Jobs
Interviews

69 Obfuscation Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Supervising Security Analyst - Cyber Triage and Forensics Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Senior Security Analyst in Cyber Defense CTF (Cyber Triage and Forensics) plays a pivotal role in enhancing EY’s security posture by vigilantly monitoring, assessing, and managing incidents effectively. In collaboration with the team and leadership, to ensure strong security oversight and contribute to joint security monitoring and incident response initiatives. Key duties include triage, detailed investigations, clear communication, and comprehensive reporting, all contributing to the integrity and resilience of the EY’s cyber defenses. Essential Functions of the Job : You will work collaboratively to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations. Engage in proactive threat hunting and provide expert security assessments, utilizing EDR, SIEM, and other tools to understand and counteract the cybercrime landscape Communicate with IT stakeholders during incident response activities, ensuring effective containment, remediation, and accurate identification of compromise indicators Report on incident metrics, analyse findings, and develop reports to ensure comprehensive resolution and understanding of security events Act as an escalation point for incident response, shift lead, mentor junior team members, and contribute to team skill enhancement Analyse security events, provide feedback on security controls, and drive process improvements to strengthen the organization's security posture Maintain and improve security incident processes, protocols, and standard operating procedures to reflect best practices in security incident response Skills And Attributes For Success Proficient in Cyber investigation including evidence management in line with best practices and using advanced tools for threat detection and incident management including advanced querying with KQL Proficient in analyzing varied data sets, identifying malware, and conducting comprehensive security event analysis from network traffic attributes and host-based attributes to detect information security incidents and latent threats. Proficient in conducting detailed forensic investigations across various operating systems, with a keen eye for obfuscation and the ability to clearly communicate findings In-depth understanding of Active Directory security, with strong scripting abilities to automate response measures and improve operational effectiveness To qualify for the role, you must have Undergraduate or Postgraduate Degree in Computer Science, Engineering, or a related field (MCA/MTech/BTech/BCA/BSc CS or BSc IT) At least 7 years of overall experience with a minimum of 5 years specialized in incident response, computer forensics, and Security Operations. Proficiency in operating within a Security Monitoring/Security Operations Center (SOC) environment, including experience with CSIRT and CERT operations Demonstrated experience in investigating security events, threats, and vulnerabilities Strong understanding of electronic investigation and forensic methodologies, including log correlation, electronic data handling, investigative processes, and malware analysis In-depth knowledge of Windows and Unix/Linux operating systems, and experience with EDR solutions for threat detection and response Ideally, you’ll also Desired certifications such as SSCP, CEH, GCIH, GCFA, GCIA, GSEC, GIAC, Security+. Experience with security incident response in cloud environments, including Azure. Knowledge of legal considerations in electronic discovery and analysis Proficiency in scripting or programming (e.g., Shell scripting, PowerShell, C, C#, Python) Solid understanding of security best practices for network architecture and server configuration What We Look For Demonstrates integrity in a professional environment Strong ethical behavior Ability to work independently Possesses a global mindset for working with diverse cultures and backgrounds Knowledgeable in industry-standard security incident response processes, procedures, and lifecycle Positive attitude and Excellent teaming skills Excellent social, communication, and writing skills Good presentation skills Excellent investigative, analytical, and problem-solving skills Supervising Responsibilities: Coordinate escalations and collaborate with internal technology teams to ensure timely resolution of issues Provide mentoring and training to other team members as required, supporting their development and ensuring consistent team performance Other Requirements: Should be willing to work in shifts What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. We ensure that individuals with disabilities are provided reasonable accommodations to participate in the job application or interview process, to perform essential job functions and to receive other benefits and privileges of employment. Please contact us to request accommodation. EY is committed to being an inclusive employer, and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible. Make your mark. Apply now EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 21 hours ago

Apply

3.0 - 7.0 years

0 Lacs

pune, maharashtra

On-site

Join us as an Application Security Consultant at Barclays, where you will play a key role in supporting the successful delivery of Location Strategy projects while adhering to plan, budget, agreed quality, and governance standards. You will be at the forefront of evolving our digital landscape, driving innovation, and ensuring excellence in our digital offerings to provide unparalleled customer experiences. To excel in this role, you should possess a strong understanding of CVEs, CWEs, and their impact on applications. Additionally, you must have in-depth knowledge of various AppSec technologies such as SAST, DAST, SCA, IAST, and RASP. Proficiency in at least one programming language and framework, as well as experience in writing scripts in languages like Python and JavaScript, are essential skills for this position. Desirable skill sets to have include the ability to showcase expertise in low-level technical topics, such as native development on any platform, and experience with languages used in modern mobile development like Java+JNI, Objective C, and Swift. Familiarity with concepts like reverse engineering, assembly, and mobile code hardening techniques will be beneficial. Furthermore, the ability to replicate vulnerabilities in a lab environment is a plus. As an Application Security Consultant, you will be based in Pune and will be responsible for supporting various business areas with day-to-day tasks, including processing, reviewing, reporting, trading, and issue resolution. You will collaborate with teams across the bank to align operational processes, identify areas for improvement, and implement operational procedures and controls to mitigate risks while maintaining efficiency. In this role, you will also develop reports and presentations on operational performance, identify industry trends, and participate in projects to enhance operational efficiency. As an Assistant Vice President, you will consult on complex issues, advise People Leaders on escalated matters, and contribute to risk mitigation and policy development. You will take ownership of managing risk, collaborate with other business areas, and engage in data analysis to creatively solve problems and communicate complex information effectively. Your role will also involve influencing stakeholders to achieve desired outcomes. All colleagues at Barclays are expected to embody the Barclays Values of Respect, Integrity, Service, Excellence, and Stewardship, as well as the Barclays Mindset of Empower, Challenge, and Drive. Your commitment to these values and mindset will serve as our moral compass and guide our behavior within the organization.,

Posted 2 days ago

Apply

10.0 years

0 Lacs

Telangana

On-site

About Chubb Chubb is a world leader in insurance. With operations in 54 countries and territories, Chubb provides commercial and personal property and casualty insurance, personal accident and supplemental health insurance, reinsurance and life insurance to a diverse group of clients. The company is defined by its extensive product and service offerings, broad distribution capabilities, exceptional financial strength and local operations globally. Parent company Chubb Limited is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index. Chubb employs approximately 40,000 people worldwide. Additional information can be found at: www.chubb.com. About Chubb India At Chubb India, we are on an exciting journey of digital transformation driven by a commitment to engineering excellence and analytics. We are proud to share that we have been officially certified as a Great Place to Work® for the third consecutive year, a reflection of the culture at Chubb where we believe in fostering an environment where everyone can thrive, innovate, and grow With a team of over 2500 talented professionals, we encourage a start-up mindset that promotes collaboration, diverse perspectives, and a solution-driven attitude. We are dedicated to building expertise in engineering, analytics, and automation, empowering our teams to excel in a dynamic digital landscape. We offer an environment where you will be part of an organization that is dedicated to solving real-world challenges in the insurance industry. Together, we will work to shape the future through innovation and continuous learning. Reporting to the VP COG ECM enterprise Forms Portfolio Delivery Manager, this role will be responsible for managing and supporting Implementation of a new Document solution for identified applications with the CCM landscape, in APAC. OpenText xPression and Duckcreek has been the corporate document generation tool of choice within Chubb. But xPression going end of life and be unsupported from 2025. A new Customer Communications Management (CCM) platform – Quadient Inspire - has been selected to replace xPression by a global working group and implementation of this new tool (including migration of existing forms/templates from xPression where applicable). Apart from migrating from xPression, there are multiple existing applications to be replaced with Quadient Inspire The role is based in Hyderabad/India with some travel to other Chubb offices. Although there are no direct line management responsibilities within this role, the successful applicant will be responsible for task management of Business Analysts and an Onshore/Offshore development team. The role will require the ability to manage multiple project/enhancement streams with a variety of levels of technical/functional scope and across a number of different technologies. In this role, you will: Lead the design and development of comprehensive data engineering frameworks and patterns. Establish engineering design standards and guidelines for the creation, usage, and maintenance of data across COG (Chubb overseas general) Derive innovation and build highly scalable real-time data pipelines and data platforms to support the business needs. Act as mentor and lead for the data engineering organization that is business-focused, proactive, and resilient. Promote data governance and master/reference data management as a strategic discipline. Implement strategies to monitor the effectiveness of data management. Be an engineering leader and coach data engineers and be an active member of the data leadership team. Evaluate emerging data technologies and determine their business benefits and impact on the future-state data platform. Develop and promote a strong data management framework, emphasizing data quality, governance, and compliance with regulatory requirements Collaborate with Data Modelers to create data models (conceptual, logical, and physical) Architect meta-data management processes to ensure data lineage, data definitions, and ownership are well-documented and understood Collaborate closely with business leaders, IT teams, and external partners to understand data requirements and ensure alignment with strategic goals Act as a primary point of contact for data engineering discussions and inquiries from various stakeholders Lead the implementation of data architectures on cloud platforms (AWS, Azure, Google Cloud) to improve efficiency and scalability Qualifications Bachelor’s degree in Computer Science, Information Systems, Data Engineering, or a related field; Master’s degree preferred Minimum of 10 years’ experience in data architecture or data engineering roles, with a significant focus in P&C insurance domains preferred. Proven track record of successful implementation of data architecture within large-scale transformation programs or projects Comprehensive knowledge of data modelling techniques and methodologies, including data normalization and denormalization practices Hands on expertise across a wide variety of database (Azure SQL, MongoDB, Cosmos), data transformation (Informatica IICS, Databricks), change data capture and data streaming (Apache Kafka, Apache Flink) technologies Proven Expertise with data warehousing concepts, ETL processes, and data integration tools (e.g., Informatica, Databricks, Talend, Apache Nifi) Experience with cloud-based data architectures and platforms (e.g., AWS Redshift, Google BigQuery, Snowflake, Azure SQL Database) Expertise in ensuring data security patterns (e.g. tokenization, encryption, obfuscation) Knowledge of insurance policy operations, regulations, and compliance frameworks specific to Consumer lines Familiarity with Agile methodologies and experience working in Agile project environments Understanding of advanced analytics, AI, and machine learning concepts as they pertain to data architecture Why Chubb? Join Chubb to be part of a leading global insurance company! Our constant focus on employee experience along with a start-up-like culture empowers you to achieve impactful results. Industry leader: Chubb is a world leader in the insurance industry, powered by underwriting and engineering excellence A Great Place to work: Chubb India has been recognized as a Great Place to Work® for the years 2023-2024, 2024-2025 and 2025-2026 Laser focus on excellence: At Chubb we pride ourselves on our culture of greatness where excellence is a mindset and a way of being. We constantly seek new and innovative ways to excel at work and deliver outstanding results Start-Up Culture: Embracing the spirit of a start-up, our focus on speed and agility enables us to respond swiftly to market requirements, while a culture of ownership empowers employees to drive results that matter Growth and success: As we continue to grow, we are steadfast in our commitment to provide our employees with the best work experience, enabling them to advance their careers in a conducive environment Employee Benefits Our company offers a comprehensive benefits package designed to support our employees’ health, well-being, and professional growth. Employees enjoy flexible work options, generous paid time off, and robust health coverage, including treatment for dental and vision related requirements. We invest in the future of our employees through continuous learning opportunities and career advancement programs, while fostering a supportive and inclusive work environment. Our benefits include: Savings and Investment plans: We provide specialized benefits like Corporate NPS (National Pension Scheme), Employee Stock Purchase Plan (ESPP), Long-Term Incentive Plan (LTIP), Retiral Benefits and Car Lease that help employees optimally plan their finances Upskilling and career growth opportunities: With a focus on continuous learning, we offer customized programs that support upskilling like Education Reimbursement Programs, Certification programs and access to global learning programs. Health and Welfare Benefits: We care about our employees’ well-being in and out of work and have benefits like Employee Assistance Program (EAP), Yearly Free Health campaigns and comprehensive Insurance benefits. Application Process Our recruitment process is designed to be transparent, and inclusive. Step 1: Submit your application via the Chubb Careers Portal. Step 2: Engage with our recruitment team for an initial discussion. Step 3: Participate in HackerRank assessments/technical/functional interviews and assessments (if applicable). Step 4: Final interaction with Chubb leadership. Join Us With you Chubb is better. Whether you are solving challenges on a global stage or creating innovative solutions for local markets, your contributions will help shape the future. If you value integrity, innovation, and inclusion, and are ready to make a difference, we invite you to be part of Chubb India’s journey. Apply Now: Chubb External Careers

Posted 2 days ago

Apply

10.0 years

0 Lacs

Telangana

On-site

About Chubb Chubb is a world leader in insurance. With operations in 54 countries and territories, Chubb provides commercial and personal property and casualty insurance, personal accident and supplemental health insurance, reinsurance and life insurance to a diverse group of clients. The company is defined by its extensive product and service offerings, broad distribution capabilities, exceptional financial strength and local operations globally. Parent company Chubb Limited is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index. Chubb employs approximately 40,000 people worldwide. Additional information can be found at: www.chubb.com. About Chubb India At Chubb India, we are on an exciting journey of digital transformation driven by a commitment to engineering excellence and analytics. We are proud to share that we have been officially certified as a Great Place to Work® for the third consecutive year, a reflection of the culture at Chubb where we believe in fostering an environment where everyone can thrive, innovate, and grow With a team of over 2500 talented professionals, we encourage a start-up mindset that promotes collaboration, diverse perspectives, and a solution-driven attitude. We are dedicated to building expertise in engineering, analytics, and automation, empowering our teams to excel in a dynamic digital landscape. We offer an environment where you will be part of an organization that is dedicated to solving real-world challenges in the insurance industry. Together, we will work to shape the future through innovation and continuous learning. Reporting to the VP COG ECM enterprise Forms Portfolio Delivery Manager, this role will be responsible for managing and supporting Implementation of a new Document solution for identified applications with the CCM landscape, in APAC. OpenText xPression and Duckcreek has been the corporate document generation tool of choice within Chubb. But xPression going end of life and be unsupported from 2025. A new Customer Communications Management (CCM) platform – Quadient Inspire - has been selected to replace xPression by a global working group and implementation of this new tool (including migration of existing forms/templates from xPression where applicable). Apart from migrating from xPression, there are multiple existing applications to be replaced with Quadient Inspire The role is based in Hyderabad/India with some travel to other Chubb offices. Although there are no direct line management responsibilities within this role, the successful applicant will be responsible for task management of Business Analysts and an Onshore/Offshore development team. The role will require the ability to manage multiple project/enhancement streams with a variety of levels of technical/functional scope and across a number of different technologies. In this role, you will: Lead the design and development of comprehensive data engineering frameworks and patterns. Establish engineering design standards and guidelines for the creation, usage, and maintenance of data across COG (Chubb overseas general) Derive innovation and build highly scalable real-time data pipelines and data platforms to support the business needs. Act as mentor and lead for the data engineering organization that is business-focused, proactive, and resilient. Promote data governance and master/reference data management as a strategic discipline. Implement strategies to monitor the effectiveness of data management. Be an engineering leader and coach data engineers and be an active member of the data leadership team. Evaluate emerging data technologies and determine their business benefits and impact on the future-state data platform. Develop and promote a strong data management framework, emphasizing data quality, governance, and compliance with regulatory requirements Collaborate with Data Modelers to create data models (conceptual, logical, and physical) Architect meta-data management processes to ensure data lineage, data definitions, and ownership are well-documented and understood Collaborate closely with business leaders, IT teams, and external partners to understand data requirements and ensure alignment with strategic goals Act as a primary point of contact for data engineering discussions and inquiries from various stakeholders Lead the implementation of data architectures on cloud platforms (AWS, Azure, Google Cloud) to improve efficiency and scalability Qualifications Bachelor’s degree in Computer Science, Information Systems, Data Engineering, or a related field; Master’s degree preferred Minimum of 10 years’ experience in data architecture or data engineering roles, with a significant focus in P&C insurance domains preferred. Proven track record of successful implementation of data architecture within large-scale transformation programs or projects Comprehensive knowledge of data modelling techniques and methodologies, including data normalization and denormalization practices Hands on expertise across a wide variety of database (Azure SQL, MongoDB, Cosmos), data transformation (Informatica IICS, Databricks), change data capture and data streaming (Apache Kafka, Apache Flink) technologies Proven Expertise with data warehousing concepts, ETL processes, and data integration tools (e.g., Informatica, Databricks, Talend, Apache Nifi) Experience with cloud-based data architectures and platforms (e.g., AWS Redshift, Google BigQuery, Snowflake, Azure SQL Database) Expertise in ensuring data security patterns (e.g. tokenization, encryption, obfuscation) Knowledge of insurance policy operations, regulations, and compliance frameworks specific to Consumer lines Familiarity with Agile methodologies and experience working in Agile project environments Understanding of advanced analytics, AI, and machine learning concepts as they pertain to data architecture Why Chubb? Join Chubb to be part of a leading global insurance company! Our constant focus on employee experience along with a start-up-like culture empowers you to achieve impactful results. Industry leader: Chubb is a world leader in the insurance industry, powered by underwriting and engineering excellence A Great Place to work: Chubb India has been recognized as a Great Place to Work® for the years 2023-2024, 2024-2025 and 2025-2026 Laser focus on excellence: At Chubb we pride ourselves on our culture of greatness where excellence is a mindset and a way of being. We constantly seek new and innovative ways to excel at work and deliver outstanding results Start-Up Culture: Embracing the spirit of a start-up, our focus on speed and agility enables us to respond swiftly to market requirements, while a culture of ownership empowers employees to drive results that matter Growth and success: As we continue to grow, we are steadfast in our commitment to provide our employees with the best work experience, enabling them to advance their careers in a conducive environment Employee Benefits Our company offers a comprehensive benefits package designed to support our employees’ health, well-being, and professional growth. Employees enjoy flexible work options, generous paid time off, and robust health coverage, including treatment for dental and vision related requirements. We invest in the future of our employees through continuous learning opportunities and career advancement programs, while fostering a supportive and inclusive work environment. Our benefits include: Savings and Investment plans: We provide specialized benefits like Corporate NPS (National Pension Scheme), Employee Stock Purchase Plan (ESPP), Long-Term Incentive Plan (LTIP), Retiral Benefits and Car Lease that help employees optimally plan their finances Upskilling and career growth opportunities: With a focus on continuous learning, we offer customized programs that support upskilling like Education Reimbursement Programs, Certification programs and access to global learning programs. Health and Welfare Benefits: We care about our employees’ well-being in and out of work and have benefits like Employee Assistance Program (EAP), Yearly Free Health campaigns and comprehensive Insurance benefits. Application Process Our recruitment process is designed to be transparent, and inclusive. Step 1: Submit your application via the Chubb Careers Portal. Step 2: Engage with our recruitment team for an initial discussion. Step 3: Participate in HackerRank assessments/technical/functional interviews and assessments (if applicable). Step 4: Final interaction with Chubb leadership. Join Us With you Chubb is better. Whether you are solving challenges on a global stage or creating innovative solutions for local markets, your contributions will help shape the future. If you value integrity, innovation, and inclusion, and are ready to make a difference, we invite you to be part of Chubb India’s journey. Apply Now: Chubb External Careers

Posted 2 days ago

Apply

12.0 years

0 Lacs

India

On-site

Data Confidentiality Protection Domain Specialist Experience: 12 Years Location: Pune Primary skill: 1. 12+ years in IT or cybersecurity, with 5+ years in a security leadership or specialist role 2. Strong experience in data protection domains, including: Encryption & Key Management, Data Obfuscation,Unstructured Data Security 3. Hands-on knowledge of cybersecurity control design, risk management, and strategic execution 4. Proven ability to drive enterprise-wide cybersecurity programs 5. High-level communication and stakeholder management skills, including senior leadership 6. Experience in mentoring or leading teams, and building long-term security roadmaps

Posted 3 days ago

Apply

7.0 years

0 Lacs

Delhi, India

Remote

Overview WELCOME TO SITA We're the team that keeps airports moving, airlines flying smoothly, and borders open. Our tech and communication innovations are the secret behind the success of the world's air travel industry. You'll find us at 95% of international hubs. We partner closely with over 2,500 transportation and government clients, each with their own unique needs and challenges. Our goal is to find fresh solutions and cutting-edge tech to make their operations run like clockwork. Want to be a part of something big? Are you ready to love your job? The adventure begins right here, with you, at SITA. About The Role & Team Designs, develops, and maintains mobile applications, associated CI/CD pipelines, automated tests, and development tools using existing and emerging technology platforms What You’ll Do Writes and delivers code for features, user stories, reusable modules, unit testing and automated functional testing; debugs existing code and modules Provides technical guidance to less experienced developers and other technical or non-technical stakeholders. Follows coding guidelines and QA practices and processes, and ensures they are followed by less experienced developers. Participates in backlog grooming, analysis of requirements, estimation, and design of new applications or new features. Supports colleagues in their drive to constantly improve the way we work and make working together a pleasant experience. Actively participate in all scrum events via video conference, and attend the office 3 days per week. Qualifications ABOUT YOUR SKILLS Skilled Developer/Engineer with 7+ years of hands-on experience developing, supporting, releasing, and optimizing mission-critical mobile apps, leveraging automation and DevOps processes to ensure repeatability and efficiency. Skilled Developer/Engineer with 7+ years of hands-on experience developing, supporting, releasing, and optimizing mission-critical mobile apps, leveraging automation and DevOps processes to ensure repeatability and efficiency. 5+ years developing native Android apps (mandatory) Proficiency in building modern Android user interfaces with Jetpack Compose Strong understanding of declarative UI concepts, state management in Compose, and composable functions Deep expertise in the KMP and coroutines for efficient asynchronous programming Proficiency in making network requests, handling API responses, and using libraries like Retrofit and OkHttp Experience with Room persistence library for local data storage Experience with unit testing with JUnit (ideal) or Jacoco/SonarQube/Mockito (desirable) Experience with Maven repository (ideal) or BOM dependency management (desirable) Experience with DexGuard (ideal), obfuscation, certificate pinning, and other methods of securing apps Experience developing with other mobile frameworks (desirable) and microservices development (desirable). Experience developing mobile SDKs and integrating mobile apps with web-services and external APIs (mandatory) A thorough understanding of OOP, design patterns, Android, iOS and enterprise mobile application integration Strong skills in securing data on the local device using industry standard encryption technologies including key management solutions Experience with push notification frameworks Experience with mobile payment solutions (Stripe would be ideal) Experience with publishing apps to Google Play, and associated release management activities Experience with A/B testing would be highly valued Knowledge And Skills - General Solid knowledge of Object Oriented code design. Solid knowledge a Procedural language such as PL/SQL. Good knowledge of IT security concepts and ability to use them while designing and developing code. Solid knowledge of SOA: XML Web Services, SOAP and Microservices architecture (desirable). Solid knowledge of JSON Working knowledge of cloud platforms such as Azure, AWS or Google Cloud would be an advantage. Good knowledge of developing and designing code to interface to one or more RDBMS databases. Demonstrate good understanding of networking concepts. Demonstrate the ability to apply application design concepts: MVVM, object-oriented design, design patterns, database development. Demonstrate the ability to use DataSet, SQL, and stored procedures. Any experience or understanding of biometrics would be highly valued. Any experience or understanding of AD B2C would be highly valued. Any experience with Google Analytics and/or Firebase Remote Config would be highly valued. Advanced knowledge of source code management (git) and branching strategies that work for DevOps. Demonstrate an understanding of trade-offs and risks with programming choices. What We Offer We’re all about diversity. We operate in 200 countries and speak 60 different languages and cultures. We’re really proud of our inclusive environment. Our offices are comfortable and fun places to work, and we make sure you get to work from home too. Find out what it's like to join our team and take a step closer to your best life ever. 🏡 Flex Week: Work from home up to 2 days/week (depending on your team’s needs) ⏰ Flex Day: Make your workday suit your life and plans. 🌎 Flex Location: Take up to 30 days a year to work from any location in the world. 🌿 Employee Wellbeing: We’ve got you covered with our Employee Assistance Program (EAP), for you and your dependents 24/7, 365 days/year. We also offer Champion Health - a personalized platform that supports a range of wellbeing needs. 🚀 Professional Development : Level up your skills with our training platforms, including LinkedIn Learning! 🙌🏽 Competitive Benefits : Competitive benefits that make sense with both your local market and employment status. SITA is an Equal Opportunity Employer. We value a diverse workforce. In support of our Employment Equity Program, we encourage women, aboriginal people, members of visible minorities, and/or persons with disabilities to apply and self-identify in the application process.

Posted 1 week ago

Apply

15.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

We’re on an exciting journey with our client and we want you to join us. With our client, you will be exposed to the latest technologies and work with some of the brightest minds in the industry. Our client is Big Investment Banking company so you will be playing a key role as a Vice President - Data Security who can assist with the below: Global CISO (Chief Information Security Office) is looking for a seasoned Data Protection Operations Lead to oversee the day-to-day execution, governance, and enhancement of our enterprise data protection technologies. This role is critical in safeguarding sensitive and regulated data across the organization using platforms such as BigID, Microsoft Information Protection (MIP), Truffle Hog for secrets discovery, Data Loss Prevention (DLP) tools (e.g., Symantec, Forcepoint, MIP), and Thales for data obfuscation and encryption. The ideal candidate will have 13–15+ years of information security experience, with at least 8 years specifically focused on data protection and governance, preferably in large, regulated environments (e.g., BFSI, Healthcare, or Tech). Responsibilities: Lead operational execution of enterprise data protection tools including BigID, MIP, DLP, Thales, Truffle Hog, etc. Manage end-to-end incident response workflows related to data leakage, sensitive data discovery, and misconfiguration. Ensure operational efficiency of data discovery, classification, and protection capabilities across endpoints, cloud, and on-prem environments. Collaborate with engineering, compliance, legal, and business teams to define and implement data protection policies. Oversee and optimize data classification strategies (manual, suggestive, and automated). Track and report key metrics including incident trends, false positives, and SLA adherence. Drive adoption and user training programs related to data classification and labeling. Participate in and lead audits, risk assessments, and regulatory readiness reviews. Own tool lifecycle—from onboarding, configuration, integration to tuning and decommissioning. Serve as escalation point for high-priority incidents, executive reporting, and stakeholder briefings. Knowledge, Skill, Experience Required: 13–15+ years of overall experience in Information Security. 8+ years of direct experience in data protection, DLP, or data privacy. Proven experience managing enterprise-grade tools like BigID, MIP, Symantec/Forcepoint DLP, Thales Cipher Trust, Truffle Hog, and/or others. Strong understanding of data discovery, classification, encryption, rights management, and related regulatory standards (e.g., GDPR, HIPAA, DPDP, CCPA). Solid background in cloud security controls (M365, AWS, Azure, GCP) and hybrid deployments. Expertise in SIEM and SOAR integrations, incident response, and threat modeling. Experience with scripting or automation (e.g., Python, PowerShell) a plus. Familiarity with compliance frameworks such as ISO 27001, NIST, RBI, etc. Beneficial: Symantec and Forcepoint DLP Certification Microsoft Certified: Information Protection Administrator Associate (SC-400) Certifications such as CIPT, CIPP, CISSP, CISM, or equivalent preferred. Azure Security / Microsoft 365 Security certifications Personal Characteristics: Strategic thinker with hands-on execution capability. Excellent communication and stakeholder management skills across technical and non-technical audiences. Strong problem-solving and analytical skills. High degree of professional integrity, ownership, and accountability. Proactive and collaborative team leader, able to operate in cross-functional and matrixed environments. Adept at working under pressure with strong prioritization and decision-making skills.

Posted 1 week ago

Apply

2.0 - 4.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

About The Team The Information Security organization advances the overall state of security at Rubrik through purposeful initiatives and coordination of large security projects. Information Security builds technologies, tools, and processes to better enable teams at Rubrik to develop secure software and protect data and systems with appropriate security controls. Information Security also develops systems to monitor and respond to attacks against our systems, provides awareness education to teams on security best practices for data protection, and ensures data sharing relationships with third parties in order to securely protect Rubrik information. About Role Rubrik is seeking a passionate and motivated Penetration Testing Engineer to join our Information Security team. In this role, you will work to simulate real-world attack scenarios to identify vulnerabilities, evaluate security posture, and develop methods to defend against attacks. The successful candidate will be technically savvy, customer-oriented, results-driven, and passionate about security. You will partner with the vulnerability management engineers, Engineering, IT and other internal stakeholders to enhance Rubrik’s overall security posture. What You'll Do Design and execute real-world attack scenarios by replicating the tactics, techniques and procedures (TTPs) of threat actors and highlight gaps impacting Rubrik’s products and enterprise security posture. Assist with the planning, execution, and reporting of penetration tests on Rubrik’s products, services, and internal systems. Develop and refine exploitation techniques consistently to conduct penetration testing exercises successfully. Deliver detailed reports of technical findings to stakeholders and assist with the development of mitigation plans. Assist in security investigations, root-cause analysis and corrective measures as required. Coordinate with the security researcher community in reviewing the identified vulnerabilities and drive the issues to closure. Drive vulnerabilities to closure within the established SLAs. Navigate escalations when necessary to raise visibility into risk and drive the risk down when SLAs are not met. Collaborate with the senior security team members to identify areas for improvement in security posture. Contribute to the continuous improvement of Rubrik’s penetration testing framework and processes. Help develop and maintain testing documentation, including methodologies, procedures, and post-engagement reports. Track and monitor penetration testing metrics to scale the pentest program and continuously improve the coverage and depth of penetration testing. Stay updated with emerging security threats, innovative defense measures, and industry trends to recommend improvements proactively. Experience you'll need Bachelor’s degree required; BE/BTech or MS in Computer Science, Information Technology, or related field 2-4 years of hands-on experience in penetration testing, red team, vulnerability exploitation, product security and/or cloud security roles Ability to perform targeted cyberattacks with or without the use of automated tools such as (e.g., Burp Suite, Metasploit, Nmap, Wireshark, etc.). Experience in system internals (windows, linux) and cloud security (AWS, Azure, GCP) In-depth knowledge of exploit frameworks, obfuscation/evasion techniques, application security, IDS/IPS and web proxies Strong understanding of security best practices and frameworks (OWASP Top 10, NIST, CIS). Demonstrated programming skills in one or more of: Python, Perl, Ruby, Java IT security certifications (OSCP, OSCE, GPEN, GWAPT, GXPN) is a plus Strong analytical and problem-solving skills. Ability to work independently as well as part of a team in a fast-paced environment. Excellent verbal and written communication skills Join Us in Securing the World's Data Rubrik (NYSE: RBRK) is on a mission to secure the world’s data. With Zero Trust Data Security™, we help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, secures data across enterprise, cloud, and SaaS applications. We help organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked. Linkedin | X (formerly Twitter) | Instagram | Rubrik.com Inclusion @ Rubrik At Rubrik, we are dedicated to fostering a culture where people from all backgrounds are valued, feel they belong, and believe they can succeed. Our commitment to inclusion is at the heart of our mission to secure the world’s data. Our goal is to hire and promote the best talent, regardless of background. We continually review our hiring practices to ensure fairness and strive to create an environment where every employee has equal access to opportunities for growth and excellence. We believe in empowering everyone to bring their authentic selves to work and achieve their fullest potential. Our inclusion strategy focuses on three core areas of our business and culture: Our Company: We are committed to building a merit-based organization that offers equal access to growth and success for all employees globally. Your potential is limitless here. Our Culture: We strive to create an inclusive atmosphere where individuals from all backgrounds feel a strong sense of belonging, can thrive, and do their best work. Your contributions help us innovate and break boundaries. Our Communities: We are dedicated to expanding our engagement with the communities we operate in, creating opportunities for underrepresented talent and driving greater innovation for our clients. Your impact extends beyond Rubrik, contributing to safer and stronger communities. Equal Opportunity Employer/Veterans/Disabled Rubrik is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability. Rubrik provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Rubrik complies with applicable state and local laws governing nondiscrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training. Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please contact us at hr@rubrik.com if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment. EEO IS THE LAW NOTIFICATION OF EMPLOYEE RIGHTS UNDER FEDERAL LABOR LAWS

Posted 1 week ago

Apply

7.0 years

0 Lacs

Delhi

Remote

Overview WELCOME TO SITA We're the team that keeps airports moving, airlines flying smoothly, and borders open. Our tech and communication innovations are the secret behind the success of the world's air travel industry. You'll find us at 95% of international hubs. We partner closely with over 2,500 transportation and government clients, each with their own unique needs and challenges. Our goal is to find fresh solutions and cutting-edge tech to make their operations run like clockwork. Want to be a part of something big? Are you ready to love your job? The adventure begins right here, with you, at SITA. ABOUT THE ROLE & TEAM: Designs, develops, and maintains mobile applications, associated CI/CD pipelines, automated tests, and development tools using existing and emerging technology platforms WHAT YOU’LL DO: Writes and delivers code for features, user stories, reusable modules, unit testing and automated functional testing; debugs existing code and modules Provides technical guidance to less experienced developers and other technical or non-technical stakeholders. Follows coding guidelines and QA practices and processes, and ensures they are followed by less experienced developers. Participates in backlog grooming, analysis of requirements, estimation, and design of new applications or new features. Supports colleagues in their drive to constantly improve the way we work and make working together a pleasant experience. Actively participate in all scrum events via video conference, and attend the office 3 days per week. Qualifications ABOUT YOUR SKILLS Skilled Developer/Engineer with 7+ years of hands-on experience developing, supporting, releasing, and optimizing mission-critical mobile apps, leveraging automation and DevOps processes to ensure repeatability and efficiency. Skilled Developer/Engineer with 7+ years of hands-on experience developing, supporting, releasing, and optimizing mission-critical mobile apps, leveraging automation and DevOps processes to ensure repeatability and efficiency. 5+ years developing native Android apps (mandatory) Proficiency in building modern Android user interfaces with Jetpack Compose Strong understanding of declarative UI concepts, state management in Compose, and composable functions Deep expertise in the KMP and coroutines for efficient asynchronous programming Proficiency in making network requests, handling API responses, and using libraries like Retrofit and OkHttp Experience with Room persistence library for local data storage Experience with unit testing with JUnit (ideal) or Jacoco/SonarQube/Mockito (desirable) Experience with Maven repository (ideal) or BOM dependency management (desirable) Experience with DexGuard (ideal), obfuscation, certificate pinning, and other methods of securing apps Experience developing with other mobile frameworks (desirable) and microservices development (desirable). Experience developing mobile SDKs and integrating mobile apps with web-services and external APIs (mandatory) A thorough understanding of OOP, design patterns, Android, iOS and enterprise mobile application integration Strong skills in securing data on the local device using industry standard encryption technologies including key management solutions Experience with push notification frameworks Experience with mobile payment solutions (Stripe would be ideal) Experience with publishing apps to Google Play, and associated release management activities Experience with A/B testing would be highly valued Knowledge and Skills - General : Solid knowledge of Object Oriented code design. Solid knowledge a Procedural language such as PL/SQL. Good knowledge of IT security concepts and ability to use them while designing and developing code. Solid knowledge of SOA: XML Web Services, SOAP and Microservices architecture (desirable). Solid knowledge of JSON Working knowledge of cloud platforms such as Azure, AWS or Google Cloud would be an advantage. Good knowledge of developing and designing code to interface to one or more RDBMS databases. Demonstrate good understanding of networking concepts. Demonstrate the ability to apply application design concepts: MVVM, object-oriented design, design patterns, database development. Demonstrate the ability to use DataSet, SQL, and stored procedures. Any experience or understanding of biometrics would be highly valued. Any experience or understanding of AD B2C would be highly valued. Any experience with Google Analytics and/or Firebase Remote Config would be highly valued. Advanced knowledge of source code management (git) and branching strategies that work for DevOps. Demonstrate an understanding of trade-offs and risks with programming choices. WHAT WE OFFER We’re all about diversity. We operate in 200 countries and speak 60 different languages and cultures. We’re really proud of our inclusive environment. Our offices are comfortable and fun places to work, and we make sure you get to work from home too. Find out what it's like to join our team and take a step closer to your best life ever. Flex Week: Work from home up to 2 days/week (depending on your team’s needs) Flex Day: Make your workday suit your life and plans. Flex Location: Take up to 30 days a year to work from any location in the world. Employee Wellbeing: We’ve got you covered with our Employee Assistance Program (EAP), for you and your dependents 24/7, 365 days/year. We also offer Champion Health – a personalized platform that supports a range of wellbeing needs. Professional Development : Level up your skills with our training platforms, including LinkedIn Learning! Competitive Benefits : Competitive benefits that make sense with both your local market and employment status. SITA is an Equal Opportunity Employer. We value a diverse workforce. In support of our Employment Equity Program, we encourage women, aboriginal people, members of visible minorities, and/or persons with disabilities to apply and self-identify in the application process.

Posted 1 week ago

Apply

2.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Since its inception in 2003, driven by visionary college students transforming online rent payment, Entrata has evolved into a global leader serving property owners, managers, and residents. Honored with prestigious awards like the Utah Business Fast 50, Silicon Slopes Hall of Fame - Software Company - 2022, Women Tech Council Shatter List, our comprehensive software suite spans rent payments, insurance, leasing, maintenance, marketing, and communication tools, reshaping property management worldwide. Our 2200+ global team members embody intelligence and adaptability, engaging actively from top executives to part-time employees. With offices across Utah, Texas, India, Israel, and the Netherlands, Entrata blends startup innovation with established stability, evident in our transparent communication values and executive town halls. Our product isn't just desirable; it's industry essential. At Entrata, we passionately refine living experiences, uphold collective excellence, embrace boldness and resilience, and prioritize different perspectives, endeavoring to craft a better world to live in. If you’re one of the best and brightest, a highly motivated innovator, a fast worker, and a fierce competitor, you might be just the person we’re looking for! Entrata’s Development department is seeking a Software Engineer based in our Lehi, UT, Headquarters. You will spend a lot of time working with senior architects and directors, designing database schema, and laying out the basic code architecture so an offshore team can run with it. You will also be tasked with projects that you will own and see through to completion. Responsibilities will include: Design and build advanced applications for the Android platform Collaborate with cross-functional teams to define and design new features Translate designs and wireframes into high-quality code Design, build and maintain high performance, reusable, and reliable Kotlin code Familiarity with MVVM architecture, Jetpack components (LiveData, ViewModel, Navigation, etc.). Ensure the best possible performance, quality, and responsiveness of the application Identify and correct bottlenecks and fix bugs. Help maintain code quality, organization, and automatization Deliver across the entire app life cycle –concept, design, build, deploy, test, release to app stores, and support. Working directly with developers and product managers to conceptualize, build, test and realize products Gather requirements around functionality and translate those requirements into elegant functional solutions Evaluate and communicate technical risk and ensure applications are deployed against a schedule with the highest quality possible. Minimum Qualifications: 2 - 4 years of experience in Mobile application development on the Android platform Strong knowledge of Android SDK, different versions of Android, Android Studio, and how to deal with different screen sizes Experience working with remote data via REST and JSON Solid understanding of the full mobile development life cycle. Ability to understand business requirements and translate them into technical requirements Familiarity with cloud message APIs, push notifications, and Animations. Experience with offline storage, threading, and performance tuning Should have a sound knowledge of Proguard, Obfuscation, and Deobfuscations of Android Applications. Proficient in the integration of REST APIs using Retrofit, Volley, etc. Should be able to write a code in such a way that it can be reused, tested, and optimized using Kotlin. Should be able to understand the actual use of advanced Kotlin Concepts and its implementation. Experience in working with localizations and multi-lingual applications. Should have sound knowledge of MVP, MVVM architectures in android Experience with Version control systems like GIT, SVN, etc. Preferred Qualifications: Bachelor's Degree in Computer Science or related field preferred Should have experience of agile methodology like Scrum. Excellent Verbal & Written Business Communication Skills. Members of the Entrata team aren’t just intelligent and ambitious, they’re the living embodiment of another core Value: “Excellent Alone, Better Together.” Entrata is dedicated to creating a workplace where a diverse and inclusive team thrives in an environment free from discrimination. We provide equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, protected veteran status, or any other applicable characteristics protected by law. It’s a great place to work! Will you join us?

Posted 1 week ago

Apply

12.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Experience : 12 - 18 years Location: Pune Proven track record of 12+ years overall experience in IT and 5+ years’ experience in an equivalent role as Security Architect / Tech Cyber Security Specialist. Experience in data protection domain; hands-on experience with designing solutions for encryption and key management, data obfuscation, attribute-based access control (ABAC) and unstructured data protection areas is a plus. Deep understanding of information security and architecture design, a depth and breadth of supporting technical knowledge. Experience in taking accountability for the challenges in your product portfolio. Positive relationship building and consultation skills as well as an ability to build and maintain positive working relationships with peers, management, key business partners and clients. High standard of communication (verbal/written) at each level, including senior management level.

Posted 1 week ago

Apply

3.0 - 6.0 years

3 - 7 Lacs

Navi Mumbai

On-site

Job Applicant Privacy Notice Big ID-Thales Cipher - Consultant Publication Date: Jul 17, 2025 Ref. No: 534749 Location: Mahape, Navi Mumbai, Maharasht, IN About Atos Atos is a global leader in digital transformation with c. 78,000 employees and annual revenue of c. € 10 billion. European number one in cybersecurity, cloud and high-performance computing, the Group provides tailored end-to-end solutions for all industries in 68 countries. A pioneer in decarbonization services and products, Atos is committed to a secure and decarbonized digital for its clients. Atos is a SE (Societas Europaea) and listed on Euronext Paris. The purpose of Atos is to help design the future of the information space. Its expertise and services support the development of knowledge, education and research in a multicultural approach and contribute to the development of scientific and technological excellence. Across the world, the Group enables its customers and employees, and members of societies at large to live, work and develop sustainably, in a safe and secure information space. Responsibilities: Design and implement data obfuscation strategies using Thales CipherTrust Tokenization, FPE, and Data Masking modules. Define and build reusable obfuscation templates and policies based on data classification, sensitivity, and business use cases. Apply obfuscation to PII, PCI, and other regulated data across databases, applications, files, APIs, and cloud services. Install, configure, and administer CipherTrust Manager, DSM, and related connectors. Develop and deploy integration patterns with enterprise systems (e.g., Oracle, SQL Server, Kafka, Snowflake, Salesforce, AWS, Azure). Automate policy deployment and secret rotation using APIs, CLI, or scripting tools (e.g., Ansible, Terraform, Python, Shell). Work with or integrate secondary data protection tools (e.g. DLP, IRM, MIP etc.) Design, deploy, and manage PKI systems, including root and subordinate certificate authorities (CAs). Manage digital certificate lifecycles for users, devices, and services. Ensure secure storage and access controls for encryption/decryption and signing keys. Enable cross-platform key management and policy consistency for hybrid and multi-cloud environments. Align obfuscation patterns with internal data protection standards, classification schemes, and regulatory frameworks (GDPR, CCPA, DORA, SEBI, etc.). Provide obfuscation logs and audit evidence to support security assessments, audits, and compliance reviews. Implement monitoring and alerting for obfuscation control failures, anomalies, or unauthorized access attempts. Create detailed technical documentation, SOPs, and configuration guides. Train internal engineering teams and application owners on how to securely integrate with obfuscation services. Collaborate with data governance, security architecture, and DevSecOps teams to drive secure-by-design initiatives. Knowledge, Skill, Experience Required: Required: 3–6 years of hands-on experience with Thales CipherTrust Data Security Platform (Tokenization, DSM, FPE, Masking). Strong knowledge of data protection concepts: tokenization (deterministic and random), pseudonymization, static/dynamic masking, and encryption . • Experience integrating obfuscation solutions with databases (Oracle, SQL, PostgreSQL, etc.), enterprise apps, and data pipelines. Proficiency in scripting and automation tools: Python, Shell, REST APIs, Ansible, CI/CD pipelines. Familiarity with key management, HSM integration, and data access policies. Beneficial: • Thales Certified Engineer / Architect – CipherTrust • CISSP, CISA, CDPSE, or CIPT will be a binus Cloud Security Certification (e.g., AWS Security Specialty, Azure SC-300) Personal Characteristics : Strong analytical and problem-solving mindset Ability to work independently in a fast-paced, global enterprise environment Excellent documentation and communication skills Comfortable collaborating with cross-functional teams (App Dev, Security, Compliance, Data Governance) Experience supporting enterprise data security transformations and data-centric protection strategies #LinkedIN

Posted 1 week ago

Apply

7.0 years

0 Lacs

India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Supervising Security Analyst - Cyber Triage and Forensics Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Senior Security Analyst in Cyber Defense CTF (Cyber Triage and Forensics) plays a pivotal role in enhancing EY’s security posture by vigilantly monitoring, assessing, and managing incidents effectively. In collaboration with the team and leadership, to ensure strong security oversight and contribute to joint security monitoring and incident response initiatives. Key duties include triage, detailed investigations, clear communication, and comprehensive reporting, all contributing to the integrity and resilience of the EY’s cyber defenses. Essential Functions of the Job : You will work collaboratively to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations. Engage in proactive threat hunting and provide expert security assessments, utilizing EDR, SIEM, and other tools to understand and counteract the cybercrime landscape Communicate with IT stakeholders during incident response activities, ensuring effective containment, remediation, and accurate identification of compromise indicators Report on incident metrics, analyse findings, and develop reports to ensure comprehensive resolution and understanding of security events Act as an escalation point for incident response, shift lead, mentor junior team members, and contribute to team skill enhancement Analyse security events, provide feedback on security controls, and drive process improvements to strengthen the organization's security posture Maintain and improve security incident processes, protocols, and standard operating procedures to reflect best practices in security incident response Skills and attributes for success Proficient in Cyber investigation including evidence management in line with best practices and using advanced tools for threat detection and incident management including advanced querying with KQL Proficient in analyzing varied data sets, identifying malware, and conducting comprehensive security event analysis from network traffic attributes and host-based attributes to detect information security incidents and latent threats. Proficient in conducting detailed forensic investigations across various operating systems, with a keen eye for obfuscation and the ability to clearly communicate findings In-depth understanding of Active Directory security, with strong scripting abilities to automate response measures and improve operational effectiveness To qualify for the role, you must have Undergraduate or Postgraduate Degree in Computer Science, Engineering, or a related field (MCA/MTech/BTech/BCA/BSc CS or BSc IT) At least 7 years of overall experience with a minimum of 5 years specialized in incident response, computer forensics, and Security Operations. Proficiency in operating within a Security Monitoring/Security Operations Center (SOC) environment, including experience with CSIRT and CERT operations Demonstrated experience in investigating security events, threats, and vulnerabilities Strong understanding of electronic investigation and forensic methodologies, including log correlation, electronic data handling, investigative processes, and malware analysis In-depth knowledge of Windows and Unix/Linux operating systems, and experience with EDR solutions for threat detection and response Ideally, you’ll also Desired certifications such as SSCP, CEH, GCIH, GCFA, GCIA, GSEC, GIAC, Security+. Experience with security incident response in cloud environments, including Azure. Knowledge of legal considerations in electronic discovery and analysis Proficiency in scripting or programming (e.g., Shell scripting, PowerShell, C, C#, Python) Solid understanding of security best practices for network architecture and server configuration What we look for Demonstrates integrity in a professional environment Strong ethical behavior Ability to work independently Possesses a global mindset for working with diverse cultures and backgrounds Knowledgeable in industry-standard security incident response processes, procedures, and lifecycle Positive attitude and Excellent teaming skills Excellent social, communication, and writing skills Good presentation skills Excellent investigative, analytical, and problem-solving skills Supervising Responsibilities: Coordinate escalations and collaborate with internal technology teams to ensure timely resolution of issues Provide mentoring and training to other team members as required, supporting their development and ensuring consistent team performance Other Requirements: Should be willing to work in shifts What we offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. We ensure that individuals with disabilities are provided reasonable accommodations to participate in the job application or interview process, to perform essential job functions and to receive other benefits and privileges of employment. Please contact us to request accommodation. EY is committed to being an inclusive employer, and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible. Make your mark. Apply now EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

4.0 years

0 Lacs

India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. The candidate would be expected to work in diverse risk consulting engagements and are willing to travel to Middle East countries for project execution atleast 60% of their time. The candidate are expected to have experience / knowledge with respect to the following: Experience with infrastructure penetration testing and vulnerability assessments Good knowledge of OWASP and Secure SDLC standards Should have performed web/mobile/API penetration testing. Good knowledge of encryption technologies & MiTM attacks Experience in performing security code reviews and log analysis. Knowledge of Linux administration, TCP/IP, DNS, Network protocols and OSI model Good understanding of MITRE ATT&CK framework and how to leverage it. Good understanding of AD administration, different authentication mechanisms, trust boundaries etc. Experience in performing security configuration reviews for OS, Databases, Network & Security devices, applications etc. Should have good understanding of the cloud services (AWS, Azure and GCP), its architecture, potential attack vectors and mitigation plans Should have good understanding of the Container services, Kubernetes auditing and LLM security Experience in performing architecture design review for network and applications Experience in performing CS audits/maturity assessments against relevant standards like SAMA CSF, NCA, NIST, NESA, Qatar Cybersecurity Framework etc. Support in conducting technical reviews as part of IT/CS audits Should hold atleast 1 of the certifications or its equivalent : OSCP, GPEN, OSWE, OSWP, CRTP, LPT, ECSA, ISO27001, CEH Hands on experience will security testing tools/frameworks like Burp Suite, Nessus, Qualys etc. Hands on experience with programming using Python/Perl/PowerShell/C# Hands on experience with setting-up phishing and performing social engineering assessments Experience with AV/NAC evasion, obfuscation, bypass windows ASR/device guard, network security controls, emails gateway filtering etc. Experience with Active directory assessments Experience with different stages of cyber kill chain Review operational logs and event console activity to determine cause of security-related events or to identify potential security related events Analysis of the patches released by the vendors Good in report writing and convey the observations to the top management in layman’s language emphasizing on the business risks. Experience with mentoring junior resources or managing stakeholders/client Should be open-minded and ready to take up additional challenges or tasks outside your core domain expertise Skills Network Vulnerability Scanning and Penetration Testing, Web Application Penetration Testing, Mobile Application Penetration Testing, Web service/API Security Assessment, Secure Code review, AD Security Assessments, Social Engineering Assessments, Configuration Audit (Automated and Manual), Wireless Penetration Testing, Threat Modelling Qualification required-MCA/BTech /BSc ( Comp Science/Electronics and communication, or equivalent) Qualification preferred- Minimum 4+ years of IT/cyber risk consulting & penetration testing experience EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

4.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. The candidate would be expected to work in diverse risk consulting engagements and are willing to travel to Middle East countries for project execution atleast 60% of their time. The candidate are expected to have experience / knowledge with respect to the following: Experience with infrastructure penetration testing and vulnerability assessments Good knowledge of OWASP and Secure SDLC standards Should have performed web/mobile/API penetration testing. Good knowledge of encryption technologies & MiTM attacks Experience in performing security code reviews and log analysis. Knowledge of Linux administration, TCP/IP, DNS, Network protocols and OSI model Good understanding of MITRE ATT&CK framework and how to leverage it. Good understanding of AD administration, different authentication mechanisms, trust boundaries etc. Experience in performing security configuration reviews for OS, Databases, Network & Security devices, applications etc. Should have good understanding of the cloud services (AWS, Azure and GCP), its architecture, potential attack vectors and mitigation plans Should have good understanding of the Container services, Kubernetes auditing and LLM security Experience in performing architecture design review for network and applications Experience in performing CS audits/maturity assessments against relevant standards like SAMA CSF, NCA, NIST, NESA, Qatar Cybersecurity Framework etc. Support in conducting technical reviews as part of IT/CS audits Should hold atleast 1 of the certifications or its equivalent : OSCP, GPEN, OSWE, OSWP, CRTP, LPT, ECSA, ISO27001, CEH Hands on experience will security testing tools/frameworks like Burp Suite, Nessus, Qualys etc. Hands on experience with programming using Python/Perl/PowerShell/C# Hands on experience with setting-up phishing and performing social engineering assessments Experience with AV/NAC evasion, obfuscation, bypass windows ASR/device guard, network security controls, emails gateway filtering etc. Experience with Active directory assessments Experience with different stages of cyber kill chain Review operational logs and event console activity to determine cause of security-related events or to identify potential security related events Analysis of the patches released by the vendors Good in report writing and convey the observations to the top management in layman’s language emphasizing on the business risks. Experience with mentoring junior resources or managing stakeholders/client Should be open-minded and ready to take up additional challenges or tasks outside your core domain expertise Skills Network Vulnerability Scanning and Penetration Testing, Web Application Penetration Testing, Mobile Application Penetration Testing, Web service/API Security Assessment, Secure Code review, AD Security Assessments, Social Engineering Assessments, Configuration Audit (Automated and Manual), Wireless Penetration Testing, Threat Modelling Qualification required-MCA/BTech /BSc ( Comp Science/Electronics and communication, or equivalent) Qualification preferred- Minimum 4+ years of IT/cyber risk consulting & penetration testing experience EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Kanayannur, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. The candidate would be expected to work in diverse risk consulting engagements and are willing to travel to Middle East countries for project execution atleast 60% of their time. The candidate are expected to have experience / knowledge with respect to the following: Experience with infrastructure penetration testing and vulnerability assessments Good knowledge of OWASP and Secure SDLC standards Should have performed web/mobile/API penetration testing. Good knowledge of encryption technologies & MiTM attacks Experience in performing security code reviews and log analysis. Knowledge of Linux administration, TCP/IP, DNS, Network protocols and OSI model Good understanding of MITRE ATT&CK framework and how to leverage it. Good understanding of AD administration, different authentication mechanisms, trust boundaries etc. Experience in performing security configuration reviews for OS, Databases, Network & Security devices, applications etc. Should have good understanding of the cloud services (AWS, Azure and GCP), its architecture, potential attack vectors and mitigation plans Should have good understanding of the Container services, Kubernetes auditing and LLM security Experience in performing architecture design review for network and applications Experience in performing CS audits/maturity assessments against relevant standards like SAMA CSF, NCA, NIST, NESA, Qatar Cybersecurity Framework etc. Support in conducting technical reviews as part of IT/CS audits Should hold atleast 1 of the certifications or its equivalent : OSCP, GPEN, OSWE, OSWP, CRTP, LPT, ECSA, ISO27001, CEH Hands on experience will security testing tools/frameworks like Burp Suite, Nessus, Qualys etc. Hands on experience with programming using Python/Perl/PowerShell/C# Hands on experience with setting-up phishing and performing social engineering assessments Experience with AV/NAC evasion, obfuscation, bypass windows ASR/device guard, network security controls, emails gateway filtering etc. Experience with Active directory assessments Experience with different stages of cyber kill chain Review operational logs and event console activity to determine cause of security-related events or to identify potential security related events Analysis of the patches released by the vendors Good in report writing and convey the observations to the top management in layman’s language emphasizing on the business risks. Experience with mentoring junior resources or managing stakeholders/client Should be open-minded and ready to take up additional challenges or tasks outside your core domain expertise Skills Network Vulnerability Scanning and Penetration Testing, Web Application Penetration Testing, Mobile Application Penetration Testing, Web service/API Security Assessment, Secure Code review, AD Security Assessments, Social Engineering Assessments, Configuration Audit (Automated and Manual), Wireless Penetration Testing, Threat Modelling Qualification required-MCA/BTech /BSc ( Comp Science/Electronics and communication, or equivalent) Qualification preferred- Minimum 4+ years of IT/cyber risk consulting & penetration testing experience EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 2 weeks ago

Apply

7.0 - 9.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Summary Position Summary Red Team — Senior Consultant 2 – Senior Solution Delivery Lead Deloitte’s CyberRiskServices helpourclientstobesecure,vigilant,andresilientinthefaceofanever-increasing array of cyber threats and vulnerabilities. Our Cyber Risk practice helps organizations with the management of information and technology risks by delivering end-to-end solutions using proven methodologies and tools in a consistent manner.Ourserviceshelporganizationsto address,in atimelymanner,pervasiveissues,suchasidentity theft, data security breaches, data leakage, cyber security, and system outages across organizations of various sizes and industries with the goal of enabling ongoing, secure, and reliable operations across the enterprise. Deloitte’s Cyber Risk Services have been recognized as a leader by a number of independent analyst firms. Kennedy Consulting Research & Advisory, a leading analyst firm, recently named Deloitte a global leader in cyber security consulting. Source: Kennedy Consulting Research & Advisory; Cyber Security Consulting 2013; Kennedy Consulting Research & Advisory estimates © 2013 Kennedy Information, LLC. Reproduced under license. Workyouwill do Manages Cyber Threat Management projects, guides the team on a day-to-day basis and ensures that assigned tasks and responsibilities are fulfilled in a timely fashion Demonstrates understanding of complex business and information technology management processes Interacts with clients, managers and partners to build and nurture strong relationships Tailors firm tools and methodologies as per client requirements Assists in implementing standard operating procedures Adheres to Service Level Agreements Identified opportunities for service optimization Evaluates, counsels, mentors and provides feedback on performance of others Manages day-to-day client relationships with their direct client contacts at a minimum at appropriate management levels Participates in proposal development efforts to sell quot;add-on quot; work to clients Identifies opportunities to improve engagement economics Lead practice development initiatives The Team Deloitte’s Red Team is a standardized process, to help clients combat today’s growing array of system threats. We help organizations assess their infrastructure, networks and application environments to identify vulnerabilities and controlweaknesses.Wedevelopanddeploythetechnicalandarchitecturalimprovementsnecessarytoreduceattack exposure OurApplicationandVulnerabilityManagementserviceshelporganizationsidentifythetechnicalandarchitectural improvements needed to minimize exposure to attacks. With our customized methodology, we assess the many aspects of risk to support identification of both internal and external facing threats. Required: - Core Skills: Advanced communication skills (written and verbal) with experience delivering high-level technical presentations, detailed engagement reports, and executive briefings to stakeholders and leadership teams. Proven ability to design and execute complex red team operations, providing tactical and strategic guidance for enhancing organizational security posture through actionable insights. Comprehensive project management skills, with experience in leading large-scale offensive security engagements from inception to execution, including coordinating cross-functional teams. Expert-level understanding of threat analysis, enterprise-level defense mechanisms, and advanced mitigation strategies, with a focus on bridging offensive techniques with defensive improvements. Hands-on experience in bypassing complex security defenses such as firewalls, EDR, IDS/IPS, SIEM solutions (e.g., Splunk, QRadar, ArcSight), using cutting-edge evasion techniques. Extensive knowledge of cyber kill chains, advanced multi-stage attack scenarios, and the ability to execute sophisticated adversarial campaigns using real-world TTPs. Deep expertise in reverse engineering, malware analysis, and exploiting vulnerabilities to uncover security flaws within complex infrastructures. Strong knowledge of cloud security (AWS, Azure, GCP) and demonstrated ability to conduct adversarial simulations targeting cloud-based environments. Advanced knowledge of operating systems (Windows/Linux) and networking technologies critical to red team operations, with the ability to exploit system misconfigurations and weaknesses. Mastery of adversarial simulation tools like Cobalt Strike, Sliver, Metasploit, Empire, Nessus, nmap, Qualys, and Tenable, with the capability to customize attack vectors. Mandatory Certifications - OSCP, OSWP, GPEN, OSCE, CRTO, GXPN, CREST Certified Simulated Attack Specialist Preferred Certifications - OSCE3, OSWE, OSEP, OSED, CREST Certified Simulated Attack Specialist, SABSA, AWS Security Specialist Proven experience leading red teaming, purple teaming, and Breach Attack Simulations (BAS) at the enterprise level, simulating advanced persistent threats (APTs) to assess security defenses. Expertise in spear-phishing campaigns, HTML smuggling, payload delivery mechanisms, and opsec strategies to evade detection throughout engagements. Deep understanding of advanced attack frameworks like MITRE ATT&CK and SANS Top 25, using them to design tailored attack scenarios specific to client environments. In-depth knowledge of EDR/AV evasion techniques, privilege escalation, lateral movement, and persistence in both on-premise and hybrid cloud infrastructures. Ability to architect, deploy, and optimize custom Red Team/Offensive Security solutions, including managing command and control infrastructure, payload obfuscation, and real-time response actions. Ability to manage cross-functional teams across red, blue, and purple engagements, fostering collaboration and improving overall security resilience through continuous improvement cycles. High-level proficiency in strategic planning, engaging with leadership to define security objectives, risk prioritization, and translating technical findings into business-centric solutions. Strong knowledge of attack surface management and vulnerability management, with experience discovering and analyzing hidden or misconfigured assets, especially shadow IT. Advanced OpSec and tradecraft knowledge, ensuring red team engagements are conducted without exposing tools or tactics to detection, while continuously adapting methods to outpace blue team defenses. As a Senior Solutions Delivery Lead, you will lead the charge in adversarial simulation operations, pushing the boundaries of offensive security capabilities. You will: Architect and lead advanced red team engagements, simulating the tactics, tools, and techniques used by sophisticated threat actors to test client defenses. Conduct multi-phase, coordinated attack campaigns, including phishing simulations, exploitation of vulnerabilities, and covert lateral movement across complex environments. Develop and optimize adversarial simulation tactics, ensuring constant evolution of red team methodologies in response to emerging threats. Provide in-depth reports and post-engagement briefings with a focus on strategic remediation advice that aligns with organizational security goals. Oversee the red team infrastructure, ensuring all tools, C2 systems, and exploit frameworks are continually updated and configured for optimal effectiveness. Lead purple team exercises, working closely with blue teams to collaboratively improve detection, response, and mitigation strategies in real time. Remain at the forefront of offensive security innovations, guiding the team through new techniques, tools, and adversarial simulations to enhance effectiveness. Ensure OpSec best practices are strictly followed to avoid detection during engagements and protect the integrity of the red team toolkit. Collaborate with clients and stakeholders to review attack scenarios, findings, and deliver customized security enhancements tailored to their specific business risks. Preferred: B. E / B.Tech / M.S in any engineering discipline; 7-9 years of cyber risk services experience. Proven ability to emulate sophisticated adversary tactics, techniques, and procedures (TTPs) to identify and exploit weaknesses in organizational defenses. Familiarity with red teaming methodologies, offensive security tools, and frameworks such as MITRE ATT&CK. Experience with tools like Cobalt Strike, Metasploit, and Empire for command and control, exploitation, and lateral movement within environments. Proficiency in scripting languages like Python, PowerShell, or Bash for automation and custom tool creation. Knowledge of evasion techniques to bypass antivirus (AV), endpoint detection and response (EDR), and network monitoring tools. Strong understanding of privilege escalation, lateral movement, and persistence mechanisms in both Windows and Linux environments. Hands-on experience conducting phishing campaigns, social engineering attacks, and delivering payloads via HTML smuggling or other covert techniques. Ability to assess and manipulate Active Directory configurations, conduct password spraying, and exploit common misconfigurations. Strong knowledge of reverse engineering tools such as IDA Pro and Ghidra for analyzing malware or binaries. Excellent ability to create detailed post-engagement reports and recommendations for improving detection and response capabilities. Knowledge of operational security (OpSec) best practices to avoid detection during adversarial engagements. Ability to think creatively in developing offensive strategies and adapting to blue team defenses. Strong desire to continuously learn emerging attack vectors and defensive countermeasures. Outstanding communication skills, with the ability to explain offensive security techniques to both technical and non-technical stakeholders. Howyouwill Grow At Deloitte,we have invested a great deal to create arich environment in whichour professionals can grow.We want all ourpeopleto developin their own way,playingto theirown strengthsastheyhonetheirleadershipskills.And,as a part of our efforts, we provide our professionals with a variety of learning and networking opportunities—including exposuretoleaders,sponsors,coaches,andchallengingassignments—tohelpacceleratetheircareersalongtheway. No two people learn in exactly the same way. So, we provide a range of resources, including live classrooms, team-based learning,and eLearning.Deloitte University(DU):The LeadershipCenter in India,our state-of-the-art, world-class learning centerin the Hyderabad office, is an extension of the DU in Westlake, Texas, and represents a tangiblesymbolofourcommitmenttoourpeople’sgrowthanddevelopment. ExploreDU:TheLeadershipCenterin India . Benefits AtDeloitte,weknowthatgreatpeoplemakeagreatorganization.Wevalueourpeopleandofferemployeesabroad range of benefits. Learn more about what working at Deloitte can mean for you. Deloitte’s culture Our positive and supportive culture encourages our people to do their best workeveryday. We celebrate individuals by recognizing their uniqueness and offering them the flexibility to make daily choices that can help them to be healthy,centered,confident,andaware.Weofferwell-beingprogramsandarecontinuouslylookingfornewwaysto maintainaculturethatisinclusive,invitesauthenticity,leveragesourdiversity,andwhereourpeopleexcelandlead healthy, happy lives. Learn more about Life at Deloitte. Corporate citizenship Deloitte is led by a purpose: to make an impact that matters. This purpose defines who we are and extends to relationshipswithourclients,ourpeople,andourcommunities.Webelievethatbusinesshasthepowertoinspireand transform.We focus on education,giving,skill-basedvolunteerism,and leadership to help drive positive social impact in our communities. Learn more about Deloitte’s impact on the world. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Professional development At Deloitte, professionals have the opportunity to work with some of the best and discover what works best for them. Here, we prioritize professional growth, offering diverse learning and networking opportunities to help accelerate careers and enhance leadership skills. Our state-of-the-art DU: The Leadership Center in India, located in Hyderabad, represents a tangible symbol of our commitment to the holistic growth and development of our people. Explore DU: The Leadership Center in India . Benefits To Help You Thrive At Deloitte, we know that great people make a great organization. Our comprehensive rewards program helps us deliver a distinctly Deloitte experience that helps that empowers our professionals to thrive mentally, physically, and financially—and live their purpose. To support our professionals and their loved ones, we offer a broad range of benefits. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Requisition code: 306123

Posted 2 weeks ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

About Us Cognizant is one of the world's leading professional services companies, transforming clients' business, operating, and technology models for the digital era. Our unique industry-based, consultative approach helps clients envision, build, and run more innovative and efficient businesses. Headquartered in the U.S., Cognizant, a member of the NASDAQ-100, is consistently listed among the most admired companies in the world. Learn how Cognizant helps clients lead with digital at www.cognizant.com. LEADING AT COGNIZANT This is a Leadership role at Cognizant. We believe how you lead is as important as what you deliver. Cognizant leaders at every level: Drive our business strategy and inspire teams around our future. Live the leadership behaviors, leading themselves, others and the business. Uphold our Values, role modeling them in every action and decision. Nurture our people and culture, creating a workplace where all can thrive. At Cognizant, leadership transcends titles and is embodied in actions and behaviors. We empower our leaders at every level to drive business strategy, inspire teams, uphold our values, and foster an inclusive culture. We invite you to see how you can contribute to our story. About The Role Cognizant is seeking a Director, Data Protection to oversee the Corporate Security’s data protection strategy, regulatory compliance, training of staff, communication with regulators, and understanding relevant data processing risks across internal systems. The candidate will possess expert knowledge of data protection law and practices, along with an understanding of Cognizant’s infrastructure, technology, and organizational structure. In this role, a risk-based approach to data protection should be taken and they will be the primary point of contact for Corporate Security with regard to potential complaints, queries, notices, and other notification requirements. Overall, an ideal candidate will possess a combination of legal knowledge, technical background, and communication skills, along with a strong sense of credibility, integrity, and independence. Job Responsibilities General Compliance Inform and advise Corporate Security, including staff who process personal data, of their obligations as per data protection provisions. The candidate will provide recommendations about the interpretation and application of all relevant data protection rules. Provide support to GDPR Program and other local data protection provisions and policies in relation to the protection of personal data. Inform Corporate Security of any failure to comply with the applicable data protection rules. Conduct data audits to ensure compliance and address potential issues proactively. Oversee implementation of compliance tools. Develop process to conduct due diligence to ensure information shared with partners/suppliers is in alignment with all requirements, protocols, and codes pertaining to personal data. Maintain comprehensive records for all data processing activities conducted by the company (such as with a Record of Processing), including the purpose of all processing activities, which may be shared on request. Documentation Develop, review, and update new and existing documentation, including privacy policies, security policies, cookie policies, retention schedule, subject access requests, and others. Develop and integrate incident, breach, and data loss management and notification processes into the general incident response process. Author technical data protection standards relating to cryptography methods and encryption solutions as needed. Risk Maintain a risk assessment process for personal data, including providing advice on performing data protection impact assessments (DPIA) and monitoring continued performance. Report into existing Corporate Security Risk Register of processing operations within Cognizant and notify managers regarding the specific risks, as necessary. Serve as the SME and “go-to” individual for all data protection, masking, encryption, obfuscation, tokenization efforts across Cognizant developed applications, services, and environments. Communication Act as the point of contact between regulators. Facilitate communications with data subjects regarding the use of their data, their rights to have their personal data erased, and the measures that Cognizant has implemented to protect their personal data. Handle queries, complaints, and other communication on request by the controller, vendors, customers, and other person(s). Job Requirements Formal Education and Certifications University degree in computer science, computer privacy/law, or computer engineering, and/or equivalent work experience in privacy law, auditing, or related. Certifications in privacy, such as Certified Information Privacy Professional (CIPP/E, CIPP/US, or CIPP/C), Certified Information Privacy Manager (CIPM), or similar. Industry Certifications such as a Certified Information Systems Security Professional (CISSP) would be an asset. Knowledge And Experience Proven expert knowledge of data protection law and practices Strong knowledge of privacy laws, security frameworks and compliance regulations globally (i.e. GDPR, NIST 800, ISO/IEC 27002, HI {AA, PCI, SOX, HITRUST) Experience interpreting complicated and/or ambiguous regulatory requirements into understandable and actionable requirements for the organization and staff. Deep understanding of encryption methods across applications and supporting application infrastructure (i.e. databases). Knowledge of encryption technologies across private and public cloud as well as common vendors who provide encryption, tokenization and/or data protection solutions. Direct experience with building,and leading a global data protection discipline and team from the ground up. Expertise with encryption SDK architectures and implementation of such SDK’s within applications. Familiarity with common encryption algorithms and key management protocols and practice Experience providing guidance on privacy and security risk assessments, countermeasures, and data protection impact assessments. Well versed in the discipline of Identity & Access Management with specific expertise focused on access controls Demonstrated leadership skills, project management experience, and delegation skills, while working with a diverse set of stakeholders and varied projects. Experience working with board-level executives and other experienced personnel who may or may not understand the complexities of data protection. Experience in developing legal and technical training, as well as awareness distributing material, to ensure staff and data subjects are aware of their rights and responsibilities. Demonstrated diplomatic and negotiation skills to deal with DPAs and other regulators. Experience implementing and managing compliance tools. Strong understanding of computer systems, databases, and how personal data is stored and processed. Excellent understanding of Cognizant’s goals and objectives.

Posted 2 weeks ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

Data Quality Engineer JD Collaborate with product, engineering, and customer teams to gather requirements and develop a comprehensive data quality strategy Lead data governance processes, including data preparation, obfuscation, integration, slicing, and quality control Test data pipelines, ETL processes, APIs, and system performance to ensure reliability and accuracy Prepare test data sets, conduct data profiling, and perform benchmarking to identify inconsistencies or inefficiencies Create and implement strategies to verify the quality of data products and ensure alignment with business standards Set up data quality environments and applications in compliance with defined standards, contributing to CI/CD process improvements Participate in the design and maintenance of data platforms and build automation frameworks for data quality testing, including resolving potential issues Provide support in troubleshooting data-related issues, ensuring timely resolution Ensure all data quality processes and tools align with organizational goals and industry best practices Collaborate with stakeholders to enhance data platforms and optimize data quality workflows Requirements Bachelor’s degree in Computer Science or a related technical field involving coding, such as physics or mathematics At least three years of hands-on experience in Data Management, Data Quality verification, Data Governance, or Data Integration Strong understanding of data pipelines, Data Lakes, and ETL testing methodologies Proficiency in CI/CD principles and their application in data processing Comprehensive knowledge of SQL, including aggregation and window functions Experience in scripting with Python or similar programming languages Databricks and snowflake experience is must . Good exposure to notebook ,sql editor etc Experience in developing test automation frameworks for data quality assurance Familiarity with Big Data principles and their application in modern data systems Experience in data analysis and requirements validation, including gathering and interpreting business needs Experience in maintaining QA environments to ensure smooth testing and deployment processes Hands-on experience in Test Planning, Test Case design, and Test Result Reporting in data projects Strong analytical skills, with the ability to approach problems methodically and communicate solutions effectively English proficiency at B2 level or higher, with excellent verbal and written communication skills Nice to have Familiarity with advanced data visualization tools to enhance reporting and insights Experience in working with distributed data systems and frameworks like hadoop

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

India

On-site

Acronis is revolutionizing cyber protection—providing natively integrated, all-in-one solutions that monitor, control, and protect the data that businesses and lives depend on. We are looking for a TRU Researcher to join our mission to create a #CyberFit future and protect all data, applications and systems across any environment. We are seeking a skilled and driven Threat Researcher to join Acronis’ Threat Research Unit. This exciting opportunity offers you the chance to play a key role in proactively defending Acronis customers against evolving cyber threats. As part of our expert team, you will engage in cutting-edge research and collaborate on high-profile security incidents. What You’ll Do Conduct in-depth research and actively hunt for both emerging and existing cyber threats, attack techniques, and malware. Generate original research leads through exploratory data analysis, pivoting on indicators, and investigating anomalous or low-prevalence activity patterns. Develop automation tools to gather malware and threat intelligence data from diverse sources such as product telemetry, the Dark Web, and honeypots. Manage and populate threat intelligence databases with the data collected. Track and attribute emerging TTPs and campaigns across malware families, threat actors, and regions. Perform reverse engineering of malware and identify novel obfuscation, packer, and C2 techniques to enrich intelligence feeds and produce unique detection content. Lead the production of actionable threat intelligence tailored to internal detection teams, external partners, and public-facing reports. Maintain, expand, and enrich Acronis’ internal threat intelligence platforms and hunting capabilities, including malware collection pipelines, dark web scrapers, and honeypot networks. Represent Acronis in the threat intelligence community: publish cutting-edge research, participate in coordinated disclosures, and present findings at leading industry conferences. What You Bring A minimum of 3 years experience in threat intelligence, threat hunting, or malware research roles with demonstrable hands-on investigations. In-depth understanding of the threat landscape, MITRE ATT&CK, malware TTP tracking, and actor profiling. Proficiency in static and dynamic malware analysis, as well as reverse engineering using tools such as IDA Pro and Ghidra. Solid knowledge of the TCP/IP network stack, with experience using network analysis tools like Suricata, Zeek, and Wireshark. Strong understanding of Windows and Linux operating systems, including their architecture and internals. Excellent analytical, problem-solving, and critical thinking abilities. Strong written and verbal communication skills, with the ability to present complex technical information to both technical and non-technical audiences. Proficiency in English. Preferred Qualifications Hands-on experience developing custom threat hunting or enrichment tools in Python, Go, or similar languages. Experience discovering new malware variants or infrastructure through passive DNS, WHOIS, TLS certificate analysis, or OSINT. Working knowledge of Chinese languages is a plus. Who We Are Acronis is a global cyber protection company that provides natively integrated cybersecurity, data protection, and endpoint management for managed service providers (MSPs), small and medium businesses (SMBs), enterprise IT departments and home users. Our all-in-one solutions are highly efficient and designed to identify, prevent, detect, respond, remediate, and recover from modern cyberthreats with minimal downtime, ensuring data integrity and business continuity. We offer the most comprehensive security solution on the market for MSPs with our unique ability to meet the needs of diverse and distributed IT environments. A Swiss company founded in Singapore in 2003, Acronis offers over twenty years of innovation with 15 offices worldwide and more than 1800 employees in 50+ countries. Acronis Cyber Protect is available in 26 languages in 150 countries and is used by over 20,000 service providers to protect over 750,000 businesses. Our corporate culture is focused on making a positive impact on the lives of each employee and the communities we serve. Mutual trust, respect and belief that we can contribute to the world everyday are the cornerstones of our team. Each member of our “A-Team” plays an instrumental role in driving the success of our innovative and expanding business. We seek individuals who excel in dynamic, global environments and have a never give up attitude, contributing to our collective growth and impact. Acronis is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, marital status, national origin, physical or mental disability, medical condition, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, gender identity or expression, or any other characteristic protected by applicable laws, regulations and ordinances.

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Job Title: Offensive Security Specialist (Red Team) Department: Red Team Unit Location: Qatar Job Type: Full-Time | Onsite Only Reports To: Red Team Manager Position Overview: We are seeking a highly qualified Red Team Offensive Security Specialist to join the cybersecurity unit of a customer. This role demands exceptional technical acumen in cyber offense, deep familiarity with adversarial tactics, and a commitment to confidentiality, precision, and resilience. You will be part of a strategic capability performing adversary emulation and cyber-attack simulations. Key Responsibilities: 1. Red Team Operations & Attack Simulation Design and execute full-scope adversary emulation campaigns against internal systems, networks, and identified assets Simulate advanced persistent threats (APTs), insider threats, and targeted attack scenarios using TTPs derived from real-world intelligence Conduct physical and cyber infiltration testing of sensitive networks and secure zones (where authorized) 2. Threat Emulation and Nation-State Tactics Emulate the tactics, techniques, and procedures of known hostile foreign actors and cyber warfare units Integrate threat intelligence feeds to align Red Team exercises with evolving global threat landscapes Execute covert testing (assumed breach, initial access, lateral movement, and exfiltration) without disrupting services 3. Advanced Tooling and Exploitation Customize and develop zero-day exploitation chains, payloads, and implants Maintain and operate stealth C2 frameworks (e.g., Cobalt Strike, Sliver, Mythic, Empire) Bypass defense-in-depth controls such as SIEM, EDR, NDR, hardened OS environments, and advanced firewalls 4. Technical Reporting and Strategic Advisory Deliver detailed technical debriefs and executive-level threat simulation reports Collaborate with Blue Team, SOC, and CTI teams to test and tune detection rules and response playbooks Recommend enhancements to cyber defense posture based on operational findings 5. Confidentiality and Operational Discipline Work in a high-security, with strict operational protocols Handle classified data with absolute discretion and compliance to national laws Follow secure coding, storage, and usage procedures for Red Team tooling Preferred Skills and Experience: Minimum 5+ years in offensive security / Red Teaming, Expert knowledge in: Offensive Windows & Linux security Advanced network pivoting, traffic obfuscation, and lateral movement Active Directory abuse, Kerberos attacks, and credential theft Binary exploitation, shellcode development, AV/EDR evasion Fluency with frameworks such as MITRE ATT&CK, D3FEND, Cyber Kill Chain Strong scripting and tooling development skills (Python, PowerShell, Bash, Go, or C++) Experience operating in air-gapped and sensitive environments Preferred Qualifications: Bachelors Degree or equivalent Certifications: OSCP, OSEP, CRTO II, OSCE3, GPEN, GXPN, GCPN Prior experience in: Critical infrastructure (SCADA/ICS) Red Teaming will be an advantage OPSEC procedures and classified engagement protocols

Posted 2 weeks ago

Apply

8.0 - 10.0 years

10 - 15 Lacs

Pune

Work from Office

Implement and manage data masking, tokenization, and encryption solutions to protect sensitive information. Utilize SecuPi as the preferred tool for data security operations. Evaluate alternate tools such as Immuta, Okera, Voltage Secure Data, and Fortanix when necessary. Collaborate with cross-functional teams to ensure data security measures are aligned with business requirements. Stay updated with the latest trends and best practices in data security. Ability to communicate effectively with other teams. Mandatory Skills: Data Obfuscation. Experience: 8-10 Years.

Posted 2 weeks ago

Apply

8.0 - 11.0 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Dear Candidate, We are hiring a Test Data Engineer to create, manage, and automate test datasets. Key Responsibilities: Generate synthetic data for testing environments. Ensure privacy and compliance in data provisioning. Automate data refresh and rollback workflows. Required Skills & Qualifications: Experience with SQL, scripting, and data masking tools. Familiar with data privacy regulations (GDPR). Knowledge of CI/CD integration. Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies

Posted 2 weeks ago

Apply

0 years

1 - 3 Lacs

Ghaziabad

Remote

Company Overview We are an innovative company developing license-based AI vision software for industrial automation and robotics, deployed on edge devices like the ARM64 boards. Our solutions leverage state-of-the-art object detection models (e.g., YOLOv8) to deliver cutting-edge vision capabilities for industries such as manufacturing, logistics, and robotics. Job Summary We are seeking a motivated .NET Developer Intern with full-stack development skills and an interest in AI vision software for industrial applications. The intern will contribute to the development, deployment, and licensing of AI vision software running on ARM64 boards, focusing on object detection using models like YOLOv8. The role involves building secure, license-protected applications using C#/.NET, integrating with Python-based AI models, and ensuring compatibility with Linux and ARM64 architectures. Responsibilities Develop full-stack applications using C#/.NET (ASP.NET Core, Blazor, or WPF) for AI vision software, including web-based dashboards and APIs for industrial use cases. Implement and integrate license-based software locking mechanisms (e.g., hardware-tied, time-based, or feature-based licenses) using .NET libraries like Portable.Licensing or similar tools. Collaborate with the AI team to integrate YOLOv8 object detection models (developed in Python) into .NET applications using ONNX Runtime or ML.NET for inference on ARM64. Optimize software for deployment on Linux-based ARM64 platforms, ensuring compatibility with ARM64. Assist in developing user interfaces for industrial vision applications, ensuring seamless interaction with object detection outputs. Write clean, maintainable, and well-documented code following best practices. Participate in testing, debugging, and performance optimization of AI vision software. Stay updated on industry trends in industrial vision and robotics, including advancements from companies like SICK AG, Cognex, and AI vision startups. Required Qualifications Education : Pursuing a Bachelor’s/Master’s degree in Computer Science, Software Engineering, or a related field. Programming Skills : Proficiency in C# and .NET (preferably .NET Core/.NET 5/6/7) for full-stack development. Experience with Python for AI model integration (e.g., PyTorch, YOLOv8). Familiarity with web development technologies (HTML, CSS, JavaScript, Blazor, or ASP.NET Core). AI Vision Knowledge : Basic understanding of computer vision concepts (e.g., object detection, image processing) and familiarity with models like YOLOv8. Licensing Knowledge : Understanding of software licensing mechanisms (e.g., hardware-based, time-based) and experience with cryptographic libraries (e.g., System.Security.Cryptography in .NET or Python’s cryptography). Linux and ARM64 : Basic knowledge of Linux environments and ARM64 architecture, particularly for deploying software on NVIDIA ecosystem. Problem-Solving : Strong analytical and problem-solving skills with a keen attention to detail. Teamwork : Ability to work collaboratively in a fast-paced, cross-functional team environment. Good-to-Have Qualifications Experience with C++ for performance-critical tasks, such as optimizing YOLOv8 inference with NVIDIA TensorRT or OpenCV. Familiarity with NVIDIA’s ecosystem (e.g., JetPack SDK, DeepStream, TensorRT) for AI vision deployment. Knowledge of computer vision libraries like OpenCV or EmguCV. Experience with cloud platforms (e.g., Azure, AWS) for license management or data integration. Understanding of industrial vision and robotics applications. Exposure to software obfuscation tools (e.g., Dotfuscator, Pyarmor) for protecting license-based software. Why Join Us? Gain hands-on experience in developing cutting-edge AI vision software for industrial applications. Work on real-world projects involving YOLOv8, ARM64, and license-based software solutions. Collaborate with a team of experts in AI, computer vision, and industrial automation. Opportunity to learn from industry trends, including those set by leaders like SICK AG, Cognex, and innovative startups. Flexible work environment with opportunities for growth and learning. Job Types: Full-time, Part-time, Permanent, Fresher, Internship, Volunteer Pay: ₹8,393.49 - ₹25,634.39 per month Benefits: Paid sick time Work from home Location Type: In-person Schedule: Day shift Evening shift Monday to Friday Rotational shift Work Location: In person Speak with the employer +91 8448116056

Posted 3 weeks ago

Apply

4.0 years

10 - 15 Lacs

Hyderabad, Telangana, India

On-site

Job Title: Android Developer Experience: 4+ Years Shift Timing: 12 PM – 10 PM IST Work Mode: Hybrid (Specify days onsite, e.g., 2–3 days/week in office) Work Locations: Hyderabad, Bangalore, Noida Base Location: Noida Employment Type: Full-Time Job Summary We are seeking a talented and experienced Android Developer with a minimum of 4 years of experience to join our mobile engineering team. The ideal candidate will have a deep understanding of modern Android development tools and practices, with hands-on experience in Clean Architecture, Jetpack Compose, Kotlin, Dependency Injection, and Coroutines. The role also requires knowledge of secure app development, networking, and writing unit tests to ensure high code quality and performance. This position offers a hybrid work model with a base location in Noida and flexibility to work from offices in Hyderabad, Bangalore, or Noida. Key Responsibilities Design and develop advanced Android applications using Jetpack Compose and Kotlin. Implement scalable and maintainable code using Clean Architecture and MVVM/MVI. Integrate Dependency Injection frameworks such as Dagger or Hilt. Handle background tasks and data flow using Kotlin Coroutines and Flow. Build robust networking modules using libraries like Retrofit/OkHttp. Write comprehensive unit test cases and maintain high code coverage using JUnit/Mockito. Implement best practices to enhance app security (e.g., secure storage, obfuscation, secure APIs). Participate in code reviews, debugging, and performance optimization. Collaborate with cross-functional teams to define, design, and ship new features. Primary Skills Languages & Frameworks: Kotlin, Jetpack Compose Architecture: Clean Architecture, MVVM Asynchronous Programming: Kotlin Coroutines, Flow Dependency Injection: Dagger/Hilt Networking: Retrofit, OkHttp Testing: JUnit, Mockito, Espresso Security: Android Keystore, ProGuard, encryption techniques Secondary Skills Knowledge of Android Jetpack libraries, Room DB CI/CD exposure, Crashlytics, Analytics integration Familiarity with Play Store compliance and publishing process Preferred Qualifications Bachelor’s degree in Computer Science, Engineering, or related field Proven experience in shipping apps with significant user base Excellent problem-solving and debugging skills Strong communication and interpersonal abilities Skills: dependency injection,retrofit,mockito,junit,mvvm,dagger,android keystore,okhttp,jetpack compose,kotlin coroutines,clean architecture,proguard,flow,hilt,kotlin,espresso

Posted 3 weeks ago

Apply
Page 1 of 3
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies