Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
6 - 8 years
8 - 12 Lacs
Bengaluru
Work from Office
Good experience and knowledge of Windows and Linux internals. Good experience and knowledge of Windows and Linux device drivers. Extensive and real-time experience with protocols such as USB, I2C, PCI, and PCIe. Proficient in testing and debugging firmware, BIOS, and BIOS stitching using various tools (Intel tool knowledge preferred). Strong experience and knowledge of low-power, high-power, and server system boot processes. Knowledge of SOC/CPU and PCH. Proficient in system log and driver log capture and analysis. Domain knowledge: Power Management, Graphics, SR-IOV, Camera/IPU, Audio, Firmware/BIOS, Debug and Trace, DPMO, and Stress and Stability. Proficient in debugging tools such as Trace32, PythonSV, ITP, Lauterbach, XDP, and DCI for system/SOC debugging. Works in the area of Software Engineering, which encompasses the development, maintenance and optimization of software solutions/applications. 1. Applies scientific methods to analyse and solve software engineering problems. 2. He/she is responsible for the development and application of software engineering practice and knowledge, in research, design, development and maintenance. 3. His/her work requires the exercise of original thought and judgement and the ability to supervise the technical and administrative work of other software engineers. 4. The software engineer builds skills and expertise of his/her software engineering discipline to reach standard software engineer skills expectations for the applicable role, as defined in Professional Communities. 5. The software engineer collaborates and acts as team player with other software engineers and stakeholders. Job Description - Grade Specific Is fully competent in it's own area and has a deep understanding of related programming concepts software design and software development principles. Works autonomously with minimal supervision. Able to act as a key contributor in a complex environment, lead the activities of a team for software design and software development. Acts proactively to understand internal/external client needs and offers advice even when not asked. Able to assess and adapt to project issues, formulate innovative solutions, work under pressure and drive team to succeed against its technical and commercial goals. Aware of profitability needs and may manage costs for specific project/work area. Explains difficult concepts to a variety of audiences to ensure meaning is understood. Motivates other team members and creates informal networks with key contacts outside own area. Skills (competencies) Verbal Communication
Posted 2 months ago
10 - 15 years
27 - 30 Lacs
Bengaluru
Remote
Senior Android POS Developer Experience: 10+ years Salary : Upto ZAR 64,000 / month Preferred Notice Period : Within 15 Days Shift : 12:30PM to 9:30PM IST Opportunity Type: Remote Placement Type: Full Time Contract for 12 Months (*Note: This is a requirement for one of Uplers' Partners) What do you need for this opportunity Must have skills required : Android POS, Api integration, Cryptography, EMV, PCI, Java Good to have skills : Integration Testing, Payments, System Testing, Unit Testing, C++, Linux Our Hiring Partner is Looking for: Senior Android POS Developer who is passionate about their work, eager to learn and grow, and who is committed to delivering exceptional results. If you are a team player, with a positive attitude and a desire to make a difference, then we want to hear from you. Role Overview Description About Role : They are growing their POS development team and are looking for a superstar developer with deep payments and EMV domain knowledge and an understanding of cryptography. Linux experience with C++ would be an added benefit. If you have more than 10 years experience in this space, you would love the team, the work environment and the challenging and meaningful work. Roles and Responsibilities: Development of payment applications on terminals Integration from payment applications to various APIs Integration Service Development Technical specification of applications Unit, System and Integration testing of the applications Requirement and Must-Have: Understanding the payments environment with special emphasis on credit card payments and associated ecosystems Hands-on experience in creating Android POS Applications from scratch. Deep domain knowledge in payments and EMV. Understanding of cryptography Good to have Skills: Linux experience with C++ would an added benefit General: Good analytical skills A challenging and enquiring mind Attention to detail and tenacity Understanding of common software failures and faults Knowledge of the domain Knowledge of the system or application-under-test Engagement Type: Job Type: Full-time 12 months contract Location: Remote How to apply for this opportunity Register or login on our portal Click 'Apply,' upload your resume and fill in the required details. Post this click Apply Now' to submit your application. Get matched and crack a quick interview with our hiring partner. Land your global dream job and get your exciting career started! About Our Hiring Partner: Dashpay, a subsidiary of JSE-listed company Capital Appreciation, provides payment solutions for SMEs and business-to-business applications. The simplest explanation of what Dashpay offers is Debit and Credit Card accepting facilities (merchant services). We are fully MasterCard and Visa accredited and basically look to offer merchant services at lower rates than what is seen in the current market thus saving merchants money. About Uplers: Our goal is to make hiring reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant opportunities and progress in their career. We will support any grievances or challenges you may face during the engagement. You will also be assigned to a dedicated Talent Success Coach during the engagement. ( Note: There are many more opportunities apart from this on the portal. Depending on the assessments you clear, you can apply for them as well). So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!
Posted 3 months ago
5 - 9 years
13 - 17 Lacs
Hyderabad
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : Bachelors or above degree in a related field or equivalent fulltime course Summary :As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve documenting the implementation of the cloud security controls and transitioning to cloud security-managed operations using SailPoint IdentityIQ. Roles & Responsibilities: Lead the design and implementation of SailPoint IdentityIQ solutions for clients. Develop and maintain the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Collaborate with cross-functional teams to ensure the security architecture aligns with business objectives and requirements. Stay updated with the latest advancements in SailPoint IdentityIQ and cloud security, integrating innovative approaches for sustained competitive advantage. Professional & Technical Skills: Must To Have Skills:Experience in SailPoint IdentityIQ. Must To Have Skills:Strong understanding of cloud security architecture and frameworks. Good To Have Skills:Experience with cloud security-managed operations. Good To Have Skills:Experience with cloud security tools such as AWS Security Hub, Azure Security Center, or Google Cloud Security Command Center. Good To Have Skills:Experience with security compliance frameworks such as ISO 27001, SOC 2, or PCI DSS. Additional Information: The candidate should have a minimum of 5 years of experience in SailPoint IdentityIQ. The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with a proven track record of delivering impactful security solutions. This position is based at our Bengaluru office. Qualifications Bachelors or above degree in a related field or equivalent fulltime course
Posted 3 months ago
2 - 4 years
2 - 7 Lacs
Pune
Hybrid
So, what’s t he r ole all about? As a member of the Cloud Security team, a successful Cloud Security Analyst will need to be self-sufficient to collaborate effectively with multiple teams, such as Application Support, Infrastructure Operations, DevOps, Product R&D, Security teams, customers and 3 rd party auditors. This role will hold the responsibility of understanding the Cloud security policies, procedures, practices and technologies and documenting them appropriately as well as demonstrating to auditors and customers the excellent Cloud Security at NICE. A successful candidate in this role will be able to work in production cloud environments to collect and curate evidence and explain it to anyone who asks for it. Experience with Governance, Risk and Compliance (GRC) is a big plus! How will you make an impact? You will directly impact the success of the NICE cloud business by ensuring all customer and auditory security requirements are met and demonstrated. A diverse, merit-driven work environment which rewards a growth mindset and encourages innovation and continued professional development; The opportunity to work in a global, highly skilled, passionate workforce to deliver world-class service and products to market. Competitive pay and excellent benefits. Generous PTO policies. A highly focused security & compliance team which is collaborative, supportive, experienced, and driven to help everyone from the individual to enterprise to our customers realize the success for which they aim. Have you got what it takes? 2-4 years of experience with Information Security & Compliance or GRC University-level degree in InfoSec, Computer Science or other related field. knowledge with major compliance frameworks such as PCI, ISO 27001/17, SOC 2, HITRUST, GDPR. A burning curiosity to learn as much as you can about the NICE cloud environment and the services and products we offer our customers as well as the existing security infrastructure we have in place today; Excellent communications skills along to work collaboratively with security team members and operations and development teams or independently to achieve tactical and strategic security goals; Strong organization and prioritization skills; Education, training or experience with security and compliance fundamentals; Experience working with work tracking tools such as JIRA, Service Now or others. What’s in it for you? Join an ever-growing, market disrupting, global company where the teams – comprised of the best of the best – work in a fast-paced, collaborative, and creative environment! As the market leader, every day at NICE is a chance to learn and grow, and there are endless internal career opportunities across multiple roles, disciplines, domains, and locations. If you are passionate, innovative, and excited to constantly raise the bar, you may just be our next NICEr! Enjoy NICE-FLEX! At NICE, we work according to the NICE-FLEX hybrid model, which enables maximum flexibility: 2 days working from the office and 3 days of remote work, each week. Naturally, office days focus on face-to-face meetings, where teamwork and collaborative thinking generate innovation, new ideas, and a vibrant, interactive atmosphere. Requisition ID: 6561 Reporting into: Director Role Type: Individual Contributor
Posted 3 months ago
5 - 10 years
5 - 10 Lacs
Hyderabad
Work from Office
Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Senior Cloud Technical Architect is an advanced subject matter expert, responsible for designing and may be required to implement complex cloud-based solutions that meet client’s business and technical requirements. This role supports and influences sales teams by providing deep expertise in cloud computing technologies and architectures ensuring the effective design, deployment and operation of our cloud-based systems to meet client needs. What you'll be doing Key Responsibilities: Collaborates with stakeholders to understand business requirements and translate them into scalable, secure, and cost-effective cloud solutions. Viewed as a trusted technical advisor to the client and ensure technical solutions will accomplish the client's objectives. Designs and architects cloud-based systems, ensuring high availability, scalability, performance, and reliability. Provides pre-sales technical support and expertise in analyzing client requirements, in conjunction with the client’s current collaboration capabilities. Assesses existing systems and develop migration strategies to transition on-premises applications and infrastructure to the cloud. Designs integration solutions to enable seamless data flow between cloud and on-premises environments. Defines and enforces security best practices and compliance standards for cloud-based systems. Develops and maintains cloud governance frameworks, policies, and procedures. Provides guidance and support to development teams to ensure adherence to cloud architecture standards and best practices. Develops or produces the technical design document to match the solution design specifications. Working with the relevant internal stakeholders, participate or lead in scope of work determination, product pricing and RFP/RFI responses. Assists with the determination of outsourcing, product pricing and collaborates with others to develop an implementation solution. Responsible for influencing and guiding members of the Sales team and to ensure that they are equipped to close deals and maintain visibility of forecasting and sales pipeline in order to influence potential deals. Manages client proof of concept (POC) initiatives, which will require the involvement of the appropriate resources, and setup and delivery of the POC. On all assigned engagements, owns the proposed solution and transitions the build / implementation to the delivery team. Serves as a subject matter expert on cloud technologies and architectures. Collaborates with cross-functional teams, including developers, operations, and project managers, to ensure alignment of technical solutions with business objectives. Specifically relating to opportunity pursuit this role will evaluate each opportunity for alignment with organizational capabilities and business policy, prepare the executive summary that outlines all of the information gathered from the client in regard to their needs, as understood, document the proposed technology solution, document the statement of work along with all labor requirements, work with the relevant internal stakeholders to prepare the pricing format that will be supplied to the customer, perform the actual solution design and prepare a parts list outlining equipment to be provided, develop and manage a proof-of-concept as such may be required, engage all technical resources required for an accurate solution design, prepare a network diagram outlining the proposed solution, document all deliverables and what constitutes a successful completion, review the final parts list as supplied and submit all information to the applicable bid team for final assembly, verify the proposal’s accuracy and sign off on the final documents to be presented to the client, assist during the final presentation to the client as appropriate. Knowledge and Attributes: Solid client engagement skills coupled solid technical consulting aptitude. Seasoned understanding of the vendor’s products business and technology positioning. Ability to collaborate and communicate effectively with team members, contributing to their success Broad product knowledge integrated with technology understanding. Seasoned knowledge of cloud architecture patterns, including microservices, serverless computing, containers, and hybrid cloud deployments. Seasoned proficiency in cloud infrastructure technologies, such as virtual machines, storage solutions, networking, and load balancing. In-depth understanding of cloud security principles, including identity and access management, encryption, and compliance frameworks. Familiarity with IaC tools and frameworks such as Terraform, AWS CloudFormation, Azure Resource Manager, or Google Cloud Deployment Manager. Understanding cloud design patterns, microservices, serverless computing, containers, and hybrid cloud deployments. Deep knowledge such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), or other providers, understanding the specific services offered by each platform, including compute, storage, databases, networking, and security. Understanding of cloud networking concepts, including virtual networks, subnets, routing, load balancing, and firewall configurations. Knowledge of VPNs, VPC peering, and hybrid connectivity options between on-premises and cloud environments. Knowledge of identity and access management (IAM), encryption, data protection, secure network configurations, and compliance frameworks such as GDPR, HIPAA, or PCI-DSS. Proficiency in cloud storage solutions such as Amazon S3, Azure Blob Storage, or Google Cloud Storage. Understanding of different database options including relational databases (e.g., Amazon RDS, Azure SQL Database) and NoSQL databases (e.g., Amazon DynamoDB, Azure Cosmos DB). Knowledge of cloud monitoring and management tools such as AWS CloudWatch, Azure Monitor, or Google Cloud Monitoring. Familiarity with DevOps principles and practices, including continuous integration and continuous deployment (CI/CD). Academic Qualifications and Certifications: Bachelor's degree in information technology, computer science or information systems or a related field. Certification and working knowledge of Enterprise Architecture methodologies (for example, TOGAF, Zachman, SOA, ITIL, COBIT, etc.). Relevant cloud certifications such as AWS Certified Solutions Architect, Microsoft Certified: Azure Solutions Architect or Google Cloud Certified - Professional Cloud Architect. Software and programming languages, for example, C++. SAFe Scaled Agile certification advantageous. Required Experience: Seasoned professional technical experience within a large scale (preferably multi-national) technology services environment. Seasoned experience as a Cloud Technical Architect or a similar role, designing and implementing cloud architectures for complex systems and applications. Seasoned experience in designing, implementing, and managing cloud-based solutions, preferably using leading cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP). Seasoned experience in a professional technical role. Seasoned experience in project management methodologies. Seasoned experience with major cloud platforms. Seasoned experience with serverless computing platforms such as AWS Lambda, Azure Functions, or Google Cloud Functions. Seasoned experience with automation and orchestration tools such as Ansible, Chef, or Puppet to streamline the provisioning, configuration, and management of cloud resources. Workplace type : Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Posted 3 months ago
5 - 8 years
8 - 12 Lacs
Bengaluru
Work from Office
Skill :- Hands on strong experience in C coding preferably in Automotive Domain, for a non-OS platform. Experience in microcontrollers and lowlevel sw to test the HW elements Strong understanding of Ethernet protocols and Ethernet switch architectures. Experience with network performance analysis and optimization tools. Knowledge of real-time operating systems (RTOS) and embedded systems. Strong knowledge on peripherals & programming on SPI, I2C, PCI, ethernet. Note :- The person need to work on board bring up activities and integration of low level drivers based on application needs
Posted 3 months ago
5 - 10 years
7 - 12 Lacs
Hyderabad
Work from Office
Project Role : Full Stack Engineer Project Role Description : Responsible for developing and/or engineering the end-to-end features of a system, from user experience to backend code. Use development skills to deliver innovative solutions that help our clients improve the services they provide. Leverage new technologies that can be applied to solve challenging business problems with a cloud first and agile mindset. Must have skills : Microsoft Cloud Application Architecture Good to have skills : No Function Specialty Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Full Stack Engineer, you will be responsible for developing and/or engineering the end-to-end features of a system, from user experience to backend code. Utilize development skills to deliver innovative solutions that enhance client services, leveraging new technologies with a cloud-first and agile mindset. Roles & Responsibilities: Expected to be an SME. Collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Lead the design and development of software applications. Implement best practices for software development. Conduct code reviews and provide constructive feedback. Professional & Technical Skills: Must To Have Skills:Proficiency in Microsoft Cloud Application Architecture. Good To Have Skills:Experience with Okta Identity Management. Automation Development and Management: Develop and maintain automation scripts and workflows for user lifecycle management using PowerShell and other scripting languages. Integrate IAM processes with platforms such as Microsoft Entra (Azure AD), Okta, LDAP, and Linux. System Integration and Administration: Administer and configure IAM systems (Microsoft Entra, Okta, LDAP) to support automated processes. Build and maintain connectors and APIs for integration with business applications and ServiceNow. Monitoring and Troubleshooting: Monitor automated processes to ensure they run smoothly and address any issues or failures promptly. Conduct root cause analyses and implement corrective actions to enhance process efficiency and reliability. Compliance and Documentation: Ensure IAM processes and automation solutions comply with PCI, SOC 2, and other regulatory standards as conveyed by SAP. Document workflows, system configurations, and maintain audit trails to meet compliance requirements. Assist in preparing for and passing audits related to IAM processes and security controls. Strong scripting skills in PowerShell; experience with Python is a plus. Proficiency in IAM platforms:Microsoft Entra (Azure AD), Okta, LDAP, and Linux administration. Experience with workflow systems like ServiceNow. Familiarity with PCI, SOC 2, or other regulatory standards Strong understanding of cloud application architecture principles. Experience in developing scalable and secure cloud applications. Proficient in backend development using cloud technologies. Additional Information: The candidate should have a minimum of 5 years of experience in Microsoft Cloud Application Architecture. This position is based at our Hyderabad office. A 15 years full-time education is required. Qualifications 15 years full time education
Posted 3 months ago
7 - 12 years
9 - 14 Lacs
Gurgaon
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security professional, you will have the opportunity to work on multiple projects that help organizations manage and mitigate risk and maximize enterprise value. In this role, ensuring it meets the business requirements and performance goals. You have to closely work with Project Architect to implement the solution as well as Create and update all supporting documentation for security solutions, Configure and optimize policies to enforce security and compliance standards, follow all security best practices while implementing security solutions. Roles & Responsibility -Create and update all supporting documentation for security solutions, Configure and optimize policies to enforce security and compliance standards.-Follow all security best practices while implementing security solutions.-Responsible for team decisions.-Engage with multiple teams and contribute on key decisions.-Provide solutions to problems for their immediate team and across multiple teams.-Develop and implement security policies and procedures.-Stay updated on the latest security trends and technologies. Professional & Technical Skills:-Design and implementation in Zscaler SASE along with NGFW (PA/Prisma / Zscaler) Web Security (, Symantec), in on-prem and Cloud, End point protection, Data center migrationExperience in Zscaler SASE / Prisma Access SASE / Zscaler SASE / Netskope / Palo Alto/Cisco ASA/ Fortinet firewall / Cloudflare WAF / Email Security-Zscaler SASE cloud-Experience in designing infra security technology products (Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), Zscaler Digital experience (ZDX), deployment of Branch connector & Cloud connector, Remote browser isolation.-In-depth understanding on IPsec VPNs, Global Protect VPNs, Security Profiles, Firewall implementation-Good understanding on cloud providers like AWS, Azure D Basic Knowledge on Operating Systems Windows, Unix, Linux-Build, Design & configuration of various NGFW such as Palo Alto, FortiGate, Checkpoint, Cisco, Prisma Cloud.-Hand-on experience in Azure/AWS-Good Hands-on experience and troubleshooting experience in NGFW such as Palo Alto, Prisma, FortiGate, Checkpoint, Cisco.-Design and hands on experience to skybox, firemon, Tufin Firewall rule review tool, Firewall on-boarding-Checkpoint, Cisco, Palo alto Certification, Cloud certification-Experience on Infra Security tools Assessment and security standards like (NIST, CIS, ISO HIPPA & PCI DSS)NAC, Cisco ISE, Web security technologies as Zscaler, SymantecGood conceptual and working knowledge around Workflow, Approval process. Additional Information:-B.E or MCA or M.Sc with Good Computer Science Background with good academic records-15 years full time education is required. The candidate should have a minimum of 12+ years of experience in SASE Tecnologies. Qualifications 15 years full time education
Posted 3 months ago
5 - 10 years
7 - 12 Lacs
Gurgaon
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security professional, you will have the opportunity to work on multiple projects that help organizations manage and mitigate risk and maximize enterprise value. In this role, ensuring it meets the business requirements and performance goals. You have to closely work with Project Architect to implement the solution as well as Create and update all supporting documentation for security solutions, Configure and optimize policies to enforce security and compliance standards, follow all security best practices while implementing security solutions. Roles & Responsibility -Create and update all supporting documentation for security solutions, Configure and optimize policies to enforce security and compliance standards.-Follow all security best practices while implementing security solutions.-Responsible for team decisions.-Engage with multiple teams and contribute on key decisions.-Provide solutions to problems for their immediate team and across multiple teams.-Develop and implement security policies and procedures.-Stay updated on the latest security trends and technologies. Professional & Technical Skills:-Design and implementation in Zscaler SASE along with NGFW (PA/Prisma / Zscaler) Web Security (, Symantec), in on-prem and Cloud, End point protection, Data center migrationExperience in Zscaler SASE / Prisma Access SASE / Zscaler SASE / Netskope / Palo Alto/Cisco ASA/ Fortinet firewall / Cloudflare WAF / Email Security-Zscaler SASE cloud-Experience in designing infra security technology products (Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), Zscaler Digital experience (ZDX), deployment of Branch connector & Cloud connector, Remote browser isolation.-In-depth understanding on IPsec VPNs, Global Protect VPNs, Security Profiles, Firewall implementation-Good understanding on cloud providers like AWS, Azure D Basic Knowledge on Operating Systems Windows, Unix, Linux-Build, Design & configuration of various NGFW such as Palo Alto, FortiGate, Checkpoint, Cisco, Prisma Cloud.-Hand-on experience in Azure/AWS-Good Hands-on experience and troubleshooting experience in NGFW such as Palo Alto, Prisma, FortiGate, Checkpoint, Cisco.-Design and hands on experience to skybox, firemon, Tufin Firewall rule review tool, Firewall on-boarding-Checkpoint, Cisco, Palo alto Certification, Cloud certification-Experience on Infra Security tools Assessment and security standards like (NIST, CIS, ISO HIPPA & PCI DSS)NAC, Cisco ISE, Web security technologies as Zscaler, SymantecGood conceptual and working knowledge around Workflow, Approval process. Additional Information:-B.E or MCA or M.Sc with Good Computer Science Background with good academic records-15 years full time education is required. The candidate should have a minimum of 9 years of experience in SASE Tecnologies. Qualifications 15 years full time education
Posted 3 months ago
4 - 9 years
20 - 30 Lacs
Bengaluru
Work from Office
Senior Cyber Compliance Audit analyst: Responsible for assessing, challenging, and testing the design and operational effectiveness of controls using TRs control framework by working collaboratively with control owners and stakeholders to improve the control testing process, including defining re-test cycles and evidence expected. About the Role : In this opportunity as Compliance Program Technical Auditor, you will assess, challenge, and test the design and operational effectiveness of controls using TRs control framework by working collaboratively with control owners and stakeholders to improve the control testing process, including defining re-test cycles and evidence expected. Execute a testing plan by communicating requirements to control owners, reviewing evidence submitted, agreeing on deficiencies found and finalizing the next steps in meeting control requirements. Oversee and act as a liaison for both external and internal audits . Identify procedures and practices that are not compliant with industry Frameworks Recommend and support stakeholders making changes to address non-compliance issues . Compile reports on audit results and present them to managers supervisors. Propose efficiencies and automation where possible to optimize workflow. Work closely with other teams like ERM, Finance, business and application owners, third party or contractors supporting processes to report and track remediation plans for any control deficiencies identified. Ensure awareness about security risks, best practices and policy/standard requirements are essential to ensure compliance. Work independently, act decisively and ensure personal deadlines and team requirements are met. Willingness and drive to learn continuously and approach change with openness. About You You're a fit for the role of Senior Business Technology Analyst if your background includes: Bachelor's degree in IT, Accounting, Finance or equivalent education and experience. At least 4+ years of relevant work experience in SoX, ITGC, SOC, PCI within Audit, Big 5, consulting firms or as line 1a or line 1b completing IT-IS control testing or working within a Governance or Compliance function across Financial Services organizations. One of these certifications in order of preference is essential CISA, CISSP, CCAK, CISM, CRISC. Strong ethical principles and understanding of business and IS ethics. Awareness about common security vulnerabilities of web and cloud applications and operating techniques from sources such as SANS, OWASP Top 10 and Cloud Security Alliance (CSA). Experience in testing Cloud controls and related technologies will be an asset. Excellent oral and written communication skills in English. Additional expertise in French, Spanish or another language will be an asset. Knowledge about GRC platforms like ServiceNow, Process Unity, RSA Archer, MetricStream and like.
Posted 3 months ago
3 - 8 years
12 - 16 Lacs
Bengaluru
Work from Office
Job Description Seize the opportunity to work with the team responsible for RTL logic design and development of chipsets for PCs millions of people around the world will use. The Chipsets Logic Team, CLIPS is responsible for developing soft IPs, subsystems and gaskets for ISCP client projects. This job requisition is to seek an experienced, disciplined and collaborative design verification engineer in Bangalore, India. As a member of the Chipsets Logic Design Verification team, you will work closely with IP architects to define and develop verification testbench and building RTL models for verification. You will be validating and verifying the functionality of new architectural features of next generation designs by developing testplan, tests content or test tools. You will be finding and implementing corrective measures for failing RTL tests, analyzes and uses results to modify testing. Your influence will cross organizational boundaries with our manufacturing and validation partners. Your expertise will grow as you debug and resolve issues on system platforms using software and RTL simulation tools. Qualifications The candidate must possess a minimum of Bachelor Degree in Electronics Engineering, Computer Engineering, Computer Science or equivalent. The candidate should have successful track record of hardware development experience and demonstrated technical leadership skills. The candidate must have demonstrated the ability to solve highly complex technical problems with excellent communication skills. The candidate must also have demonstrated strong ethical standards. Must also be able to perform in a highly ambiguous and dynamic business environment. Skills : UVM, AMBA protocols, system verilog, IP sub-system DV. Other technical requirements: 3 to 8 years of relevant pre-silicon verification/logic design experience. Experienced with various tools and methodologies including but not limited to: System Verilog, Python/Perl/Shell scripting, power-aware simulation with VCS/Synopsys tools, RTL model build, design-for-test, design-for-verification. Experienced in developing test plan and contents and coverage points for validation purpose based on High Level Architecture specifications. Experienced in VLSI or Structural and Physical design flow and methodology, SIP and HIP interoperability validation. Experienced in Power-aware design and validation flows. Experienced in AMBA, UFS, SPI, USB, PCI express or any industry standard BUS protocol. Strong Chipset or CPU level understanding required on power consumption, power estimation and low power design methods.
Posted 3 months ago
15 - 20 years
45 - 50 Lacs
Pune
Remote
What You'll Do We are looking for a visionary Head of Business Technology India to lead the strategic development of technology programs. You will demand a leader with a ability to build, mentor, and scale teams in India while establishing a global support desk and overseeing development teams. You will improve innovation, increase operational efficiency, and ensure understanding of global our goals. In addition to being and advocate of best practices, this opportunity requires in-depth understanding of functional and technical aspects of business process, integration methodologies, security architecture and reporting constructs in all areas including the architecture of Salesforce (CRM, Service Cloud, CPQ), Gainsight and enterprise customer support chat platforms. You will report to VP, Business Technology. What Your Responsibilities Will Be You will build, lead, and mentor technology teams (Development, Admins, Service Desk) in India. Foster a culture of collaboration, innovation and learning. Design and implement a 24/7 global technical support desk to enhance customer service delivery. Oversee software development teams, ensuring agile practices and project delivery. Architect and deploy enterprise solutions (SFDC, CRM platforms, customer support systems) to improve operations. Manage digital transformation plans aligned with organizational goals. Ensure appropriate development, configuration and testing and support of system functionality for: o Quote to Cash - Salesforce CPQ, Dell Boomi, Salesforce Billing o Lead to Sale - Salesforce CRM, other middleware (ZoomInfo, LeanData, LinkedIn Sales Navigator) o Onboarding to Renewal - Salesforce Service Cloud, Gainsight, Drift Chatbot, Salesforce Communities. Partner with global leadership to align India operations with international standards. Manage vendor relationships and negotiate contracts for cost-effective technology solutions. Identify automation opportunities to improve system performance and user experience. Establish Goals to measure team productivity and service quality. Collaborate with and manage agreements for Service providers. Negotiate the best agreement for Avalara and our customers. What You'll Need To Be Successful Experience in solution design and enterprise architecture with experience leading technology transformation, automation and scaling strategies at enterprise companies 15+ years in technology leadership roles, including hands-on experience with SFDC, CRM platforms (e.g., Salesforce, HubSpot), and customer support systems (e.g., Zendesk, Freshdesk). Experience building 50+ member teams and managing global support operations. Experience in solution design and enterprise architecture with experience leading technology transformation, automation and scaling strategies at enterprise companies Proficiency in cloud platforms and DevOps practices. Grasp of ITIL frameworks and SaaS product lifecycle management. Solid grasp in an Agile development environment with engineering principles. Experience with data and creating systems that meet security and compliance requirements. Experience with SOX, PCI, SOC2, and IT audit controls of a public company. Degree in Computer Science, Computer Engineering, Information Systems or other related field. Certifications in SFDC, ITIL or PMP/PgMP.
Posted 3 months ago
3 - 5 years
12 - 16 Lacs
Bengaluru
Work from Office
Job Description Seize the opportunity to work with the team responsible for RTL logic design and development of chipsets for PCs millions of people around the world will use. The Chipsets Logic Team, CLIPS is responsible for developing soft IPs, subsystems and gaskets for ISCP client projects. This job requisition is to seek an experienced, disciplined and collaborative design verification engineer in Bangalore, India. As a member of the Chipsets Logic Design Verification team, you will work closely with IP architects to define and develop verification testbench and building RTL models for verification. You will be validating and verifying the functionality of new architectural features of next generation designs by developing testplan, tests content or test tools. You will be finding and implementing corrective measures for failing RTL tests, analyzes and uses results to modify testing. Your influence will cross organizational boundaries with our manufacturing and validation partners. Your expertise will grow as you debug and resolve issues on system platforms using software and RTL simulation tools. Qualifications The candidate must possess a minimum of Bachelor Degree in Electronics Engineering, Computer Engineering, Computer Science or equivalent. The candidate should have successful track record of hardware development experience and demonstrated technical leadership skills. The candidate must have demonstrated the ability to solve highly complex technical problems with excellent communication skills. The candidate must also have demonstrated strong ethical standards. Must also be able to perform in a highly ambiguous and dynamic business environment. Skills : UVM, AMBA protocols, system verilog, IP sub-system DV. Other technical requirements: 3 to 8 years of relevant pre-silicon verification/logic design experience. Experienced with various tools and methodologies including but not limited to: System Verilog, Python/Perl/Shell scripting, power-aware simulation with VCS/Synopsys tools, RTL model build, design-for-test, design-for-verification. Experienced in developing test plan and contents and coverage points for validation purpose based on High Level Architecture specifications. Experienced in VLSI or Structural and Physical design flow and methodology, SIP and HIP interoperability validation. Experienced in Power-aware design and validation flows. Experienced in AMBA, UFS, SPI, USB, PCI express or any industry standard BUS protocol. Strong Chipset or CPU level understanding required on power consumption, power estimation and low power design methods. Inside this Business Group In the Design Engineering Group (DEG), we take pride in developing the best-in-class SOCs, Cores, and IPs that power Intel's products. From development, to integration, validation, and manufacturing readiness, our mission is to deliver leadership products through the pursuit of Moore's Law and groundbreaking innovations. DEG is Intel's engineering group, supplying silicon to business units as well as other engineering teams. As a critical provider of all Intel products, DEG leadership has a responsibility to ensure the delivery of these products in a cost efficient and effective manner. Posting Statement All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance. Benefits We offer a total compensation package that ranks among the best in the industry. It consists of competitive pay, stock, bonuses, as well as, benefit programs which include health, retirement, and vacation. Find more information about all of our Amazing Benefits It has come to our notice that some people have received fake job interview letters ostensibly issued by Intel, inviting them to attend interviews in Intel's offices for various positions and further requiring them to deposit money to be eligible for the interviews. We wish to bring to your notice that these letters are not issued by Intel or any of its authorized representatives. Hiring at Intel is based purely on merit and Intel does not ask or require candidates to deposit any money. We would urge people interested in working for Intel, to apply directly at https://jobs.intel.com/ and not fall prey to unscrupulous elements. Working Model This role will be eligible for our hybrid work model which allows employees to split their time between working on-site at their assigned Intel site and off-site. * Job posting details (such as work model, location or time type) are subject to change.
Posted 3 months ago
3 - 5 years
4 - 6 Lacs
Bengaluru
Work from Office
Experience in BIOS, Bootloader and Slim bootloader Experience on UEFI Device driver development Experience in ACPI, PCI, USB, SMBIOS, GPIO Knowledge on various types of Payloads (UEFI, OS Payload) to support multiple flavour of OS Experience on PCH IO devices configuration & Control. Experience on firmware loading for different SoC Independent IP. Experience on Secure boot and Secure loading of different FW Experience on different OS loader. Experience on ACPI tables and ASL Scripting
Posted 3 months ago
7 - 11 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Managed Cloud Security Services Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years of education Summary :As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve documenting the implementation of the cloud security controls and transitioning to cloud security-managed operations. Roles & Responsibilities: Lead the development and implementation of cloud security frameworks and architectures for Managed Cloud Security Services. Ensure that the cloud security framework meets business requirements and performance goals. Document the implementation of cloud security controls and transition to cloud security-managed operations. Collaborate with cross-functional teams to ensure the successful implementation of cloud security solutions. Stay updated with the latest advancements in cloud security and integrate innovative approaches for sustained competitive advantage. Professional & Technical Skills: Must To Have Skills:Strong experience in Managed Cloud Security Services. Good To Have Skills:Experience with cloud security technologies such as AWS, Azure, and Google Cloud Platform. Strong understanding of cloud security frameworks and architectures. Experience with security tools such as SIEM, IDS/IPS, and DLP. Experience with security compliance frameworks such as ISO 27001, SOC 2, and PCI DSS. Solid grasp of network security concepts such as firewalls, VPNs, and load balancers. Additional Information: The candidate should have a minimum of 7.5 years of experience in Managed Cloud Security Services. The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with a proven track record of delivering impactful data-driven solutions. This position is based at our Bengaluru office. Qualification 15 years of education
Posted 3 months ago
3 - 5 years
9 - 13 Lacs
Bengaluru
Work from Office
Project Role : Test Automation Lead Project Role Description : Lead the transformation of testing into a continuous and efficient end-to-end quality engineering function through the use of quality processes, tools, and methodologies significantly improving control, accuracy and integrity. Evolve more predictive and intelligent testing approaches based on automation and innovative testing products and solutions. Must have skills : Automotive Functional Safety Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : Bachelor of Engineering in Electronics or any related stream Key ResponsibilitiesAs a Penetration Tester, you will be responsible for identifying and exploiting security vulnerabilities in our systems and applications. You will work closely with IT, development, and operations teams to ensure our infrastructure is resilient against cyber threats. Your expertise in ethical hacking and security assessment will be crucial in safeguarding our digital assets. Technical Experience Proven experience as a Penetration Tester or in a similar role within a complex IT environment. Strong knowledge of penetration testing methodologies and tools, including: * Metasploit * Burp Suite * Nmap * OWASP ZAP * Kali Linux * Wireshark Proficiency in scripting languages such as Python, Bash, or PowerShell, and familiarity with programming languages such as Java, C++, or Ruby. In-depth understanding of network protocols, firewall configurations, and common vulnerabilities. Knowledge of secure coding practices, web application vulnerabilities (OWASP Top 10), and API security. Familiarity with regulatory requirements and standards such as GDPR, ISO 27001, and PCI-DSS. Overall, 3+ years of experience in vehicle security or a related field. In-depth knowledge and practical experience with various vehicle systems, including telematics, CAN bus, remote entry/start, OTA, and EV charging. Familiarity with relevant security standards and regulations, such as ISO/SAE 21434, ISO 27001, NIST Cybersecurity Framework, and UN Regulation No. 155.Professional Attributes Excellent problem-solving skills and attention to detail. Strong communication and collaboration skills to effectively convey technical information to non-technical stakeholders. Excellent communication and interpersonal skills. Motivation to stay updated with the latest cybersecurity trends, tools, and techniques. Ability to work effectively in a cross-functional team environment.Preferred Qualifications Relevant certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), or CompTIA PenTest+. Experience with advanced penetration testing techniques, wireless security assessments, social engineering, and physical security testing.Knowledge of cloud security and experience with penetration testing in cloud environments such as AWS, Azure, or Google Cloud. Qualifications Bachelor of Engineering in Electronics or any related stream
Posted 3 months ago
10 - 15 years
12 - 17 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats. Do Design and develop enterprise cyber security strategy and architecture Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses Identify risks associated with business processes, operations, information security programs and technology projects Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge Identify security design gaps in existing and proposed architectures and recommend changes or enhancements Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. Provide support during technical deployment, configuration, integration and administration of security technologies Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity Provide solution of RFPs received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture Depending on the clients need with particular standards and technology stacks create complete RFPs Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps Evaluate and recommend solutions to integrate with overall technology ecosystem Tracks industry and application trends and relates these to planning current and future IT needs Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers Provide training to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Program Manager/Director Regular reporting & updates Infrastructure (CIS team) For infrastructure support External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming security technologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) and understanding of compliance regulatory requirement like PCI DSS, HIPAA, etc.- Expert Systems Thinking - Understanding of the Wipro system (interrelatedness, interdependencies and boundaries) and perform problem solving in a complex environment - Expert Leveraging Technology - In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect - Master Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure, ToGAF or SABSA certification- Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Managing Complexity Client centricity Technology Acumen Innovation Problem Solving approach Collaborative Working Execution Excellence Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2. Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Posted 3 months ago
10 - 15 years
12 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats. Do Design and develop enterprise cyber security strategy and architecture Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses Identify risks associated with business processes, operations, information security programs and technology projects Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge Identify security design gaps in existing and proposed architectures and recommend changes or enhancements Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. Provide support during technical deployment, configuration, integration and administration of security technologies Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity Provide solution of RFPs received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture Depending on the clients need with particular standards and technology stacks create complete RFPs Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps Evaluate and recommend solutions to integrate with overall technology ecosystem Tracks industry and application trends and relates these to planning current and future IT needs Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers Provide training to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Program Manager/Director Regular reporting & updates Infrastructure (CIS team) For infrastructure support External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming security technologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) and understanding of compliance regulatory requirement like PCI DSS, HIPAA, etc.- Expert Systems Thinking - Understanding of the Wipro system (interrelatedness, interdependencies and boundaries) and perform problem solving in a complex environment - Expert Leveraging Technology - In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect - Master Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure, ToGAF or SABSA certification- Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Managing Complexity Client centricity Technology Acumen Innovation Problem Solving approach Collaborative Working Execution Excellence Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2. Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Posted 3 months ago
10 - 15 years
12 - 17 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats. Do Design and develop enterprise cyber security strategy and architecture Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses Identify risks associated with business processes, operations, information security programs and technology projects Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge Identify security design gaps in existing and proposed architectures and recommend changes or enhancements Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. Provide support during technical deployment, configuration, integration and administration of security technologies Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity Provide solution of RFPs received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture Depending on the clients need with particular standards and technology stacks create complete RFPs Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps Evaluate and recommend solutions to integrate with overall technology ecosystem Tracks industry and application trends and relates these to planning current and future IT needs Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers Provide training to employees on issues such as spam and unwanted or malicious emails Stakeholder Interaction Stakeholder Type Stakeholder Identification Purpose of Interaction Internal Program Manager/Director Regular reporting & updates Infrastructure (CIS team) For infrastructure support External Customer To coordinate for all security breaches & resolutions Display Lists the competencies required to perform this role effectively: Functional Competencies/ Skill Leveraging Technology - Knowledge of current and upcoming security technologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) and understanding of compliance regulatory requirement like PCI DSS, HIPAA, etc.- Expert Systems Thinking - Understanding of the Wipro system (interrelatedness, interdependencies and boundaries) and perform problem solving in a complex environment - Expert Leveraging Technology - In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect - Master Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure, ToGAF or SABSA certification- Master Competency Levels Foundation Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance. Competent Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well. Expert Applies the competency in all situations and is serves as a guide to others as well. Master Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization. Behavioral Competencies Effective Communication Managing Complexity Client centricity Technology Acumen Innovation Problem Solving approach Collaborative Working Execution Excellence Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2. Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led
Posted 3 months ago
2 - 6 years
4 - 8 Lacs
Bengaluru
Work from Office
Primary Skills 1. PKI, HSM, Encryption and Cryptography solutions. 2. Bureau Solutions, Instant Financial Issuance, Cryptographic and Digital Card Solutions. Additional SKills 1. nShield HSMs, Identity Enterprise, KeyControl, DataControl, and others 2. Financial industry knowledge and PKI, HSM, Cryptography 3. Knowledge and experience in PCI DSS
Posted 3 months ago
2 - 6 years
4 - 8 Lacs
Kochi
Work from Office
Minimum qualifications: Bachelors degree in computer science, a related technical field, or equivalent practical experience Experience in cloud computing engineering & implementations (e.g., applications, infrastructure, storage, platforms, security) Overall, 6-12 years of experience as Security architect in either a cloud computing environment or equivalent experience in a customer-facing role. Preferred qualifications: Perform Cloud assessment and management using tools like Wiz, Defender for Cloud, AWS Security HUB Analysis the gaps and define remediate accordingly (using automation) Implement Cloud security best practices & defend against cyber-attacks using security standards as NIST, PCI DSS & CIS. Implemented Cloud Security Posture Management tool Prisma Cloud and Dome9; performed assessment of cloud accounts and stringent compliance requirement as per defined standards (CIS, NIST, PCI-DSS etc). Ensure coverage and support of all critical service management processes through SNOW:Incident Management, Problem Management, Change Management, Application Enhancements Leads and directs the workforce in problem identification, problem solving and implementing continuous improvement measures through innovation. Certification - Prisma Certified cloud security engineer or Equivalent Certification in Cloud Platforms like Azure, AWS & GCP
Posted 3 months ago
2 - 7 years
4 - 9 Lacs
Bengaluru
Work from Office
As a Functional verification engineer, you will be working on IBM server processors/SOC or ASICs used in IBM servers. Develop the verification environment and test bench and creating testcases. Debug fails using waveform, trace tools and debug RTL code Develop skills in IBM Functional verification tools and methodologies. Work with design as well as other key stakeholders in resolving/debugging logic design issues and deliver a quality design Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 3 + years of experience in Functional Verification of Processors or ASICs. Minimum 2+ years of experience in any of the following Computer architecture knowledge, Processor core design specifications, instruction set architecture and logic verification. Multi-processor cache coherency, Memory subsystem, IO subsystem knowledge, any of the protocols like PCIE/CXL, DDR, Flash, Ethernet etc Madhu to update ASICs specific skills Knowledge of functional verification methodology - UVM/OVM/System Verilog/SystemC/ Knowledge of HDLs (Verilog, VHDL) Good object-oriented programming skills in C/C++, and any of scripting languages like Python/Perl Development experience on Linux/Unix environments and in GIT repositories and basic understanding of Continues Integration and DevOps workflow Exposure in developing testbench environment, write complex test scenario, debugging and triaging fails Experience in verification coverage closure Preferred technical and professional experience Verify the different functions/components in a PCI Express Controller & high speed SERDES (PHY). Scripting Expertise backed up relevant experience in the same Writing Verification test plans Functional and code coverage analysis and debug
Posted 3 months ago
5 - 10 years
7 - 12 Lacs
Pune
Work from Office
We are looking for C/C++ programming, Cryptography, Threat modelling, Penetration testing, knowledge of vehicle electrical architecture and vulnerabilities, Embedded Linux, Python is added advantage. Threat modeling at the vehicle level, and also the ECU level Influencing the architecture design of new features (embedded, cloud and mobile) to ensure that our security needs can be met Identifying and implementing cryptographic security controls Providing technical leadership to teams to help them grow their security capability Developing tools and frameworks that make it easy for teams to adopt security Performing penetration testing on new products to find vulnerabilities Driveembeddedcybersecurity requirements into new product programs - Drive process improvements. Ideate and deploy innovative solutions in implementing the security in automotiveembeddedSoftware development 6+ years of experience withembeddedsystems/software engineering and/or IoT systems 3+ years of experience with leading and creating a vision for a team, and communication with leadership 5+ years of experience in development ofembeddedapplications in C or C++ 5+ years of experience with Agile practices Experience with Linux distributions Experience with applying cryptographic concepts in theembeddedspace Experience interpreting and applying standards (e.g. ISO 21434) and specifications in theembeddedsoftware space Experience withembeddedLinux and other Real Time Operating Systems (RTOS) Experience in the application of cryptographic security controls forembeddedsystems Experience in the development ofembeddedsystems for vehicles Experience in the development of IoT devices Experience performing penetration testing ofembeddedsystems PKI experience Experience in a DevOps role Developed AWS-native applications Understanding of FTP, TLS, UDP, PCI/IP Bachelor's degree Computer Engineering, Cyber Security / Security Engineering, Computer Science, Electronics Engineering or equivalent experience Advanced degree is a plus
Posted 3 months ago
5 - 10 years
7 - 12 Lacs
Bengaluru
Work from Office
About The Role : DEG/IMSG seeks an experienced pre-Si verification engineer for its PCIe IP development organization, a dynamic team with a history of outstanding execution and industry-leading accomplishments. We are looking for an enthusiastic individual with a strong background in all aspects of IP development and a proven capacity for understanding new technologies, to help deliver on our charter as Intel's center of innovation for IO and Accelerator technologies. You will be responsible for, but not limited too. Working with a high performing team to deliver fully functional IPs on Intel's latest process technology to reduce product risk for various enterprise IPs including PCI express and accelerators. Interfacing with architects and senior design/val team members to develop new features. Roles and responsibilities Performs functional verification of IP logic to ensure design will meet specification requirements. Develops IP verification plans, test benches (BFM, Scoreboard, tests) , and the verification environment to ensure coverage to confirm to microarchitecture specifications. Executes verification plans and defines and runs system simulation models to verify the design, analyze power and timing, and uncover bugs. Replicates, root causes, and debugs issues in the presilicon environment. Finds and implements corrective measures to resolve failing tests. Collaborates with architects, RTL developers, and physical design teams to improve verification of complex architectural and microarchitectural features. Documents test plans and drives technical reviews of plans and proofs with design and architecture teams. Maintains and improves existing functional verification infrastructure and methodology. Participates in the definition of verification infrastructure and related TFMs needed for functional design verification Qualifications Qualification Candidate should possess a bachelor's degree in electrical, Electronics, Computer Engineering or Computer Science or any related field with 10+ years' experience -OR - a Master's degree Electrical, Electronics, Computer Engineering or Computer Science or any related field with 8+ years of experience -OR- PhD degree in Electrical, Electronics, Computer Engineering with 5+ years of experience. Mandatory Skills :- SV /UVM, Mirco, test bench , test plan creation , coverage analysis , debugging/problem solving skills . Preferred skills :- BFM development , third party VIP integration , evaluation of VIP's , formal verification skills and c++ Preferred Protocol knowledge on PCIE , Cxl* , Solid verbal/written communication skills.o Effective team player with continuous learning mindset. Be willing to balance multiple tasks. Prior experience in IP development teams would be an added advantage. The candidate must be able to work independently and be self-motivated to identify, innovate upon, architect and deploy Formal Verification solutions. Experience in BFM development. Inside this Business Group The Data Center & Artificial Intelligence Group (DCAI) is at the heart of Intel's transformation from a PC company to a company that runs the cloud and billions of smart, connected computing devices. The data center is the underpinning for every data-driven service, from artificial intelligence to 5G to high-performance computing, and DCG delivers the products and technologies"”spanning software, processors, storage, I/O, and networking solutions"”that fuel cloud, communications, enterprise, and government data centers around the world.
Posted 3 months ago
2 - 3 years
3 - 7 Lacs
Bengaluru
Work from Office
As a Senior Developer / Architect in Identity and Access Management, you will be responsible for designing, developing, and implementing complex solutions on the Salesforce platform. You will collaborate with technical and enterprise architects to address intricate business requirements, mission-critical applications, and large projects. Your role will involve leading the estimation of development efforts, guiding developers in poker planning sessions, and managing complex development and testing. Responsibilities: 1. Have overall design accountability on projects and be responsible for all aspects of the solution architecture. 2. Ensure solution alignment with Function and Segment strategies and roadmaps, including alignment to Bill-of-IT's. 3. Work closely with the project manager and business to turn business requirements into technical solutions. 4. Steer the project through architecture processes, including agreeing architecture deliverables, quality assuring project technical outputs, and arranging design reviews at appropriate stages of the project lifecycle. 5. Ensure Chief Architects sign-off for solutions and architectures as part of the process. 6. Recommend innovations which enhance the operation and functionality of customer systems. 7. Produce high-quality architecture documentation and outputs in line with IBM standards. Required education Bachelor's Degree Required technical and professional expertise 1. Primary: WebSphere application server, DB2, Java, IBM MQ, Cirrus (Cloud), Notes 2. Secondary : LDAP, windows server, IBM Tivoli Identity Manager, Spring, Tiles 3. Experience with micro services, Identity and Access Management background Preferred technical and professional experience To be an effective DRMS Developer for Identity & Access Management (IAM), the following skills are essential: 1. Technical Skills: * Programming: Proficiency in Java, C#, Python, and JavaScript. * Web Tech: Knowledge of REST APIs, SOAP, OAuth, JWT, SAML. * IAM Platforms: Experience with Okta, Azure AD, Ping Identity, ForgeRock. * Cryptography: Understanding of AES, RSA, TLS/SSL, PKI, HSM. * DRMS: Familiarity with DRM systems (FairPlay, PlayReady, Widevine). * Cloud Security: Expertise in AWS IAM, Azure AD, GCP IAM. * SSO Integration: Experience with SAML, OAuth 2.0, OpenID Connect. 2. Security Skills: * Access Control: Knowledge of RBAC, ABAC, PBAC. * Identity Federation: Familiarity with SAML, OpenID Connect, Federated SSO. * MFA: Experience implementing Multi-Factor Authentication (e.g., TOTP, SMS, Biometric). * Auditing: Ability to create access logging and auditing systems. * Compliance: Understanding of GDPR, HIPAA, PCI-DSS, ISO 27001. 3. IAM Concepts & Techniques: * User Lifecycle Management: Experience with user provisioning and de-provisioning. * Delegated Admin: Managing decentralized roles and permissions. * Identity Governance: Knowledge of IGA tools for managing access rights. 4. Development Tools: * CI/CD: Knowledge of tools like Jenkins, GitLab CI, Azure DevOps. * Version Control: Proficiency in Git. * Testing & Debugging: Familiar with JUnit, Mockito, Postman. 5. Soft Skills: * Problem-Solving: Troubleshooting complex DRM and access issues. * Collaboration: Strong communication and teamwork skills. * Analytical Mindset: Ability to design secure and user-friendly systems. 6. Experience & Domain Knowledge: * Experience developing IAM solutions focused on digital rights management and secure access. * Familiar with cloud IAM systems and managing large-scale IAM environments. This role requires a strong mix of technical and security expertise, along with an understanding of the intersection of DRM and IAM to secure digital assets.
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2