications. Lead the end-to-end development lifecycle, from gathering requirements to deployment and maintenance. Write high-performance SQL & PL/SQL code, including stored procedures, triggers, and packages. Implement advanced APEX Dynamic Actions, Interactive Reports, and Universal Theme customizations. Develop and integrate RESTful APIs, SOAP services, and third-party web services within APEX applications. Provide technical advice and guide team to ensure APEX security best practices, including authentication, authorization, session management, and data protection. Optimize application performance by improving queries, indexing strategies, and UI responsiveness. Collaborate with business stakeholders, architects, and DevOps teams to define and implement scalable solutions. Lead code reviews, mentoring junior developers, and defining APEX best practices. Work with CI/CD pipelines, version control (Git), and deployment automation tools for efficient software delivery. Maintain detailed documentation on system architecture, technical specifications, and troubleshooting procedures. Profile: Bachelor or Master degree; +8 years of hands-on experience in Oracle APEX development; Expert-level proficiency in Oracle SQL and PL/SQL, including query tuning and optimization; Strong knowledge of APEX Dynamic Actions, Page Processes, Custom Themes, and Oracle JETCharts; In-depth experience of Oracle APEX Shared Components, including workflows, automations, security protocols, authentication/authorization schemes, and role-based access control; Proficiency in JavaScript, jQuery, AJAX, and CSS for advanced UI/UX customizations; Experience with APEX security models, authentication (OAuth, LDAP, SSO), and data encryption; Proven ability to integrate RESTful web services, JSON, XML, and ORDS with APEX applications; Deep understanding of Oracle database architecture, indexing strategies, and performance tuning; Experience with Git, CI/CD pipelines, DevOps tools, and cloud deployments (Oracle Cloud, AWS, or Azure); Strong analytical and problem-solving skills with the ability to troubleshoot complex applications; Excellent communication skills and ability to collaborate with cross-functional teams; Fluent in English; Preferred Qualifications: Experience with APEX Plugin Development for extended functionality; Knowledge of Oracle Forms and Reports migration to APEX; Experience with Progressive Web Apps (PWAs) and modern front-end frameworks (React, Angular); Hands-on experience deploying APEX applications on Oracle Cloud Infrastructure (OCI); Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

About Tarento Tarento is a fast-growing technology consulting company headquartered in Stockholm, with a strong presence in India and clients across the globe. We specialize in digital transformation, product engineering, and enterprise solutions, working across diverse industries including retail, manufacturing, and healthcare. Our teams combine Nordic values with Indian expertise to deliver innovative, scalable, and high-impact solutions. We're proud to be recognized as a Great Place to Work , a testament to our inclusive culture, strong leadership, and commitment to employee well-being and growth. At Tarento, you’ll be part of a collaborative environment where ideas are valued, learning is continuous, and careers are built on passion and purpose. Role Overview An Azure Data Engineer specializing in Databricks is responsible for designing, building, and maintaining scalable data solutions on the Azure cloud platform, with a focus on leveraging Databricks and related big data technologies. The role involves close collaboration with data scientists, analysts, and software engineers to ensure efficient data processing, integration, and delivery for analytics and business intelligence needs245. Key Responsibilities Design, develop, and maintain robust and scalable data pipelines using Azure Databricks, Azure Data Factory, and other Azure services. Build and optimize data architectures to support large-scale data processing and analytics. Collaborate with cross-functional teams to gather requirements and deliver data solutions tailored to business needs. Ensure data quality, integrity, and security across various data sources and pipelines. Implement data governance, compliance, and best practices for data security (e.g., encryption, RBAC). Monitor, troubleshoot, and optimize data pipeline performance, ensuring reliability and scalability. Document technical specifications, data pipeline processes, and architectural decisions Support and troubleshoot data workflows, ensuring consistent data delivery and availability for analytics and reporting Automate data tasks and deploy production-ready code using CI/CD practices Stay updated with the latest Azure and Databricks features, recommending improvements and adopting new tools as appropriate Required Skills And Qualifications Bachelor’s degree in Computer Science, Engineering, or a related field 5+ years of experience in data engineering, with hands-on expertise in Azure and Databricks environments Proficiency in Databricks, Apache Spark, and Spark SQL Strong programming skills in Python and/or Scala Advanced SQL skills and experience with relational and NoSQL databases Experience with ETL processes, data warehousing concepts, and big data technologies (e.g., Hadoop, Kafka) Familiarity with Azure services: Azure Data Lake Storage (ADLS), Azure Data Factory, Azure SQL Data Warehouse, Cosmos DB, Azure Stream Analytics, Azure Functions Understanding of data modeling, schema design, and data integration best practices Strong analytical, problem-solving, and troubleshooting abilities Experience with source code control systems (e.g., GIT) and technical documentation tools Excellent communication and collaboration skills; ability to work both independently and as part of a team Preferred Skills Experience with automation, unit testing, and CI/CD pipelines Certifications in Azure Data Engineering or Databricks are advantageous Soft Skills Flexible, self-starter, and proactive in learning and adopting new technologies Ability to manage multiple priorities and work to tight deadlines Strong stakeholder management and teamwork capabilities Show more Show less

Posted 1 week ago

Apply

170.0 years

0 Lacs

Greater Hyderabad Area

On-site

Linkedin logo

Area(s) of responsibility About Us Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Job Summary The IT (Mac) Specialist will be responsible for supporting primarily Mac workstations & Laptops, performing software updates, Installation, imaging, setting up devices and more! Would be responsible for acting as the first line of technical support for our employees, as well as the go-to person for MAC OS related technical support. Experience Required- 4-6 Years Location - Noida/Pune/Bengaluru/Mumbai/Chennai Mode - Hybrid Notice Period - 0-15 Days Job Description Mandatory Skills Should have worked as an engineer providing support Apple MAC devices for a minimum of 6+ years. Preferably an Apple Certified Support Professional (ACSP). Hands on working knowledge of jamf Should be proficient in installing, configuring & troubleshooting enterprise level software on the MAC device such as DLP, CASB, EDR, office 365, SCCM Client etc. Should understand Proxy, WPAD settings & SMB on a MAC device. Should be comfortable in utilizing shell & its utilities, such as Ping, Traceroute, telnet etc. Should be proficient in upgrading OS & its security patches, along with security patches related to third party applications. Should be proficient in installing Network/Local printers as well as shared drives. Should have good knowledge on Mac M1/Intel chip, file system, storage, encryption, networking concepts. Show more Show less

Posted 1 week ago

Apply

3.0 years

0 Lacs

Thane, Maharashtra, India

On-site

Linkedin logo

Responsibilities Design, implement, and maintain comprehensive cybersecurity measures for safeguarding systems, networks, and sensitive data. Administer and optimize cybersecurity infrastructure including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint detection and response (EDR), privileged access management (PAM), and cloud security posture management (CSPM) platforms. Perform regular security assessments and audits to proactively identify vulnerabilities, prioritizing and addressing remediations. Continuously monitor network and system activity for suspicious behavior or potential threats, performing detailed risk analysis and incident investigation. Serve as a vital member of the Incident Response Team, effectively addressing cybersecurity breaches and minimizing business impact. Develop, document, and execute emergency response plans, disaster recovery protocols, and incident playbooks. Collaborate closely with IT teams and various business units to integrate robust security practices across the organization. Partner actively with the Security Operations team to stay ahead of emerging ransomware, phishing campaigns, and zero-day vulnerabilities, and implement appropriate preventive measures. Contribute to the creation, review, and enforcement of cybersecurity policies and procedures, ensuring compliance with applicable regulations and industry standards. Generate clear, concise, and timely reports on security posture, threats, incidents, and mitigation measures for senior management. Stay abreast of industry developments, emerging threats, innovative technologies, and best practices to continually enhance cybersecurity defenses. Recommend improvements to security architecture, technology adoption, and procedures based on threat intelligence and industry advancements. Perform additional cybersecurity-related duties as required. Basic Qualifications Minimum 3 years of experience in cybersecurity roles, with a solid understanding of network infrastructure and database security. Demonstrated proficiency in security technologies including firewalls, VPN, IDS/IPS, endpoint protection, encryption, and cloud security. Hands-on experience working in diverse environments such as cloud, hybrid-cloud, multi-cloud, and on-premises systems. Familiarity with cybersecurity frameworks (e.g., NIST, ISO 27001) and regulatory standards (e.g., GDPR, HIPAA). Strong analytical, critical thinking, and problem-solving capabilities. Excellent written and verbal communication skills in English, with proven ability to collaborate effectively across teams. Relevant industry certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) strongly preferred. Ability to travel domestically or internationally up to 10% as needed. Preferred Characteristics Bachelor’s or Master's degree in Computer Science, Information Security, or related technical fields. Experience securing Operational Technology (OT) systems in global manufacturing environments. Expertise in defending against sophisticated threats, including nation-state threat actors. Prior U.S. Security Clearance or experience in highly regulated environments. Familiarity and experience conducting audits and maintaining compliance with standards such as SOC, ISO 27001/27017/27018/27701, FedRAMP, SOX 404, HITRUST CSF, HIPAA, GxP, 21 CFR Part 11, EU Annex 11, and NIST guidelines. Proficiency in scripting languages such as Python, Shell, Ruby, or Perl. Previous experience in corporate IT, help desk, or infrastructure support roles. Show more Show less

Posted 1 week ago

Apply

28035.0 years

0 Lacs

Noida, Uttar Pradesh, India

Remote

Linkedin logo

Python AWS Developer https://goodspace.ai/jobs/Python-AWS-Developer?id=28035&source=campaign_Linkedin-kritika_pythonawsdeveloper-28035 Years of Experience - 5-10 Years Location -Remote Mongodb, Python, Amazon Web Services (was),SQL (e.g., PostgreSQL, MySQL) Job Description: We are seeking a skilled Senior Python Developer with extensive experience in Python development and hands-on expertise in AWS cloud services. The ideal candidate will play a crucial role in developing, maintaining, and deploying backend services and cloud infrastructure. This position is primarily focused on Python development , complemented by AWS tasks . Key Responsibilities: ● Python Development : Design, develop, test, and deploy scalable and efficient backend solutions using Python.Write clean, maintainable, and well-documented code following best practices. Implement APIs, data processing workflows, and integrations with various services. Troubleshoot, debug, and optimize existing Python applications for performance and scalability. Collaborate with cross-functional teams, including frontend developers, QA engineers, and product managers, to deliver high-quality software. Conduct code reviews and mentor junior developers on best practices. AWS Cloud Management : Work with AWS services, with a primary focus on SQS, Lambda, SNS, EC2, and RDS. Integrate SQS for message queuing and ensure robust, scalable communication between microservices. Implement and manage CI/CD pipelines using AWS services like CodePipeline, CodeBuild, and Code Deploy. Monitor and optimize cloud resource usage, ensuring cost-effective and reliable cloud operations. Set up security best practices on AWS, including IAM roles, VPC configurations, and data encryption. Troubleshoot cloud-related issues, perform regular updates, and apply patches as needed. Required Skills and Qualifications: ● Bachelor’s degree in Computer Science, Engineering, or a related field. ● 5+ years of hands-on experience in Python development. ● Strong understanding of RESTful API design and integration. ● Solid experience with relational databases (e.g., PostgreSQL, MySQL) and NoSQL databases (e.g., MongoDB). ● 2+ years of experience working with AWS services including EC2, S3, Lambda, RDS, and CloudFormation. ● Familiarity with DevOps practices and CI/CD tools. ● Experience with version control systems, particularly Git. ● Strong problem-solving skills and attention to detail. ● Excellent communication skills and ability to work in a team environment. Quick apply on the link by copying the the link on other tab : https://goodspace.ai/jobs/Python-AWS-Developer?id=28035&source=campaign_Linkedin-kritika_pythonawsdeveloper-28035 Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Responsible for designing and implementing user-facing features, developing server-side logic and databases, integrating third-party APIs, conducting testing and debugging, deploying applications, implementing security measures, optimizing performance, and collaborating with cross-functional teams to ensure alignment with project requirements. Design and implement user-facing features to ensure a seamless and responsive user experience across various applications. Develop server-side logic and databases to support front-end functionalities and ensure smooth data processing. Design, implement, and maintain databases to store and manage application data efficiently, ensuring data integrity and scalability. Integrate third-party APIs and web services to enhance application functionality and facilitate seamless data exchange with external systems. Maintain version control systems to manage and collaborate on codebase, ensuring code quality, consistency, and easy collaboration within development teams. Conduct thorough testing and debugging of application components to ensure reliability, security, and optimal performance across different environments. Deploy applications to production environments and collaborate with DevOps teams to optimize deployment processes and ensure continuous integration and delivery (CI/CD). Collaborate with Information Security teams and Implement security best practices and measures (e.g., encryption, authentication, authorization) to protect applications from vulnerabilities and cyber threats. Identify and address performance bottlenecks, optimize application performance, and improve scalability to enhance user experience and accommodate growing user demands. Document codebase, APIs, and technical specifications, and collaborate effectively with cross-functional teams including designers, product owners/managers, and other developers to ensure alignment with project requirements and timelines. Education: Bachelor's degree or equivalent in Computer Science, Electrical / Electronics Engineering, MIS or related discipline Experience: Relevant work experience in both front-end and back-end application design and development based on the following number of years: Associate: Prior experience not required Standard I: Two (2) years Standard II: Three (3) years Senior I: Four (4) years Senior II: Five (5) years Knowledge, Skills And Abilities Fluency in English Accuracy & Attention to Detail Analytical Skills Problem Solving Skills Microsoft Office & PC Skills Numerical Skills Preferred Qualifications Pay Transparency: Pay Additional Details: FedEx was built on a philosophy that puts people first, one we take seriously. We are an equal opportunity/affirmative action employer and we are committed to a diverse, equitable, and inclusive workforce in which we enforce fair treatment, and provide growth opportunities for everyone. All qualified applicants will receive consideration for employment regardless of age, race, color, national origin, genetics, religion, gender, marital status, pregnancy (including childbirth or a related medical condition), physical or mental disability, or any other characteristic protected by applicable laws, regulations, and ordinances. Our Company FedEx is one of the world's largest express transportation companies and has consistently been selected as one of the top 10 World’s Most Admired Companies by "Fortune" magazine. Every day FedEx delivers for its customers with transportation and business solutions, serving more than 220 countries and territories around the globe. We can serve this global network due to our outstanding team of FedEx team members, who are tasked with making every FedEx experience outstanding. Our Philosophy The People-Service-Profit philosophy (P-S-P) describes the principles that govern every FedEx decision, policy, or activity. FedEx takes care of our people; they, in turn, deliver the impeccable service demanded by our customers, who reward us with the profitability necessary to secure our future. The essential element in making the People-Service-Profit philosophy such a positive force for the company is where we close the circle, and return these profits back into the business, and invest back in our people. Our success in the industry is attributed to our people. Through our P-S-P philosophy, we have a work environment that encourages team members to be innovative in delivering the highest possible quality of service to our customers. We care for their well-being, and value their contributions to the company. Our Culture Our culture is important for many reasons, and we intentionally bring it to life through our behaviors, actions, and activities in every part of the world. The FedEx culture and values have been a cornerstone of our success and growth since we began in the early 1970’s. While other companies can copy our systems, infrastructure, and processes, our culture makes us unique and is often a differentiating factor as we compete and grow in today’s global marketplace. Show more Show less

Posted 1 week ago

Apply

8.0 years

1 - 4 Lacs

Thiruvananthapuram

On-site

GlassDoor logo

Techvantage.ai is a next-generation technology and product engineering company at the forefront of innovation in Generative AI, Agentic AI , and autonomous intelligent systems . We build intelligent, secure, and scalable digital platforms that power the future of AI across industries. Role Overview: We are looking for a Senior Security Specialist with 8+ years of experience in cybersecurity, cloud security, and application security. You will be responsible for identifying, mitigating, and preventing threats across our technology landscape — particularly in AI-powered, data-driven environments. This role involves leading penetration testing efforts , managing vulnerability assessments , and implementing best-in-class security tools and practices to protect our platforms and clients. What we are looking from an ideal candidate? Design and implement robust security architectures for cloud-native and on-prem environments. Conduct penetration testing (internal/external, network, application, API) and deliver clear remediation strategies. Perform regular vulnerability assessments using industry-standard tools and frameworks. Lead threat modeling and risk assessments across systems, services, and data pipelines. Collaborate with development and DevOps teams to integrate security in SDLC and CI/CD pipelines ( DevSecOps ). Define and enforce security policies, incident response procedures, and access controls. Monitor for security breaches and investigate security events using SIEM and forensic tools. Ensure compliance with global standards such as ISO 27001 , SOC 2 , GDPR , and HIPAA . Provide guidance on secure implementation of AI/ML components and data protection strategies. Preferred Skills: What skills do you need? Requirements: 8+ years of experience in information security , application security , or cybersecurity engineering . Proficient in penetration testing methodologies and use of tools such as Burp Suite , Metasploit , Nmap , Wireshark , Nessus , OWASP ZAP , Qualys , etc. Deep experience in vulnerability management , patching, and security hardening practices. Strong understanding of OWASP Top 10 , CWE/SANS Top 25 , API security, and secure coding principles. Hands-on experience with cloud security (AWS, Azure, or GCP), IAM, firewalls, WAFs, encryption, and endpoint security. Familiarity with SIEM , EDR , IDS/IPS , and DLP solutions. Knowledge of DevSecOps and tools like Terraform , Kubernetes , Docker , etc. Excellent problem-solving, analytical, and incident-handling capabilities. Preferred Qualifications: Certifications such as CISSP , CISM , CEH , OSCP , or AWS Security Specialty . Experience working on security aspects of AI/ML platforms , data pipelines , or model inferencing . Familiarity with governance and compliance frameworks (e.g., PCI-DSS, HIPAA). Experience in secure agile product environments and threat modeling techniques. What We Offer: A mission-critical role securing next-gen AI systems Opportunity to work with an innovative and fast-paced tech company High visibility and leadership opportunities in a growing security function Compensation is not a constraint for the right candidate

Posted 1 week ago

Apply

2.0 years

5 - 8 Lacs

Hyderābād

On-site

GlassDoor logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. JD : Container Security Engg – Exp –2-5 years Responsibilities: Design, Deploy and Troubleshoot Container Deployments for Security Scanning solution containerized agents using Helm Charts, on Kubernetes Platforms (Open Shift and EKS). Support integration with CI /CD pipelines and automation efforts to ensure that security testing is an integral and painless part of code development. Ensure these tools deliver maximum value for both security and developer stakeholders. Provide training, guidance and JIRA Story Integration with Security Solutions for developers to obtain Remediation Guidance deliver secure code. Provide API analysis and support for the integration of Security Solutions with Risk and Reporting solutions to track, prioritize and drive remediation of code vulnerabilities. Develop and foster effective working relationships within both Security and IT teams to ensure that projects are delivered securely and on-time. Configure and manage OpenSSL for cryptographic operations, including SSL/TLS certificates, key generation, and encryption protocols. Implement and maintain secure communication channels between services using OpenSSL. Design, build, and maintain highly scalable, reliable, and secure AWS cloud infrastructure using Terraform. Write and manage Terraform scripts for the provisioning of AWS resources (e.g., EC2, S3, VPC, RDS, Lambda, etc.). Required: Minimum of 2 years of IT experience At least 2+ years of specialization in Container Security. At least 1+ years of application development experience with backend development, Containerized applications At least 1+ Experience with programming languages such as Java, JavaScript, Python At least 1+ Experience working with Container Technologies such as Docker, and Kubernetes Platforms such as OpenShift or EKS or GKE. Experience using or fixing vulnerabilities various container security tools. 1+ years of experience with OpenSSL, managing SSL/TLS certificates and encryption. 1+ years of hands-on experience with Terraform in AWS environments. Preferred: Experience with Container Deployments using Helm Charts and Infrastructure Code preferably Terraform. Experience working with Secure Development Pipelines such as Jenkins or Electric Flow Strong knowledge of relevant Security Standards (OWASP) and how to apply them to the software development lifecycle in a large agile environment. Experience performing security analysis on web applications and APIs. Experience working in an Agile environment. AWS certifications (e.g., AWS Solutions Architect, AWS DevOps Engineer) are a plus. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

Exploring Encryption Jobs in India

The encryption job market in India is rapidly growing as organizations prioritize securing their data and communication channels. Professionals skilled in encryption techniques are in high demand across various industries such as IT, cybersecurity, finance, and healthcare.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Mumbai
  5. Delhi

Average Salary Range

The average salary range for encryption professionals in India varies based on experience level. Entry-level positions can expect to earn around INR 4-6 lakhs per annum, while experienced professionals with 5+ years of experience can earn upwards of INR 15 lakhs per annum.

Career Path

A typical career path in encryption may involve starting as an Encryption Analyst or Cryptographer, progressing to roles such as Security Engineer, Security Architect, and eventually reaching positions like Chief Information Security Officer (CISO) or Encryption Consultant.

Related Skills

In addition to encryption skills, professionals in this field are often expected to have knowledge of cybersecurity, network security, cryptography, programming languages (such as Python, Java), and familiarity with security protocols like SSL/TLS.

Interview Questions

  • What is encryption and why is it important? (basic)
  • Explain the difference between symmetric and asymmetric encryption. (medium)
  • How does a digital signature work in encryption? (medium)
  • What is the role of a key in encryption? (basic)
  • Can you explain the concept of end-to-end encryption? (medium)
  • Describe a scenario where you would use hashing instead of encryption. (advanced)
  • How do you ensure secure key management in encryption processes? (advanced)
  • What is quantum encryption and how does it differ from traditional encryption methods? (advanced)
  • How can you detect if encrypted data has been tampered with? (medium)
  • Discuss the limitations of encryption in ensuring data security. (advanced)
  • Explain the concept of a 'man-in-the-middle' attack in the context of encryption. (medium)
  • How do you mitigate the risks associated with encryption key loss? (advanced)
  • Describe the process of encryption key rotation and its significance. (medium)
  • Can you compare the performance impact of different encryption algorithms? (advanced)
  • How do you handle compliance requirements related to encryption in an organization? (medium)
  • What are some common challenges faced when implementing encryption on a large scale? (advanced)
  • How does encryption contribute to data privacy regulations like GDPR? (medium)
  • Discuss the importance of secure random number generation in encryption. (advanced)
  • How do you ensure the integrity of encrypted data during transmission? (medium)
  • What are the best practices for secure encryption key storage? (advanced)
  • How can you verify the authenticity of an encrypted message? (medium)
  • Discuss the concept of forward secrecy in encryption protocols. (advanced)
  • How do you evaluate the performance impact of encryption on network latency? (medium)
  • Explain the concept of 'salting' in encryption and its purpose. (medium)

Closing Remark

As you prepare for encryption job opportunities in India, remember to showcase your expertise in encryption techniques, cybersecurity knowledge, and related skills during interviews. Stay updated on the latest trends in encryption technology and demonstrate your passion for data security. With the right preparation and confidence, you can excel in the competitive encryption job market in India. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies