Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PKI - Certificate Management . Experience: 8-10 Years .
Posted 1 week ago
1.0 - 3.0 years
4 - 7 Lacs
mysuru
Work from Office
Role Purpose The purpose of the role is to resolve, maintain and manage clients software/ hardware/ network based on the service requests raised from the end-user as per the defined SLAs ensuring client satisfaction Do Ensure timely response of all the tickets raised by the client end user Service requests solutioning by maintaining quality parameters Act as a custodian of clients network/ server/ system/ storage/ platform/ infrastructure and other equipments to keep track of each of their proper functioning and upkeep Keep a check on the number of tickets raised (dial home/ email/ chat/ IMS), ensuring right solutioning as per the defined resolution timeframe Perform root cause analysis of the tickets raised and create an action plan to resolve the problem to ensure right client satisfaction Provide an acceptance and immediate resolution to the high priority tickets/ service Installing and configuring software/ hardware requirements based on service requests 100% adherence to timeliness as per the priority of each issue, to manage client expectations and ensure zero escalations Provide application/ user access as per client requirements and requests to ensure timely solutioning Track all the tickets from acceptance to resolution stage as per the resolution time defined by the customer Maintain timely backup of important data/ logs and management resources to ensure the solution is of acceptable quality to maintain client satisfaction Coordinate with on-site team for complex problem resolution and ensure timely client servicing Review the log which Chat BOTS gather and ensure all the service requests/ issues are resolved in a timely manner Mandatory Skills: Network Data Admin . Experience: 1-3 Years .
Posted 1 week ago
5.0 - 9.0 years
10 - 15 Lacs
mumbai
Work from Office
Your Career The Solutions Consultant is the evolution of the traditional Sales Engineering role, aligning how we best serve our customers in understanding their environment, providing solution guidance and ensuring value realization in their investment with Palo Alto Networks. As a Solutions Consultant you provide technical leadership and expertise and guidance in your customers security transformation journey. You will play a key role in defining technical solutions that secure a customers key business imperatives and ensuring value realization of their investment with Palo Alto Networks. You evangelize our industry leadership in on-prem, cloud, and security operations services that establish PANW as your customers cybersecurity partner of choice. Your Impact Curiosity is core to the Solutions Consultant role, and you see complex problems as opportunities to learn and deliver innovative solutions! You define your impact by: Meeting and exceeding sales quotas by building and implementing strategic, technical account plans that target cross-platform solutions. Your ability to position, demonstrate and create high level designs across the entire PANW portfolio based on customer business needs Conducting discovery to understand and articulate the key technical, operational, and commercial imperatives of your prospects and customers Working closely with Professional Services, Customer Success and Specialist teams to ensure overall customer implementation and adoption of solutions. Demonstrating strong communication skills and the ability to influence through effective presentations and customer-specific demos, technical engagements, and workshops Leading successful technical validation efforts based on best practices to ensure technical win in assigned opportunities. Orchestrating supporting resources (Specialists, Channel Resources, Customer Support) to ensure a one-team approach that demonstrates a cohesive strategy Promoting end-to-end solutions that include PANW and/or partner professional services to ensure customers realize business value sooner Understanding the competitive landscape and effectively differentiating our leadership Continuously investing in yourself to develop technical and professional skills that drive your ever-increasing contributions to success of our customers while actively participating within the Solutions Consultant community and at industry events (OT) - Identifying technical stakeholders and cultivating relationships with key personas to build and drive a security architecture transformation roadmap Qualifications Your Experience Understanding of data networking and/or modern application design and cloud architectures Delivering cybersecurity solutions that solve technical challenges and influence new business initiatives Influencing and gaining buy-in from key stakeholders, either in a customer-facing or internal role; prior experience in a pre-sales role is ideal Creating and delivering technical presentations, workshops, or technical validation engagements Experience in selling, designing, implementing, or managing one or more of the following solutions: Network Security, SASE, SaaS, CNAPP and/or SOC Transformation Technologies Partnering with Customer Support functions to ensure successful implementation and adoption of sold solutions Complex sales involving long sales processes with multiple buying centers and multi-product solutions are preferred Proficient in English Additional Information The Team Our Solutions Consultant team members work hand-in-hand with large organizations around the world to keep their digital environments protected. We educate, inspire, and empower our potential clients in their journey to transform their security architectures. You are empowered with unmatched systems and tools and a team built on joint success. You wont find someone at Palo Alto Networks that isnt committed to your success with everyone pitching in to assist when it comes to solutions selling, learning, and development. Our Solutions Consulting community is driven by the mission to be our customers cybersecurity partner of choice, protecting their digital way of life. Our Commitment Were trailblazers that dream big, take risks, and challenge cybersecuritys status quo. Its simple: we cant accomplish our mission without diverse teams innovating, together. We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at . Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics. Our Commitment Our Commitment
Posted 1 week ago
5.0 - 9.0 years
10 - 15 Lacs
bengaluru
Work from Office
Your Career The Solutions Consultant is the evolution of the traditional Sales Engineering role, aligning how we best serve our customers in understanding their environment, providing solution guidance and ensuring value realization in their investment with Palo Alto Networks. As a Solutions Consultant you provide technical leadership and expertise and guidance in your customers security transformation journey. You will play a key role in defining technical solutions that secure a customers key business imperatives and ensuring value realization of their investment with Palo Alto Networks. You evangelize our industry leadership in on-prem, cloud, and security operations services that establish PANW as your customers cybersecurity partner of choice. Your Impact Curiosity is core to the Solutions Consultant role, and you see complex problems as opportunities to learn and deliver innovative solutions! You define your impact by: Meeting and exceeding sales quotas by building and implementing strategic, technical account plans that target cross-platform solutions. Your ability to position, demonstrate and create high level designs across the entire PANW portfolio based on customer business needs Conducting discovery to understand and articulate the key technical, operational, and commercial imperatives of your prospects and customers Working closely with Professional Services, Customer Success and Specialist teams to ensure overall customer implementation and adoption of solutions. Demonstrating strong communication skills and the ability to influence through effective presentations and customer-specific demos, technical engagements, and workshops Leading successful technical validation efforts based on best practices to ensure technical win in assigned opportunities. Orchestrating supporting resources (Specialists, Channel Resources, Customer Support) to ensure a one-team approach that demonstrates a cohesive strategy Promoting end-to-end solutions that include PANW and/or partner professional services to ensure customers realize business value sooner Understanding the competitive landscape and effectively differentiating our leadership Continuously investing in yourself to develop technical and professional skills that drive your ever-increasing contributions to success of our customers while actively participating within the Solutions Consultant community and at industry events (OT) - Identifying technical stakeholders and cultivating relationships with key personas to build and drive a security architecture transformation roadmap Qualifications Your Experience Understanding of data networking and/or modern application design and cloud architectures Delivering cybersecurity solutions that solve technical challenges and influence new business initiatives Influencing and gaining buy-in from key stakeholders, either in a customer-facing or internal role; prior experience in a pre-sales role is ideal Creating and delivering technical presentations, workshops, or technical validation engagements Experience in selling, designing, implementing, or managing one or more of the following solutions: Network Security, SASE, SaaS, CNAPP and/or SOC Transformation Technologies Partnering with Customer Support functions to ensure successful implementation and adoption of sold solutions Complex sales involving long sales processes with multiple buying centers and multi-product solutions are preferred Proficient in English Additional Information The Team Our Solutions Consultant team members work hand-in-hand with large organizations around the world to keep their digital environments protected. We educate, inspire,and empower our potential clients in their journey to transform their security architectures. You are empowered with unmatched systems and tools and a team built on joint success. You wont find someone at Palo Alto Networks that isnt committed to your success with everyone pitching in to assist when it comes to solutions selling, learning, and development. Our Solutions Consulting community is driven by the mission to be our customers cybersecurity partner of choice, protecting their digital way of life. Our Commitment Were trailblazers that dream big, take risks, and challenge cybersecuritys status quo. Its simple: we cant accomplish our mission without diverse teams innovating, together. Our Commitment We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Information Event Management .Experience: 8-10 Years .
Posted 1 week ago
5.0 - 8.0 years
6 - 10 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to provide solutions and bridge the gap between technology and business know-how to deliver any client solution Do 1. Bridging the gap between project and support teams through techno-functional expertise For a new business implementation project, drive the end to end process from business requirement management to integration & configuration and production deployment Check the feasibility of the new change requirements and provide optimal solution to the client with clear timelines Provide techno-functional solution support for all the new business implementations while building the entire system from the scratch Support the solutioning team from architectural design, coding, testing and implementation Understand the functional design as well as technical design and architecture to be implemented on the ERP system Customize, extend, modify, localize or integrate to the existing product by virtue of coding, testing & production Implement the business processes, requirements and the underlying ERP technology to translate them into ERP solutions Write code as per the developmental standards to decide upon the implementation methodology Provide product support and maintenance to the clients for a specific ERP solution and resolve the day to day queries/ technical problems which may arise Create and deploy automation tools/ solutions to ensure process optimization and increase in efficiency Sink between technical and functional requirements of the project and provide solutioning/ advise to the client or internal teams accordingly Support on-site manager with the necessary details wrt any change and off-site support 2. Skill upgradation and competency building Clear wipro exams and internal certifications from time to time to upgrade the skills Attend trainings, seminars to sharpen the knowledge in functional/ technical domain Write papers, articles, case studies and publish them on the intranet Mandatory Skills: SPLUNK Security Analytics .Experience: 5-8 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Fortinet Firewall .Experience: 8-10 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Fortinet Firewall .Experience: 8-10 Years .
Posted 1 week ago
4.0 - 9.0 years
10 - 14 Lacs
hyderabad, pune, bengaluru
Work from Office
F5 LTM & GTM(must) Looking for F5 loadbalancer, LTM & GTM L2 or L3 Experience: 4 to 10 Years Workind days: 5 days Work From Office Notice Period: Max 30 Days Shifts: 24/ F5 Load Balancer Administration: o Configure, manage, and troubleshoot F5 Load Balancers to ensure high availability, scalability, and optimal performance for applications and services. o Design, implement, and maintain load balancing configurations for internal and external applications, including SSL offloading, traffic distribution, and healt Experience: o Minimum of 4 years of experience in network security engineering, with hands-on expertise F5 Load Balancers LTM & GTM. o In-depth knowledge of Fortinet products and their integration into enterprise environments. o Proven experience in configuring, troubleshooting, and optimizing F5 Load Balancers for high-availability applications. Certifications: o F5 Certified Technology Specialist (F5-CTS) or equivalent is a plus. Mandatory Skills: F5 Load Balancers .Experience: 5-8 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: PingFederate . Experience: 8-10 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Log Monitoring . Experience: 8-10 Years .
Posted 1 week ago
8.0 - 13.0 years
6 - 9 Lacs
chennai
Work from Office
Responsibilities: * Design, implement & maintain network security solutions using firewalls. * Collaborate with cross-functional teams on risk management strategies. * Monitor network activity & respond to incidents promptly.
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SailPoint Identity Mgmt and Governance . Experience: 8-10 Years .
Posted 1 week ago
6.0 - 11.0 years
4 - 8 Lacs
navi mumbai
Work from Office
Experience: 5 to 6 Experience. Hands-on Experience on Checkpoint firewall 80.xx and cloud guard and Cisco ASA 55XX and FTD. Hands-on Experience on O365 EOP and Email proxys and web proxys. Hands-on Experience on any IPS devices. Hands-on Experience on Mcafee EPO. Hands-on Experience on Cisco umbrella. Experience on working ticketing tool. Good communication & Presenting skill Technical. Aware of Firewall Upgradation process. Maintaining firewalls, virtual private networks, web protocols, and email security. Reporting the security analysis and monitoring findings. Hands-on experience on DC, DR, AWS connectivity. BE / BTech 5/6 yrs experience of the domain
Posted 1 week ago
3.0 - 5.0 years
4 - 8 Lacs
mangaluru
Work from Office
Role Purpose The purpose of the role is to resolve, maintain and manage clients software/ hardware/ network based on the service requests raised from the end-user as per the defined SLAs ensuring client satisfaction Do Ensure timely response of all the tickets raised by the client end user Service requests solutioning by maintaining quality parameters Act as a custodian of clients network/ server/ system/ storage/ platform/ infrastructure and other equipments to keep track of each of their proper functioning and upkeep Keep a check on the number of tickets raised (dial home/ email/ chat/ IMS), ensuring right solutioning as per the defined resolution timeframe Perform root cause analysis of the tickets raised and create an action plan to resolve the problem to ensure right client satisfaction Provide an acceptance and immediate resolution to the high priority tickets/ service Installing and configuring software/ hardware requirements based on service requests 100% adherence to timeliness as per the priority of each issue, to manage client expectations and ensure zero escalations Provide application/ user access as per client requirements and requests to ensure timely solutioning Track all the tickets from acceptance to resolution stage as per the resolution time defined by the customer Maintain timely backup of important data/ logs and management resources to ensure the solution is of acceptable quality to maintain client satisfaction Coordinate with on-site team for complex problem resolution and ensure timely client servicing Review the log which Chat BOTS gather and ensure all the service requests/ issues are resolved in a timely manner Mandatory Skills: Network Data Admin . Experience: 3-5 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Security Incident Response . Experience: 8-10 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SAP GRC Process Control . Experience: 8-10 Years .
Posted 1 week ago
8.0 - 10.0 years
12 - 17 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Threat Protection . Experience: 8-10 Years .
Posted 1 week ago
5.0 - 10.0 years
50 - 55 Lacs
bengaluru
Work from Office
Design and architect software-defined data center solutions including compute virtualization, software-defined networking (SDN), software-defined storage (SDS), and security virtualization. Develop scalable and automated infrastructure architectures to support hybrid cloud and multi-cloud environments. Lead the evaluation and integration of SDDC technologies such as VMware NSX, VMware vSAN, Cisco ACI, Nutanix, or other relevant platforms. Collaborate with infrastructure, network, security, and application teams to implement SDDC strategies and ensure alignment with business goals. Create architecture blueprints, standards, and best practices for SDDC deployment and management. Drive automation and orchestration initiatives using tools like Ansible, Terraform, and Kubernetes. Assess existing data center environments and recommend transformation plans to software-defined infrastructure. Oversee proof-of-concepts, pilot projects, and full-scale implementations of SDDC components. Ensure high availability, security, compliance, and performance of software-defined data center solutions. Document technical architectures, operational procedures, and disaster recovery plans. Provide technical leadership, mentorship, and training to engineering and operations teams. Stay current with emerging trends and technologies in software-defined infrastructure and cloud computing. Qualifications: Bachelor s degree in Computer Science, Information Technology, Engineering, or related field; Master s degree preferred. 5+ years of experience in data center infrastructure design with a focus on software-defined technologies. Strong experience in sizing and pricing of on-prem private cloud with standard core infrastructure (Compute, Storage, Network & Security) or with Converge & Hyper Converge infrastructure (VxRail, Nutanix, VBlock, FlexPod,UCP) and orchestration Strong expertise in virtualization technologies (VMware vSphere, Hyper-V, KVM). In-depth knowledge of software-defined networking (e.g., VMware NSX, Cisco ACI). Experience with software-defined storage solutions (e.g., VMware vSAN, Ceph, Nutanix). Proficiency with automation and orchestration tools such as Ansible, Terraform, Jenkins, or similar. Familiarity with container orchestration platforms like Kubernetes is a plus. Understanding of cloud infrastructure and hybrid cloud integration. Strong problem-solving, communication, and collaboration skills. Relevant certifications such as VMware VCAP, Cisco CCNP Data Center, Certified Kubernetes Administrator (CKA), or cloud certifications are advantageou
Posted 1 week ago
5.0 - 10.0 years
13 - 15 Lacs
bengaluru
Work from Office
Linux L2 + Admin JD: Linux OS Administration (Red hat / SUSE) Patching Upgrade Kernel upgrade Cloud Platform Expertise (Azure, GCP, AWS, IBM Cloud) Good troubleshooting skills, adhering to client process Should have good knowledge in Compute, Storage and Network in the Hyperscale Good troubleshooting skills, adhering to client process Networking & Security (TCP/IP, NAT, DNS, LDAP, Firewalls) Knowledge of running Linux OS in the physical Server Good knowledge on cloud compute networking, stora
Posted 1 week ago
10.0 - 13.0 years
35 - 40 Lacs
bengaluru
Work from Office
We are looking forward to hire Cloud Security Professionals in the following areas : Cloud Security Architect Description YASH is a Digital services enabler organization delivering vast portfolio of digital services to customers across the globe. Our topline services include Cybersecurity services. This role will be part of vibrant YASH s Cybersecurity Cloud Security team. We are looking for candidates who will embrace our Cyber Security strategy in the design, implementation and operations of Cloud Security with a focus on Azure and AWS. As an Cloud Security Architect, you should have experience in all aspects of cloud security including designing security controls and threat protection, defining security policies, using cloud technologies. Attributes we will look for in our candidates include excellent technical and analytical skills, communication and flexibility, innovative thinking and problem solving. In addition, this position is responsible for analyzing security vulnerabilities and determining if there is an attack surface and impact. The ideal candidate understands the full cycle of Cloud Security. Position Cloud Architect Number 1 Location Indore/Pune/ Hyderabad Total Experience 10- 13 Years How do you grow and be successful: At YASH, we will offer all support to grow in your career. At the very beginning you will receive a deep knowledge on the current SOPs once you are fully onboarded into our Cloud Security team. You will be measured on the positive contribution in delivering the Cloud Security services to our customers. Fluency will be measured on the goals such as improvement of cyber posture of customers through our vulnerability management services. Our employees will have global exposure from day-1. We offer to learn multiple security domains through our mentored on-the-job training program. Aspiring candidates will reach to highest positions and make a global career. Preferred Skills: A strong understanding of cloud computing technologies, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Knowledge of security frameworks such as ISO 27001, NIST Cybersecurity Framework, and CIS Controls. Familiarity with cloud security platforms like Microsoft Azure, Amazon Web Services, and Google Cloud Platform. Understanding in all aspects of cloud Security including identity and access management, organizational structure and policies, technologies to provide data protection, network security defenses, security logs, and incident response processes. Good understanding of security concepts (Zero Trust Network, CASB, Cloud computing, SIEM, SOAR, PKI, DevSecOps, IAM and PAM) Experience with other Cloud Platforms like AWS and Google Cloud is nice-to-have Familiarity with Linux and Windows operating systems and scripting languages like Powershell, Python, . Net Designing security services in cloud-based programs based on pre-defined architecture frameworks Maintain and improve the security posture of the Azure platform Overlook the process of identifying and remediating vulnerabilities Define security controls and policies, access to data, and monitor alerts to ensure that data, apps, containers, infrastructure, and networks are protected. Design access configurations within a cloud solution environment using the defense-in-depth principle Design network security including in a hybrid context with traditional network centric controls Implement and use cloud native tools like Log Analytics, Azure Monitor, Azure Security Center and Azure Sentinel Working knowledge Passion for Cyber Security, being the basic ingredient of success. Necessary soft-skills set to successfully understand, challenge and translate the business needs and communicate to the relevant parties with a structured and methodical approach to problem solving You are a team player with good communication skills, proactive and highly motivated individual with a serious hands-on work ethic Qualifications: A bachelors or masters degree in computer science, information technology Preferred Certifications: Azure Security Engineer Our Hyperlearning workplace is grounded upon four principles Flexible work arrangements, Free spirit, and emotional positivity Agile self-determination, trust, transparency, and open collaboration All Support needed for the realization of business goals, Stable employment with a great atmosphere and ethical corporate culture
Posted 1 week ago
0.0 - 2.0 years
2 - 4 Lacs
mumbai
Work from Office
Job Title: Entuity L1 Consultant Education: Bachelor s degree in Computer Science, Information Technology, Engineering, or a related discipline. Job Description Solid foundational knowledge of networking technologies, including LAN/WAN, switching, routing, and firewall concepts. Understanding of IP networking and related protocols such as TCP/IP, OSPF, and BGP. Basic exposure to network security principles, performance monitoring, and troubleshooting techniques. Familiarity with network management and monitoring tools (academic or lab-based experience acceptable). Ability to assist with the administration and maintenance of network environments. Willingness to participate in implementation, upgrade, and migration activities under supervision. Strong analytical and problem-solving skills, with a proactive approach to learning and resolving technical issues. Skilled in preparing clear and concise technical documentation across different phases of a project. Effective communication and team collaboration abilities. CCNA (Cisco Certified Network Associate) certification or equivalent knowledge preferred.
Posted 1 week ago
6.0 - 11.0 years
8 - 13 Lacs
pune
Work from Office
Where Data Does More. Join the Snowflake team. Snowflake is looking for a Senior Security Risk Analyst to join our Global Security Compliance & Risk team and help manage and improve on the existing program for assessing the risk of third party tools and services in use by Snowflake. You will be responsible for managing the intake process, working with constituents to collect the required information, collecting all necessary details to understand the use case for each tool or service, and reviewing the required documentation and evidence to meet the security controls required based on the use case. You will help identify and manage Third Party security risk to protect Snowflake assets. AS THE SENIOR SECURITY RISK ANALYST - TPRM, YOU WILL: Independently perform ongoing third party security risk assessments to help Snowflake identify and evaluate security risks and provide comprehensive evaluations and actionable recommendations based on security and compliance best practices Support and monitor remediation efforts of identified gaps, perform remediation audit to validate the closure Review all evidence provided to compare vendor security controls to Snowflake data protection requirements Assess and manage security findings from various vendor security monitoring systems Develop and improve security documentation Work cross-functionally to ensure team objectives are achieved Take risk-based approach to review and negotiate security agreement Measure effectiveness of the program and ensure SLA is met Establish points of view, negotiate the point of view, and drive outcomes effectively with stakeholders. OUR IDEAL SENIOR SECURITY RISK ANALYST - TPRM WILL HAVE: 6+ years of experience in security compliance role with 3+ years previous experience in third party security risk Highly motivated individuals who thrive in fast-paced environments Understanding of a broad set of security best practices (e.g., application security, secure software development lifecycles, risk management, data protection, encryption & key management, identity and access management, security operations, security governance, network security, etc.) and technologies Flexibility to work during different time zones Exceptional communication skills, including proficiency in writing, summarizing and presenting technical documents, policies, procedures, and assessment reports Deep understanding and experience with multiple industry regulations, standards such as PCI-DSS, HIPAA, SOC1, SOC2, GDPR, and/or ISO standards and frameworks and ability to determine applicability Previous role that requires exceptional organizational skills. Ability to analyze, organize and prioritize multiple tasks and meet deadlines Technical competence sufficient to understand and explain complicated security concepts to various Snowflake stakeholders possessing varying levels of cybersecurity skill and understanding Self-motivated problem solver who is comfortable engaging with high paced and complex environment Work independently as well as collaboratively within a team environment. Ability to translate ambiguous directives into relevant action items and deliverables Ability to think strategically and plan effectively, with attention to details and a strong ownership ethic and intense focus on accuracy and accountability Ability to lead meeting with internal stakeholders and/or external third-party to achieve desired outcomes independently Extremely high ethical standards as proven by successful background checks and references Previous experience working with a variety of personalities from a variety of cultures BONUS POINTS FOR EXPERIENCE WITH THE FOLLOWING: Proficiency in use of JIRA, Confluence, and ServiceNow Proven experience in reviewing and negotiating security agreements Security certification, such as CISSP, CCSP, CISA AWS, Azure, Google Cloud, or other major Cloud Provider experience Snowflake is growing fast, and we re scaling our team to help enable and accelerate our growth. We are looking for people who share our values, challenge ordinary thinking, and push the pace of innovation while building a future for themselves and Snowflake. How do you want to make your impact For jobs located in the United States, please visit the job posting on the Snowflake Careers Site for salary and benefits information: careers.snowflake.com "
Posted 1 week ago
10.0 - 15.0 years
40 - 45 Lacs
gurugram
Work from Office
Solution Architect . Job Summary: We are seeking a highly experienced and technically adept Solution Architect to join our dynamic team. The ideal candidate will be a strategic thinker with a strong hands-on background, responsible for translating business requirements into scalable, secure, and robust technical solutions. This role requires a deep understanding of the entire software development lifecycle, from initial concept and design through to deployment, operations, and continuous improvement. The Solution Architect will play a pivotal role in shaping our technical roadmap, ensuring architectural alignment, and driving the adoption of best practices across product development, infrastructure, and operations. Key Responsibilities: Solution Design & Architecture: Lead the design and development of end-to-end technical solutions, ensuring they meet business needs, technical requirements, and architectural standards. Create detailed architectural diagrams, technical specifications, and design documents for various systems and applications. Evaluate and recommend technology choices, frameworks, and patterns to optimize performance, scalability, security, and cost-effectiveness. Conduct architectural reviews and provide technical guidance to development teams, ensuring adherence to design principles. Product Development Lifecycle: Collaborate closely with product managers, business analysts, and stakeholders to understand business requirements and translate them into technical solutions. Provide architectural oversight throughout the product development lifecycle, from ideation to deployment and beyond. Champion agile methodologies and practices within the technical teams. DevOps & Automation: Drive the adoption of DevOps principles and practices, including continuous integration, continuous delivery (CI/CD), and automated testing. Design and implement scalable and resilient deployment pipelines. Promote infrastructure-as-code (IaC) principles. Infrastructure & Cloud Expertise: Architect and design solutions leveraging leading cloud platforms, with a strong focus on Azure and/or AWS. Demonstrate a deep understanding of cloud services such as compute (VMs, containers, serverless), storage, networking, databases, and security services. Optimize cloud resource utilization for cost efficiency and performance. Possess a solid understanding of on-premise infrastructure concepts and hybrid cloud deployments. Cybersecurity: Integrate security best practices into all phases of the solution design and development lifecycle. Identify and mitigate security risks and vulnerabilities at the architectural level. Ensure compliance with relevant security standards and regulations. Advise on security controls, identity and access management (IAM), data encryption, and network security. Exposure to AI & Emerging Technologies: Stay abreast of emerging technologies and industry trends, particularly in Artificial Intelligence (AI) and Machine Learning (ML). Evaluate the applicability of AI/ML solutions to business problems and integrate them into architectural designs where appropriate. Understand the architectural implications of integrating AI/ML models and data pipelines. Leadership & Communication: Act as a technical leader and mentor to development teams, fostering a culture of technical excellence. Communicate complex technical concepts clearly and concisely to both technical and non-technical stakeholders. Influence and drive architectural decisions across the organization. Qualifications: Bachelors or Masters degree in Computer Science, Software Engineering, or a relatedfield. 10+ years of experience in software development, with at least 5+ years in a Solution Architect or similar senior architectural role. Proven track record of designing and delivering complex, scalable, and secure enterprise-level solutions. Extensive experience with at least one major cloud platform (Azure and/or AWS) is mandatory, including hands-on experience with core services. Strong understanding of architectural patterns (e.g., microservices, event-driven, serverless) and their application. Proficiency in at least one major programming language (e.g., Java, Python, .NET, Node.js). Solid understanding of databases (relational and NoSQL). Experience with DevOps tools and practices (e.g., Docker, Kubernetes, Jenkins, GitLab CI/CD, Terraform, Ansible). Deep knowledge of cybersecurity principles, best practices, and common vulnerabilities. Exposure to AI/ML concepts, frameworks, and deployment patterns (e.g., TensorFlow, PyTorch, Azure ML, AWS SageMaker) is a significant plus. Excellent communication, presentation, and interpersonal skills. Ability to work independently and collaboratively in a fast-paced environment. Preferred Qualifications (Nice to Have): Relevant cloud certifications (e.g., Azure Solutions Architect Expert, AWS Certified Solutions Architect - Professional). Contributions to open-source projects or active participation in tech communities.
Posted 1 week ago
3.0 - 8.0 years
5 - 10 Lacs
pune
Work from Office
Some careers shine brighter than others. If you re looking for a career that will help you stand out, join HSBC and fulfil your potential. Whether you want a career that could take you to the top, or simply take you in an exciting new direction, HSBC offers opportunities, support and rewards that will take you further. HSBC is one of the largest banking and financial services organisations in the world, with operations in 64 countries and territories. We aim to be where the growth is, enabling businesses to thrive and economies to prosper, and, ultimately, helping people to fulfil their hopes and realise their ambitions. We are currently seeking an experienced professional to join our team in the role of Senior Software Engineer In this role, you will: Design, implement, and manage cloud infrastructure on Google Cloud Platform (GCP). Automate infrastructure provisioning, configuration, and Build and maintain CI/CD pipelines Monitor and optimize cloud resources for performance, cost, and scalability using tools. Implement and manage containerized applications using Docker and orchestrate on Kubernetes. Ensure security best practices, including IAM policies, network security, and data encryption. Collaborate with development teams to streamline the software delivery process and improve system reliability. Troubleshoot and resolve infrastructure and deployment issues in production and non-production environments. Stay updated with the latest GCP services and DevOps tools to recommend improvements. Requirements Hands-on experience with Google Cloud Platform (GCP) services, including Compute Engine, Cloud Storage, Cloud Functions, BigQuery, Pub/Sub, and GKE. Strong knowledge of Infrastructure as Code (IaC) tools like Terraform, Cloud Deployment Manager and Ansible Proficiency in building and managing CI/CD pipelines like Cloud Build Experience with Kubernetes and container orchestration (preferably Google Kubernetes Engine - GKE) Strong scripting skills in Python for automation. Knowledge of networking concepts, including VPCs, firewalls, load balancers, and DNS. Experience with version control systems like Git and branching strategies. Strong problem-solving and troubleshooting skills Bachelor s or master s degree in computer science, Engineering, or a related field. 3+ years of experience in DevOps, Cloud Engineering, or related roles. GCP certifications (e.g., Professional Cloud DevOps Engineer, Professional Cloud Architect) are a plus. .
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |