Jobs
Interviews

492 Metasploit Jobs - Page 3

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 4.0 years

4 - 8 Lacs

Chennai

Work from Office

We are seeking an experienced and dynamic Cybersecurity Trainer to join our team. The ideal candidate will be responsible for delivering high-quality cybersecurity training to individuals and groups, ensuring they gain the knowledge and skills necessary to thrive in a fast-paced and ever evolving digital landscape. You will be responsible for creating and delivering engaging training materials, hands-on labs, and real-world scenarios to effectively educate participants on essential cybersecurity principles and practices. Diam massa vulputate ut tempus viverra sed ac. Amet faucibus non nulla id adipiscing. Aliquam sit parturient amet, sagittis. Urna, dictum volutpat dapibus pharetra massa felis. Convallis duis suspendisse luctus amet ultricies at leo, nulla. Consectetur porta cras etiam bibendum sed lobortis aenean lectus. Key Responsibilities Conduct engaging, informative, and hands-on cybersecurity training sessions for individuals or groups, either in-person or remotely. Curriculum Development Develop and update comprehensive training materials, including presentations, guides, lab exercises, and assessments on various cybersecurity topics such as threat analysis, network security, ethical hacking, encryption, risk management, etc. Skill Development Teach and assess participants' knowledge and practical skills in areas like network security, cybersecurity fundamentals, penetration testing, firewalls, vulnerability management, and incident response. Real-World Application Integrate real-world scenarios and case studies into training sessions to enhance learning and provide practical understanding. Performance Tracking Evaluate participant progress through assessments and feedback, and track learning outcomes. Continuous Improvement Stay updated with the latest cybersecurity trends, tools, and technologies and incorporate them into the training programs. Technical Support Provide ongoing technical support and guidance to participants as they apply learned concepts in real-world situations. Certification Preparation Assist participants in preparing for leading cybersecurity certifications (e.g., CompTIA Security+, CISSP, CEH, etc.). Training Customization Customize training sessions for different levels of experience, from beginners to advanced professionals. Educational Qualifications Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent work experience). Relevant cybersecurity certifications (CISSP, CISM, CEH, CompTIA Security+, etc.) preferred. Experience Training Delivery Minimum of 3 years of experience in cybersecurity roles such as network security, ethical hacking, or information security. Proven experience in delivering cybersecurity training or workshops is a strong plus. Technical Skills Training Delivery In-depth knowledge of cybersecurity concepts, tools, and technologies (e.g., firewalls, IDS/IPS, encryption, VPNs, vulnerability scanning). Hands-on experience with cybersecurity platforms and tools like Wireshark, Kali Linux, Metasploit, Splunk, etc. Familiarity with cybersecurity frameworks (e.g., NIST, ISO 27001). Teaching & Communication Skills Training Delivery Strong presentation and communication skills, with the ability to explain complex topics clearly and effectively to diverse audiences. Patience and the ability to simplify difficult concepts for beginners. Ability to adapt training delivery to different learning styles (visual, auditory, kinesthetic). Personal Skills Training Delivery Analytical and problem-solving abilities. Strong organizational skills with the ability to manage multiple training programs simultaneously. Continuous learner, committed to staying ahead in the ever-changing cybersecurity field. Travel Requirements Training Delivery Travel to training locations across cities/states as per schedule (sometimes on short notice). Travel and accommodation expenses will be covered or reimbursed as per company policies. Training duration at client sites may range from 1 day to 2 weeks. Travel Requirements Training Delivery Travel to training locations across cities/states as per schedule (sometimes on short notice). Travel and accommodation expenses will be covered or reimbursed as per company policies. Training duration at client sites may range from 1 day to 2 weeks. What We Offer Training Delivery Competitive salary + travel allowance + performance incentives A dynamic and growth-focused work environment Opportunities to work with reputed academic and corporate partners Ongoing learning & upskilling support

Posted 1 week ago

Apply

5.0 years

3 - 9 Lacs

India

Remote

Masai, in partnership with top academic institutions, is launching an advanced online program in Cyber Security. This program is designed to equip learners — including students, working professionals, and career changers — with practical, job-ready skills in information security, threat analysis, penetration testing, and governance frameworks. We are seeking experienced Cyber Security professionals to join as Industry Mentors who can bring real-world insights, guide learners through hands-on applications, and bridge the gap between theory and practice. Key Responsibilities Session Facilitation & Mentorship: Lead live online mentoring sessions focused on real-world applications, tools, and industry case studies. Help learners understand the practical challenges and solutions in Cyber Security domains such as network security, ethical hacking, cloud security, and incident response. Provide career guidance and professional insights to aspiring security professionals. Capstone & Project Review Guide learners in applying security principles in capstone or portfolio projects. Offer feedback and support to enhance project quality and job-readiness. Industry Integration Share industry updates, best practices, and emerging trends in Cyber Security. Facilitate Q&A, discussions, and interactive learning experiences. Candidate Requirements Minimum 5 years of hands-on experience in Cyber Security (e.g., Threat Intelligence, SOC, Security Audits, Pen Testing, Compliance, etc.) Current or former professionals from companies working in Cyber Security, Tech Consulting, Fintech, Government, or Defense are encouraged to apply. Strong communication and mentoring skills. Familiarity with tools and platforms like SIEM, IDS/IPS, Nmap, Burp Suite, Metasploit, Wireshark, and more. Passion for education, mentorship, and upskilling future professionals. Engagement Details Time Commitment: 2–4 hours per week Location: Remote (online) Compensation: ₹25K to ₹75K per month (based on experience and involvement) Why Join Us? Mentor aspiring Cyber Security professionals from diverse backgrounds Share your expertise while contributing to a mission-driven education platform Engage with a flexible, part-time schedule Collaborate with a network of academic and industry leaders Help shape the future of India's cybersecurity workforce Skills: ids/ips,nmap,network security,security,burp suite,incident response,pen testing,compliance,wireshark,security audits,cloud security,soc,threat intelligence,cyber security,siem,metasploit,mentoring,ethical hacking

Posted 1 week ago

Apply

130.0 years

0 Lacs

Pune, Maharashtra, India

On-site

About Northern Trust Northern Trust, a Fortune 500 company, is a globally recognized, award-winning financial institution that has been in continuous operation since 1889. Northern Trust is proud to provide innovative financial services and guidance to the world’s most successful individuals, families, and institutions by remaining true to our enduring principles of service, expertise, and integrity. With more than 130 years of financial experience and over 22,000 partners, we serve the world’s most sophisticated clients using leading technology and exceptional service. Job Profile Summary Expert responsible for developing and administering solutions that meet system expectations relative to scalability, performance, fault tolerance, usability, and data integrity for the Information Security Operations and Architecture function. This position will collaborate extensively with business, technology, risk and other corporate teams to establish and strengthen adoption of security by design. We operate within a complex landscape driven by client expectations and the diverse needs that comes with operating in countries across the globe. This role is part of the Information Security organization, aligning to Business Information Security Officer (BISO) for Asset Servicing and Chief Operating Office. This role will report to the BISO who reports to the Global Chief Information Security Officer (CISO). Responsibilities Works with management and the architecture team to develop the security strategy and plan and ensures objectives are met. Provides leadership and guidance to staff, fostering an environment that encourages employee participation, teamwork, and communication. Participate in Architecture Review Boards and help teams create secure design. Evaluates proposals to determine if proposed security solutions effectively address enterprise requirements. Displays a balanced, cross-functional perspective, constantly liaising with the business to improve efficiency, effectiveness and productivity. Work with Enterprise Security Architecture team to develop Security blueprints and patterns. Good understanding of vulnerability management. Interfaces frequently with information security industry groups to stay abreast of emerging security trends. Focus of role is on execution of strategic direction of business function activities. Identifies alternative functional security strategies to balance organizational IT security concerns and business requirements. Description Guides the development, specification and communication of application or infrastructure architectures used by business or application systems. Security architect primarily focused on technologies related to authentication, authorization, access management, governance, controls, regulatory requirements etc. As a key member of Workforce authorization and authentication team this candidate will play a vital role in ensuring the secure and compliant implementation of various solutions (Hybrid and Cloud). Provides extensive, in-depth, technical consultation to the clients, partners, and IT Management to develop plans and directions to assure the integration of corporate business area requirements. Thoroughly understands decision process issues of technology choice, such as design, data security, client server communication, etc. Evaluates and selects from existing and emerging technologies those options best fitting business/project needs Promotes sharing of expertise through consulting, presentations, and documentations, etc. Experienced, functional expert with technical and/or business knowledge and functional expertise Carries out complex initiatives involving multiple disciplines and/or ambiguous projects Displays a balanced, cross-functional perspective, liaising with the business to help improve efficiency, effectiveness, and productivity Qualifications Knowledge of network architecture concepts including topology, protocols, components and the application of Defense-In-Depth principles Ten years of experience in the Information Security roles preferred; wide range of technical experience across multiple Cyber Security domains. Five years of experience as a Security Architect In-depth knowledge and experience on Entra ID, EPM, Sentinel, Azure, M365, AWS Security is required Excellent communication skills with the ability to convey complex technical and non-technical concepts in verbal products & excellent writing skills Thoroughly understands and provides solutions considering Security technology choices, such as design, protocols support, secrets management, data security, client server communication, token handling, Session management, credential vaulting, OIDC/ OAuth flows, Okta usage and implementations, authorization patterns, identity federation, cloud architectures, cryptography, cloud native services, cloud security etc. Good understanding of Cloud Infrastructure Entitlement Management solution (CIEM) to ensure continuous improvement in Security Posture by providing consultations to application teams Exposure to API Management, Firewalls, DLP, VPNs, DNS, Azure Defender, MCAS, Sentinel, WAFs, Application Gateways, NSGs, App Proxy, Radius clusters, CDN etc. Deep understanding of Applications security, OWASP standards, security best practices, browser compatibilities/storages/cookies Displays a balanced, cross-functional perspective under information security, liaising with other towers and business to help improve Security centric designs Strong knowledge on Identities management on Azure AD with OAuth, OIDC, SAML, SSO, MFA, Conditional access policies, MFA, Kerberos, LDAP, Identity Federations etc. Strong knowledge of: Security architecture patterns, requirements, and security controls; Security controls like Authentication, Authorization, Data Security, IAM; Threat modeling frameworks and methodologies Secure code reviews and utilizing outputs Common frameworks and standards such as CRI and NIST Knowledge of penetration testing tools and techniques (e.g., metasploit, neosploit, etc.) Working With Us As a Northern Trust partner, greater achievements await. You will be part of a flexible and collaborative work culture in an organization where financial strength and stability is an asset that emboldens us to explore new ideas. Movement within the organization is encouraged, senior leaders are accessible, and you can take pride in working for a company committed to assisting the communities we serve! Join a workplace with a greater purpose. We’d love to learn more about how your interests and experience could be a fit with one of the world’s most admired and sustainable companies! Build your career with us and apply today. #MadeForGreater Reasonable accommodation Northern Trust is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation for any part of the employment process, please email our HR Service Center at MyHRHelp@ntrs.com. We hope you’re excited about the role and the opportunity to work with us. We value an inclusive workplace and understand flexibility means different things to different people. Apply today and talk to us about your flexible working requirements and together we can achieve greater.

Posted 1 week ago

Apply

4.0 years

0 Lacs

Kanpur, Uttar Pradesh, India

Remote

Description As an Automotive Cybersecurity Engineer, you will be responsible for assessing and enhancing the security of connected vehicles through advanced penetration testing, wireless and hardware exploitation, and embedded system analysis. You will evaluate vehicle communication systems, infotainment platforms, and remote entry mechanisms to identify vulnerabilities that could compromise vehicle safety, privacy, and functionality. This position is ideal for cybersecurity professionals passionate about automotive technologies, embedded interfaces, and threat simulation. Responsibilities Perform Security Testing of In-Vehicle Systems: Conduct assessments of vehicle internal networks (e.g., CAN, OBD-II) to identify and exploit vulnerabilities in communication flows and control mechanisms. Analyze infotainment systems and user interfaces for privacy concerns, data leakage, and potential malware injection points. Simulate remote and physical attack vectors, including key fob signal replay, wireless intrusion, and unauthorized access. Evaluate Embedded & Wireless Communication Interfaces: Assess the security of Bluetooth, Wi-Fi, and RF-based protocols used in the vehicle ecosystem. Examine communication channels between connected mobile applications, infotainment clusters, and backend services. Test for privilege escalation, data interception, and firmware or hardware manipulation. Reverse Engineer Vehicle Architectures: Understand and map circuit-level data flows across ECUs and control modules. Extract and analyze firmware, debug interfaces, and physical ports for security analysis. Utilize diagnostic tools, CAN analyzers, and SDR platforms for in-depth testing. Identify Vulnerabilities and Recommend Mitigation: Document test findings with detailed risk assessments and technical evidence. Work with internal teams and OEMs to recommend security hardening measures. Contribute to the ongoing improvement of testing methodologies and lab capabilities. Stay Aligned with Industry Standards: Ensure compliance with national and international automotive cybersecurity standards, including AIS 189, ISO/SAE 21434, and UN R155. Stay updated on emerging vehicle technologies and cyber threat landscapes. Eligibility Educational Background: Bachelor’s degree in electrical/Electronics, Computer Science, Cybersecurity, or related discipline. Technical Skills: Knowledge of vehicle networking protocols (CAN, LIN, UDS). Experience with CAN analysis tools (CANalyzer, SavvyCAN, PCAN). Familiarity with Android-based systems, ADB, rooting, and mobile OS exploitation. Experience in wireless exploitation (Wi-Fi, Bluetooth, RF using SDR). Circuit and system-level debugging, reverse engineering PCBs, or automotive modules. Experience: 1–4 years of experience in penetration testing, embedded security, or automotive security assessment. Desired Eligibility Exposure to AIS 189 or ISO/SAE 21434 frameworks. Participation in hardware-based CTFs, red teaming, or automotive-focused security research. Familiarity with tools such as Metasploit, Burp Suite, IDA Pro, Ghidra, Wireshark, and SDR tools. Certifications like CEH, CRTP, OSCP, PJPT, PNPT, or relevant embedded/automotive certifications. Ability to work in lab environments and travel for on-site testing engagements. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph.

Posted 1 week ago

Apply

3.0 - 5.0 years

0 Lacs

Gujarat, India

On-site

Job Summary: We are seeking a highly experienced “Senior VAPT & Penetration Testing Specialist” to lead and ensure the quality and effectiveness of our vulnerability assessment and penetration testing operations. This role involves findings, validating findings, reviewing technical reports, ensuring compliance with standards (OWASP, PTES, NIST, etc.), and improving methodologies and tools. Key Responsibilities: Conduct in-depth vulnerability assessments and penetration tests on web, mobile, network, API, and cloud infrastructure using manual and automation. Utilize industry-standard tools like SQLMap, Burp Suite, Nessus, Nmap, and custom scripts for advanced exploitation techniques. Simulate various cyber-attacks including DDoS, Brute Force, XSS, SQL Injection, DNS attacks, and Social Engineering to identify system vulnerabilities. Perform peer reviews of technical deliverables and verify accuracy of findings and recommendations. Ensure that all assessments are aligned with industry standards such as OWASP, PTES, MITRE ATT&CK, and NIST. Act as a technical lead and mentor for junior VAPT team and QA team members. Identify gaps in the current testing methodologies and implement process improvements. Prepare detailed documentation and the VA report and ensure clear, actionable, and risk-rated reporting. Collaborate with clients and internal teams to understand scope and provide post-assessment clarifications. Present the client meeting for the future VAPT assignments. Stay updated with emerging threats, tools, techniques, and frameworks. Required Skills & Qualifications: Bachelor's or Master's degree in Computer Science, Cybersecurity, or related field. 3 to 5 years of hands-on experience in VAPT and penetration testing. In-depth knowledge of web, network, mobile, cloud, and API security. Strong understanding of secure coding practices and vulnerability management. Expertise in tools like Burp Suite, Nmap, Nessus, Metasploit, Qualys, Kali Linux, Wireshark, etc. Familiarity with SIEM, IDS/IPS, EDR tools is a plus. Excellent report writing and documentation skills. Strong communication and overseas client-interaction skills. Preferred Certifications: OSCP (Offensive Security Certified Professional) – Highly preferred CEH (Certified Ethical Hacker) CREST / GPEN / GWAPT / CISSP – Optional but desirable ISO 27001 Lead Auditor or Lead Implementer – Added advantage

Posted 1 week ago

Apply

4.0 - 8.0 years

0 Lacs

maharashtra

On-site

The ideal candidate for the Security Analyst position should have a keen interest in working within a security assessment and application support environment, particularly within the BFSI/Financial Sector. Your primary responsibility will be to ensure compliance with security frameworks such as SWIFT CSCF (Customer Security Controls Framework). In this role, you will be tasked with overseeing the day-to-day SWIFT operations to guarantee uninterrupted message processing. Your expertise in using VAPT tools like Nessus and Metasploit will be essential in providing technical assistance and troubleshooting SWIFT-related issues promptly. You will also be required to monitor SWIFT systems for any abnormalities or performance issues and perform routine maintenance, health checks, and system updates for SWIFT applications. As a Security Analyst, you will play a critical role in managing and resolving SWIFT-related incidents, escalating critical issues as necessary, and conducting root cause analysis to implement preventive measures for recurring problems. Collaborating with cross-functional teams, including infrastructure and security, will be crucial to maintaining SWIFT systems effectively. Additionally, you will assist with system upgrades and integration projects involving SWIFT applications, ensuring incidents, resolutions, and technical procedures are well-documented. Moreover, you will be responsible for preparing and presenting reports on system performance, risks, and service levels, ensuring that SWIFT systems comply with internal and external security protocols, including SWIFT CSP. Coordinating with the security team to safeguard SWIFT infrastructure from threats and providing SWIFT-related support to clients for timely and accurate service delivery will be part of your daily tasks. You will also address escalated client issues and maintain high service levels while monitoring security logs and analyzing security incidents for intrusion detection, anomaly detection, and forensic investigations. Furthermore, your role will involve evaluating SWIFT CSCF compliance and working on the implementation, monitoring, and reporting of SWIFT security controls. Conducting security awareness training for internal teams and assisting in security policy creation and enforcement will be essential aspects of this position. Knowledge of Unix and Windows Server OS platforms, as well as the ability to assess security monitoring of clients, servers, applications, and network infrastructure activities, will be advantageous. In summary, the Security Analyst role requires a candidate with 4-8 years of experience, a Bachelor's degree or equivalent combination of education and work experience, and a degree in a technology field is preferred. If you are looking for a challenging yet rewarding opportunity to contribute to the security and compliance of SWIFT systems within the BFSI/Financial Sector, this position may be the perfect fit for you.,

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

You are being hired for a Cybersecurity Penetration Testing Senior position by a leading US Accounting and Tax Advisory firm based in Bangalore. Your primary responsibilities will include conducting network penetration testing using tools like Nessus, Nmap, and Metasploit, as well as performing web application testing with advanced utilization of Burp Suite Pro. You should possess a strong understanding of TCP/IP networking and the capability to troubleshoot connectivity issues. Additionally, you will be responsible for assessing the security vulnerabilities of client's web and/or mobile applications and APIs, ensuring test quality, and resolving any issues that may hinder the testing process, especially for large or complex projects. To qualify for this role, you should hold a Bachelor's degree in business administration, cybersecurity, information technology, computer science, or a related field, or have equivalent experience. It is essential to have a minimum of 3 years of experience in TCP/IP networking, attacking endpoints at a network level, and penetration testing. Moreover, you should have at least 3 years of experience in an internal or external cybersecurity position, or similar roles such as threat/penetration testing, ethical hacking, OWASP top 10, or AppScan. Your ability to collaborate effectively and communicate efficiently within a team environment is crucial for this role. Preferred certifications for this position include Offensive Security Certified Professional (OSCP), GPEN: GIAC Certified Penetration Tester, OffSec Web Assessor (OSWA), OffSec Web Expert (OSWE), API Security Certified Professional (ASCP), and Certified API Security Analyst (CASA). A working knowledge of tools like Burp Suite, Nessus, and the Kali Linux environment is highly desirable for this role.,

Posted 1 week ago

Apply

6.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Position Senior Security Engineer - IOT Experience Job Description: 2–6 years of relevant experience in system security, embedded systems, and vulnerability assessments. Key Skills Firmware Analysis Tools: Expertise in using firmware analysis tools such as Ghidra, Binwalk, and Radare2 for static and dynamic analysis of firmware images. Embedded Linux Platforms: In-depth knowledge of embedded Linux, Yocto, and OpenWRT platforms for secure firmware and OS testing. Secure Boot & Firmware Update Mechanisms: Proficiency in testing secure boot processes and firmware update mechanisms, ensuring integrity and authenticity. OS Hardening & Security Configurations: Strong understanding of OS hardening techniques and security configurations to mitigate threats and enhance system integrity. Vulnerability Assessment & CVE Analysis: Extensive experience with vulnerability assessment frameworks and CVE analysis, identifying and addressing security vulnerabilities in embedded systems. Debugging & Emulation Tools: Proficient in using debugging tools and emulators such as QEMU to analyze embedded system behavior. SBOM & Secure Update Protocols: Familiarity with SBOM (Software Bill of Materials), patch management, and secure update protocols to ensure safe software deployments. Firmware Reverse Engineering: Expertise in performing reverse engineering of firmware images to detect vulnerabilities and potential exploits. Penetration Testing Frameworks: Experience using penetration testing frameworks like Metasploit, Kali Linux, and custom tools for system vulnerability testing. Custom Test Case Development: Ability to develop and execute custom test cases to simulate real-world attack scenarios and identify potential risks in embedded systems. Leadership & Mentoring: Strong leadership skills with a proven track record of mentoring junior engineers and guiding teams in advanced security testing methodologies. Technical Writing & Reporting: Excellent technical writing skills, including the ability to produce clear, concise, and detailed reports on security findings and risk assessments. Proactive Security Risk Mitigation: Proactive in identifying and mitigating security risks within embedded systems, ensuring the implementation of security best practices. Responsibilities Leadership in Security Testing: Lead system-level Vulnerability Assessment and Penetration Testing (VAPT) for firmware, operating systems, and embedded software, ensuring thorough security evaluations. Test Plan Development & Execution: Develop and implement comprehensive test plans for secure update and patch validation, ensuring security fixes are applied correctly and without introducing new risks. Firmware Static & Dynamic Analysis: Conduct detailed static and dynamic analysis of firmware images using tools like Ghidra, Binwalk, and Radare2 to identify potential vulnerabilities. Secure Boot & Root of Trust Validation: Validate secure boot implementations and hardware root of trust to ensure system integrity and protection from malicious code injection. OS Hardening & Access Control Testing: Test OS hardening configurations and secure access control mechanisms to strengthen system defenses against unauthorized access and exploitation. Vulnerability Identification & Classification: Identify and classify vulnerabilities and misconfigurations in embedded systems, following industry standards such as CVSS for risk assessment and remediation prioritization. Collaboration with Compliance & Engineering: Work closely with compliance and engineering teams to prioritize remediation efforts, ensuring that vulnerabilities are addressed effectively. Custom Attack Simulations: Develop and execute custom test cases to simulate real-world attack scenarios and evaluate the system's resilience against cyber threats. Rollback & Patch Management Testing: Oversee testing of rollback and patch management procedures, ensuring that system updates do not compromise security or functionality. Mentoring & Knowledge Sharing: Mentor junior engineers in security testing methodologies, sharing knowledge on advanced techniques and tools for improving system security testing processes. CVE Monitoring & Testing Updates: Monitor relevant CVE feeds, integrating new vulnerabilities and security patches into testing procedures to ensure up-to-date protection. Reporting & Risk Assessments: Provide detailed technical reports and risk assessments to stakeholders, outlining identified vulnerabilities, potential impact, and recommended mitigations. Regulatory Compliance: Ensure that all testing activities align with industry standards, including RED 18031 compliance, and adhere to relevant regulatory frameworks. Secure Lab Environment Maintenance: Maintain a secure lab environment for all system testing activities, ensuring that testing procedures are conducted in a controlled and isolated setting. Qualifications & Certifications Education: Bachelor's or Master’s degree in Cybersecurity, Embedded Systems, Computer Engineering, or a related field. Certifications (Preferred): OSCP (Offensive Security Certified Professional) OSCE (Offensive Security Certified Expert) GXPN (GIAC Exploit Researcher and Advanced Penetration Tester) Equivalent certifications in ethical hacking, penetration testing, or embedded system security are also highly valued. Industry Standards Familiarity: Familiarity with security frameworks such as ISO/IEC 62443, RED 18031, and IoT security frameworks. Why Join Us? Opportunity to work with cutting-edge automation technologies in a collaborative and innovative environment. Competitive salary and benefits package. Career growth opportunities in a fast-paced and dynamic industry. A strong focus on work-life balance and employee well-being. Location: IN-GJ-Ahmedabad, India-Ognaj (eInfochips) Time Type Full time Job Category Engineering Services

Posted 1 week ago

Apply

1.0 - 3.0 years

5 - 10 Lacs

Bengaluru

Work from Office

Apply on company website- https://zrec.in/hIRJh?source=CareerSite

Posted 1 week ago

Apply

7.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

At Microsoft, our core mission is empowering every person and every organization on the planet to achieve more. Industry Solutions (IS) is a global organization of over 16,000 strategic sellers, industry experts, elite engineers, architects and consultants, who along with delivery experts are working together to bring Microsoft’s mission of empowerment – and cutting-edge technology - to life for the world’s most influential customers. We are on the front lines of innovation, working side-by-side with customers to drive value across the entirety of their digital transformation journey. Our team prides itself on embracing a growth mindset, inspiring excellence, and encouraging everyone to share their unique viewpoints and be their authentic selves. Responsibilities Candidates must understand customer and partner business and IT environment and have demonstrated skills designing and developing technology in area(s) of specialization to solve business problems. Candidates must have experience developing software for the Microsoft platform using programming languages and development platforms including C# or any modern programming language and Microsoft SQL Server. Participates in the delivery of complex solution as technical individual contributor or as a team member under coaching/guidance of senior team members. Strong knowledge of the Software Development Life Cycle methodology, technical design, development and implementation decisions on the use of technology in area(s) of specialization. Contribution to overall Release and Sprint planning Overall Application Design (HLD) Validate planned velocity of the feature teams Provide user story estimates in refinements to deliver quality and on time delivery Drive team to Code Metrics like Style Cop, FXCop, CC, Class Coupling are met as defined by the project Drive team to ensure code complies with security and performance standards Track and monitor the feature team’s delivery progress Track team sprint bug's RCA for quality improvement in subsequent sprints and take action Track quality reports like Build and Sonarqube Conduct User story ready meeting DoD once Sprint ends Lead Sprint planning and task distribution Track creation of LLD for relevant user story Review LLD for relevant user story Ensure Unit Test, Integration test Automation as per the acceptance and P1, P2 test cases Ensure UI Automation for validation scenarios and 80% P1, P2 Validate Performance Test Scenarios and Execution Validate Environment Readiness Ensure Functionality is verified to be working in the DEV Integration environment against the test cases identified by the test team. Ensure UI verification and validation Ability to understand and analyze issues and use judgment to make decisions. Strong problem solving & troubleshooting skills Strong communication and leadership skills Responsible for self-development according to professional development plan Qualifications Required qualifications for Consultants include: Highly proficient, customer-facing experience involving project envisioning, planning, design, development, and deployment of complex solutions 7+ years of software development: automation-related experience is valued. Scripting languages such as bash, python, and PowerShell, or compiled languages such as C, C# and Go are most relevant, but others are acceptable. Awareness of, and ability to reason about, modern software & systems architectures, including load-balancing, queueing, caching, distributed systems failure modes generally, microservices, and so on Associated troubleshooting skills, including the ability to follow RPC call-chains across arbitrary network steps. Consequent understanding of monitoring in distributed systems Deep understanding of operating system level concepts such as processes, memory allocation, and the network stack; understanding of how applications are affected by the above, and ability to debug same Experience with working in a team, including coordinating large projects, communicating well, and exercising initiative when presented with problems Strong understanding of customer and partner business and IT environments, with proven record of delivering successful technical solutions Practical experience running large scale online systems is always an advantage Demonstrated ability to focus on the development of customer business agility and business value, while simultaneously providing deep experience with specific technologies Strong communication, consulting, analytical and problem-solving skills Growth mindset Flexible work approaches with strong proactivity and inclination to resolving customer situations Demonstrated skills designing and developing technology in area(s) of specialization to solve business problems and help customers in enhancing existing applications; core skills must include Microsoft technology, with open-source experience helpful Degree in Computer Science Engineering, MCA or equivalent with work experience; higher relevant education preferred MCSD/MCSE/MCAD/Azure certification is a plus Required Skills Strong Object-Oriented Programming and Design experience Understanding of Technical Design Patterns SQL Programming knowledge .Net 4.0/Core (ASP.Net, Web API, PowerShell script. MVC, TFS/GitHub) Azure (Deep technical understanding of PaaS, Good experience in Azure services like Service Fabric, Web Apps, Cosmos DB, Azure Storage, Azure Service Bus, Azure Functions, and API management, SQL. with Azure Application Dev experience)Deep technical and architectural knowledge of at least 3 of the following areas, as well as broad understanding across the Microsoft Development toolset: Cloud Technologies (preferably Azure Full Stack) Skills on projects targeting a variety of form factors (e.g. Mobile, IoT) Development Languages (e.g. C#, JavaScript, Java, Front end skills like React, Angular etc.) Application Lifecycle Management (e.g. Agile, TFS etc.) Solution Architecture (e.g. SOA, Enterprise Architecture) Identity and Access Management (IAM), Conditional Access Policies, Strong Authentication, Risk-Based Access, Encryption, Backup & Disaster Recovery, Data Loss Prevention (DLP), Secure Coding Practices, Input Validation, Output Encoding, Authentication and Password Management, Session Management, Cryptography, Threat and Vulnerability Identification, Security Breach Response. Techniques:Implementing modern authentication providers (like EntraID), simulating attacks, writing resilient code, using encryption algorithms, hashing techniques, secret management with key vault, cryptographic protocols. Tools: Azure Security Center, Azure Sentinel, Metasploit, Burp Suite, custom scripts. Good to have skills: Industry vertical knowledge – Retail, Banking and Finance, Telecom etc. Middleware technologies used for integrations Knowledge of Azure DevOps, Docker, Kubernetes etc. Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.

Posted 1 week ago

Apply

12.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Director Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats, drive transformation, and foster growth. As companies increasingly adopt digital business models, the generation and sharing of data among organizations, partners, and customers multiply. We play a crucial role in ensuring that our clients are protected by developing transformation strategies focused on security, efficiently integrating and managing new or existing technology systems, and enhancing their cybersecurity investments. As a Director, you will be responsible for overseeing regular operations, driving continuous improvement processes, and managing client and vendor interactions. This role involves managing complex incidents escalated from L2 analysts, operating the Security Incident process, and mentoring junior team members to build a cohesive and motivated unit. Responsibilities: Review cybersecurity events analyzed by L2 security analysts, serving as the escalation point for detection, response, and remediation activities. Monitor and guide the team in triaging cybersecurity events, prioritizing, and recommending/performing response measures. Provide technical support for IT teams in response and remediation activities for escalated cybersecurity events/incidents. Follow up on cybersecurity incident tickets until closure. Guide L1 and L2 analysts in analyzing events and response activities. Expedite cyber incident response and remediation activities when delays occur, coordinating with L1 and L2 team members. Review and provide suggestions for information security policies and best practices in client environments. Ensure compliance with SLAs and contractual requirements, maintaining effective communication with stakeholders. Review and share daily, weekly, and monthly dashboard reports with relevant stakeholders. Update and review documents, playbooks, and standard operational procedures. Validate and update client systems and IT infrastructure documentation. Share knowledge on current security threats, attack patterns, and tools with team members. Create and review new use cases based on evolving attack trends. Analyze and interpret Windows, Linux OS, firewall, web proxy, DNS, IDS, and HIPS log events. Develop and maintain threat detection rules, parsers, and use cases. Understand security analytics and flows across SaaS applications and cloud computing tools. Validate use cases through selective testing and logic examination. Maintain continuous improvement processes and build/groom teams over time. Develop thought leadership within the SOC. Mandatory skill sets: Bachelor’s degree (minimum requirement). 12+years of experience in SOC operations. Experience analyzing malicious traffic and building detections. Experience in application security, network security, and systems security. Knowledge of security testing tools (e.g., BurpSuite, Mimikatz, Cobalt Strike, PowerSploit, Metasploit, Nessus, HP Web Inspect). Proficiency in common programming and scripting languages (Python, PowerShell, Ruby, Perl, Bash, JavaScript, VBScript). Familiarity with cybersecurity frameworks and practices (OWASP, NIST CSF, PCI DSS, NY-DFS). Experience with traditional security operations, event monitoring, and SIEM tools. Knowledge of MITRE or similar frameworks and procedures used by adversaries. Ability to develop and maintain threat detection rules and use cases. Preferred skill sets: Strong communication skills, both written and oral. Experience with SMB and large enterprise clients. Good understanding of ITIL processes (Change Management, Incident Management, Problem Management). Strong expertise in multiple SIEM tools and other SOC environment devices. Knowledge of firewalls, IDS/IPS, AVI, EDR, Proxy, DNS, email, AD, etc. Understanding of raw log formats of various security devices. Foundational knowledge of networking concepts (TCP/IP, LAN/WAN, Internet network topologies). Relevant certifications (CEH, CISA, CISM, etc.). Strong work ethic and time management skills. Coachability and dedication to consistent improvement. Ability to mentor and encourage junior teammates. Knowledge of regex and parser creation. Ability to deploy SIEM solutions in customer environments. Years of experience required: 12 + years Education qualification: B.Tech Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Accenture Managed Detection and Response (MDR) Ops Security Engineering Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Coaching and Feedback, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Influence, Innovation, Intellectual Curiosity, Learning Agility, Managed Services, Optimism {+ 20 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date

Posted 1 week ago

Apply

2.0 years

8 Lacs

Madurai, Tamil Nadu, India

Remote

Experience : 2.00 + years Salary : INR 74074 / month (based on experience) Expected Notice Period : 7 Days Shift : (GMT+05:30) Asia/Kolkata (IST) Opportunity Type : Remote Placement Type : Full Time Contract for 12 Months(40 hrs a week/160 hrs a month) (*Note: This is a requirement for one of Uplers' client - BrowserStack) What do you need for this opportunity? Must have skills required: Python, Bash, Api Security, OWASP Top 10, Penetration Testing BrowserStack is Looking for: As a Security Analyst, you will be responsible for identifying and mitigating security risks by conducting penetration tests and automating security processes. You will work closely with engineering teams to ensure vulnerabilities are effectively remediated and security is integrated into development workflows. Requirements: Understanding of vulnerability assessment, secure code review, pentesting methodologies, OWASP Top 10, and API security. Experience with tools like Burp Suite, Nmap, Metasploit, TCPDump, etc. Proficiency in at least one scripting language (e.g., Python, Bash) for automating security tasks. Basic knowledge of Linux commands, file system navigation, and networking concepts. Strong interpersonal and communication skills (written and verbal). Ability to take initiative and deliver committed results. Exposure to cloud security principles in AWS, GCP, or Azure (good to have). Responsibilities: Conduct penetration tests on web applications, APIs, and infrastructure. Automate security testing and vulnerability detection. Work with developers to remediate vulnerabilities and implement security best practices. Vulnerability management - triage and manage vulnerabilities identified through scanning and manual efforts How to apply for this opportunity? Step 1: Click On Apply! And Register or Login on our portal. Step 2: Complete the Screening Form & Upload updated Resume Step 3: Increase your chances to get shortlisted & meet the client for the Interview! About Uplers: Our goal is to make hiring reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant contractual onsite opportunities and progress in their career. We will support any grievances or challenges you may face during the engagement. (Note: There are many more opportunities apart from this on the portal. Depending on the assessments you clear, you can apply for them as well). So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!

Posted 1 week ago

Apply

2.0 years

8 Lacs

Vellore, Tamil Nadu, India

Remote

Experience : 2.00 + years Salary : INR 74074 / month (based on experience) Expected Notice Period : 7 Days Shift : (GMT+05:30) Asia/Kolkata (IST) Opportunity Type : Remote Placement Type : Full Time Contract for 12 Months(40 hrs a week/160 hrs a month) (*Note: This is a requirement for one of Uplers' client - BrowserStack) What do you need for this opportunity? Must have skills required: Python, Bash, Api Security, OWASP Top 10, Penetration Testing BrowserStack is Looking for: As a Security Analyst, you will be responsible for identifying and mitigating security risks by conducting penetration tests and automating security processes. You will work closely with engineering teams to ensure vulnerabilities are effectively remediated and security is integrated into development workflows. Requirements: Understanding of vulnerability assessment, secure code review, pentesting methodologies, OWASP Top 10, and API security. Experience with tools like Burp Suite, Nmap, Metasploit, TCPDump, etc. Proficiency in at least one scripting language (e.g., Python, Bash) for automating security tasks. Basic knowledge of Linux commands, file system navigation, and networking concepts. Strong interpersonal and communication skills (written and verbal). Ability to take initiative and deliver committed results. Exposure to cloud security principles in AWS, GCP, or Azure (good to have). Responsibilities: Conduct penetration tests on web applications, APIs, and infrastructure. Automate security testing and vulnerability detection. Work with developers to remediate vulnerabilities and implement security best practices. Vulnerability management - triage and manage vulnerabilities identified through scanning and manual efforts How to apply for this opportunity? Step 1: Click On Apply! And Register or Login on our portal. Step 2: Complete the Screening Form & Upload updated Resume Step 3: Increase your chances to get shortlisted & meet the client for the Interview! About Uplers: Our goal is to make hiring reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant contractual onsite opportunities and progress in their career. We will support any grievances or challenges you may face during the engagement. (Note: There are many more opportunities apart from this on the portal. Depending on the assessments you clear, you can apply for them as well). So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!

Posted 1 week ago

Apply

2.0 years

8 Lacs

Faridabad, Haryana, India

Remote

Experience : 2.00 + years Salary : INR 74074 / month (based on experience) Expected Notice Period : 7 Days Shift : (GMT+05:30) Asia/Kolkata (IST) Opportunity Type : Remote Placement Type : Full Time Contract for 12 Months(40 hrs a week/160 hrs a month) (*Note: This is a requirement for one of Uplers' client - BrowserStack) What do you need for this opportunity? Must have skills required: Python, Bash, Api Security, OWASP Top 10, Penetration Testing BrowserStack is Looking for: As a Security Analyst, you will be responsible for identifying and mitigating security risks by conducting penetration tests and automating security processes. You will work closely with engineering teams to ensure vulnerabilities are effectively remediated and security is integrated into development workflows. Requirements: Understanding of vulnerability assessment, secure code review, pentesting methodologies, OWASP Top 10, and API security. Experience with tools like Burp Suite, Nmap, Metasploit, TCPDump, etc. Proficiency in at least one scripting language (e.g., Python, Bash) for automating security tasks. Basic knowledge of Linux commands, file system navigation, and networking concepts. Strong interpersonal and communication skills (written and verbal). Ability to take initiative and deliver committed results. Exposure to cloud security principles in AWS, GCP, or Azure (good to have). Responsibilities: Conduct penetration tests on web applications, APIs, and infrastructure. Automate security testing and vulnerability detection. Work with developers to remediate vulnerabilities and implement security best practices. Vulnerability management - triage and manage vulnerabilities identified through scanning and manual efforts How to apply for this opportunity? Step 1: Click On Apply! And Register or Login on our portal. Step 2: Complete the Screening Form & Upload updated Resume Step 3: Increase your chances to get shortlisted & meet the client for the Interview! About Uplers: Our goal is to make hiring reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant contractual onsite opportunities and progress in their career. We will support any grievances or challenges you may face during the engagement. (Note: There are many more opportunities apart from this on the portal. Depending on the assessments you clear, you can apply for them as well). So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!

Posted 1 week ago

Apply

7.0 years

3 - 8 Lacs

Hyderābād

On-site

At Microsoft, our core mission is empowering every person and every organization on the planet to achieve more. Industry Solutions (IS) is a global organization of over 16,000 strategic sellers, industry experts, elite engineers, architects and consultants, who along with delivery experts are working together to bring Microsoft’s mission of empowerment – and cutting-edge technology - to life for the world’s most influential customers. We are on the front lines of innovation, working side-by-side with customers to drive value across the entirety of their digital transformation journey. Our team prides itself on embracing a growth mindset, inspiring excellence, and encouraging everyone to share their unique viewpoints and be their authentic selves. Responsibilities Candidates must understand customer and partner business and IT environment and have demonstrated skills designing and developing technology in area(s) of specialization to solve business problems. Candidates must have experience developing software for the Microsoft platform using programming languages and development platforms including C# or any modern programming language and Microsoft SQL Server. Participates in the delivery of complex solution as technical individual contributor or as a team member under coaching/guidance of senior team members. Strong knowledge of the Software Development Life Cycle methodology, technical design, development and implementation decisions on the use of technology in area(s) of specialization. Contribution to overall Release and Sprint planning Overall Application Design (HLD) Validate planned velocity of the feature teams Provide user story estimates in refinements to deliver quality and on time delivery Drive team to Code Metrics like Style Cop, FXCop, CC, Class Coupling are met as defined by the project Drive team to ensure code complies with security and performance standards Track and monitor the feature team’s delivery progress Track team sprint bug's RCA for quality improvement in subsequent sprints and take action Track quality reports like Build and Sonarqube Conduct User story ready meeting DoD once Sprint ends Lead Sprint planning and task distribution Track creation of LLD for relevant user story Review LLD for relevant user story Ensure Unit Test, Integration test Automation as per the acceptance and P1, P2 test cases Ensure UI Automation for validation scenarios and 80% P1, P2 Validate Performance Test Scenarios and Execution Validate Environment Readiness Ensure Functionality is verified to be working in the DEV Integration environment against the test cases identified by the test team. Ensure UI verification and validation Ability to understand and analyze issues and use judgment to make decisions. Strong problem solving & troubleshooting skills Strong communication and leadership skills Responsible for self-development according to professional development plan Qualifications Required qualifications for Consultants include: Highly proficient, customer-facing experience involving project envisioning, planning, design, development, and deployment of complex solutions 7+ years of software development: automation-related experience is valued. Scripting languages such as bash, python, and PowerShell, or compiled languages such as C, C# and Go are most relevant, but others are acceptable. Awareness of, and ability to reason about, modern software & systems architectures, including load-balancing, queueing, caching, distributed systems failure modes generally, microservices, and so on Associated troubleshooting skills, including the ability to follow RPC call-chains across arbitrary network steps. Consequent understanding of monitoring in distributed systems Deep understanding of operating system level concepts such as processes, memory allocation, and the network stack; understanding of how applications are affected by the above, and ability to debug same Experience with working in a team, including coordinating large projects, communicating well, and exercising initiative when presented with problems Strong understanding of customer and partner business and IT environments, with proven record of delivering successful technical solutions Practical experience running large scale online systems is always an advantage Demonstrated ability to focus on the development of customer business agility and business value, while simultaneously providing deep experience with specific technologies Strong communication, consulting, analytical and problem-solving skills Growth mindset Flexible work approaches with strong proactivity and inclination to resolving customer situations Demonstrated skills designing and developing technology in area(s) of specialization to solve business problems and help customers in enhancing existing applications; core skills must include Microsoft technology, with open-source experience helpful Degree in Computer Science Engineering, MCA or equivalent with work experience; higher relevant education preferred MCSD/MCSE/MCAD/Azure certification is a plus Required Skills: Strong Object-Oriented Programming and Design experience Understanding of Technical Design Patterns SQL Programming knowledge .Net 4.0/Core (ASP.Net, Web API, PowerShell script. MVC, TFS/GitHub) Azure (Deep technical understanding of PaaS, Good experience in Azure services like Service Fabric, Web Apps, Cosmos DB, Azure Storage, Azure Service Bus, Azure Functions, and API management, SQL. with Azure Application Dev experience)Deep technical and architectural knowledge of at least 3 of the following areas, as well as broad understanding across the Microsoft Development toolset: Cloud Technologies (preferably Azure Full Stack) Skills on projects targeting a variety of form factors (e.g. Mobile, IoT) Development Languages (e.g. C#, JavaScript, Java, Front end skills like React, Angular etc.) Application Lifecycle Management (e.g. Agile, TFS etc.) Solution Architecture (e.g. SOA, Enterprise Architecture) Identity and Access Management (IAM), Conditional Access Policies, Strong Authentication, Risk-Based Access, Encryption, Backup & Disaster Recovery, Data Loss Prevention (DLP), Secure Coding Practices, Input Validation, Output Encoding, Authentication and Password Management, Session Management, Cryptography, Threat and Vulnerability Identification, Security Breach Response. Techniques :Implementing modern authentication providers (like EntraID), simulating attacks, writing resilient code, using encryption algorithms, hashing techniques, secret management with key vault, cryptographic protocols. Tools : Azure Security Center, Azure Sentinel, Metasploit, Burp Suite, custom scripts. Good to have skills: Industry vertical knowledge – Retail, Banking and Finance, Telecom etc. Middleware technologies used for integrations Knowledge of Azure DevOps, Docker, Kubernetes etc. Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.

Posted 1 week ago

Apply

2.0 years

5 - 8 Lacs

Gāndhīnagar

On-site

Key Responsibilities Monitor, identify, and respond to security incidents across systems and networks. Implement and maintain security measures such as firewalls, intrusion detection systems (IDS), and endpoint protection. Conduct regular vulnerability assessments and penetration tests on systems and applications. Collaborate with DevOps and Engineering teams to integrate security best practices into CI/CD pipelines. Manage and review access controls, identity management, and secure configurations. Investigate and remediate security breaches, threats, and anomalies. Stay current with the latest security trends, vulnerabilities, and threat intelligence. Document security processes, policies, incident response plans, and risk assessments. Assist in compliance efforts (e.g., ISO 27001, SOC 2, GDPR) as applicable. Required Skills and Qualifications Bachelor’s degree in Computer Science, Information Security, or related field. Proven experience in system/network/application security. Strong knowledge of cybersecurity frameworks and standards (OWASP, NIST, CIS). Familiarity with tools such as Wireshark, Nessus, Burp Suite, Metasploit, or similar. Hands-on experience with cloud platforms (AWS, Azure, or GCP) and securing cloud infrastructure. Understanding of secure coding practices and code review for security flaws. Scripting knowledge (e.g., Python, Bash, PowerShell) is a plus. Nice to Have Security certifications like CEH, CISSP, OSCP, or CompTIA Security+. Experience in automating security tasks or using SIEM tools. Knowledge of container security (e.g., Docker, Kubernetes). Job Types: Full-time, Permanent Pay: ₹500,000.00 - ₹800,000.00 per year Benefits: Flexible schedule Paid sick time Paid time off Provident Fund Ability to commute/relocate: Gandhinagar, Gujarat: Reliably commute or planning to relocate before starting work (Required) Experience: Security Engineer: 2 years (Required) Work Location: In person

Posted 1 week ago

Apply

3.0 - 5.0 years

0 Lacs

Andhra Pradesh

On-site

Information Protection Senior Analyst - HIH - Evernorth Job Description Summary The Information Protection Senior Analyst - Penetration Testing, is responsible for conducting vulnerability assessments, threat modeling, penetration tests of Cigna’s IT infrastructure and applications. This role will work closely with the Information Protection Senior Manager to identify, evaluate, and remediate potential weaknesses in Cigna’s systems, using both manual and automated methods. About Cigna Cigna is a global health service company dedicated to helping the people we serve improve their health, well-being, and peace of mind. But we don’t just care about your well–being, we care about your career health too. That’s why, when you work with us, you can count on a different kind of career – you’ll make a difference, learn a ton, and share in changing the way people think about healthcare. Responsibilities Execute internal and external penetration tests against corporate web applications, APIs, networks, infrastructure and operating systems in order to discover vulnerabilities. Execute mobile application penetration tests for both Android and iOS based devices. Execute penetration tests in cloud-hosted environments. Create comprehensive and accurate penetration testing reports with recommendations for appropriate remediation, and communicate risk findings with development and infrastructure teams. Develop scripts, tools, or methodologies to enhance Cigna’s penetration testing processes. Work as part of a team to identify risks, communicate to key stakeholders, and provide value to the organization. Skills required Demonstrated ability to work as both an individual contributor and a team player in a fast paced environment. Coordinate with people and teams to forecast activity completion and the ability to work in a team environment, sharing workloads and responsibilities. Knowledge of Windows and *nix-based operating systems. Understanding of core Internet protocols (e.g. TCP, UDP, DNS, HTTP, TLS, IPsec) and the OSI model. Understanding of encryption fundamentals (symmetric/asymmetric, ECB/CBC operations, AES, etc.). Understanding of Cloud environments such as SaaS, PaaS and IaaS. Basic exploit development and validation skills. Proficiency in application vulnerability assessment tools (e.g. Burp, Checkmarx, AppScan, WebInspect, Cenzic, etc.). Proficiency in network and server assessment tools (e.g. Nessus, metasploit, nmap, nikto, etc.) Understanding of web application frameworks (React, Springboot, Ruby on Rails, J2EE, PHP, ASP.NET). Proficiency in manual and automated techniques for penetration testing and executing vulnerability assessments. Knowledge of networking fundamentals and common attacks. Coding/scripting experience in modern scripting languages (e.g. Python, Ruby, PowerShell.) Mobile application coding experience with Android/iOS based platforms (e.g. Java, Swift, Objective C). Ability to analyze vulnerabilities and misconfigurations, appropriately characterize threats, and provide remediation recommendations. Qualifications High School diploma; Bachelor's degree preferred. 3-5 years or more of penetration testing experience. Passionate about security and finding new ways to break into systems, as well as defend them. Strong analytical and problem solving skills, with the ability to “think outside the box”. Ability to work in a flexible environment where requirements and procedures continuously evolve. Strong oral and written communication skills, including a demonstrated ability to prepare documentation and presentations for technical and non-technical audiences. About Evernorth Health Services Evernorth Health Services, a division of The Cigna Group, creates pharmacy, care and benefit solutions to improve health and increase vitality. We relentlessly innovate to make the prediction, prevention and treatment of illness and disease more accessible to millions of people. Join us in driving growth and improving lives.

Posted 1 week ago

Apply

5.0 - 8.0 years

0 Lacs

Andhra Pradesh

On-site

Information Protection Lead Analyst - HIH - Evernorth Job Description Summary: Provides counsel and advice to top management on significant Information Protection matters, often requiring coordination between organizations. Viewed as an expert in a specific aspect of information security. Undertakes complex projects requiring additional specialized technical knowledge. Makes well-thought-out decisions on complex or ambiguous information security issues. Provides architectural oversight and direction for enterprise-wide security technology. Ensures high-level integration of application development with information security policies and strategies. Stays up-to-date on the direction of emerging industry standards. Identifies, evaluates, conducts, schedules and leads technical analyses functions to ensure all applicable IS security requirements are met. Provides technical analysis of requirements necessary for the protection of all information processed, stored, or transmitted by systems. Coordinates with users to determine requirements. Conducts security reviews of external service providers and outsourcing vendors and systems reviews to ensure appropriate security implementation. Focuses on providing thought leadership and technical expertise across multiple disciplines. Recognized internally as “the go-to person” for the most complex Information Protection assignments. Job Description: Position Summary: The Information Protection Lead Analyst - Penetration Testing is responsible for conducting vulnerability assessments, threat modeling, penetration tests, and red team campaigns of Cigna’s IT infrastructure and applications. This role will work closely with the Information Protection Senior Manager to identify, evaluate, and remediate potential weaknesses in Cigna’s systems using both manual and automated methods. As a member of the Cyber Security Incident Response Team, this role will provide second and third level incident response services to the global Cigna enterprise to address Cyber Security threats to the enterprise. Daily activities will include analysis of logs, memory and disc artifacts and the use of a variety of commercial and open source security tools to respond to and triage threats in global enterprise. This role will focus on Threat Hunting and Incident Response capabilities within Cloud Service Provider environments. About Cigna: Cigna is a global health service company dedicated to helping the people we serve improve their health, well-being, and peace of mind. But we don’t just care about your well –being, we care about your career health too. That’s why when you work with us, you can count on a different kind of career – you’ll make a difference, learn a ton and share in changing the way people think about healthcare. Responsibilities : Lead and execute internal and external penetration tests against corporate web applications, APIs, networks, Windows and Unix variants to discover vulnerabilities Lead and execute mobile application penetration tests for both Android and iOS based devices Create comprehensive and accurate penetration testing reports with recommendations for appropriate remediation Develop scripts, tools or methodologies to enhance Cigna’s penetration testing processes Experience in application vulnerability assessment tools (e.g. Burp, Checkmarx, AppScan, WebInspect, Cenzic, etc.) Experience with network and server assessment tools (e.g. Nessus, metasploit, nmap, nikto, etc.) Understanding of web application frameworks (React, Springboot, Ruby on Rails, J2EE, PHP, ASP.NET) Strong experience in manual and automated techniques for penetration testing and executing vulnerability assessments Knowledge of Windows and *nix-based operating systems Knowledge of networking fundamentals and common attacks Coding/scripting experience in modern scripting languages (e.g. Python, Ruby, PowerShell) Mobile application coding experience with Android/iOS based platforms (e.g. Java, Swift, Objective C) Exploit development and validation skills Ability to analyze vulnerabilities, appropriately characterize threats, and provide remediation recommendations Understanding of core Internet protocols (e.g. DNS, HTTP, TCP, UDP, TLS, IPsec) Understanding of encryption fundamentals (symmetric/asymmetric, ECB/CBC operations, AES, etc.) Demonstrated ability to coordinate people and lead teams to project/activity completion and the ability to work in a team environment, sharing workloads and responsibilities Qualifications: High School diploma; Bachelor's degree preferred 5-8 years or more of penetration testing experience One or more professional certifications such as OSCP, OSCE, GWAPT, GSEC, GPEN, GXPN Passionate about security and finding new ways to break into systems as well as defend them Strong analytical and problem solving skills with the ability to “think outside the box” Ability to work in a flexible environment where requirements and procedures continuously evolve Strong oral and written communication skills, including a demonstrated ability to prepare documentation and presentations for technical and non-technical audiences About Evernorth Health Services Evernorth Health Services, a division of The Cigna Group, creates pharmacy, care and benefit solutions to improve health and increase vitality. We relentlessly innovate to make the prediction, prevention and treatment of illness and disease more accessible to millions of people. Join us in driving growth and improving lives.

Posted 1 week ago

Apply

2.0 years

8 Lacs

Greater Hyderabad Area

Remote

Experience : 2.00 + years Salary : INR 74074 / month (based on experience) Expected Notice Period : 7 Days Shift : (GMT+05:30) Asia/Kolkata (IST) Opportunity Type : Remote Placement Type : Full Time Contract for 12 Months(40 hrs a week/160 hrs a month) (*Note: This is a requirement for one of Uplers' client - BrowserStack) What do you need for this opportunity? Must have skills required: Python, Bash, Api Security, OWASP Top 10, Penetration Testing BrowserStack is Looking for: As a Security Analyst, you will be responsible for identifying and mitigating security risks by conducting penetration tests and automating security processes. You will work closely with engineering teams to ensure vulnerabilities are effectively remediated and security is integrated into development workflows. Requirements: Understanding of vulnerability assessment, secure code review, pentesting methodologies, OWASP Top 10, and API security. Experience with tools like Burp Suite, Nmap, Metasploit, TCPDump, etc. Proficiency in at least one scripting language (e.g., Python, Bash) for automating security tasks. Basic knowledge of Linux commands, file system navigation, and networking concepts. Strong interpersonal and communication skills (written and verbal). Ability to take initiative and deliver committed results. Exposure to cloud security principles in AWS, GCP, or Azure (good to have). Responsibilities: Conduct penetration tests on web applications, APIs, and infrastructure. Automate security testing and vulnerability detection. Work with developers to remediate vulnerabilities and implement security best practices. Vulnerability management - triage and manage vulnerabilities identified through scanning and manual efforts How to apply for this opportunity? Step 1: Click On Apply! And Register or Login on our portal. Step 2: Complete the Screening Form & Upload updated Resume Step 3: Increase your chances to get shortlisted & meet the client for the Interview! About Uplers: Our goal is to make hiring reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant contractual onsite opportunities and progress in their career. We will support any grievances or challenges you may face during the engagement. (Note: There are many more opportunities apart from this on the portal. Depending on the assessments you clear, you can apply for them as well). So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!

Posted 1 week ago

Apply

1.0 - 3.0 years

0 Lacs

Andhra Pradesh

On-site

Information Protection Analyst, Penetration Testing Job Description Summary The Information Protection Senior Analyst - Penetration Testing, is responsible for conducting vulnerability assessments, threat modeling, penetration tests of Cigna’s IT infrastructure and applications. This role will work closely with the Information Protection Senior Manager to identify, evaluate, and remediate potential weaknesses in Cigna’s systems, using both manual and automated methods. About Cigna Cigna is a global health service company dedicated to helping the people we serve improve their health, well-being, and peace of mind. But we don’t just care about your well–being, we care about your career health too. That’s why, when you work with us, you can count on a different kind of career – you’ll make a difference, learn a ton, and share in changing the way people think about healthcare. Responsibilities Execute internal and external penetration tests against corporate web applications, APIs, networks, infrastructure and operating systems in order to discover vulnerabilities. Execute mobile application penetration tests for both Android and iOS based devices. Execute penetration tests in cloud-hosted environments. Create comprehensive and accurate penetration testing reports with recommendations for appropriate remediation, and communicate risk findings with development and infrastructure teams. Develop scripts, tools, or methodologies to enhance Cigna’s penetration testing processes. Work as part of a team to identify risks, communicate to key stakeholders, and provide value to the organization. Skills required Demonstrated ability to work as both an individual contributor and a team player in a fast paced environment. Coordinate with people and teams to forecast activity completion and the ability to work in a team environment, sharing workloads and responsibilities. Knowledge of Windows and *nix-based operating systems. Understanding of core Internet protocols (e.g. TCP, UDP, DNS, HTTP, TLS, IPsec) and the OSI model. Understanding of encryption fundamentals (symmetric/asymmetric, ECB/CBC operations, AES, etc.). Understanding of Cloud environments such as SaaS, PaaS and IaaS. Basic exploit development and validation skills. Proficiency in application vulnerability assessment tools (e.g. Burp, Checkmarx, AppScan, WebInspect, Cenzic, etc.). Proficiency in network and server assessment tools (e.g. Nessus, metasploit, nmap, nikto, etc.) Understanding of web application frameworks (React, Springboot, Ruby on Rails, J2EE, PHP, ASP.NET). Proficiency in manual and automated techniques for penetration testing and executing vulnerability assessments. Knowledge of networking fundamentals and common attacks. Coding/scripting experience in modern scripting languages (e.g. Python, Ruby, PowerShell.) Mobile application coding experience with Android/iOS based platforms (e.g. Java, Swift, Objective C). Ability to analyze vulnerabilities and misconfigurations, appropriately characterize threats, and provide remediation recommendations. Qualifications High School diploma; Bachelor's degree preferred. 1-3 years of penetration testing experience. Passionate about security and finding new ways to break into systems, as well as defend them. Strong analytical and problem solving skills, with the ability to “think outside the box”. Ability to work in a flexible environment where requirements and procedures continuously evolve. Strong oral and written communication skills, including a demonstrated ability to prepare documentation and presentations for technical and non-technical audiences. About Evernorth Health Services Evernorth Health Services, a division of The Cigna Group, creates pharmacy, care and benefit solutions to improve health and increase vitality. We relentlessly innovate to make the prediction, prevention and treatment of illness and disease more accessible to millions of people. Join us in driving growth and improving lives.

Posted 1 week ago

Apply

5.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

We are seeking a versatile and experienced Cybersecurity Professional to join our team as a Threat Hunter and VAPT Analyst . In this dual-capacity role, you will proactively identify and mitigate emerging cyber threats, perform in-depth vulnerability assessments, and help protect critical infrastructure and data assets. This role requires a blend of advanced technical expertise , analytical mindset , and strong collaboration with SOC and incident response teams. Key Responsibilities Threat Hunting Proactively hunt for undetected threats across networks, systems, and endpoints using behavioral analysis and threat intelligence . Identify Tactics, Techniques, and Procedures (TTPs) and anomalies to detect potential threats or APT activities. Leverage threat intelligence feeds and the MITRE ATT&CK framework to build and validate detection use cases. Collaborate with SOC teams to enhance detection rules and reduce false positives. Conduct forensic investigations and perform root cause analysis on incidents and suspicious behaviors. Develop custom scripts and queries (Python, PowerShell, Bash) for automating hunting activities in EDR, SIEM, and XDR platforms. Document and share threat hunting reports , IOCs , and actionable recommendations with relevant stakeholders. Vulnerability Assessment & Penetration Testing (VAPT) Conduct vulnerability assessments and penetration tests on systems, applications, networks, and APIs. Analyze vulnerabilities, assess risks, and deliver detailed, actionable reports to technical teams. Use a combination of automated tools (e.g., Nessus , Burp Suite , Nmap , Metasploit ) and manual techniques to identify security flaws. Ensure all assessments adhere to internal policies and regulatory standards . Perform periodic and ad-hoc security assessments for web applications , databases , wireless , and cloud environments . Collaborate with IT teams to validate remediations through re-testing and follow-ups . Stay current on emerging vulnerabilities , exploit techniques , and threat actor tactics . Qualifications & Skills Bachelor’s degree in computer science, Information Security , or a related discipline. 5+ years of experience in a cybersecurity role with hands-on work in threat hunting and VAPT . Strong expertise in VAPT tools and methodologies: Nessus, Burp Suite, Nmap, Metasploit, OWASP Top 10 . Experience with SIEMs , EDR platforms , and threat intelligence tools . Working knowledge of the MITRE ATT&CK framework . Proficient in scripting languages such as Python, PowerShell, or Bash . Excellent analytical , investigative , and report-writing skills. Strong communication and stakeholder engagement abilities. Preferred Certifications OSCP – Offensive Security Certified Professional CEH – Certified Ethical Hacker GIAC – GCIH, GPEN, GWAPT

Posted 1 week ago

Apply

0.0 - 2.0 years

5 - 8 Lacs

Gandhinagar, Gujarat

On-site

Key Responsibilities Monitor, identify, and respond to security incidents across systems and networks. Implement and maintain security measures such as firewalls, intrusion detection systems (IDS), and endpoint protection. Conduct regular vulnerability assessments and penetration tests on systems and applications. Collaborate with DevOps and Engineering teams to integrate security best practices into CI/CD pipelines. Manage and review access controls, identity management, and secure configurations. Investigate and remediate security breaches, threats, and anomalies. Stay current with the latest security trends, vulnerabilities, and threat intelligence. Document security processes, policies, incident response plans, and risk assessments. Assist in compliance efforts (e.g., ISO 27001, SOC 2, GDPR) as applicable. Required Skills and Qualifications Bachelor’s degree in Computer Science, Information Security, or related field. Proven experience in system/network/application security. Strong knowledge of cybersecurity frameworks and standards (OWASP, NIST, CIS). Familiarity with tools such as Wireshark, Nessus, Burp Suite, Metasploit, or similar. Hands-on experience with cloud platforms (AWS, Azure, or GCP) and securing cloud infrastructure. Understanding of secure coding practices and code review for security flaws. Scripting knowledge (e.g., Python, Bash, PowerShell) is a plus. Nice to Have Security certifications like CEH, CISSP, OSCP, or CompTIA Security+. Experience in automating security tasks or using SIEM tools. Knowledge of container security (e.g., Docker, Kubernetes). Job Types: Full-time, Permanent Pay: ₹500,000.00 - ₹800,000.00 per year Benefits: Flexible schedule Paid sick time Paid time off Provident Fund Ability to commute/relocate: Gandhinagar, Gujarat: Reliably commute or planning to relocate before starting work (Required) Experience: Security Engineer: 2 years (Required) Work Location: In person

Posted 1 week ago

Apply

1.0 years

0 Lacs

Bengaluru, Karnataka

On-site

Job Information Date Opened 07/23/2025 Industry Software Development Job Type Full time City Bangalore South State/Province Karnataka Country India Zip/Postal Code 560034 Job Description Job Description As a Security Engineer , you will assist the information security team in protecting organizational data, systems, and networks. You will gain hands-on experience in various cybersecurity practices, including threat analysis, vulnerability assessment, and incident response. This internship is an excellent opportunity for individuals passionate about cybersecurity and looking to gain real-world experience in a dynamic and fast-paced environment. Key Responsibilities: Assist in monitoring and analyzing security alerts and incidents, responding under supervision. Conduct basic VAPT and report findings to the security team. Familiarity with VAPT tools such as Burp Suite, Nessus, nmap, Metasploit, etc. Research and stay updated on the latest cybersecurity threats, tools, and best practices. Collaborate with cross-functional teams to support security audits and compliance initiatives. Document incident response procedures and other critical processes to ensure best practices are maintained. Assist with the deployment and maintenance of security tools and technologies. Preferred Qualifications 1+ Years of experience in Information Security. Relevant coursework or certifications (e.g., CEH, OSCP, CRTP, CompTIA Security+). Familiarity with vulnerability assessment and penetration testing (VAPT) tools. Basic experience with scripting languages (e.g., Python, Bash) for automation tasks. Knowledge of security practices for AI/ML, including model vulnerability and data privacy for LLMs. Experience or participation in bug bounty programs or Capture the Flag (CTF) competitions.

Posted 1 week ago

Apply

7.0 years

0 Lacs

Hyderabad, Telangana

Remote

Consultant Hyderabad, Telangana, India Date posted Jul 23, 2025 Job number 1849920 Work site Up to 50% work from home Travel 0-25 % Role type Individual Contributor Profession Consulting Services Discipline Technology Consulting Employment type Full-Time Overview At Microsoft, our core mission is empowering every person and every organization on the planet to achieve more. Industry Solutions (IS) is a global organization of over 16,000 strategic sellers, industry experts, elite engineers, architects and consultants, who along with delivery experts are working together to bring Microsoft’s mission of empowerment – and cutting-edge technology - to life for the world’s most influential customers. We are on the front lines of innovation, working side-by-side with customers to drive value across the entirety of their digital transformation journey. Our team prides itself on embracing a growth mindset, inspiring excellence, and encouraging everyone to share their unique viewpoints and be their authentic selves. Qualifications Required qualifications for Consultants include: Highly proficient, customer-facing experience involving project envisioning, planning, design, development, and deployment of complex solutions 7+ years of software development: automation-related experience is valued. Scripting languages such as bash, python, and PowerShell, or compiled languages such as C, C# and Go are most relevant, but others are acceptable. Awareness of, and ability to reason about, modern software & systems architectures, including load-balancing, queueing, caching, distributed systems failure modes generally, microservices, and so on Associated troubleshooting skills, including the ability to follow RPC call-chains across arbitrary network steps. Consequent understanding of monitoring in distributed systems Deep understanding of operating system level concepts such as processes, memory allocation, and the network stack; understanding of how applications are affected by the above, and ability to debug same Experience with working in a team, including coordinating large projects, communicating well, and exercising initiative when presented with problems Strong understanding of customer and partner business and IT environments, with proven record of delivering successful technical solutions Practical experience running large scale online systems is always an advantage Demonstrated ability to focus on the development of customer business agility and business value, while simultaneously providing deep experience with specific technologies Strong communication, consulting, analytical and problem-solving skills Growth mindset Flexible work approaches with strong proactivity and inclination to resolving customer situations Demonstrated skills designing and developing technology in area(s) of specialization to solve business problems and help customers in enhancing existing applications; core skills must include Microsoft technology, with open-source experience helpful Degree in Computer Science Engineering, MCA or equivalent with work experience; higher relevant education preferred MCSD/MCSE/MCAD/Azure certification is a plus Required Skills: Strong Object-Oriented Programming and Design experience Understanding of Technical Design Patterns SQL Programming knowledge .Net 4.0/Core (ASP.Net, Web API, PowerShell script. MVC, TFS/GitHub) Azure (Deep technical understanding of PaaS, Good experience in Azure services like Service Fabric, Web Apps, Cosmos DB, Azure Storage, Azure Service Bus, Azure Functions, and API management, SQL. with Azure Application Dev experience)Deep technical and architectural knowledge of at least 3 of the following areas, as well as broad understanding across the Microsoft Development toolset: Cloud Technologies (preferably Azure Full Stack) Skills on projects targeting a variety of form factors (e.g. Mobile, IoT) Development Languages (e.g. C#, JavaScript, Java, Front end skills like React, Angular etc.) Application Lifecycle Management (e.g. Agile, TFS etc.) Solution Architecture (e.g. SOA, Enterprise Architecture) Identity and Access Management (IAM), Conditional Access Policies, Strong Authentication, Risk-Based Access, Encryption, Backup & Disaster Recovery, Data Loss Prevention (DLP), Secure Coding Practices, Input Validation, Output Encoding, Authentication and Password Management, Session Management, Cryptography, Threat and Vulnerability Identification, Security Breach Response. Techniques :Implementing modern authentication providers (like EntraID), simulating attacks, writing resilient code, using encryption algorithms, hashing techniques, secret management with key vault, cryptographic protocols. Tools : Azure Security Center, Azure Sentinel, Metasploit, Burp Suite, custom scripts. Good to have skills: Industry vertical knowledge – Retail, Banking and Finance, Telecom etc. Middleware technologies used for integrations Knowledge of Azure DevOps, Docker, Kubernetes etc. Responsibilities Candidates must understand customer and partner business and IT environment and have demonstrated skills designing and developing technology in area(s) of specialization to solve business problems. Candidates must have experience developing software for the Microsoft platform using programming languages and development platforms including C# or any modern programming language and Microsoft SQL Server. Participates in the delivery of complex solution as technical individual contributor or as a team member under coaching/guidance of senior team members. Strong knowledge of the Software Development Life Cycle methodology, technical design, development and implementation decisions on the use of technology in area(s) of specialization. Contribution to overall Release and Sprint planning Overall Application Design (HLD) Validate planned velocity of the feature teams Provide user story estimates in refinements to deliver quality and on time delivery Drive team to Code Metrics like Style Cop, FXCop, CC, Class Coupling are met as defined by the project Drive team to ensure code complies with security and performance standards Track and monitor the feature team’s delivery progress Track team sprint bug's RCA for quality improvement in subsequent sprints and take action Track quality reports like Build and Sonarqube Conduct User story ready meeting DoD once Sprint ends Lead Sprint planning and task distribution Track creation of LLD for relevant user story Review LLD for relevant user story Ensure Unit Test, Integration test Automation as per the acceptance and P1, P2 test cases Ensure UI Automation for validation scenarios and 80% P1, P2 Validate Performance Test Scenarios and Execution Validate Environment Readiness Ensure Functionality is verified to be working in the DEV Integration environment against the test cases identified by the test team. Ensure UI verification and validation Ability to understand and analyze issues and use judgment to make decisions. Strong problem solving & troubleshooting skills Strong communication and leadership skills Responsible for self-development according to professional development plan Benefits/perks listed below may vary depending on the nature of your employment with Microsoft and the country where you work.  Industry leading healthcare  Educational resources  Discounts on products and services  Savings and investments  Maternity and paternity leave  Generous time away  Giving programs  Opportunities to network and connect Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.

Posted 1 week ago

Apply

15.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Job Summary Development engineer to carry out the agile delivery of book of work prioritized by product owner. Key Responsibilities Design & Develop solutions as per the scope agreed in the LUW and solution agreed. Team Player – Participate in the Scrum discussion and contribute to the overall goal of the team. Troubleshooting – Expertise with the Ability to troubleshoot and resolve issues quickly. Impact & Value Re-engineer legacy applications and build state of the art platform Envision FSS platform and align it with Bank’s NextGen technology vision Consistently leads delivery of valuable features Continually looking for process improvements Proposes new ways of doing things Suggests novel ways to fulfil requirements Does Solution Architect where necessary Programming In depth knowledge of IDE, language and toolset in language of choice. Excellent understanding of language & framework and a good working knowledge of the abstraction layer underneath Understanding of threads, threading model and concurrent programming Can profile and optimize code Good knowledge of other programming languages & paradigms and when to apply them Comfortable debugging/finding complex problems Responsibilities Design: Can identify and apply appropriate design patterns to problems. Comfortable developing large features Understands Idempotence Understands boy scout principle. Leaves code in a better state then when arrived Good understanding of cohesion, SOLID and how to apply Writes clean, maintainable code Understands importance of domain model and can coherently model a problem domain within a given context Anticipates medium term (3-6 month) vectors of change and designs and abstracts accordingly Understands & appreciates simplicity & the value of removing code Understands design patterns such as CQRS and eventual consistency Understands how to design for performance at all levels Development Practice Automates everything by default Can build a CD pipeline Automates security scanning and performance testing as part of build Monitor systems to ensure they meet both user needs and business goals Oversee assigned programs (e.g. conduct code review), set and monitor team standards. Evaluate and select appropriate software or hardware and suggest integration methods Focus on reliability, performance and availability Other Responsibilities Infrastructure : Good grasp of multiple operating systems Good grasp of scripting techniques Expertise in one database & good grasp of multiple data storage paradigms and when to apply other technologies Understands and can automate PAAS technologies Understands when to apply appropriate infrastructure technologies. Understanding of network communications, including TCP/IP, HTTP protocols Security Writes Secure code by default Can use tools (nmap/metasploit etc.) to perform deep security probes Understands server hardening Understating of security principles using SSL protocols and data encryption. Behaviours & Collaboration Leads group discussions on design of particular areas Comfortable presenting information Gains buy in from team and drives design Mentors and develops those around them Understands domain well enough to work with PO to drive value Shares knowledge with wider community Regulatory and Business Conduct Display exemplary conduct and live by the Group’s Values and Code of Conduct. Take personal responsibility for embedding the highest standards of ethics, including regulatory and business conduct, across Standard Chartered Bank. This includes understanding and ensuring compliance with, in letter and spirit, all applicable laws, regulations, guidelines and the Group Code of Conduct. Effectively and collaboratively identify, escalate, mitigate and resolve risk, conduct and compliance matters. Qualifications Expertise in the design and development of application using Webmethods Integration knowledge using Webmethods Productt , Development using Flow Language / Java, CAF UI framework, Expertise in integration other applications through standard integration points like JMS , File Etc leveraging various product capability. Knowledge of SQL with design and development of DB integration . SWIFT Messages handling 15+ years of experience in developing world class products/applications. Bachelor in engineering or equivalent Role Specific Technical Competencies Webmethods Developent Java Services Development ADO & CI/CD PL/SQL & DB Development SWIFT and Messages Custody Domain Strongly Desired competencies We are looking for Language agnostic people, however below is the end to end tech stack we intend to use for developing our FSS platforms. Java/ J2EE, Spring Boot, Hibernate Reporting tools – OBIEE, Tableau BI tools - Informatica Hands-on skills in J2EE specifications like JAX-RS, JAX-WS Cloud Solutions – Openshift or AWS or Azure Containers Management –using tools like Docker, Rocket and Drawbridge Elastic Scaling – using tools like Nginx, HAProxy or PAAS like Openshift Dynamic Discover – using tools like Zookeeper or Etcd Configuration Management – using tools like Zookeeper, Etcd, Spring, Puppet/Chef, Ansible Continuous Integration – using tools like Maven and Jenkins Continuous Deployment – using tools like Jenkins, Nolio or Go Assembly Development – using frameworks like Apache Camel or Node.js UI Development – using frameworks like Node.js, REACT, Angular or Backbone IDL Definition – using tools like RAML or Swagger Code Development – using IDE’s like Eclipse or IntelliJ Web API’s – for Information Exchange Collaboration – using tools like Git-Hub and JIRA Hands experience and Knowledge of microservices architecture Strong in Oracle or SQL Server PL/SQL development and designing data model. Web services, API design, Defining Specification using swagger/RAML. Dev Ops Tools and CI/CD Processes –GitFlow, BitBucket etc. Experience with automated test configuration. About Standard Chartered We're an international bank, nimble enough to act, big enough for impact. For more than 170 years, we've worked to make a positive difference for our clients, communities, and each other. We question the status quo, love a challenge and enjoy finding new opportunities to grow and do better than before. If you're looking for a career with purpose and you want to work for a bank making a difference, we want to hear from you. You can count on us to celebrate your unique talents and we can't wait to see the talents you can bring us. Our purpose, to drive commerce and prosperity through our unique diversity, together with our brand promise, to be here for good are achieved by how we each live our valued behaviours. When you work with us, you'll see how we value difference and advocate inclusion. Together We Do the right thing and are assertive, challenge one another, and live with integrity, while putting the client at the heart of what we do Never settle, continuously striving to improve and innovate, keeping things simple and learning from doing well, and not so well Are better together, we can be ourselves, be inclusive, see more good in others, and work collectively to build for the long term What We Offer In line with our Fair Pay Charter, we offer a competitive salary and benefits to support your mental, physical, financial and social wellbeing. Core bank funding for retirement savings, medical and life insurance, with flexible and voluntary benefits available in some locations. Time-off including annual leave, parental/maternity (20 weeks), sabbatical (12 months maximum) and volunteering leave (3 days), along with minimum global standards for annual and public holiday, which is combined to 30 days minimum. Flexible working options based around home and office locations, with flexible working patterns. Proactive wellbeing support through Unmind, a market-leading digital wellbeing platform, development courses for resilience and other human skills, global Employee Assistance Programme, sick leave, mental health first-aiders and all sorts of self-help toolkits A continuous learning culture to support your growth, with opportunities to reskill and upskill and access to physical, virtual and digital learning. Being part of an inclusive and values driven organisation, one that embraces and celebrates our unique diversity, across our teams, business functions and geographies - everyone feels respected and can realise their full potential.

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies