Home
Jobs

103 Pci Jobs - Page 2

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

13 - 17 Lacs

Noida

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Infrastructure Security Vulnerability Management Operations Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:-Qualys Platform Ownership & Optimization:Act as the Qualys SME, leading the end-to-end lifecycle of vulnerability management using Qualys, including scanner appliance deployment, asset tagging, scan scheduling, and template creation.Configure and manage Qualys Global AssetView, Cloud Agents, and Scanner Appliances (physical and virtual) for internal, external, and authenticated scans.Develop and fine-tune custom scan templates to reduce false positives/negatives, tailored to OS, application stack, and business unit needs.Leverage Qualys Tagging, Dynamic Asset Groups, and Query Language (QQL) to segment, track, and report on assets across on-prem, cloud, and hybrid environments.Vulnerability Lifecycle Management:Analyze vulnerability data, correlate with threat intelligence, and provide risk-prioritized remediation plans to infrastructure, cloud, and devops teams.Build automated ticketing workflows with platforms like ServiceNow, integrating Qualys findings directly into change management processes.Design and deliver actionable dashboards and reports for different audiences (CISO, IT Ops, Audit, DevSecOps).Policy Compliance & Governance:Implement and manage Qualys Policy Compliance (PC) for baseline configuration and hardening checks aligned with CIS, NIST, ISO, and custom policies.Collaborate with GRC teams to support audits, compliance initiatives, and regulatory mandates (e.g., PCI-DSS, HIPAA, SOX).Strategic & Technical Leadership:Work cross-functionally to evangelize vulnerability management best practices, educate stakeholders, and shift security left in development and operations lifecycles.Identify opportunities to automate manual processes through APIs, scripting (Python, Bash, PowerShell), and integrations with DevOps tools.Stay ahead of new Qualys features/releases and coordinate their controlled rollout across environments.________________________________________ Professional & Technical Skills: - Must To Have Skills: Proficiency in Infrastructure Security Vulnerability Management Operations- Strong understanding of cloud security principles- Experience with security architecture design- Knowledge of security compliance standards- Hands-on experience with security tools and technologies Additional Information:- The candidate should have a minimum of 5 years of experience in Infrastructure Security Vulnerability Management Operations.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

5.0 - 10.0 years

13 - 17 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Data Loss Prevention (DLP) Good to have skills : Microsoft Data SecurityMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:-Specific experience in Microsoft DLP-Lead the design, implementation, and management of Microsoft Purview across the enterprise.-Define and enforce data governance policies, including data classification, labeling, retention, and loss prevention.-Configure and manage Microsoft Purview components such as:-Data Map & Data Catalog-Information Protection & Sensitivity Labels-Data Loss Prevention (DLP) policies-Communication Compliance-Compliance Manager-Collaborate with IT, security, legal, and compliance teams to align Purview configurations with business and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS).-Conduct data discovery, mapping, and lineage tracking across on-prem and cloud platforms using Purview tools.-Integrate Purview with Microsoft 365, Azure, and third-party data sources for unified data governance.-Monitor and report on compliance scores, risks, and policy violations.-Provide training and documentation to internal teams on Microsoft Purview features and best practices.-Stay updated on Microsoft Purview roadmap and recommend enhancements accordingly. Professional & Technical Skills: - Must To Have Skills: Proficiency in Microsoft Data Loss Prevention (DLP)- Strong understanding of cloud security frameworks- Experience in implementing Microsoft Data Security- Knowledge of data encryption techniques- Familiarity with security compliance standards910 years of overall experience in Cybersecurity, Information Governance, or IT Risk & Compliance.Minimum 3 years of hands-on experience with Microsoft Purview.Strong understanding of data protection regulations and frameworks (GDPR, HIPAA, CCPA, ISO 27001, etc.).Experience with Microsoft 365 Compliance Center, Azure Purview, or similar governance tools.Proficient in implementing DLP policies, information protection labels, and auto-labeling. Additional Information:- The candidate should have a minimum of 5 years of experience in Data Loss Prevention (DLP)- This position is based at our Gurugram office- A 15 years full time education is required Qualification 15 years full time education

Posted 2 weeks ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Google Chronicle SIEM Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :The SIEM SME leads in architectural design, specification, and maintenance of Splunk/Google Chronicle Security products and services.Candidates must have backgrounds in network planning and design, implementation, and operations. SIEM SMEs apply business and technology skills with structured methodologies to deliver complex solutions to the customer. Roles & ResponsibilitiesAnalyze potential infrastructure security incidents to determine if incident qualifies as a legitimate security breachPerform network incident investigations, determining the cause of the security incident and preserving evidence for potential legal actionInterface with technical personnel and others teams as requiredMake recommendations on the appropriate corrective action for incidentsConfigure and manage Infrastructure Security and SIEM solutions.Design, develop and create correlation rules within the Security Information and Event Management (SIEM) platformMonitor devices and correlation tools for potential threatsInitiate escalation procedure to counteract potential threats/vulnerabilitiesExperience building and maintain security incident correlation content (hands-on)Experience with reverse engineering tools and techniques as it pertains to network traffic collection and analysisOperational knowledge of system and network security engineering best practices and architectureWillingness to engage hands-on from inception to complete and audit to SIEMs deploymentProvide guidance and insight, as well as follow directives as necessary to complete accelerated deployment of the SIEMsCapable and willing to integrate multiple security control production into the SIEMs platformAppropriately inform and advise management on incidents and incident preventionEncourages and implements continuous improvement measures on day-to-day basisLeverages extensive knowledge of communications in a manner that provides business value to the IT OrganizationRequired to identify, assess, and resolve complex issues/problems within own area of responsibilityProvide Incident remediation and prevention documentationDocument and conform to processes related to security monitoringParticipate in knowledge sharing with other analysts and develop solutions efficientlyCoordinate or participate in individual or team projectsWrite technical articles for internal knowledge baseProvide performance metrics as necessaryDevelop and optimize technical processes and coordinate procedure documentation. Professional & Technical Skills: Must have working experience in Google Chronicle SIEM/SOAR as SME. At least 8+ years of experience in Information Security, Risk Management, Infrastructure Security and ComplianceSecurity device installations, configuration and troubleshooting (e.g., firewall, IDS, etc.)Hands on experience in supporting AWS and Azure Assets, especially supporting Splunk deployment in AWS/Splunk ES as a serviceExperience in deploying different type of forwarders and AppsDeep knowledge in AWS services and serverless architectureExpertise in UNIX, Linux, and Windows - able to tear down and rebuild a host systemExperience with Database installation and configuration is required and Oracle experience is a plusExploit and detection analysis skills, including ability to analyze logs for useful information and patternsInstall, configure, tune, and maintain the Splunk SIEM componentsPrimarily focus on content creation regarding advanced threat analysis (rules, variables, trending, watch lists, etc) of incoming data and for self-monitoring of the solution itself.Perform supporting tasks such as system hardening, high availability configurations, and developing backup strategies.Assist with the creation of detailed deployments plans, architectural drawings and operation manuals.Assist with event source auditing configurations, integration with various security platforms, network devices, and systemsExpert in development of Regular Expression (REGEX)Good understanding of Infrastructure Security and its impact on Security Operations, Vulnerabilities, Reporting, Analytics and Monitoring.Good understanding and experiences with Infrastructure Security, Risk assessment and Security Information and Event Management.A solid understanding of frameworks such as ISO 27001/27002, COBIT, and other relevant compliance such PCI, HIPAA, SOX, FISMA, and others those are required for Security Information and Event Management. Experience working in a diversified, virtual environment.Administrational tool development and maintenance.Desirable to have some certifications such as CISSP, ITIL, CISA, CISM and GIAC-GCIADesirable to have some advanced Certification from SIEM vendor on products such as HP ArcSight or RSA envision. Additional InformationBachelors and above degree in Computer Science, Information & Technology, MIS, Engineering. Qualification 15 years full time education

Posted 2 weeks ago

Apply

2.0 - 5.0 years

8 - 14 Lacs

Mumbai

Work from Office

Naukri logo

Permanent opportunity with an RBI-licensed FinTech company for professionals with 2-5 years of experience in GRC, InfoSec, or Compliance.Requires expertise in PCI DSS, ISO 27001, SOC 2, GDPR, RBI guidelines, & experience in audits & risk assessments.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security professional, you will have the opportunity to work on multiple projects that help organizations manage and mitigate risk and maximize enterprise value. In this role, ensuring it meets the business requirements and performance goals. You have to closely work with Project Architect to implement the solution as well as Create and update all supporting documentation for security solutions, Configure and optimize policies to enforce security and compliance standards, follow all security best practices while implementing security solutions. Roles & Responsibility -Create and update all supporting documentation for security solutions, Configure and optimize policies to enforce security and compliance standards.-Follow all security best practices while implementing security solutions.-Responsible for team decisions.-Engage with multiple teams and contribute on key decisions.-Provide solutions to problems for their immediate team and across multiple teams.-Develop and implement security policies and procedures.-Stay updated on the latest security trends and technologies. Professional & Technical Skills:-Design and implementation in Zscaler SASE along with NGFW (PA/Prisma / Zscaler) Web Security (, Symantec), in on-prem and Cloud, End point protection, Data center migrationExperience in Zscaler SASE / Prisma Access SASE / Zscaler SASE / Netskope / Palo Alto/Cisco ASA/ Fortinet firewall / Cloudflare WAF / Email Security-Zscaler SASE cloud-Experience in designing infra security technology products (Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), Zscaler Digital experience (ZDX), deployment of Branch connector & Cloud connector, Remote browser isolation.-In-depth understanding on IPsec VPNs, Global Protect VPNs, Security Profiles, Firewall implementation-Good understanding on cloud providers like AWS, Azure D Basic Knowledge on Operating Systems Windows, Unix, Linux-Build, Design & configuration of various NGFW such as Palo Alto, FortiGate, Checkpoint, Cisco, Prisma Cloud.-Hand-on experience in Azure/AWS-Good Hands-on experience and troubleshooting experience in NGFW such as Palo Alto, Prisma, FortiGate, Checkpoint, Cisco.-Design and hands on experience to skybox, firemon, Tufin Firewall rule review tool, Firewall on-boarding-Checkpoint, Cisco, Palo alto Certification, Cloud certification-Experience on Infra Security tools Assessment and security standards like (NIST, CIS, ISO HIPPA & PCI DSS)NAC, Cisco ISE, Web security technologies as Zscaler, SymantecGood conceptual and working knowledge around Workflow, Approval process. Additional Information:-B.E or MCA or M.Sc with Good Computer Science Background with good academic records-15 years full time education is required. The candidate should have a minimum of 9 years of experience in SASE Tecnologies. Qualifications 15 years full time education

Posted 2 weeks ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security professional, you will have the opportunity to work on multiple projects that help organizations manage and mitigate risk and maximize enterprise value. In this role, ensuring it meets the business requirements and performance goals. You have to closely work with Project Architect to implement the solution as well as Create and update all supporting documentation for security solutions, Configure and optimize policies to enforce security and compliance standards, follow all security best practices while implementing security solutions. Roles & Responsibility -Create and update all supporting documentation for security solutions, Configure and optimize policies to enforce security and compliance standards.-Follow all security best practices while implementing security solutions.-Responsible for team decisions.-Engage with multiple teams and contribute on key decisions.-Provide solutions to problems for their immediate team and across multiple teams.-Develop and implement security policies and procedures.-Stay updated on the latest security trends and technologies. Professional & Technical Skills: -Design and implementation in Zscaler SASE along with NGFW (PA/Prisma / Zscaler) Web Security (, Symantec), in on-prem and Cloud, End point protection, Data center migrationExperience in Zscaler SASE / Prisma Access SASE / Zscaler SASE / Netskope / Palo Alto/Cisco ASA/ Fortinet firewall / Cloudflare WAF / Email Security-Zscaler SASE cloud-Experience in designing infra security technology products (Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), Zscaler Digital experience (ZDX), deployment of Branch connector & Cloud connector, Remote browser isolation.-In-depth understanding on IPsec VPNs, Global Protect VPNs, Security Profiles, Firewall implementation-Good understanding on cloud providers like AWS, Azure D Basic Knowledge on Operating Systems Windows, Unix, Linux-Build, Design & configuration of various NGFW such as Palo Alto, FortiGate, Checkpoint, Cisco, Prisma Cloud.-Hand-on experience in Azure/AWS-Good Hands-on experience and troubleshooting experience in NGFW such as Palo Alto, Prisma, FortiGate, Checkpoint, Cisco.-Design and hands on experience to skybox, firemon, Tufin Firewall rule review tool, Firewall on-boarding-Checkpoint, Cisco, Palo alto Certification, Cloud certification-Experience on Infra Security tools Assessment and security standards like (NIST, CIS, ISO HIPPA & PCI DSS)NAC, Cisco ISE, Web security technologies as Zscaler, SymantecGood conceptual and working knowledge around Workflow, Approval process. Additional Information:-B.E or MCA or M.Sc with Good Computer Science Background with good academic records-15 years full time education is required.- The candidate should have a minimum of 9 years of experience in SASE Tecnologies. Qualification 15 years full time education

Posted 2 weeks ago

Apply

2.0 - 5.0 years

3 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

As a Functional verification engineer, you will be working on IBM server processors/SOC or ASICs used in IBM servers. Develop the verification environment and test bench and creating testcases. Debug fails using waveform, trace tools and debug RTL code Develop skills in IBM Functional verification tools and methodologies. Work with design as well as other key stakeholders in resolving/debugging logic design issues and deliver a quality design Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 5 + years of experience in Functional Verification of Processors or ASICs. Minimum 3+ years of experience in any of the following Computer architecture knowledge, Processor core design specifications, instruction set architecture and logic verification. Multi-processor cache coherency, Memory subsystem, IO subsystem knowledge, any of the protocols like PCIE/CXL, DDR, Flash, Ethernet etc Knowledge of functional verification methodology - UVM/OVM/System Verilog/SystemC/ Knowledge of HDLs (Verilog, VHDL) Good object-oriented programming skills in C/C++, and any of scripting languages like Python/Perl Development experience on Linux/Unix environments and in GIT repositories and basic understanding of Continues Integration and DevOps workflow Exposure in developing testbench environment, write complex test scenario, debugging and triaging fails Experience in verification coverage closure Preferred technical and professional experience Verify the different functions/components in a PCI Express Controller & high speed SERDES (PHY). Scripting Expertise backed up relevant experience in the same Writing Verification test plans Functional and code coverage analysis and debug Formal verification experience

Posted 2 weeks ago

Apply

4.0 - 9.0 years

16 - 31 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Naukri logo

1.Must Have: SoC or IP 2.Experience Languages : System Verilog (must) 3.Methodologies: OVM/UVM/VMM 4.Protocols:DDR/USB/Ethernet/PCIE/Video/HDMI/MIPI/DSI/CSI 5.Processor/ARM Based SoC Verification experience 6.Candidate must have expertise in System Verilog. 7.Experience in ARM base SoC Verification 8.Strong Analytical skills desirable if having worked.

Posted 2 weeks ago

Apply

3.0 - 8.0 years

14 - 24 Lacs

Chandigarh

Work from Office

Naukri logo

Job Description Work with External Auditors as required, including facilitating interactions and documentation requests. Assist with compliance framework assessments including, but not limited to NYDFS, PCI DSS, SOC, SOX, GLBA, CIS, MTL and HIPAA. Coordinate external penetration test(s). Coordinate remediation of observations noted from Audit(s) or Gap Analyses. Conduct Internal Audits each quarter. Conduct New Product Audits. Review and edit policies as necessary, but no less than annually. Develop technical security training programs for application users, site security personnel, IT and HR staff globally. Coordinates audit activities with customers workload and schedule. Maintains the Internal Audit manual and leads updates to audit templates. Conducting investigations on irregularities and errors seen during the Audit. Conduct Table Top exercises including, but not limited to Business Continuity/Disaster Recovery and Incident Response. Update Risk Assessment(s) no less than annually. Complete internal vulnerability scans. Complete new hire training, including but not limited to KnowBe4 and BAI. Work with vendors, banks, partners as required to meet their compliance needs, including but not limited to, Questionnaires, RFPs, and Report Requests. Provide consultation and advisement to the business and project leads around compliance initiatives. Performance of other duties and responsibilities as assigned Comply with and enforce company policies and procedures Provide regular and predictable attendance considering any rights to leaves provided by law or company policy Perform all essential job functions without posing a direct threat of harm to yourself or others Effective written and verbal communication with subordinates, peers and supervisor Preferred candidate profile Demonstrate an ability to work under pressure to meet deliverables accurately and on time Excellent communication, interpersonal, organizational, time management and leadership skills Collaborate effectively with other teams within the Security and Compliance department, IT and the Organization Must be able to resolve problems on a daily basis, handle conflict and make effective decisions under pressure. Determination, Dependability, Integrity, Professionalism

Posted 3 weeks ago

Apply

1.0 - 3.0 years

4 - 9 Lacs

Chennai

Work from Office

Naukri logo

Your work profile We are currently hiring for our Internal Audit Team. In this role, you will be expected to build strong working relationships with both team members and clients, consistently aiming to exceed client expectations. Assist client in identifying and evaluating business and technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement Assist in the selection and tailoring of approaches, methods, and tools to support service offering or industry projects Facilitate use of technology-based tools or methodologies to review, design, and/or implement products and services Understand clients' business environment and basic risk management approaches Project Management : Actively participate in decision making with engagement management and seek to understand the broader impact of current decisions Play substantive/lead role and engagement planning, economics, and billing Generate innovative ideas and challenge the status quo Participate in proposal development efforts Participate in "add-on" sales to client Membership and visibility in professional & civic organizations Identify opportunities to cross-sell other services Build and nurture positive working relationships with clients with the intention to exceed client expectations Desired qualifications Certifications of CISA, CISSP, CISM, ISO27001 preferred B.E/B.Tech in Computer Science, Information Technology or related fields. Chartered Accountant and/or MBA with Finance/IT Must have 1 - 2 years of experience in the areas of IT audits, ITGC, SOX / ICFR / IFC / SAS 70 / SSAE / SOC, IT Financial Audit and Business Automated Controls, IT Risk consulting or any other regulatory / compliance audits Knowledge of ERPs like SAP / OFIN / JDE / etc and their native application controls will be preferred. Must have hands on experience on regulatory requirements / international standards (SSAE / ISAE / SOX, PCI, ISO 27001) and good practices (COSO, COBIT) relating to information security. Must have Excellent English skills, excellent presentation skills, excellent soft-skills Location and way of working. Base location: Chennai Must have 1 2 years experience This profile involves frequent travelling to client locations. Hybrid is our default way of working. Each domain has customized the hybrid approach to their unique needs. Your role as a Consultant We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Consultants across our organization must strive to be: Inspiring - Leading with integrity to build inclusion and motivation. Committed to creating purpose - Creating a sense of vision and purpose Agile - Achieving high-quality results through collaboration and Team unity Skilled at building diverse capability - Developing diverse capabilities for the future Persuasive / Influencing - Persuading and influencing stakeholders Collaborating - Partnering to build new solutions Delivering value - Showing commercial acumen Committed to expanding business - Leveraging new business opportunities Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization Effective communication Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s) Managing change - Responding to changing environment with resilience Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Client. Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviors and attitudes to become more inclusive.

Posted 3 weeks ago

Apply

10.0 - 20.0 years

30 - 45 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

Naukri logo

Looking for below - Architect/Lead ASIC designer/Lead Design verification/Lead Formal Verification/Lead Emulation/Lead Synthesis Engineer/Lead Implementation Engineer/Lead DFT Engineer/Lead Share your updated CV at jatin@smrd.in

Posted 3 weeks ago

Apply

12.0 - 18.0 years

11 - 15 Lacs

Pune

Work from Office

Naukri logo

Domain Certifications CISSP, CISA, CRISC, ISO 27001 Responsibilities Own and lead the governance program at account level for a large Financial services account with 700 + head count and multi country locations having high security Offshore Delivery Centres & Work from home teams Develop, implement and monitor Account level Information security governance program; meeting client compliance requirements proactively Perform contract reviews, cyber security risk assessments and drive compliance programs to meet contractual and organizational cyber security requirements within the client offshore delivery centres. Experience in Application security and code reviews which can be leveraged to guide and work with delivery teams on covering the cyber security risks associated with Application security, development and maintenance projects. Work closely with different teams internally like IT, business, HR, facilities, cyber security which operate at Organization level to translate client requirements and assess residual risk if required Give directions and monitor the compliance and operations activities within the account through dedicated team and work closely with account team on ensuring the compliance within account team Develop account level procedures, metrics and review programs to maintain and enhance the governance model within the account Be a single point of contact for client interactions during third party audits and liaise within the organization Prepare the account for certification and internal audit requirements based on industry standards like PCI DSS and ISO 27001 requirements Focus and objective driven to demonstrate ongoing improvements; identify early indicators of non compliance and able to draw mitigation actions Hold technical skills to participate in technical discussions for delivery centre setup, connectivity models Excellent communication skills and have demonstrated effective CXO level reviews

Posted 3 weeks ago

Apply

7.0 - 12.0 years

15 - 30 Lacs

Hyderabad

Work from Office

Naukri logo

Job Title: Embedded Linux Engineer (Multiple Skills) Location: Hyderabad Experience: 3 - 12 YearsEmployment Type: Full-TimeMode: Work from Office Job Summary: We are seeking a skilled Embedded Linux Engineer with deep expertise in virtualization technologies , platform software , and Linux kernel development . The ideal candidate will have hands-on experience working with QEMU, Yocto Project, BSPs, hypervisors , and the Linux kernel ecosystem , along with exposure to Android (AOSP) and Chrome OS platforms. You will be responsible for designing, developing, and maintaining software components across various layers including bootloader, HAL, kernel drivers , and hypervisors for embedded systems. Key Responsibilities: Develop and maintain Board Support Packages (BSPs) using the Yocto Project . Design and integrate virtualization solutions using QEMU, KVM, Xen , or other hypervisors for embedded platforms. Work with Linux kernel internals , including writing and debugging Loadable Kernel Modules (LKMs) and device drivers . Integrate and customize bootloaders (e.g., U-Boot, Coreboot) for target platforms. Collaborate with hardware teams to bring up new platforms and debug PCI , USB , I2C , and other bus interfaces. Customize and integrate AOSP/Chrome OS for custom hardware platforms. Work closely with the HAL and middleware teams to ensure proper hardware abstraction and performance optimization. Debug issues across software and hardware boundaries using tools like JTAG, GDB, printk, and ftrace. Support continuous integration pipelines and unit/system testing infrastructure. Required Skills: Strong programming experience in C/C++ and Shell scripting . In-depth understanding of Linux kernel architecture and experience with kernel driver development . Hands-on experience with QEMU , virtualization technologies, and emulation environments. Proficiency in building and customizing Yocto Project -based BSPs. Experience with bootloaders (e.g., U-Boot) and kernel bring-up on new hardware. Familiarity with PCIe , USB , and other hardware interface protocols. Working knowledge of AOSP , Chrome OS , and Android HAL layers. Strong debugging skills using hardware and software tools. Familiar with LKM , device tree , systemd , and Linux build systems. Role & responsibilities Preferred candidate profile

Posted 3 weeks ago

Apply

3.0 - 5.0 years

0 - 2 Lacs

Mumbai

Work from Office

Naukri logo

Roles & Responsibilities: Attend/resolve defects/faults observed in Systems Installation of RHEL OS, user management, network configuration, etc. Application softwares installation,System configuration as per installation procedure, Defect identification and defect resolution (DI/DR) of software issues and other maintenance related issues. Collection of data logs and any other logs (wire shark, RHEL logs) Assembly/De-assembly as per system documents or Computer based training (CBT)software Identification/Localization of hardware defects, resolution of defects as per hardware manuals Maintain logbook for all observed/reported problem and action taken to resolve the problem Skills Experience in CMS system/Command and Control system/Embedded system IEE12207 SDLC, networking, serverbased hardware etc. Overview of embedded electronics, PCI, PMC based architecture and Processors, SBC Graphic boards, LAN switches, etc. Understanding of documents like Schematics Diagrams (SDs), BDs and wire list (WL) etc. Arithmetic skills and understanding of number system Ability to work on both hardware/software as per requirement Interested and suitable candidates can forward resume to hr@gvrtechnolabs.com or Whatsapp@ 8590604770

Posted 3 weeks ago

Apply

8.0 - 13.0 years

3 - 7 Lacs

Pune, Bengaluru

Work from Office

Naukri logo

Job Title:DLP Lead Experience8-14 Years Location:Bangalore /Pune : Technical Skills: Experience in configuring s and creating workflows on Email DLP - Proofpoint Prior experience with CASB Netskope or similar solution Knowledge of security principles including cloud , standards and techniques Understanding of cloud principles ,cloud applications and key cloud service providers Prior experience with Data loss prevention tools, SIEM, network devices and other infrastructure Reviews violations of data security procedures to eliminate violations Strong experience on Mimecast email Security solution for threat Protection, Spoofing, Encryption, Archive, URL Defense Strong understanding of email delivery architecture, email gateway and DNS technologies Strong understanding of networking, SMTP, DNS Experience of compliance requirements for database security (e.g. SOX, HIPAA, PCI etc.) Strong verbal and written communications skills; must be able to effectively communicate technical details and thoughts in non-technical/general terminology to various levels of the organization. Work well in team environments with internal and external resources as well as work independently on tasks Strong organizational, and time management skills Process Skills: Overall management of Email DLP solution - Proofpoint Analyze blocked emails Manage CASB operations ,maintain implemented Netskope CASB solution,respond and resolve incidentsinvestigate and conduct analysis Work on email release/drop as per requests Tune/Amend email DLP policies Perform Daily DLP System Health check and publish health report Update/Add - roles modification, response rules, complex and new policies modifications Email DLP – Microsoft E4 licenses CASB –Netskope Behavioral Skills: Effective interpersonal, team building and communication skills Ability to collaborate; be able to communicate clearly and concisely both to laypeople and peers, be able to follow instructions, make a team stronger for your presence and not weaker. Ability to see the bigger picture and differing perspectives; to compromise, to balance competing priorities, and to prioritize the user. Desire for continuous improvement, of the worthy sort; always be learning and seeking improvement, avoid change aversion and excessive conservatism, equally avoid harmful perfectionism, 'not-invented-here' syndrome and damaging pursuit of the bleeding edge for its own sake. Learn things quickly, while working outside the area of expertise. Analyze a problem and realize exactly what all will be affected by even the smallest of change you make in your design Ability to communicate complex technology to no tech audience in simple and precise manner. Ownership skills. Qualification: Must have 4 Year degree (Computer Science, Information Systems or equivalent) 4+ years overall IT experience.

Posted 3 weeks ago

Apply

6.0 - 8.0 years

8 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Senior System Software Engineer Embedded Solutions (Android Systems Focus) Seeking a highly experienced Senior System Software Engineer with 6+ years of experience in embedded systems and Android-based platforms The ideal candidate will have hands-on expertise in Android BSP development, system-level programming, and device driver development Responsibilities include leading design for multiple processor platforms, coding in assembly, C, and C++, and creating detailed technical documentation Proficiency with Linux (Yocto BSP), ARM/x86 processors, and debugging tools like oscilloscopes and JTAG is essential

Posted 3 weeks ago

Apply

3 - 4 years

3 - 4 Lacs

Bengaluru

Work from Office

Naukri logo

locationsBangalore RMZ-ECO WORLDposted onPosted Yesterday time left to applyEnd DateJune 14, 2025 (28 days left to apply) job requisition idR177746 , India Job Family Group: Information Technology (IT) Worker Type: Regular Posting Start Date: May 15, 2025 Business unit: Projects and Technology Experience Level Experienced Professionals About The Role Whats the role As a Cyber Threat Prevention Advisor in the CyberDefence SecOps team, you'll join the Vulnerability team to manage and oversee vulnerability processes, ensuring they are trackable and measurable with robust tool support. Your team will lead the implementation of these processes within ServiceNow Security Operations (SecOps), establishing standard workflows and integrating them with IT service management processes executed by Line of Defence 1 within IRM. This role leverages market-standard tools and practices to streamline the architecture by reducing dependency on Collective. What youll be doing Asset Discovery: Set-up and lead adequate discovery of new Shell IT assets in Shell's legacy IT network, RES & Portfolio companies, Cloud environments and PCD and Retail environments. Ensure visibility in new areas such as Internet of Things and Cloud and investigate possibilities to keep track of IT assets. Automated Vulnerability Scanning: Maintain a portfolio of tools for automated vulnerability scanning with a focus on Business-Critical systems and systems that are available from the public Internet. Set-up regular scanning and make results available for further analytics in IRM investigation platform. Take appropriate action on vulnerabilities where required. Security Posture Reporting: Use the results from asset discovery, vulnerability scanning, penetration testing and attack simulation to provide an overview of vulnerabilities in Shell IT landscapes for different stakeholders including IRM LT and IDSO LT. Create specific reports for Business, Business Critical applications, IDSO service lines, External perimeters etc. Act as a Subject Matter Expert on implications of a vulnerability in an IT system and establishing the priority of applying security patches. Help creating prioritized overviews of Cyber vulnerabilities and putting these in a context of IT services and Business applications. Take mitigating actions coming out of identified threats or vulnerabilities either directly by the team or agree the actions with other parties in Shell. What you bring Bachelors degree in Computer Science, Information Technology, or related field 5-8 years of total experience in IT Security including at least 3-4 years of experience in Vulnerability Assessment Proficient in analysing network traffic using tools such as tcpdump or wireshark Strong experience in using open-source scanning tools such as nmap, nessus, metasploit and/or commercial tools such as Rapid7 or Qualys Knowledge in integrating Vulnerability Management into modern CI/CD Pipelines with 'shift-left' strategy Understanding of Network Security, Cloud Security, Endpoint Security, Application Security Understanding Cyber Threat Landscape and analyzing Threats from various sources. Assess new threats, rate threat per Shell ratings and collaborate with Threat team on new threat criticality Understanding of CVE id / CVSS score and metrics Familiar with application of Cybersecurity Benchmarks, NIST controls, PCI controls Lead security research proposals and Proof Of Concepts for Emerging Technologies and assessing Fit-For-Purpose Tools. Understanding of Cloud Security Posture Management (CSPM) Expertise in operating Application security tools like Rapid7 Appspider, Netsparker Knowledge on CI/CD pipeline able to understand the integration of security tools and guide the developers Understanding of Application security design and providing guidance to developers on secure design. Good understating of SAST/DAST concepts and process Knowledge of Mobile DAST scanning and vulnerabilities and remediation consultation Knowledge of Splunk, SecOps VR, basic querying and creating dashboards Additional Skills (Good to have): PCI-DSS Compliance Scan. SecOps VR Module in ServiceNow. Linux environment experience. Azure/AWS Cloud Console. Wiz.io tool knowledge. Advanced Splunk skills. What we offer You bring your skills and experience to Shell and in return you work with talented, committed people on one of the most important challenges facing our planet. Youll have the opportunity to develop the skills you need to grow in an environment where we value honesty, integrity, and respect for one another. Youll be able to balance your priorities as you become the best version of yourself. Progress as a person as we work on the energy transition together. Continuously grow the transferable skills you need to get ahead. Work at the forefront of technology, trends, and practices. Collaborate with experienced colleagues with unique expertise. Achieve your balance in a values-led culture that encourages you to be the best version of yourself. Benefit from flexible working hours, and the possibility of remote/mobile working. Perform at your best with a competitive starting salary and annual performance related salary increase our pay and benefits packages are considered to be among the best in the world. Take advantage of paid parental leave, including for non-birthing parents. Join an organisation working to become one of the most diverse and inclusive in the world. We strongly encourage applicants of all genders, ages, ethnicities, cultures, abilities, sexual orientation, and life experiences to apply. Grow as you progress through diverse career opportunities in national and international teams. Gain access to a wide range of training and development programmes. We'd like you to know that Shell has a > click here . - Shell in India Shell is a diversified energy company in India with 13,000 employees, and presence in Integrated Gas, Downstream, Power, Renewable and Upstream. Additionally, we have deep capabilities in R&D, digitalisation, and business operations. Our global strategy, Powering Progress, is designed to generate value for our shareholders, customers, and the wider society, and focuses on creating more value with less emissions. The strategy supports our purpose of providing more and cleaner energy solutions, with the aim of profitably transforming Shell into a net-zero emissions energy business by 2050. As India moves towards its target of net-zero emissions by 2070, Shell India aims to play a leading role in securing vital energy for today, while investing in, and helping to build, the energy system of the future through strategic investments in the country. Our Lubricants business serves over 50,000 consumers through a strong network of over 200 distributors, and operates an end-to-end value chain that spans conceptualization, development, and production at a world-class blending plant at Taloja. Through our 350-plus retail stations, we offer an integrated mobility experience including fuels, cafes, and convenience stores, with a prominent network of EV recharging facilities. Shell owns and operates a LNG re-gasification terminal at Hazira, Surat, with a capacity of 5 MTPA and a LNG truck-loading unit that plays a crucial role in helping meet Indias growing demand for gas across sectors. In 2022, Shell acquired Sprng Energy in a $1.55 billion deal to build an integrated energy transition business in the country. Sprng is a leading renewable energy company in India which develops and manages solar, wind, and hybrid power generation facilities and infrastructure. Our three capability centres across Bangalore and Chennai serve as a technology and innovation powerhouse for Shell globally, working as a delivery engine for core technical, digital, and finance processespioneering digital innovation and cutting-edge technologies across the energy sector. We also have strong academic partnerships and collaborations with leading universities and technology institutes to accelerate decarbonization efforts within the energy sector. We are committed to positively contributing to the communities in which we operate through programmes on STEM Education, Skilling, and Livelihood across India. We nurture and invest in startups developing initiatives focused on accelerating energy innovation through programs such as Shell E4 and Shell Eco-marathon. We also have strategic investments in new energy companies such as Husk Power, d.light, Orb Energy, and Cleantech Solar. DISCLAIMER: Please noteWe occasionally amend or withdraw Shell jobs and reserve the right to do so at any time, including prior to the advertised closing date. Before applying, you are advised to read our data protection policy. This policy describes the processing that may be associated with your personal data and informs you that your personal data may be transferred to Shell/Shell Group companies around the world. The Shell Group and its approved recruitment consultants will never ask you for a fee to process or consider your application for a career with Shell. Anyone who demands such a fee is not an authorised Shell representative and you are strongly advised to refuse any such demand. Shell is an Equal Opportunity Employer.

Posted 4 weeks ago

Apply

5 - 10 years

12 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

locationsIndia, Bangaloreposted onPosted Today job requisition idJR0275251 Job Details: About The Role : Intel is at the forefront of the wireless communication industry, offering cutting-edge products that set the standard for performance and innovation. We are seeking a highly skilled SerDes PHY System Engineer to join our team. In this pivotal role, you will be responsible for the design and development of physical layer components for high-speed SerDes systems, ensuring their performance and reliability. Key Responsibilities: SerDes PHY DesignLead the design and development of the physical layer for SerDes systems, including transmitter and receiver architectures, equalization techniques, and signal integrity. Simulation and ValidationConduct comprehensive simulations using MATLAB and Python, along with lab testing, to validate the performance and compliance of the SerDes PHY, optimizing it for high-speed data transmission. Calibration TechniquesDevelop and implement calibration methods to enhance the performance of the SerDes PHY, ensuring high-quality data transmission. CollaborationWork closely with cross-functional teams, including digital design, hardware, and software, to ensure seamless integration of the PHY layer into the overall SerDes system. DocumentationMaintain detailed and up-to-date documentation of design specifications, test plans, and results. Problem-SolvingAddress and resolve complex technical issues related to the SerDes PHY, ensuring optimal performance. Quality AssuranceImplement quality control measures and best practices to ensure the reliability and robustness of the SerDes PHY. Qualifications: Bachelor's degree in Electrical Engineering; a Master's degree in a relevant field is preferred. Minimum of 5 years of experience in wired or wireless communication systems. Proven experience and enthusiasm for lab work, collaboration, and solution development. Prior experience in DDR/PCI/GDDR7/UCI will be added advantage. Proficiency in scripting and programming languages such as C, C#, MATLAB, and Python. Experience in silicon development and SerDes technologies is advantageous. Strong problem-solving abilities and analytical skills. Self-motivated and capable of executing tasks in uncertain environments. Demonstrated leadership skills and ability to drive initiatives in a matrix organization. Job Type: Experienced Hire Shift: Shift 1 (India) Primary Location: India, Bangalore Additional Locations: Business group: The Client Computing Group (CCG) is responsible for driving business strategy and product development for Intel's PC products and platforms, spanning form factors such as notebooks, desktops, 2 in 1s, all in ones. Working with our partners across the industry, we intend to deliver purposeful computing experiences that unlock people's potential - allowing each person use our products to focus, create and connect in ways that matter most to them. As the largest business unit at Intel, CCG is investing more heavily in the PC, ramping its capabilities even more aggressively, and designing the PC experience even more deliberately, including delivering a predictable cadence of leadership products. As a result, we are able to fuel innovation across Intel, providing an important source of IP and scale, as well as help the company deliver on its purpose of enriching the lives of every person on earth. Posting Statement: All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance. Position of Trust N/A Work Model for this Role This role will be eligible for our hybrid work model which allows employees to split their time between working on-site at their assigned Intel site and off-site. *

Posted 1 month ago

Apply

- 4 years

2 - 4 Lacs

Hyderabad

Work from Office

Naukri logo

Job description Role & responsibilities Review and execute physicians' prescriptions checking their appropriateness and legality Organize the pharmacy in an efficient manner to make the identification of products easier and faster Maintain full control over delivering, stocking and labeling medicine and other products and monitor their condition to prevent expiring or deterioration Listen carefully to customers to interpret their needs and issues and offer information and advice Provide assistance other medical services such as injections, blood pressure/ temperature measurements etc. Prepare medicine when appropriate using correct dosages and material for each individual patient Keep records of patient history and of all activities regarding heavy medication Requirements and skills Proven experience as a pharmacist Thorough understanding of dosage administration and measurement, chemical compounds, medical brands etc. Outstanding knowledge of MS Office and Pharmacy information system Excellent communication skills with a customer Oriented approach Integrity and compassion Qualification-B Pharmacy Valid license -PCI Mandatory/Telangana Preffered From Hospitals/ Diagnostics LOCATION -BANJARA HILLS contact -6281426579 (Namratha) Looking for immediate joiners.

Posted 1 month ago

Apply

5 - 10 years

20 - 30 Lacs

Kochi, Kozhikode, Thiruvananthapuram

Work from Office

Naukri logo

Minimum 5+ years of extensive RPG and SQL Experience. Responsibilities Design and implement enterprise solutions based on business needs. Collaborating with IT stakeholders to define requirements and ensure secure cost-effective architectures. Required Candidate profile Lead or support project teams, guide technical decisions, and maintain current knowledge of technologies, standards, and compliance (e.g., PCI).

Posted 1 month ago

Apply

3 - 7 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

Generate compliance reports from an existing dashboard or build requirements to create a new reporting dashboard Proactively Monitor, track, and report on security compliance status across systems and processes. Analyze large datasets to identify trends, anomalies, and compliance risks. Support security audits, assessments, and certification efforts through data collection and analysis. Possess strong communication skill, collaborate with cross-functional matrix teams to drive root cause analysis, corrective actions and improvements based on data insights. Maintain and enhance compliance reporting dashboards and metrics for leadership visibility and decision making. Required education Bachelor's Degree Required technical and professional expertise Experience working with security architects and technical security teams to define and implement security processes and procedures based on industry-standard best practices and compliance requirements. Defining the requirements and validating the procedures and audit testing methodology Working with the Development teams to ensure automation of evidence collection and evidence management is always in line with compliance expectations, otherwise, identifies specific actions and owners to meet the expectations. Assisting team members in addressing highly complex security issues applicable to enterprise environment Ability to utilize project management principles to properly scope compliance work efforts by service lines, identify common areas of work, and create a measurable milestone plans across service lines to enable completion of compliance work items on time. Ability to manage multiple priority projects simultaneously under a short timeline Experience/familiar with enterprise risk management (ERM) framework, service delivery operations, software development lifecycle and be able to understand when to request and integrate risk items into compliance reporting. Experience with compliance programs such as FedRAMP/ FISMA, HIPAA, GDPR, SOC 2, PCI, NIST, ISO, ITAR, etc. Conducting regular reviews on compliance progression of systems and hosting internal audit/assessment as required to maintain compliance certifications. Ability to translate and interpret regulatory compliance requirements into technical controls Ability to understand cloud enterprise business computing operations/requirements, and effectively communicate to service lines what is expected in order to consider a work item complete. Also, will possess good understanding of networking security including security systems such as firewalls, intrusion detection, vulnerability scanning, OS patching, health-checking Diagnosing the root cause of problems and propose solutionsExamples would be failed patches, tooling issues, false positives on system tests, authentication problems. Drive and track audit, security and compliance finding remediation to closure. Experience with enterprise configuration Management database (CMDB) or IT Asset inventory Management. Understand CMDB's structure, data quality, relationships between CIs (Configuration Items), and updates. Use the CMDB for risk, audit, and compliance analysis and reporting Proficiency in SQL, Excel (advanced levelpivot tables, macros), and ServiceNow— data analytics and visualization functionalities Ability to process large datasets, identify and handle missing data, data transformation, normalization, and data quality checks. Ability to perform data analysis to discover patterns and trends to mitigate security risks and drive business results Work with stakeholders to define key metrics and KPIs; develop dashboards and reports for business users. Collaborate with database engineers, data owners, security focal, product managers, and broader metrics teams to understand data needs. Results oriented with intense focus on achieving both short and long term goals. He/she should be able to drive and execute an agenda in a fast paced, dynamic environment. Strong project management skills with ability to design visual and appealing presentations Strong collaboration, problem-solving and critical-thinking abilities. Excellent communication skills — ability to explain technical findings to non-technical audiences. Good time management, organizational skills, and ability to prioritize tasks. Curiosity and a continuous learning mindset. A highly organized with strong attention to detail, analytical and project management skills Work independently within a team focused organization. Preferred technical and professional experience Experience or familiar with cloud service models; IaaS preferred. Project management and consulting experience is a plus Experience with process automation is a plus Experience with Linux Shell, Perl or Python is a plus

Posted 1 month ago

Apply

5 - 10 years

15 - 20 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats. Do Design and develop enterprise cyber security strategy and architecture Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses Identify risks associated with business processes, operations, information security programs and technology projects Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge Identify security design gaps in existing and proposed architectures and recommend changes or enhancements Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. Provide support during technical deployment, configuration, integration and administration of security technologies Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity Provide solution of RFP’s received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture Depending on the client’s need with particular standards and technology stacks create complete RFPs Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps Evaluate and recommend solutions to integrate with overall technology ecosystem Tracks industry and application trends and relates these to planning current and future IT needs Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers Provide training to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Program Manager/Director Regular reporting & updates Infrastructure (CIS team) For infrastructure support External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming security technologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) and understanding of compliance regulatory requirement like PCI DSS, HIPAA, etc.- Expert Systems Thinking - Understanding of the Wipro system (interrelatedness, interdependencies and boundaries) and perform problem solving in a complex environment - Expert Leveraging Technology - In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect - Master Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure, ToGAF or SABSA certification- Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Managing Complexity Client centricity Technology Acumen Innovation Problem Solving approach Collaborative Working Execution Excellence Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2. Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 1 month ago

Apply

10 - 15 years

35 - 40 Lacs

Hyderabad

Work from Office

Naukri logo

The impact you will have in this role: In this role, you will be responsible for the functional and technical design of business systems; integration of business services & information security; driving industry-specific best practices & standards; understanding regulatory compliance needs; coordinating test planning & execution; providing leadership to AD teams and acting as technology liaison to all IT areas within DTCC, to the business partners, and to the industry. Leading projects, teams, code reviews are required to be able to lead by example. Your Primary Responsibilities: As an expert solutions engineer and senior software engineer, mission is to help lead our team of innovators and technologists toward crafting next-generation solutions that improve the way our business is run. Taking part in the development and deployment of Cyberark solution. Create and enforce Cyberark PAM policies and procedures, ensuring adherence to industry best practices and regulatory requirements. Develop and manage the PAM roadmap, including technology upgrades, new features, and integrations. Manage and maintain the CyberArk PAM platform, including Privileged Session Manager (PSM), Central Policy Manager (CPM), Password Vault Web Access (PVWA), and Vault. Defines and factors in performance, scalability, availability, resiliency, security, maintainability, support, testing and cost requirements when making technology selection and application design decisions. Define approaches for modernizing legacy applications including migration to public or private cloud infrastructure. Own the engineering design practices of our software development organization. Lead design reviews session. Collaborate with Infrastructure and Solution Architecture to choose efficient hosting environment. Focus on industry practices such as lose coupling of applications, standardization, APIs, reusability, concepts of isolation, extensibility, extendibility, and consistency of solutions while proposing and reviewing architectures. Identify and solve for non-functional requirements for the platform consumers. Ensures solutions adhere to security policies and standards of firm and industry. Conduct POCs for tools as seen fit for the area. **NOTE: The Primary Responsibilities of this role are not limited to the details above. ** Qualifications: Minimum of 10+ years of experience in Information Security with at least 5 years in Privileged Access Management Bachelors degree in Computer Science, Information Systems or a related field and/or equivalent experience Talents Needed for Success: Extensive experience with CyberArk PAM platform, including PSM, CPM, PVWA, and Vault. Ability to understand architectural diagrams and design Advanced understanding of privileged user life cycle management and controls around privileged access. Experience with AWS, Azure, and/or GCP IAM and PAM concepts Experience with troubleshooting issues with PAM solutions and applications. Sound understanding of regulatory requirements and standards such as GDPR, FISMA, PCI, HIPAA, SOX, FICA, etc Ability to guide teams through sophisticated issues and drive resolution for issues that arise within sophisticated and high-risk applications Ability to effectively translate technical information between vendors, IT management and other internal and external IT teams Ability to work with all levels of management to define requirements associated with PAM services, incorporating security standard processes.

Posted 1 month ago

Apply

8 - 15 years

13 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

* Responsible for functional verification involving coherent and non-coherent IP designs. * Collaborating with market leaders in High Performance Computing, Data Centre, Mobile/Client, Automotive, and IoT segments to define and develop products that meet complex verification requirements. * Architecting and building SystemVerilog UVM-based verification components, testbenches, checkers, scoreboards, and verification IPs. * Developing verification plans and driving functional coverage-driven verification closure of real designs. * Debugging and resolving issues in verification environments to ensure robust and reliable verification processes. The Impact You Will Have: * Enhancing the reliability and performance of high-performance computing and data center systems through rigorous verification processes. * Contributing to the advancement of mobile and client devices by ensuring the integrity and functionality of their verification protocols. * Driving innovation in the automotive sector by developing robust verification solutions for automotive systems. * Supporting the growth of IoT applications by providing reliable and efficient verification for IoT devices. * Collaborating with industry leaders to shape the future of system verification and contribute to technological advancements. * Ensuring the successful implementation and integration of verification IPs, thereby enhancing the overall quality of our products. What You ll Need: * B.E/B.Tech in Electrical Engineering/Electronics & Communications Engineering OR M.E/M.Tech in VLSI Design/Microelectronics with 8-15 years of relevant experience. * Hands-on experience in architecting and building System Verilog UVM-based verification components, testbenches, checkers, scoreboards, and verification IPs. * In-depth understanding of cache coherency protocols such as Protocol experience: Should have experience with Display Port/HDMI/MIPI/USB/PCI-E protocol preferably the latest specifications * Experience in creating verification plans and achieving functional coverage-driven verification closure of real designs. * Proficiency in writing scripts using Perl, Python, and Shell scripting. Who You Are: * Excellent problem-solving, debugging, and analytical skills. * Strong programming skills and familiarity with object-oriented programming concepts. * Creative and innovative mindset. * Excellent verbal and written communication skills.

Posted 1 month ago

Apply

4 - 8 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

We have a team of security compliance leaders overseeing solutions for this complex environment, collaborating with security architects and Cloud DevOps teams internally and around IBM. The security compliance leader’s role is to determine the secure operation of the all computer systems, servers, and network connections in accordance with our policies, procedures, and compliance requirements. A security compliance leader in our team will participate in some or all of the following: Providing subject matter expertise in the creation, implementation, and maintenance of appropriate enterprise programs, policies, and procedures to be compliant with all applicable regulations including ISO, SOC, HIPAA, PCI, FedRAMP/FISMA Having the ability to utilize working knowledge of information security best practices such asNIST 800 series, ISO 27000 series, GDPR, etc Interpreting standards, requirements, and their application to the enterprise Cloud environment in the most reasonable and cost-effective manner Developing, implementing, maintaining, and overseeing enforcement of security policies Collaborating with security architects and technical security teams to define and implement security processes and procedures based on industry-standard best practices and compliance requirements. Defining the requirements and validating the procedures and audit testing methodology Conducting regularly scheduled audits on systems and hosting third-party audits as required in order to maintain certifications and compliance certificates. Working with the DevOps teams to prepare ongoing client reporting, information for prospective clients, and marketing materials Providing training to teams as needed Assisting team members and internal clients in addressing highly complex security issues applicable to enterprise environment Required education Bachelor's Degree Preferred education Bachelor's Degree Required technical and professional expertise Minimum of 12 years of relevant compliance experience and cybersecurity knowledge Compliance leaders do not require dev experience, but it is an advantage. 10+ years of security compliance audit experience is a must Ability to utilize working knowledge of information security best practices such asNIST 800 series, ISO 27000 series, GDPR, etc Experience with compliance programs such as FFIEC or FedRAMP/ FISMA, HIPAA, GDPR, SOC 2, or PCI Experience in risk assessment processes, policy development, proposals, work statements, product evaluations, and delivery of technology Ability to understand enterprise business computing operations/requirements, and in particular, Cloud Ability to stand firm on issues yet be flexible and creative when working with customers to find effective solutions Ability to understand and interpret laws and regulatory requirements related to information protection, and develop and implement appropriate processes to achieve and maintain compliance and reduce risk

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies