1.Conduct information security management reviews and information security management system (ISMS) assessments 2.Must have knowledge of various compliances like ISO 27001, SOC 2, PCI DSS, GDPR etc. 3.Ensure technical implementation and business processes are aligned 4.Lead the design, implementation, operation and maintenance security management systems 4.Participate in the creation, review and update of information security policies 5.Provide complex technical advice, recommendations and consultancy on networks, infrastructure, products and services supplied 6.Provide or assist with implementation documentation Ongoing project management 7. Must be ISO 27001 LA certified.
1.Conduct information security management reviews and information security management system (ISMS) assessments 2.Must have knowledge of various compliances like ISO 27001, SOC 2, PCI DSS, GDPR etc. 3.Ensure technical implementation and business processes are aligned 4.Lead the design, implementation, operation and maintenance security management systems 4.Participate in the creation, review and update of information security policies 5.Provide complex technical advice, recommendations and consultancy on networks, infrastructure, products and services supplied 6.Provide or assist with implementation documentation Ongoing project management 7. Must be ISO 27001 LA certified
1.Conduct information security management reviews and information security management system (ISMS) assessments 2.Must have knowledge of various compliances like ISO 27001, SOC 2, PCI DSS, GDPR etc. 3.Ensure technical implementation and business processes are aligned 4.Lead the design, implementation, operation and maintenance security management systems 5.Participate in the creation, review and update of information security policies 6.Provide complex technical advice, recommendations and consultancy on networks, infrastructure, products and services supplied 7.Provide or assist with implementation documentation Ongoing project management 8. Must be ISO 27001 LA certified
1. Bachelors degree in Computer Science, Information Security, or a related field (Masters preferred). 2. 5+ years of hands-on experience in Identity and Access Management (IAM) architecture and solutions. 3. Expertise in IAM technologies such as Okta, Azure AD, SailPoint, ForgeRock, Ping Identity, or equivalent. 4. Strong knowledge of security architecture frameworks (e.g., SABSA, TOGAF, Zero Trust) and best practices. 5. In-depth understanding of authentication protocols such as SAML, OAuth, OpenID Connect, LDAP, Kerberos, etc. Experience with Privileged Access Management (PAM) solutions such as CyberArk, BeyondTrust, or similar tools. 6.Familiarity with cloud security architecture for IAM in environments like AWS, Azure, and GCP. 7.Proven experience in role-based access control (RBAC), identity governance, and directory services. 8. Solid understanding of compliance requirements and industry standards (e.g., NIST, ISO 27001) related to IAM.
1.Conduct information security management reviews and information security management system (ISMS) assessments 2.Must have knowledge of various compliances like ISO 27001, SOC 2, PCI DSS, GDPR etc. 3.Ensure technical implementation and business processes are aligned 4.Lead the design, implementation, operation and maintenance security management systems 4.Participate in the creation, review and update of information security policies 5.Provide complex technical advice, recommendations and consultancy on networks, infrastructure, products and services supplied 6.Provide or assist with implementation documentation Ongoing project management 7. Must be ISO 27001 LA certified
1. Bachelors degree in Computer Science, Information Security, or a related field (Masters preferred). 2. Develop, test, and maintain scalable web applications using Spring Boot and Angular. 3.Design and manage database structures and queries using SQL. 4. Collaborate with UI/UX designers, product managers, and backend engineers to create a seamless user experience. 5. Implement RESTful APIs and ensure robust backend logic. 6. Optimize application performance and ensure high-quality code. 7. Perform code reviews, debugging, and troubleshooting for production issues. 8. Stay up-to-date with industry best practices and emerging technologies.
1)The work involves Test Case Creation, Penetration Testing, Source code reviews, Report Creation & presentation to stakeholders along with the operation and construction of tools to assist in these tasks. 2)Well-versed with OWASP Top 10, SANS, NIST and WASC Threat Classifications 3)Expertise in Vulnerability Assessment and Penetration Testing of Web Applications, Networks and Cloud (AWS/Azure) 4)Expertise in Penetration testing of Mobile applications 5)Well versed in Source Code Reviews 6)Familiar with popular tools like Burp suite, Paros, OWASP ZAP, Wireshark Nessus, NTO Spider, Metasploit, Exploit DB, Kali etc. 7)Understanding of the nature and sources of security vulnerabilities, how to identify and exploit them 8)Must be CEH certified 9)Excellent communication skills written and verbal
Integrate and optimize security controls within CI/CD pipelines. Work with tools like SAST, DAST, SCA, container scanning, and secrets detection. Partner with developers, architects, and QA to embed security early in the SDLC. Reduce turnaround time and offload senior architects by handling routine and mid-complexity requests. Track request volumes, turnaround times, and quality metrics to drive continuous improvement. Hands-on experience with security tools (e.g., SonarQube, Checkmarx, Fortify, Aqua, Trivy). Familiarity with container security, IaC scanning, and SBOM generation. Scripting skills (Python, Bash, or similar) for automation. Excellent communication and documentation skills. Knowledge of CNAPP, secure design patterns, and cloud-native security. Certifications such as CSSLP, GCSA, or equivalent are a plus.
1. Bachelors degree in Computer Science, Information Security, or a related field (Masters preferred). 2. Develop, test, and maintain scalable web applications using Spring Boot and Angular. 3.Design and manage database structures and queries using SQL. 4. Collaborate with UI/UX designers, product managers, and backend engineers to create a seamless user experience. 5. Implement RESTful APIs and ensure robust backend logic. 6. Optimize application performance and ensure high-quality code. 7. Perform code reviews, debugging, and troubleshooting for production issues. 8. Stay up-to-date with industry best practices and emerging technologies.
1. Bachelors degree in Computer Science, Information Security, or a related field (Masters preferred). 2. 5+ years of hands-on experience in Identity and Access Management (IAM) architecture and solutions. 3. Expertise in IAM technologies such as Okta, Azure AD, SailPoint, ForgeRock, Ping Identity, or equivalent. 4. Strong knowledge of security architecture frameworks (e.g., SABSA, TOGAF, Zero Trust) and best practices. 5. In-depth understanding of authentication protocols such as SAML, OAuth, OpenID Connect, LDAP, Kerberos, etc. Experience with Privileged Access Management (PAM) solutions such as CyberArk, BeyondTrust, or similar tools. 6.Familiarity with cloud security architecture for IAM in environments like AWS, Azure, and GCP. 7.Proven experience in role-based access control (RBAC), identity governance, and directory services. 8. Solid understanding of compliance requirements and industry standards (e.g., NIST, ISO 27001) related to IAM.
1.Conduct information security management reviews and information security management system (ISMS) assessments 2.Must have knowledge of various compliances like ISO 27001, SOC 2, PCI DSS, GDPR etc. 3.Ensure technical implementation and business processes are aligned 4.Lead the design, implementation, operation and maintenance security management systems 4.Participate in the creation, review and update of information security policies 5.Provide complex technical advice, recommendations and consultancy on networks, infrastructure, products and services supplied 6.Provide or assist with implementation documentation Ongoing project management 7. Must be ISO 27001 LA certified
1)The work involves Test Case Creation, Penetration Testing, Source code reviews, Report Creation & presentation to stakeholders along with the operation and construction of tools to assist in these tasks. 2)Well-versed with OWASP Top 10, SANS, NIST and WASC Threat Classifications 3)Expertise in Vulnerability Assessment and Penetration Testing of Web Applications, Networks and Cloud (AWS/Azure) 4)Expertise in Penetration testing of Mobile applications 5)Well versed in Source Code Reviews 6)Familiar with popular tools like Burp suite, Paros, OWASP ZAP, Wireshark Nessus, NTO Spider, Metasploit, Exploit DB, Kali etc. 7)Understanding of the nature and sources of security vulnerabilities, how to identify and exploit them 8)Must be CEH certified 9)Excellent communication skills written and verbal
1.Conduct information security management reviews and information security management system (ISMS) assessments 2.Must have knowledge of various compliances like ISO 27001, SOC 2, PCI DSS, GDPR etc. 3.Ensure technical implementation and business processes are aligned 4.Lead the design, implementation, operation and maintenance security management systems 5.Participate in the creation, review and update of information security policies 6.Provide complex technical advice, recommendations and consultancy on networks, infrastructure, products and services supplied 7.Provide or assist with implementation documentation Ongoing project management 8. Must be ISO 27001 LA certified
1.Conduct information security management reviews and information security management system (ISMS) assessments 2.Must have knowledge of various compliances like ISO 27001, SOC 2, PCI DSS, GDPR etc. 3.Ensure technical implementation and business processes are aligned 4.Lead the design, implementation, operation and maintenance security management systems 4.Participate in the creation, review and update of information security policies 5.Provide complex technical advice, recommendations and consultancy on networks, infrastructure, products and services supplied 6.Provide or assist with implementation documentation Ongoing project management 7. Must be ISO 27001 LA certified
1. Bachelors degree in Computer Science, Information Security, or a related field (Masters preferred). 2. Develop, test, and maintain scalable web applications using Spring Boot and Angular. 3.Design and manage database structures and queries using SQL. 4. Collaborate with UI/UX designers, product managers, and backend engineers to create a seamless user experience. 5. Implement RESTful APIs and ensure robust backend logic. 6. Optimize application performance and ensure high-quality code. 7. Perform code reviews, debugging, and troubleshooting for production issues. 8. Stay up-to-date with industry best practices and emerging technologies.
Design, develop, and execute manual and automated test cases. Identify, document, and track bugs and defects using issue tracking tools. Collaborate with developers and product teams to ensure software quality. Perform functional, regression, performance, and security testing. Develop and maintain test plans, test cases, and test scripts. Stay up-to-date with industry best practices and emerging QA technologies. Proficiency in automation testing tools such as Selenium, Cypress, or similar. Experience with manual testing methodologies and defect tracking tools (JIRA, TestRail, etc.). Familiarity with programming languages such as Java, Python, or JavaScript (a plus). Knowledge of API testing, performance testing, and security testing. Strong analytical and problem-solving skills. Excellent communication and collaboration skills. A strong attention to detail and passion for quality assurance. knowledge of SQL for backend data validation and testing database performance. Familiarity with API testing tools (e.g., Postman). Understanding of different application architectures built on Spring Boot, Node.js, and .NET.
A strategic leadership position responsible for designing and implementing the end-to-end security framework, policies, and architecture across all applications and infrastructure This role ensures compliance, mitigates risk, and drives security best practices across all development teams Define and own the overall application security strategy (AppSec) and DevSecOps processes Conduct Threat Modeling and risk assessments for new and existing systems Design secure configurations for databases (SQL Server, Oracle DB, Redis) and cloud environments Establish secure coding standards for all languages (Java, .NET, Python, Node js, PHP) Evaluate and recommend security tools, technologies, and compensating controls Mentor engineering teams on secure development practices Deep expertise in security principles (CIA triad, OWASP Top 10) Expert-levelknowledge of security protocols (OAuth, SAML, TLS) Strong understanding of secure architecture patterns for microservices, APIs, and mobile platforms (Xamarin, Swift, Kotlin) Experience with infrastructure security concepts
FIND ON MAP
 
                         
                    