Jobs
Interviews

427 Ips Jobs - Page 12

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

6.0 - 9.0 years

11 - 16 Lacs

Pune

Work from Office

Our Purpose Title and Summary Senior Software Engineer - React Developer Who is Mastercard? Mastercard is a global technology company in the payments industry. Our mission is to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart, and accessible. Using secure data and networks, partnerships, and passion, our innovations and solutions help individuals, financial institutions, governments, and businesses realize their greatest potential. Our decency quotient, or DQ, drives our culture and everything we do inside and outside of our company. With connections across more than 210 countries and territories, we are building a sustainable world that unlocks priceless possibilities for all. Overview Real-Time Payments (RTP) offer immediate transfer and detailed messaging options for A2A (Account to Account) payments and are critical on Mastercard s journey for Multi-Rail Payments. Real Time Payments are categorized as Critical National Infrastructure for respective countries and requires high benchmark of resilience, availability, quality, and scalability. Within Real Time Paymeents, Data Feed Manager provides access to transaction, settlement, and reference data information from the Instant Payment System (IPS) in the form of data extracts, all year round. All About You 6-9 years of overall career experience into Technology or a similar role Extensive experience in UI technologies and practices using JavaScript, Typescript, React experience in working with fast paced, modern architecture using Java, Spring Boot, Oracle RDBMS, SQL, Flyway. experience in designing and implementing data models, data migration, and data streams. experience working in cross-functional and large projects with globally dispersed engineering teams. the ability to write secure code and be familiar with secure coding standards (e.g., OWASP, CWE, SEI CERT) and the detection and remediation of security vulnerabilities. the skills in building applications using opensource frameworks to achieve reuse and reduce development times (e.g., Spring Boot, React, others). the ability to configure rules and build automation for code with vulnerability scanning and software composition analysis using standard tools (e.g., SonarQube, Checkmarx, JFrog XRay, Blackduck, others) the skills to conduct various performance tests (e.g., load, spike, breakpoint, endurance) in order to assess if the design and implementation meets the non-functional requirements. proven history of designing enterprise-grade applications utilizing Domain Driven Design principles, microservices, event driven systems, 12 factor principles for cloud native applications, REST and GRPC API design, CAP Theorem, etc. a good understanding of distributed systems design and implementation. the ability to perform debugging and troubleshooting to analyze core, heap, thread dumps and remove coding errors. the proficiency in Software Development Best Practices (TDD/BDD, Unit test, Continuous Integration and Delivery) the skills to orchestrate release workflows and pipelines and apply standardized pipelines via APIs to achieve CI and CD using industry-standard tools (e.g., Jenkins, AWS/Azure pipelines, XL Release, Ansible, others) practitioner of automation/configuration management, deployment strategies (blue/green, canary, A/B testing, feature flags). experience and comprehensive understanding of software/application observability (logging, tracing, metrics, etc), and health and liveliness features, which enable improved R&A and operational monitoring. very good analytical and problem solving skills. the desire to stay abreast of advances in software engineering practices, technologies, and tooling. very good inter-personal skills and ability to work in a collaborative environment effective communication and interpersonal skills, with an ability to express design ideas to a development team and senior management. Nice to have: Experience in building and maintaining critical national infrastructure. Experience working in payments industry. Good understanding of private and public cloud eco systems. We currently operate a hybrid working pattern which allows colleagues to gain a work life balance with the requriement to work from the office and home for part of the week. Flexible to working patterns that enable colaboration and engagement with other teams/individuals that are located in differnet global time zones, as required. The Real Time Payments team is looking for a Senior Software Engineer with proven experience in a squad, including coaching and mentoring. A self starter who is able to take understand and take control of code without much need for knowledge transfer/training. Self sufficient in delivery and be able to progress on work areas with minimal supervision own complex problems having dependency across services and facilitate cross-functional team interactions to drive resolution. be responsible for the analysis, design, development and delivery of software solutions. write code to build and enhance applications/services and promote code-reviews, secure code, whilst adhering to standards and best practices resulting in the deliver high-quality artifacts through to production. define, design, and develop procedures and solutions at a service level to meet the business requirements/enhancements. automate and simplify all aspects of software delivery and development actively evangelizing the need to automate and simplify where needed. drive seamless integration across all connected services to meet end-user expectations. promote a blameless postmortem culture to identify root causes of incidents and implement learnings. advocate for engineering principles outside of current organization/platform. build relationships and effective partnerships across organizations. conduct technical interviews for hiring engineering staff and raising the performance bar. architect monitoring, logging, and alerting to provide end-to-end observability. Corporate Security Responsibility Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: abide by Mastercard s security policies and practices; ensure the confidentiality and integrity of the information being accessed; report any suspected information security violation or breach, and complete all periodic mandatory security trainings in accordance with Mastercard s guidelines.

Posted 1 month ago

Apply

5.0 - 8.0 years

15 - 19 Lacs

Mumbai

Work from Office

At Kulfi Collective, we are a diverse team of storytellers, technologists, and cultural enthusiasts who believe in the power of content to shape minds and inspire change. We are on a mission to create original and branded content that resonates with Gen Y and Gen Z audiences, merging authentic narratives with cutting-edge digital experiences. What are we looking for Title: Lead AI & Platform Engineer Location: Mumbai, Maharashtra (Hybrid) Reports to: Chief Innovation Officer (Product & Tech) Experience: 5-8 years Job Summary As our Lead AI & Platform Engineer, youll be at the heart of blending technology and creativity. Youll work closely with the Chief Innovation Officer at Kulfi Collective to build AI powered products and workflows, with a focus on disrupting creative and marketing processes. Youll create innovative digital products and AI-powered market intelligence & automation platforms that will be used by some of the biggest global and Indian brands. This role is perfect for an ambitious builder who wants to work on cutting edge tech, in a space that is ripe for disruption, and grow into the Chief Technology Officer (CTO) within 2-3 years. Key Responsibilities Build digital products, tools, and connected experiences that transform how brands ideate and produce content Lead backend development and infrastructure for our AI-powered Market Intelligence Platform, delivering insights to top CMOs and brand strategists Orchestrate data ingestion (social, web, first-party), model training & fine-tuning (LLMs, vector DBs, RAG), and near real-time inference at scale. Design, integrate, and manage AI/LLM workflows across text, image, and video generation Collaborate with designers, strategists, and creative directors to develop cutting-edge solutions for brand campaigns and IPs (occasionally build products for clients) Prototype new ideas rapidly and stay on top of emerging multi modal AI trends Implement scalable cloud infrastructure (AWS/GCP), APIs, and CI/CD pipelines for product launches Mentor junior engineers and help establish coding and documentation best practices Contribute to our technical vision and help set the foundations for future engineering leadership Present tech trade-offs and road-map to execs, investors, and enterprise clients. Requirements 5-8 years of backend or full-stack engineering experience, with fluency in at least one of the widely adopted tech stacks 2+ yrs as lead/architect on data or ML Ops heavy SaaS Proven experience designing and deploying production-level APIs, data pipelines, and cloud-native services At least 1 year experimenting with LLMs or GenAI APIs (OpenAI, Claude, Midjourney, Stability, etc.) Strong understanding of cloud services (AWS/GCP), containerized deployments (Docker, ECS, Cloud Run), and modern DevOps (GitHub Actions, Terraform) Exposure to working in fast-paced product environments Strong communication and collaboration skills; ability to partner with non-technical stakeholders Bonus: Prior first engineer or founding-team experience for a product or tech startup Why Join Us Be the first senior tech hire on a mission to redefine how culturally relevant content is created using AI Directly shape tech architecture and product evolution as we scale from MVP to enterprise Work on projects that blend creativity, culture, and code, impacting the biggest brands in India and globally Fast-track to CTO within 2-3 years as you lead the buildout of our tech team and platform roadmap More about Kulfi Collective We are committed to building an inclusive and diverse team at Kulfi Collective. We welcome candidates from all backgrounds, and strive to create a culture that values and respects diversity. Want to know more about Kulfi s incredible work, our culture, the benefits we offer, our journey and everything in between? Here is everything you need to know.

Posted 1 month ago

Apply

6.0 - 8.0 years

2 - 6 Lacs

Bengaluru

Work from Office

Network Administrator - Bengaluru (Sampangiramnagar) Experience in Routing, Switching, Wireless, Firewalls and load balancer. Experience in working on features like NAT, IPSEC, HA, IDS/IPS Experience in working on Firewalls Checkpoint, Cisco ASA, Fortinet Experience in working on Cisco Routers and L2/L3 Switches (Catalyst , Nexus), Multi vendor switches (brocade, etc) Help in Design and deployment of networks. Relevant experience of 6-8 yrs as network administrator role in large enterprise network. • Candidate with CCNA Certified is preferred • Hands-on experience in configuration of switches, routers, virtualised n/w, MPLS, ILL, sdwan, network monitoring tools, firewalls, proxy, etc. ******************************************************************************************* If interested with this opportunity, Kindly - do share your updated Resume along with below required details to devaraj.v@valuepointsystems.com OR WhatsApp to 8867682884 Notice Period: Total Experience: Relevant Experience: Current Location: Preferred Location: Current CTC: Expected CTC: Interview mode: 1) F2F (In-person) Interview : Jayanagar 2) Client Round - F2F

Posted 1 month ago

Apply

3.0 - 7.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Job Description: The ideal candidate will be responsible for managing and securing endpoints using CyberArk EPM and CrowdStrike Falcon. They will play a pivotal role in minimizing risks, improving security posture, and ensuring compliance with organizational policies and industry standards. Technical Skills (Necessary) Preferred: CyberArk Defender, CrowdStrike Certified Falcon Administrator (CCFA). Programming/Scripting: Proficiency in Python, PowerShell, or Bash for security task automation. Experience with Security Technologies: Hands-on with EDR, DLP, IDS/IPS, WAF, AV, and SIEM tools. SSL certificate management for installation, renewal, and troubleshooting. Key Responsibilities: CyberArk EPM Management: Configure and manage endpoint privilege policies to enforce least privilege. Monitor and respond to privilege escalation activities. Implement application control policies for endpoint security. CrowdStrike Falcon Management: Monitor endpoint activities and respond to alerts generated by CrowdStrike Falcon. Investigate incidents using CrowdStrike tools and conduct threat hunting. Implement and optimize detection and prevention policies in Falcon. Endpoint Security and Compliance: Collaborate with IT teams to ensure secure endpoint configurations. Ensure compliance with security standards and regulations. SSL Certificate Management: Manage the lifecycle of SSL certificates, including installation, renewal, and troubleshooting. Ensure proper encryption standards are maintained. Continuous Improvement: Stay updated on emerging threats and vulnerabilities related to endpoint security. Enhance policies and procedures for endpoint protection. Documentation and Reporting: Maintain comprehensive documentation of configurations, incidents, and resolutions. Provide regular reports on endpoint security metrics and compliance status.

Posted 1 month ago

Apply

3.0 - 6.0 years

8 - 9 Lacs

Mumbai

Work from Office

We are looking to hire a Security Analyst to join our team in Mumbai. The candidate will be a part of the Security Operations team and would be responsible for a 24*7 role in monitoring security tools for potential malicious behaviors and providing incident response and escalation to the incident response team. An ideal candidate will have to work from office and will have the following role and responsibilities: The responsibilities include but are not limited to: Use SIEM technologies and other native tools to perform the monitoring of security events on a 24x7 basis. Perform analysis on logs produced by network devices utilized within the infrastructure such as firewalls, content filtering, syslog from various sources/devices, assorted Intrusion Detection capabilities, substantiating vulnerability scanner results, directory services, DHCP logs, Secure Email Gateway logs, and approved applications. Use the SIEM to monitor the network and perform analysis, while integrating the results and information needed to proactively protect the enterprise. This includes developing customized signatures, enterprise content filtering, or firewall ACL change recommendations. Provide security events analysis and support to include identifying potential threat, anomalies, and infections, documenting findings, providing recommendations within the incident management system, performing triage of incoming security events, performing preliminary and secondary analysis of those events, and validating the events Manage inbound requests via the ticketing system (Service Now), as well as via telephone calls, and provide security notifications via three methods: logging incident tickets, sending emails, placing telephone calls. Provide cybersecurity root-cause analysis in support of any tickets for which it fails to meet the Acceptable Quality Levels (AQLs) specified in the PRS. This root-cause analysis will include documenting recommendations for corrective action. Requirements: Minimum 3 years of experience in Cyber Security. Bachelor of Science (Masters preferred) in Computer Science, Systems Engineering, Cybersecurity, Information Technology or related area. Working level knowledge of policies, procedures, and protocols of a government Security Operations Center. Experience using numerous security tools and technologies to include some of the following and/or closely comparable security technologies: McAfee Nitro SIEM, McAfee IDS/IPS, Imperva web application firewalls, McAfee Enterprise Antivirus, BlueCoat, Symantec DLP, Mandiant/Fireeye, Guardian MDB Protect, Cisco firewalls, QualysGuard, AppScan. Preferred Certifications: Comptia Security+ Certified Ethical Hacker (CEH) About Kroll In a world of disruption and increasingly complex business challenges, our professionals bring truth into focus with the Kroll Lens. Our sharp analytical skills, paired with the latest technology, allow us to give our clients clarity - not just answers - in all areas of business. We value the diverse backgrounds and perspectives that enable us to think globally. As part of One team, One Kroll, you ll contribute to a supportive and collaborative work environment that empowers you to excel. Kroll is the premier global valuation and corporate finance advisor with expertise in complex valuation, disputes and investigations, MA, restructuring, and compliance and regulatory consulting. Our professionals balance analytical skills, deep market insight and independence to help our clients make sound decisions. As an organization, we think globally and encourage our people to do the same. Kroll is committed to equal opportunity and diversity, and recruits people based on merit. In order to be considered for a position, you must formally apply via careers. kroll. com #LI-AT1 #LI-Hybrid

Posted 1 month ago

Apply

0.0 - 9.0 years

22 - 27 Lacs

Bengaluru

Work from Office

At Cadence, we hire and develop leaders and innovators who want to make an impact on the world of technology. Key Responsibilities: Lead DesignVerification (DV) execution of UCIe PHY IP. Drive internal DV team meeting for day to day execution. Work closely with RTL, AMS system modelling and PD teams. Lead technical alignment on verification strategies. Define and architect verification environments and methodologies. Take initiative to drive overall execution efficiency and quality improvements. Improve and evolve existing verification methodologies : Co-Simulation (Co-SIM), UPF Power Aware Simulations (UPF PA Sim), VIP/DIP integration and Verification, increase Formal Verification usage especially FPV, Safety Verification Analyze execution and quality issues to define, develop, and deploy new functional verification methodologies for continuous improvement. Required Qualifications: Solid background in functional verification fundamentals. Experience in: Verification environment development Test plan creation Verification closure RTL and GLS debug skills, formal verification, PA simulation Strong SystemVerilog and UVM methodology expertise. Prior digital verification experience in serial bus multiprotocol PHY IPs (UCIE or SerDes IPs is preferred) B. E/B. Tech/M. E/M. Tech with 10+ years of experience Good to Have (Not Mandatory): Exposure to analog modeling and AMS (Analog/Mixed-Signal)-digital co-simulations. Experience with automotive IP verification (e. g. , fault injection). Emulation exposure. We re doing work that matters. Help us solve what others can t.

Posted 1 month ago

Apply

6.0 - 10.0 years

20 - 25 Lacs

Noida, Bengaluru

Work from Office

At Cadence, we hire and develop leaders and innovators who want to make an impact on the world of technology. Position: Sr. Information Security Analyst Grade: IT3 Location: Noida/Bangalore Job Description: Key Responsibilities Led and implement security architecture and solutions to safeguard enterprise systems, networks, and data. Conduct vulnerability assessments, penetration testing, and risk assessments to identify and mitigate security threats. Develop and enforce security policies, procedures, and best practices to ensure compliance with internal standards and industry regulations. Collaborate with cross-functional teams to design secure systems and provide guidance on secure coding practices and vulnerability management. Continuously monitor the security landscape for new threats and ensure proactive defense mechanisms are in place. Required Skills Qualification Hands-on experience in securing corporate environment. Hands-on experience in security frameworks (NIST, ISO 27001, CIS) and experience with risk management and compliance Hands-on experience securing Windows (Workstations and Servers), Linux (Workstations and Servers), and Mac Hands-on experience conducting risk management by identifying gaps and providing strategies for mitigation. Hands-on experience documenting vulnerability assessment results in a clear and actionable format. Expertise in network security, firewalls, IDS/IPS, and security monitoring tools such as SIEM Proficiency with cloud security technologies (AWS, Azure, GCP) and securing cloud-based infrastructure. Experience with incident response, forensics, and managing security incidents from detection to resolution. Determines security violations and inefficiencies. Knowledge of mergers and acquisitions Experience: Should have relevant experience of at least 6-10 years. Qualification: Engineering (Computers, Electronics, IT) or equivalent We re doing work that matters. Help us solve what others can t.

Posted 1 month ago

Apply

10.0 - 15.0 years

12 - 16 Lacs

Gurugram

Work from Office

Job Summary: The Cyber Security Team Lead will support the Head of Information Security in the development, implementation, and management of the organisation s information security strategy. This role involves overseeing daily operations, ensuring the security of information assets, managing security incidents, and fostering a security-conscious culture within the organisation. Key Responsibilities: Strategic Support: Assist in the development and execution of the organisations information security strategy and policies. Provide strategic guidance and leadership in all areas of information security. Operational Management: Oversee day-to-day security operations, including monitoring, threat management, and incident response. Ensure effective 24/7 monitoring and incident handling. Risk Management: Identify and assess security risks, and develop mitigation strategies. Conduct regular security audits and vulnerability assessments. Incident Response: Lead the response to security incidents and breaches, ensuring timely and effective resolution. Develop and maintain the incident response plan, including conducting regular drills. Compliance and Governance: Ensure compliance with relevant security standards, regulations, and frameworks (e.g., ISO 27001, NIST, GDPR). Maintain up-to-date documentation of security policies, procedures, and incidents. Team Leadership: Supervise and mentor the information security team, providing guidance and support. Foster a collaborative and high-performance team environment. Training and Awareness: Develop and deliver security training and awareness programs for employees. Promote a culture of security awareness throughout the organisation. Stakeholder Collaboration: Collaborate with IT, legal, HR, and other departments to ensure cohesive security practices. Serve as a key point of contact for security-related matters with external partners and vendors. Qualifications: Education: Bachelor s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Master s degree is a plus. Certifications: Relevant certifications such as CISSP, CISM, CISA, or equivalent. Experience: Minimum of 10 -15 years of experience in information security, with at least 3 - 5 years in a leadership role. Proven experience in managing security operations, incident response, and risk management. Skills and Competencies: Technical Expertise: Strong knowledge of information security principles, technologies, and best practices. Experience with security tools and technologies such as SIEM, firewalls, IDS/IPS, and endpoint protection. Analytical Skills: Ability to analyse complex security issues and develop effective solutions. Strong risk assessment and management skills. Leadership and Communication: Excellent leadership and team management skills. Strong verbal and written communication skills, with the ability to convey complex security concepts to non-technical stakeholders. Problem-Solving: Strong critical thinking and problem-solving abilities. Ability to remain calm and effective in high-pressure situations. Additional Requirements: Availability for on-call duties and to respond to security incidents outside regular working hours. Willingness to travel as needed. Hybrid Policy - 2 to 3 days in a month work from Office* #LI-Hybrid What we offer Benefits We offer excellent benefits including an incentive programme, generous annual and parental leave policies, volunteering days and well-being support throughout the year, as well as free access to all Economist content. Country specific benefits are also offered. Our Values Our values are a collective set of beliefs and behaviours that strengthen The Economist Groups purpose and demonstrate where we want to be as an organisation. They reflect on our mission to pursue progress for individuals, organisations and the world. Independence We are not bound to any party or interest and encourage exploration and free-thinking. We champion freedom, both within our organisation and around the world. Integrity We are bold in our efforts to uncover the truth and stand up for what we believe in. We inspire trust through our rigour, fact-checking and transparency. Excellence We aspire to the highest standards in all we do. We are ambitious and inquisitive in our pursuit of continuous progress and innovation. Inclusivity We value diversity in thought and background and encourage healthy debate with a breadth of perspectives. We treat our colleagues and customers fairly and respectfully. Openness

Posted 1 month ago

Apply

4.0 - 6.0 years

6 - 8 Lacs

Pune

Work from Office

Why join us? Key Responsibilities Threat Monitoring & Detection: Continuously monitor security tools and systems (SIEM, EDR, IDS/IPS, etc.) for suspicious activity or anomalies. Analyse and triage security alerts in real-time, assessing their legitimacy and severity. Quickly distinguish false positives from genuine threats and escalate significant incidents for immediate action. Use your expertise to fine-tune alerting rules and reduce noise, ensuring the SOC focuses on meaningful threats. Incident Response & Investigation: Serve as a front-line responder and incident handler for cybersecurity incidents. Follow established incident response procedures to contain threats and minimise damage when an incident is confirmed. Lead the technical investigation of complex incidents, determining the scope, root cause, and attack vector. This includes analysing logs, network traffic, malware, and other evidence to piece together what happened. When needed, perform in-depth digital forensics (e.g. malware analysis or disk/memory forensics) to retrieve artifacts of the attack and understand the full impact. Collaborate with the Incident Manager or SOC Lead on major incidents, taking technical ownership of containment and eradication steps. Ensure rapid recovery and verification that threats have been neutralised before restoring systems. Proactive Threat Hunting & Detection Enhancement: Leverage your experience to go beyond reactive monitoring and proactively hunt for threats that may evade automated security tools. Regularly conduct threat hunting exercises across network and endpoint data to identify stealthy malicious activity or vulnerabilities. Develop and refine new detection rules, alerts, and security controls based on your findings to improve our ability to catch advanced threats. Work closely with security engineering teams to implement these improvements in our SIEM and other monitoring platforms. Stay attuned to the latest attacker tactics and techniques; if credible new threats emerge (e.g. a novel malware or hack tactic), pivot to hunt for any signs of those in our environment. Threat Intelligence & Trend Analysis: Monitor threat intelligence feeds and stay up-to-date on cybersecurity trends, emerging vulnerabilities, and attack campaigns relevant to our industry. Analyse how global threat developments DWF Group - Confidential Data might impact our firm, and share timely alerts or guidance with the team (for example, if a new vulnerability (Zero-Day) is being exploited in the wild, ensure we check our systems and apply patches or mitigations). Use this intel to inform your threat hunting and to adjust our defences pre-emptively. Identify patterns or recurring issues in security events and recommend strategic changes (such as additional security controls or user training) to address the root causes. Documentation & Reporting: Maintain meticulous documentation for all incidents and investigations. For each incident handled, document the details, analysis steps, containment actions, and resolution outcomes in our incident management system. Prepare clear and comprehensive incident reports that can be shared with both technical teams and non-technical stakeholders. These reports should outline what happened, how it was remediated, and recommendations to prevent similar incidents. Contribute to the SOC s knowledge base by recording lessons learned and updating incident response playbooks or runbooks. This ensures the team can handle similar incidents more efficiently in the future and helps fulfil any compliance or audit requirements for incident record-keeping. Mentoring & Knowledge Sharing: Act as a subject matter expert and mentor within the SOC team. Be the fount of knowledge that less-experienced analysts can rely on for guidance. Provide on-the-job training, tips, and best practices to junior SOC analysts during investigations and day-to-day monitoring. Guide and support junior analysts through complex investigations and response efforts, helping them develop their skills in threat analysis and incident handling. Lead by example in documentation, analysis techniques, and adherence to processes. Additionally, you may conduct periodic knowledgesharing sessions or post-incident debriefs to help the entire team learn from notable incidents or new threat tactics. Cross-Functional Coordination: Collaborate with a variety of teams and stakeholders to ensure effective incident resolution and strengthen overall security. Work closely with IT infrastructure and application teams to understand system behaviours and assist in remediation (for instance, coordinating the isolation of affected servers or deployment of critical patches during an incident). Interface with the Legal and Compliance departments when needed, especially if an incident involves sensitive client data or may require legal actions and notifications - understanding that certain incidents in a law firm may invoke client breach reporting or evidentiary preservation needs. Coordinate with the Communications/PR team if a significant breach requires internal or external communications, ensuring consistent and accurate messaging. Your role is to make sure everyone who DWF Group - Confidential Data needs to be involved in an incident is informed and working in sync, thereby facilitating a swift, unified response. Security Awareness & Preventive Measures: Contribute to improving the human element of security in our firm. Take a leading role in organising and executing phishing simulation campaigns and other security awareness exercises for employees. Analyse the results of phishing tests to identify common weaknesses or departments that may need extra training. Work with our security awareness or IT training teams to provide feedback and implement remedial actions that reduce the risk of successful phishing and social engineering attacks in the future. Additionally, provide security guidance to staff when needed - for example, by reviewing suspicious emails reported by users or advising on best practices - thereby injecting your knowledge into the broader organisation beyond the SOC. Process Improvement & Preparedness: Continuously seek opportunities to improve the SOC s processes and tools. After major incidents, lead a thorough post-mortem analysis with the team to discern what went well and what could be improved. Update incident response playbooks and checklists based on lessons learned or changes in the IT environment. Ensure our incident response plans align with industry standards (such as NIST 800-61) and legal industry requirements. Participate in (and sometimes lead) incident response drills and tabletop exercises to test the team s readiness for various scenarios (e.g., a ransomware outbreak or a significant data breach). These simulations help strengthen the team s coordination and build muscle memory for real incidents. Also, collaborate with the SOC Manager/Lead on identifying tool or capability gaps - for instance, if you notice that certain types of threats are hard to investigate, you might champion the adoption of a new forensic tool or a SIEM enhancement. Your seasoned perspective is valuable in steering investments in SOC capabilities and ensuring the team stays ahead of adversaries. Responsibilities You should be adept at querying and correlating data to spot threats across complex IT systems. Hands-on experience with digital forensic techniques and tools (for disk imaging, memory analysis, malware analysis, etc.) is expected - you know how to uncover and analyse evidence left by attackers. Familiarity with threat intelligence platforms and feeds, and the ability to integrate threat intel into SOC monitoring, is important. Scripting or basic programming skills (Python, PowerShell, etc.) to automate tasks or parse data are a plus. Overall, you should be comfortable with the technical underpinnings of modern cyber-attacks (network protocols, Windows/*nix internals, cloud security, etc.) and how to detect and stop them. Incident Response Expertise: Demonstrated ability to handle incidents from start to finish. You have a clear understanding of incident response frameworks (e.g. NIST CSIRP, SANS PICERL) and can effectively perform each phase: preparation, identification, containment, eradication, recovery, and lessons learned. Experience conducting root cause analysis and driving remediation efforts is essential. You should be able to coordinate multiple parallel workstreams during an incident (e.g., one focusing on containment, another on analysis, etc.) and ensure nothing is overlooked. Experience with threat hunting and identifying incidents proactively is highly valued, as it shows you can go on the offensive against threats, not just react. Leadership & Communication: Excellent communication and teamwork abilities. In this senior role, you must communicate clearly with different audiences - from technical peers to lawyers and executives. Ability to translate DWF Group - Confidential Data complex technical findings into clear, concise explanations is key, especially when briefing non-technical stakeholders after an incident. Strong written communication is important for reports and documentation. You should be comfortable providing guidance and constructive feedback to junior team members. Prior experience mentoring or training others (formally or informally) will serve you well, as a portion of this role is to uplift the skills of the team. We are looking for someone who can take initiative, remain calm under pressure, and lead by example during crisis situations. A collaborative mindset is crucial - you will work with a variety of teams, so being able to build positive working relationships and influence others to act on security recommendations is part of the job. Knowledge of Regulations & Best Practices: Good understanding of relevant security standards and regulations. Familiarity with data protection laws (such as GDPR in Europe) and breach notification requirements will help ensure our incident handling remains compliant. Awareness of legal-industry specific concerns like protecting attorney-client privilege during breach investigations is a plus. Knowledge of frameworks like MITRE ATT&CK for threat analysis, and ISO 27001 or SOC 2 for security controls, can provide helpful context in this role. You should also exhibit a strong ethical compass and respect for confidentiality, given the legal sensitivities of the data we handle. What will help you succeed in this role? Qualifications and Experience Education: Bachelor s degree in Cybersecurity, Information Security, Computer Science, or a related field is preferred. Equivalent practical experience is fully recognised. Relevant certifications that demonstrate your expertise in incident response or security operations are a plus (e.g., GCIH, CISSP, CISM, GCFA, CEH). While not strictly required, such certifications indicate a solid knowledge base and commitment to the field. More importantly, we value a proven track record and hands-on skills in security operations over formal credentials alone. DWF Group - Confidential Data Experience: Extensive experience in security operations and incident response. We expect on the order of 4-6+ years of dedicated cybersecurity experience, with significant time spent in a SOC or Incident Response role. This should include handling a wide variety of security incidents from detection through resolution. You should have seen everything from minor malware infections to major security breaches and be comfortable acting as the escalation point for complex cases. Experience specific to legal or other highly regulated industries is beneficial (due to understanding of data sensitivity and compliance needs), as is experience dealing with cross-border security challenges. Any experience in supporting cybersecurity during mergers & acquisitions (integrating acquired company s networks, data protection during transitions) would be an asset, as our firm is growing and occasionally acquires other businesses. Technical Skills: Deep knowledge of security technologies and incident response practices. Strong proficiency with SIEM platforms, intrusion detection/prevention systems, EDR tools, and log management is required, as these are the primary tools for monitoring and investigating incidents. You should be adept at querying and correlating data to spot threats across complex IT systems. Hands-on experience with digital forensic techniques and tools (for disk imaging, memory analysis, malware analysis, etc.) is expected - you know how to uncover and analyse evidence left by attackers. Familiarity with threat intelligence platforms and feeds, and the ability to integrate threat intel into SOC monitoring, is important. Scripting or basic programming skills (Python, PowerShell, etc.) to automate tasks or parse data are a plus. Overall, you should be comfortable with the technical underpinnings of modern cyber-attacks (network protocols, Windows/*nix internals, cloud security, etc.) and how to detect and stop them. Incident Response Expertise: Demonstrated ability to handle incidents from start to finish. You have a clear understanding of incident response frameworks (e.g. NIST CSIRP, SANS PICERL) and can effectively perform each phase: preparation, identification, containment, eradication, recovery, and lessons learned. Experience conducting root cause analysis and driving remediation efforts is essential. You should be able to coordinate multiple parallel workstreams during an incident (e.g., one focusing on containment, another on analysis, etc.) and ensure nothing is overlooked. Experience with threat hunting and identifying incidents proactively is highly valued, as it shows you can go on the offensive against threats, not just react. Leadership & Communication: Excellent communication and teamwork abilities. In this senior role, you must communicate clearly with different audiences - from technical peers to lawyers and executives. Ability to translate DWF Group - Confidential Data complex technical findings into clear, concise explanations is key, especially when briefing non-technical stakeholders after an incident. Strong written communication is important for reports and documentation. You should be comfortable providing guidance and constructive feedback to junior team members. Prior experience mentoring or training others (formally or informally) will serve you well, as a portion of this role is to uplift the skills of the team. We are looking for someone who can take initiative, remain calm under pressure, and lead by example during crisis situations. A collaborative mindset is crucial - you will work with a variety of teams, so being able to build positive working relationships and influence others to act on security recommendations is part of the job. Knowledge of Regulations & Best Practices: Good understanding of relevant security standards and regulations. Familiarity with data protection laws (such as GDPR in Europe) and breach notification requirements will help ensure our incident handling remains compliant. Awareness of legal-industry specific concerns like protecting attorney-client privilege during breach investigations is a plus. Knowledge of frameworks like MITRE ATT&CK for threat analysis, and ISO 27001 or SOC 2 for security controls, can provide helpful context in this role. You should also exhibit a strong ethical compass and respect for confidentiality, given the legal sensitivities of the data we handle What we offer? At DWF, we deeply appreciate the significance of offering a comprehensive rewards package that extends beyond a basic salary. Our commitment is to ensure that each member of our team not only feels valued but is also duly rewarded throughout their tenure with us. Upon joining our organisation, you will have the opportunity to select from a diverse array of benefits, allowing you to carefully tailor a package that perfectly aligns with your individual needs and those of your family. In addition to our standard benefits, we offer a wide range of flexible benefits and robust well-being programs. Our recruitment process upholds the highest standards of fairness and engagement. It includes comprehensive interviews and, at times, a written assessment, an assessment day, or presentation. We aim to create a positive experience for all candidates and offer any adjustments or additional support. About us DWF is a global legal business providing Complex, Managed and Connected Services. We empower people to be themselves within an inclusive and supportive environment, enabling everyone to achieve their full potential in line with their abilities and career aspirations.

Posted 1 month ago

Apply

1.0 - 3.0 years

7 - 11 Lacs

Mumbai

Work from Office

Define and implement secure cloud network architecture, manage firewall operations, and ensure alignment with industry security standards. Education: 15 Years Full-TimeJob SummaryWe are hiring a Security Architect to lead the design and implementation of secure network environments, with a focus on firewalls, cloud security, and threat protection. You will ensure compliance with frameworks like NIST, ISO 27001, and CIS while supporting cross-functional security transitions. Job Summary We are hiring a Security Architect to lead the design and implementation of secure network environments, with a focus on firewalls, cloud security, and threat protection. You will ensure compliance with frameworks like NIST, ISO 27001, and CIS while supporting cross-functional security transitions. Required Skills Expertise in Checkpoint Firewalls, IPsec, GlobalProtect VPNs, and Firewall implementation Experience with Cisco ASA, Cisco ISE, Barracuda, and Incapsula WAFs Strong in firewall rule management, remote access, threat detection, and content filtering Familiarity with patch management, firmware monitoring, and ruleset reviews Proficient in network protocols (BGP, routing, switching) Hands-on with IDS/IPS, proxies, and network security tools Basic OS knowledge: Windows, Unix, Linux Understanding of cloud security standards: NIST, ISO 27001, CIS Strong documentation and collaboration skills for security handovers

Posted 1 month ago

Apply

8.0 - 13.0 years

8 - 12 Lacs

Thiruvananthapuram

Work from Office

is a next-generation technology and product engineering company at the forefront of innovation in Generative AI, Agentic AI , and autonomous intelligent systems . We build intelligent, secure, and scalable digital platforms that power the future of AI across industries. Role Overview: We are looking for a Senior Security Specialist with 8+ years of experience in cybersecurity, cloud security, and application security. You will be responsible for identifying, mitigating, and preventing threats across our technology landscape particularly in AI-powered, data-driven environments. This role involves leading penetration testing efforts , managing vulnerability assessments , and implementing best-in-class security tools and practices to protect our platforms and clients. What we are looking from an ideal candidate? Design and implement robust security architectures for cloud-native and on-prem environments. Conduct penetration testing (internal/external, network, application, API) and deliver clear remediation strategies. Perform regular vulnerability assessments using industry-standard tools and frameworks. Lead threat modeling and risk assessments across systems, services, and data pipelines. Collaborate with development and DevOps teams to integrate security in SDLC and CI/CD pipelines ( DevSecOps ). Define and enforce security policies, incident response procedures, and access controls. Monitor for security breaches and investigate security events using SIEM and forensic tools. Ensure compliance with global standards such as ISO 27001 , SOC 2 , GDPR , and HIPAA . Provide guidance on secure implementation of AI/ML components and data protection strategies. Preferred Skills: What skills do you need? Requirements: 8+ years of experience in information security , application security , or cybersecurity engineering . Proficient in penetration testing methodologies and use of tools such as Burp Suite , Metasploit , Nmap , Wireshark , Nessus , OWASP ZAP , Qualys , etc. Deep experience in vulnerability management , patching, and security hardening practices. Strong understanding of OWASP Top 10 , CWE/SANS Top 25 , API security, and secure coding principles. Hands-on experience with cloud security (AWS, Azure, or GCP), IAM, firewalls, WAFs, encryption, and endpoint security. Familiarity with SIEM , EDR , IDS/IPS , and DLP solutions. Knowledge of DevSecOps and tools like Terraform , Kubernetes , Docker , etc. Excellent problem-solving, analytical, and incident-handling capabilities. Preferred Qualifications: Certifications such as CISSP , CISM , CEH , OSCP , or AWS Security Specialty . Experience working on security aspects of AI/ML platforms , data pipelines , or model inferencing . Familiarity with governance and compliance frameworks (e.g., PCI-DSS, HIPAA). Experience in secure agile product environments and threat modeling techniques. What We Offer: A mission-critical role securing next-gen AI systems Opportunity to work with an innovative and fast-paced tech company High visibility and leadership opportunities in a growing security function Compensation is not a constraint for the right candidate

Posted 1 month ago

Apply

10.0 - 15.0 years

35 - 40 Lacs

Gurugram

Work from Office

Since our launch in 2015, we ve lent over 10bn to ambitious entrepreneurs up and down the UK. That s led to the creation of over 40,000 new jobs and over 29,000 new homes - and we re not about to stop there. We re dedicated to helping trailblazing businesses thrive and our Finance team are the drivers of our growth. As an IT and Cyber Security Auditor , you will be responsible for planning, executing, and reporting on a wide range of audits covering IT security, business automation, cloud infrastructure, and digital transformation across OakNorth Bank plc. You will provide independent assurance to senior management that the Bank s technology environment including its growing use of Generative AI is secure, resilient, and well-governed. This role also includes guiding the Bank s responsible adoption of Generative AI (GenAI) technologies while helping build capabilities within the Internal Audit team, including mentoring and developing junior staff members. This is a fantastic opportunity to join a fast-paced, growing bank with a reputation for doing things differently. We don t want another cog in the machine, we re looking for self-starters and bold thinkers who want to pave their own career paths. Are you ready to step up to the challenge? Key Responsibilities: Lead and Deliver Audits : Plan, execute, and report IT and cyber security audits covering ITGCs, cloud (AWS/Azure), networks, data protection, automation, and digital transformation initiatives. Manage audits independently or with co-sourced partners, ensuring end-to-end delivery. Support GenAI Risk Assurance : Assess risks and controls related to the Bank s adoption of Generative AI covering governance, data integrity, ethical usage, access controls, and operational safeguards. Leverage GenAI tools to enhance audit execution and insight generation. Evaluate Cybersecurity and Resilience : Review threat detection capabilities, cybersecurity controls (e.g., IAM, DLP, IDS/IPS), and response readiness. Challenge business continuity, disaster recovery, and incident response plans, including backup processes and RPO/RTO targets. Stakeholder Engagement and Reporting : Provide clear, actionable reporting to senior management and collaborate with Technology, Risk, and Operations teams to strengthen control environments and drive improvements. Team Development and Methodology Improvement : Guide, coach, and mentor junior auditors; contribute to the evolution of IT audit methodology to reflect emerging technologies, risks, and regulatory expectations. What We re Looking For: Must-Haves: Overall experience of 8 years with Minimum 3 years of experience in IT audit or cyber risk, ideally within banking, fintech, or a Big 4 advisory firm. Degree in Information Technology, Computer Science, or a related field with a strong academic record. At least one globally recognized IT audit/security certification (e.g., CISA, CISSP, ISO 27001 LA); Familiarity with GenAI use cases and associated risks in an enterprise setting. Strong understanding of frameworks like NIST, ISO 27001, COBIT, COSO, and ITIL. Experience using GRC tools and a passion for applying technology in audit work. Preferred Traits: High drive and bias for action brings energy and momentum to audit delivery. Clear and structured communicator who simplifies complexity and delivers insights. A collaborative leader who uplifts others coaches, mentors, and supports junior colleagues. Operates with integrity and directness say it as it is mindset. Trusted and respected by peers and stakeholders at all levels of the organization. Fast learner and problem-solver who thrives in a changing environment. 0 - 0 a year Benefits & Perks: Equity. We want people to have a stake in the business so that all our interests are aligned Health Insurance for employee and dependents Wellbeing and social events Support causes that matter to you - Volunteering time off

Posted 1 month ago

Apply

10.0 - 15.0 years

35 - 40 Lacs

Bengaluru

Work from Office

The Role We are looking to expand our team with a Senior Digital IC Design Engineer with experience in the development of mixed-signal components, and behavioral modelling of Power & CLK modules like LDO/DCDC, RC-OSCs, and PLL You will participate in the development of Power & Clock management digital system controller design in close collaboration with analog designers Additionally, you will support the product integration teams on the integration of these components into the semiconductor products What You ll Do Participate in feasibility studies and architecture definitions of new mixed-signal components Participate in detailed specifications and test plans for these components Implement and verify the digital part of the mixed-signal components and participate in the mixed-signal verification Participate in prototyping integration by performing logic synthesis, and digital backend of smaller systems Participate in the development of a silicon evaluation infrastructure, and support the evaluation in the lab What You ll Need Minimum BS/MS in Electrical Engineering or related technical field At least 10 years of relevant work experience in semiconductor product or IP development RTL design of digital IP blocks and systems in Verilog/SystemVerilog Good understanding of mixed-signal semiconductor circuits Experience in logic synthesis, place-and-route, STA

Posted 1 month ago

Apply

10.0 - 17.0 years

40 - 50 Lacs

Bengaluru

Work from Office

Are you ready to elevate your career in the rapidly growing field of cloud securityJoin our Aumni Cloud Security team, where your expertise in Infrastructure as Code (IaC), Kubernetes, and CI/CD security gates will drive innovation and protect our mission-critical systems. We offer unparalleled opportunities for career growth and a collaborative environment where you can thrive and contribute to meaningful projects. As a Lead Software Engineer at JPMorgan Chase within the Aumni Cloud Security team, your role will be instrumental in safeguarding the security, availability, and integrity of our cloud-based infrastructure and applications. You will work in collaboration with various teams to enforce robust security measures, pinpoint vulnerabilities, and effectively handle security incidents. Your pivotal role will ensure the protection of our organizations sensitive data and uphold a strong security stance in the constantly changing cloud environment. Job Responsibilities Design, write, implement, and review security controls for IaC frameworks (e. g. , Terraform, CloudFormation) to ensure secure provisioning and management of cloud resources. Collaborate with development teams to integrate security best practices into the IaC and IaC pipelines. Develop and implement security controls for Kubernetes clusters, ensuring secure configuration, network policies, authentication, and authorization. Conduct regular vulnerability assessments and penetration tests on Kubernetes infrastructure and applications. Define and enforce security gates and best practices for continuous integration and continuous deployment (CI/CD) pipelines. Automate security checks and code analysis to identify and remediate vulnerabilities early in the development lifecycle. Participate in an on-call rotation for security incidents and respond to security events promptly. Conduct root cause analysis of security incidents, document lessons learned, and propose improvements to prevent future incidents. Assist in conducting security assessments, audits, and compliance reviews to ensure adherence to industry standards and regulatory requirements. Implement and maintain security monitoring and logging systems to detect and respond to security events in real-time. Required Qualifications, Capabilities, and Skills Formal training or certification on Cloud Security Engineer concepts and 5+ years applied experience. Strong knowledge of cloud security principles, best practices, and technologies (AWS). Hands-on experience with IaC frameworks (Terraform, CloudFormation) and configuration management tools. Proficiency in securing Kubernetes clusters, containerization, and microservices architectures. Familiarity with CI/CD pipelines, automated security testing, and secure code review practices. In-depth understanding of incident response methodologies, including detection, analysis, containment, and recovery. Experience with security audits, compliance frameworks, and regulatory requirements. Knowledge of network security, firewalls, IDS/IPS, and vulnerability management tools. Excellent analytical and problem-solving skills, with a keen attention to detail. Preferred Qualifications, Capabilities, and Skills Proven experience interacting with major institutional Emerging investors. Experience with government bond obligations in the region. Bachelors degree in Engineering, Finance, Math, or a related quantitative field.

Posted 1 month ago

Apply

5.0 - 10.0 years

8 - 10 Lacs

Noida, New Delhi, Gurugram

Work from Office

Firewall, check point, paloalto,DDOS, Randware,IPS, waf f5,SSL Loadbalancer,apt

Posted 1 month ago

Apply

4.0 - 8.0 years

12 - 16 Lacs

Mumbai, Mumbai Suburban, Mumbai (All Areas)

Work from Office

Monitor,analyze security events,alerts across various platforms. Investigate potential security incidents,escalate as appropriate,following defined incident response processes. Correlate events from multiple sources to identify patterns or anomalies Required Candidate profile Lead,participate in threat hunting activities to proactively identify potential threats vulnerabilities Serve as the administrator for SOC tools including SIEM, EDR, SOAR,threat intelligence platforms Perks and benefits To be disclosed post interview

Posted 1 month ago

Apply

5.0 - 10.0 years

15 - 20 Lacs

Thane

Work from Office

Network Design and Architecture Proven experience with Cisco Catalyst, Nexus, and ASA/Firepower devices CCNA – Required. CCNP – Required. [Other relevant certifi cations such as Palo Alto PCNSA/PCNSE, Fortinet NSE, or Juniper JNCIA/JNCIP are a plus.]

Posted 1 month ago

Apply

4.0 - 7.0 years

9 - 10 Lacs

Pune

Work from Office

Role: SOC Analyst Location: Kharadi, Pune Life Unlimited. At Smith+Nephew, we design and manufacture technology that takes the limits off living! The Security Analyst works on the detection and response for potential security incidents on the Smith & Nephew network, systems, and applications. This includes technical analysis and incident management, communications, and reporting. The role works with the Global SOC Manager. The work includes partnering closely with other functions within Information Security, with outsourced tier 1 SOC functions, with the wider IT team including Service Desk, as well as with HR, Legal, Procurement, and other functions. The role interacts with end users and technical resolver teams within Smith & Nephew as well as outsourced suppliers. The working hours are Monday to Friday (11AM - 8PM IST). What will you be doing? Complete alert and incident response activities following standard runbooks and processes, with work to include the initial triage and analysis, recording of the incident with all relevant details to high standards, and documenting all containment and response actions. Uses Smith+Nephew technology platforms and security tools to conduct investigations such as threat hunting or other proactive investigations outside the incident process. Write comprehensive reports including assessment-based findings, outcomes, and propositions for enhancements such as new detection plays, new runbooks or playbooks, process improvements, or tuning detection rules. Mentoring and coaching other team members, sharing skills and experience to enable higher levels of performance. Provide technical domain expertise to projects and initiatives aimed at improving the capability and maturity of Smith & Nephew information security practices. What will you need to be successful? Bachelor s degree in Computer Science or a related subject preferred or equivalent experience. Licenses/Certifications: Relevant entry- or mid-level security certifications are advantageous but not required. Job-specific training will be provided. Experience: At least 4 years of experience in a relevant Information Security role. Experience working hands-on with SIEM and EDR/XDR technologies for the identification and response to existing and emerging threats. Familiar with MITRE ATT&CK for the identification and mapping of attacker tactics, techniques, and procedures (TTPs). Familiarity with network models (OSI and TCP/IP), common network terminology and concepts, and network equipment. Must be able to correctly interpret logs for firewalls (including WAF and IDS/IPS), Windows and Linux operating system logs, AWS and Azure cloud logs. Familiarity with web-related technologies (Web applications, Web Services, Service Oriented Architectures) and network/web-related protocols. Competences: Understanding of industry frameworks such as MITRE ATT&CK, MITRE D3FEND, NIST CSFv2, and NIST SP800-61r2. Using SIEM (including scripted query languages) and EDR/XDR technologies, threat intelligence tools, and ITSM tools. Familiarity with AWS and Azure cloud technologies and cloud security standards (CSA or equivalent). Understanding of API security and familiarity with AI security concepts (such as NIST AI RMF). Familiarity with ITIL methodology and terminology. Excellent written and oral communication skills, service attitude, and analytical approach to problem solving. Ability to work independently without daily direction, balancing conflicting priorities, and effectively tracking and managing task completion to committed deadlines. You. Unlimited. We believe in crafting the greatest good for society. Our strongest investments are in our people and the patients we serve. Inclusion, Diversity and Equity- Committed to Welcoming, Celebrating and Thriving on Diversity, Learn more about Employee Inclusion Groups on our website ( https://www.smith-nephew.com/ ). Other reasons why you will love it here! Your Future: Major medical coverage + policy exclusions and insurance non-medical limit. Educational Assistance. Work/Life Balance: Flexible Personal/Vacation Time Off, Privilege Leave, Floater Leave. Your Wellbeing: Parents/Parents in Law s Insurance (Employer Contribution of 7,000/- annually), Employee Assistance Program, Parental Leave. Flexibility : Hybrid Work Model (For most professional roles) Training: Hands-On, Team-Customized, Mentorship Extra Perks: Free Cab Transport Facility for all employees; One-Time Meal provided to all employees as per shift. Night shift allowances

Posted 1 month ago

Apply

4.0 - 7.0 years

12 - 17 Lacs

Pune

Work from Office

Description Guides the development, specification and communication of application or infrastructure architectures used by multiple business or application systems. Provides extensive, in-depth, technical consultation to the clients, partners, and IT Management to develop plans and directions to assure the integration of corporate business area requirements. Acts as cybersecurity expert for cloud migration projects/programs Thoroughly understands decision process issues of technology choice, such as design, data security, client server communication, etc. Partner with Management in the building of new and on-going partnership with various teams and line of business Evaluates and selects from existing and emerging technologies those options best fitting business/project needs Partner with Security Champions, Attack Surface Management, and AppSec teams Promotes sharing of expertise through consulting, presentations, and documentations, etc. Experienced, functional expert with technical and/or business knowledge and functional expertise Carries out complex initiatives involving multiple disciplines and/or ambiguous projects Displays a balanced, cross-functional perspective, liaising with the business teams to help improve efficiency, effectiveness, and productivity Strategic in developing, implementing, and administering programs within functional areas Provides guidance to team members, fostering an environment that encourages employee participation, teamwork, and communication Qualifications Bachelors degree and experience in information security, or an equivalent combination of education and work experience. Excellent consultative and communication skills, and the ability to work effectively with client, partner, and IT management and staff. Six years of industry experience with the combination of main stream Information Security role and application development is preferred CISSP, CISM, or Security+ certification preferred Strong collaboration skills and analytical ability Deep knowledge of application or infrastructure systems architecture, usually having experience with multiple system technologies. Requirements/Responsibilities - Experience related to application development and DevOps Very good understanding of CI/CD pipeline and secure application development methodologies Experience with security tools related to DevSecOps- SAST, DAST, IAST In-depth knowledge of various cybersecurity frameworks, standards, and SSDLC Experience related to vulnerability management is big plus Must have very good understanding related to OWASP top vulnerabilities and knowledge related to MITRE framework Knowledge related to WAF, App Proxy, and CDN Very good understanding of zero-trust architecture and working experience with relevant tools/technologies Good understanding related to IPS/IDS, Network load balancer, firewalls, Z-Scaler, and networking technologies Knowledge related AI/ML, CI/CD Pipeline, IaC, and relevant tools Experience in dealing with threat vectors and develop relevant plans to protect the organization from cyber threats Lead the security architecture reviews and provide analysis with the observations and findings Experience in providing security consultation to application teams Knowledge of network architecture concepts including topology, protocols, and components Understanding related to SEIM and experience related to Microsoft Defender, Entra, KQL, APIM, endpoint protection, scripting, CoPilot Knowledge related to Privilege access management, Threat hunting, data protection, encryption, Authentication/Authorization, Vulnerability management systems, Cloud Security Posture Management. Very good understanding of concepts related to docker, container, serverless computing, and Kubernetes Must be able to represent the security architecture team in technical discussions and drive towards deliverables with minimal guidance

Posted 1 month ago

Apply

8.0 - 13.0 years

10 - 15 Lacs

Bengaluru

Work from Office

At Astrome Technologies, we are pioneering advanced communication solutions tailored for the unique demands of the aerospace sector. We are actively seeking a Lead FPGA Design Engineer for our Space Division, aimed at creating high-performance and reliable FPGA-based systems for satellite and space applications. Lead the design and development of FPGA architectures specifically for space-grade applications, ensuring optimal performance and reliability. Mentor and guide a team of engineers in the implementation of complex digital systems while fostering a collaborative and innovation-driven environment. Conduct rigorous testing, validation, and optimization of FPGA designs to meet the specific environmental and operational requirements of space missions. Collaborate with cross-functional teams to define system specifications and integrate the FPGA designs into larger communication solutions. Maintain up-to-date knowledge of the latest developments in space technology and apply this knowledge to enhance product offerings. Required Skills: 8+ years of experience in FPGA design, with a strong focus on aerospace or space applications. Proven expertise in digital design, RTL development, and verification processes, with leadership experience in guiding design teams. Mastery of HDLs, specifically SystemVerilog and Verilog, with practical experience in space-grade designs. Experience with designing IPs compliant with rigorous space standards using AXI4 and other protocols. In-depth understanding of radiation-hardened design principles and the challenges specific to space communication systems. Excellent knowledge of Xilinx FPGA architectures and proficiency in using tools like Vivado, tailored for space applications. Strong capability in digital signal processing techniques relevant to satellite communication, including techniques like OFDM. Track record of successfully leading projects from concept to completion in the aerospace domain, including working with relevant regulatory and compliance bodies. Exceptional communication skills and ability to work collaboratively in a multidisciplinary environment, ensuring project goals are met effectively. We offer great career growth, ESOPs, Gratuity, PF and Health Insurance.

Posted 1 month ago

Apply

10.0 - 15.0 years

20 - 27 Lacs

Noida, Hyderabad

Work from Office

At Cadence, we hire and develop leaders and innovators who want to make an impact on the world of technology. Job Description Position: IT- Staff Software Security Engineer Grade: IT4 Location: Noida/Hyderabad Job Description: Role: Cadence s Information Security team is seeking a Sr. Software Security Engineer. This role will focus on Cloud and on-premise Software Security controls including WAF and CDN tools. This is a Security Development Operations role that will ensure security tool integration at the source code repo (Perforce, Github etc. ), build environment, and artifactory level. As a member of the Information Security team, this role will develop and support the secure software develop life cycle, including DAST, SAST, SCA, penetration testing, and attack surface management. This role reports to Group Director and will interface directly with development teams. Of course, there is broad exposure to other aspects of information security related tasks such as incident response, vulnerability management, and deployment of security solutions. The successful candidate for this position is a highly motivated individual with a strong Application Development and Configuration Management/DevOps background with hands-on experience in building software security within CI/CD. Required Skills Qualification Hands-on experience in securing corporate environment. Hands-on experience in security frameworks (NIST, ISO 27001, CIS) and experience with risk management and compliance Hands-on experience securing Windows (Workstations and Servers), Linux (Workstations and Servers), and Mac Hands-on experience conducting risk management by identifying gaps and providing strategies for mitigation. Hands-on experience documenting vulnerability assessment results in a clear and actionable format. Expertise in network security, firewalls, IDS/IPS, and security monitoring tools such as SIEM Proficiency with cloud security technologies (AWS, Azure, GCP) and securing cloud-based infrastructure. Experience with incident response, forensics, and managing security incidents from detection to resolution. Determines security violations and inefficiencies. Knowledge of mergers and acquisitions Experience: Should have relevant experience of at least 10-15 years. Qualification: Engineering (Computers, Electronics, IT) or equivalent We re doing work that matters. Help us solve what others can t.

Posted 1 month ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

Vadodara

Work from Office

Civica develops software for local and national government, education, health and care. Over 5,000 public bodies across the globe use our software to help deliver critical services to over 100 million citizens. Our aspiration is to be a GovTech champion everywhere we work around the globe, supporting the needs of citizens and those that serve them every day. Building on 21 years of continuous growth and success, were at a pivotal point on our journey to realise that aspiration. As a company, we re passionate about what we do and the citizens we help to serve. If you too would like to help champion the use of technology in public services, to improve outcomes for citizens and public sector organisations, then Civica is the right place for you. We will help you unlock the best version of yourself, achieve growth in your career whilst making a real difference to people and communities. Why will you love this opportunity as Security Operations Centre (SOC) at Civica As a vital member of our dynamic Security Operations Centre (SOC) team, comprising Analysts, Engineers, and a SOC Manager, youll take the lead in monitoring our SIEM and various security systems to safeguard both CIVICA Group and our valued customers. Your keen eye will assess real-time and historical logs across multiple technologies, helping to uncover potential attack patterns, instances of compromise, and security vulnerabilities. Working closely with your team, youll swiftly determine the most effective response to security events and incidents, while meticulously documenting every step taken to contain and resolve the issues. Youll also manage internal customer requests, particularly in relation to phishing, spam, and Anti-virus challenges. Additionally, youll evaluate risks using a Surface Attack Tool, develop and utilize OSINT tools to gather open-source intelligence from various published sources, and collaborate with different business units to inform, mitigate, or remediate any issues. In this role, youll be in charge of supervising Microsoft Sentinel and Microsoft Defender systems, while also managing other technologies as needed, including IPS, Email Gateways, Web Filtering services, and Antivirus solutions. You ll be on the lookout for patterns of misuse or recurring issues, working together with the team to contain, control, and resolve any incidents. Plus, you ll have the chance to identify opportunities for improvement in our personnel, processes, or technology to enhance the teams overall effectiveness. A deep understanding of security principles Use of Microsoft Sentinel and/or Defender Minimum 3 years experience working in IT, with at least 1 year in a security-based role. Any recognised certific

Posted 1 month ago

Apply

1.0 - 6.0 years

3 - 7 Lacs

Pune

Work from Office

LotusFlare is a provider of cloud-native SaaS products based in the heart of Silicon Valley. Founded by the team that helped Facebook reach over one billion users, LotusFlare was founded to make affordable mobile communications available to everyone on Earth. Today, LotusFlare focuses on designing, building, and continuously evolving a digital commerce and monetization platform that delivers valuable outcomes for enterprises. Our platform, Digital Network Operator (DNO ) Cloud, is licensed to telecommunications services providers and supports millions of customers globally. LotusFlare has also designed and built the leading eSIM travel product - Nomad. Nomad provides global travelers with high-speed, affordable data connectivity in over 190 countries. Nomad is available as an iOS or Android app or via getnomad.app. Description: DevOps Support Engineers at LotusFlare guarantee the quality of the software solutions produced by LotusFlare by monitoring, responding to incidents and testing and quality checking. With shared accountability and code ownership, DevOps Support Engineers take on-call responsibilities and incident management work. Through these activities, LoutsFlare developers write code that better fits into their applications and infrastructure, helping them proactively deepen the reliability of services being deployed. DevOps Support Engineers will test the functionality of the code to bring out every flaw and to improve on the underperformance of every standalone feature. This role is always on the lookout for opportunities to improve any and every feature to bring customer satisfaction. Partnered alongside the best engineers in the industry on the coolest stuff around, the code and systems you work on will be in production and used by millions of users all around the world. Our team comprises engineers with varying levels of experience and backgrounds, from new grads to industry veterans. Relevant industry experience is important (Site Reliability Engineer (SRE), Systems Engineer, Software Engineer, DevOps Engineer, Network Engineer, Systems Administrator, Linux Administrator, Database Administrator, or similar role), but ultimately less so than your demonstrated abilities and attitude. Responsibilities: Monitoring backend services (cloud-based infrastructure) Supporting, troubleshooting, and investigating issues and incidents (support developers and infra team with system metrics analysis, logs, traffic, configuration, deployment changes, etc) Supporting and improving monitoring/alerting systems (Searching, testing, deploying new functionality for existing tools) Creating new features for automating troubleshooting and investigation process Creating new tools to improve the support process Drafting reports and summarizing information after investigations and incidents Requirements: At least 1 year of work experience with similar responsibilities Strong knowledge and practical experience in working with the Linux(Ubuntu) command-line/administration Understanding of network protocols and troubleshooting (TCP/IP, UDP) Strong scripting skills (Bash, Python) Critical thinking and problem solving Understanding of containerization (Docker, container) Experience with troubleshooting API driven services Experience with Kubernetes Experience with Git Background in release management processes English Professional written and verbal skills Good to have: Prometheus, Grafana, Kibana (Query language) Experience with Nginx/OpenResty Experience with telco protocols (Camel, Map, Diameter) from advantage Software development/scripting skills Basic knowledge Casandra, PostgreSQL Experience with using AWS cloud services (EC2, Redshift, S3, RDS, ELB/ALB, ElastiCache, Direct Connect, Route 53, Elastic IPs, etc.) CI/CD: Jenkins Terraform Recruitment Process: HR Interview followed by 4-5 Levels of Technical Interviews About: At LotusFlare, we attract and keep amazing people by offering two key things: Purposeful Work: Every team member sees how their efforts make a tangible, positive difference for our customers and partners. Growth Opportunities: We provide the chance to develop professionally while mastering cutting-edge practices in cloud-native enterprise software. From the beginning, our mission has been to simplify technology to create better experiences for customers. Using an experience down approach, which prioritizes the customers journey at every stage of development, our Digital Network Operator Cloud empowers communication service providers to achieve valuable business outcomes. DNO Cloud enables communication service providers to innovate freely, reduce operational costs, monetize network assets, engage customers on all digital channels, drive customer acquisition, and increase retention. With headquarters in Santa Clara, California, and five major offices worldwide, LotusFlare serves Deutsche Telekom, T-Mobile, A1, Globe Telecom, Liberty Latin America, Singtel, and other leading enterprises around the world. Website: www.lotusflare.com LinkedIn: https: / / www.linkedin.com / company / lotusflare Instagram: https: / / www.instagram.com / lifeatlotusflare / Twitter: https://twitter.com/lotus_flare

Posted 1 month ago

Apply

5.0 - 10.0 years

13 - 17 Lacs

Gurugram

Work from Office

Overview Keysight is on the forefront of technology innovation, delivering breakthroughs and trusted insights in electronic design, simulation, prototyping, test, manufacturing, and optimization. Our ~15,000 employees create world-class solutions in communications, 5G, automotive, energy, quantum, aerospace, defense, and semiconductor markets for customers in over 100 countries. Learn more about what we do. Our award-winning culture embraces a bold vision of where technology can take us and a passion for tackling challenging problems with industry-first solutions. We believe that when people feel a sense of belonging, they can be more creative, innovative, and thrive at all points in their careers. Responsibilities Cybersecurity SOC Analyst - Tier1 (SOC-Security Operation Center) The Cybersecurity Analyst will be responsible for the handling, and escalation of, alerts which require technical triage and analysis. This may include web attacks, malware infections, and phishing campaigns, which have been identified by the Information Risk & Security team s technology stack. Functional Responsibilities Experience Monitoring SIEM solutions and a variety of other security devices found in a SOC environment (e.g. Behavioral Analytics tools, IDS/IPS, log management tools, and security analytics platforms. Creating and maintaining documentation for security event processing. Acknowledge and handle the incoming security alerts. Use the internal ticketing system and dashboards to update the tickets/alerts accordingly and escalating them to the appropriate teams if necessary. Assist the Incident Response team on alerts escalated to them by the SOC team. Develop/Update and follow Standard Operating Procedures (SOPs) and Playbooks to handle standard and out-of-band alerts. Report to the Incident Response Team quickly and efficiently regarding urgent matters. Ensure ticket queues are always within satisfactory limits and all tickets are updated. Provide On-Call Support for emergency or high severity issues. Liaise with partner teams and end-users for security related tickets and activities. Qualifications Bachelors degree in Conputer Science / Electrical & Electronics / IT Engineering ; MCA Excellent verbal and written communication skills. Excellent analytical and problem-solving skills required. Minimum of 5+ years of experience in a SOC or Cybersecurity. Equivalent Certifications (Network+, Security+, CySA+, GSEC, GMON, etc.) Experience working with SIEMs and evaluating SIEM alerts, EDR , NDR Experience leveraging core security and infrastructure technologies during investigations (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS) Key Competencies Ability to think with a security mindset. The successful candidate has a good IT background with good level knowledge of multiple relevant security practice areas (anti-malware solutions, patch and vulnerability management, network security; monitoring; endpoint, etc.) Knowledge of TCP/IP Protocols, network analysis, and network/security applications. Good knowledge of various security tools and monitoring devices; e.g. able to read and understand IDS/IPS/Firewall/Proxy logs and determine the current state of play. Experience in correlating malware infections with attack vectors to determine the extent of security and data compromise. Ability to work in a time-sensitive environment; must be detail oriented and able to multitask to meet deadlines and company objectives. Experience in large, geographically diverse enterprise networks. Ability to build lasting relationships with partner teams and stakeholders. Strong written and oral communication skills, including the ability to interact directly with customers that do not have an IT background. Documentation; experience in writing reports and documenting tickets efficiently and accurately. Careers Privacy StatementKeysight is an Equal Opportunity Employer. Cybersecurity SOC Analyst - Tier1 (SOC-Security Operation Center) The Cybersecurity Analyst will be responsible for the handling, and escalation of, alerts which require technical triage and analysis. This may include web attacks, malware infections, and phishing campaigns, which have been identified by the Information Risk & Security team s technology stack. Functional Responsibilities Experience Monitoring SIEM solutions and a variety of other security devices found in a SOC environment (e.g. Behavioral Analytics tools, IDS/IPS, log management tools, and security analytics platforms. Creating and maintaining documentation for security event processing. Acknowledge and handle the incoming security alerts. Use the internal ticketing system and dashboards to update the tickets/alerts accordingly and escalating them to the appropriate teams if necessary. Assist the Incident Response team on alerts escalated to them by the SOC team. Develop/Update and follow Standard Operating Procedures (SOPs) and Playbooks to handle standard and out-of-band alerts. Report to the Incident Response Team quickly and efficiently regarding urgent matters. Ensure ticket queues are always within satisfactory limits and all tickets are updated. Provide On-Call Support for emergency or high severity issues. Liaise with partner teams and end-users for security related tickets and activities.

Posted 1 month ago

Apply

10.0 - 15.0 years

10 - 14 Lacs

New Delhi, Gurugram

Work from Office

The individual play a key role on a new website development project working in a highly distributed matrix environment comprising of multiple in-house IT and non-IT teams and external suppliers. Who you will work with Solution/Domain architects (internal/suppliers) Development teams (Internal/suppliers) Application support teams (Internal/suppliers) Internal Product Management Teams Project Managers (Internal/Supplier) Internal Infrastructure teams The development would follow Scrum agile framework, leveraging Rally/Agile central as the requirement/release/sprint management tool. What you will be responsible for Join the dots between various technical teams on topics ranging from tech architecture/design/development of website scope Own resolution of technical dependencies involving the various products/systems that may be affected/involved during website development Collaborate with various technical teams in the firm and external suppliers to get to the resolution on aspects that relate to the technical solution of the project (eg, connectivity requirements/issues between systems, whitelisting Ips/URLs) Liaison between the core engineering teams (DEV/QA) teams to ensure any open technical next steps are addressed. Qualifications Your experience Should have hands-on experience of 10+ years in web application development preferably using Adobe Experience Manager Strong experience in integrating applications with AEM using REST APIs Hands on experience in creating high level/low level technical design Experienced in contributing to and comprehending technical architecture Familiarity with modern design patterns leveraged on web applications Familiarity with building conversational searches leveraging GenAI technology (ChatGPT etc.) How we will support you From your first day with us, you will have varied opportunities to continuously grow and development your skills and knowledge. From formal training, informal coaching and mentoring through to skills-based and technical training and on the job learning. You can also get involved in a variety of employee affinity groups. There is also opportunity to be part of charitable events and volunteering.

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies