Home
Jobs

54 Product Security Jobs - Page 2

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5 - 10 years

13 - 17 Lacs

Hyderabad

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : Google Cloud Data Services Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :GCP Security Engineer / Associate Architect – Cloud Security Operations & EngineeringWe are looking for GCP Security Engineers / Associate Architects with 5+ years of experience in cloud security engineering and automation. This role supports operational security, control configuration, and secure design practices for GCP workloads. Roles & Responsibilities: Implement GCP security controls:IAM, VPC security, VPNs, KMS, Cloud Armor, and secure networking. Manage GCP identity and access, including SSO, MFA, and federated IDP configurations. Monitor workloads using Cloud Operations Suite and escalate anomalies. Conduct basic threat modeling, vulnerability scanning, and patching processes. Automate security audits and compliance controls using Terraform and Cloud Shell scripting. Assist architects in deploying and maintaining secure-by-default infrastructure. Support audit preparation, policy enforcement, and evidence gathering. Collaborate with cross-functional teams to resolve security alerts and findings. Maintain detailed technical documentation and knowledge sharing resources. Professional & Technical Skills: Working knowledge of IAM, KMS, GCP networking, and cloud policy enforcement. Familiarity with IaC tools (Terraform), scripting, and log analytics. Strong desire to grow in the cloud security domain. Good communication skills and proactive approach to problem-solving. Thrives in a fast-paced, learning-oriented environment. Additional Information:Bachelor's degree in Computer Science, IT, or Information Security.Certifications such as Google Cloud Certified – Professional Cloud Security Engineer is a must; Associate Cloud Engineer is a plus. 5+ years in security or cloud engineering, with at least 1–2 years in GCP. This position is based at our Bengaluru office A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

12 - 17 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : Security Architecture Design Minimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Automotive Cybersecurity Architect, you will define the end-to-end security architecture and strategy for in-vehicle systems, telematics, and cloud-connected services, ensuring alignment with regulatory requirements and industry best practices. You will also lead penetration testing efforts, document security controls across ECUs and communication interfaces, and guide the implementation of secure system designs across the vehicle ecosystem. Roles & Responsibilities: Define and implement end-to-end cybersecurity architecture for connected vehicles, ECUs, and backend services, ensuring alignment with ISO/SAE 21434, UNECE WP.29, and CSMS requirements. Develop secure communication and firmware update frameworks, supporting over-the-air (OTA) updates and in-vehicle data integrity. Perform threat modeling and risk analysis using industry-standard methodologies such as HEAVENS, STRIDE, and attack trees to identify vulnerabilities across vehicle networks and interfaces. Guide the definition of mitigation strategies and ensure full traceability between threats, assets, and controls throughout the development lifecycle. Plan and lead security validation activities, including advanced penetration testing and fuzzing of vehicle interfaces (CAN, DoIP, Ethernet, Bluetooth, Wi-Fi, Cellular). Create and maintain documentation for test cases, tooling, security controls, and validation outcomes across ECUs and connected modules. Collaborate with cross-functional teams to drive secure design practices in diagnostics, boot process, and firmware integrity verification. Conduct vulnerability assessments using tools such as CANoe, CANalyzer, Wireshark, Ghidra, and custom analysis scripts, and support remediation planning. Lead red team exercises and security reviews in coordination with product security and development teams. Represent cybersecurity in internal audits and regulatory assessments, ensuring alignment with WP.29 R155/R156 and ISO 26262. Work with suppliers and partners to evaluate and integrate security solutions aligned with evolving vehicle cybersecurity requirements. Professional & Technical Skills: Extensive experience (12+ years) in embedded and automotive systems, with over 6 years specializing in automotive cybersecurity strategy, architecture, and threat analysis. Hands-on experience designing and executing penetration testing of automotive systems, including ECUs, ADAS, telematics, infotainment, and V2X components, across in-vehicle networks and external interfaces. Strong knowledge of in-vehicle communication protocols such as CAN, LIN, FlexRay, DoIP, and automotive diagnostic protocols (UDS), as well as wireless technologies including Bluetooth, Wi-Fi, and Cellular. In-depth understanding of secure communication protocols and cryptographic standards, including TLS, MACsec, AES, RSA, ECC, and Public Key Infrastructure (PKI) for automotive applications. Proven experience in designing and implementing Secure Boot, Secure OTA (Over-the-Air) update mechanisms, and ECU firmware authentication using HSMs and trusted execution environments. Demonstrated ability to conduct and lead threat modeling and risk assessments using HEAVENS, STRIDE, attack trees, and DFD methodologies in compliance with ISO/SAE 21434. Familiarity with regulatory and compliance frameworks such as UNECE WP.29 (R155/R156), CSMS, and ISO 26262, and practical experience aligning security activities to these standards. Proficiency in security validation tools and platforms including Canoe, CANalyzer, Wireshark, Ghidra, Scapy, and custom-built tools for binary analysis, fuzzing, and reverse engineering. Experience guiding vulnerability remediation efforts across hardware and software development teams in an Agile or V-model development environment. Strong technical documentation skills and the ability to translate complex cybersecurity concepts into actionable guidance for engineering and compliance teams. Capable of engaging with external vendors, regulatory bodies, and cross-functional stakeholders to align security requirements, audits, and certifications. Additional Information: 7+ years' experience implementing and performing Automotive Cybersecurity This position is based at our Bengaluru office A 15-year full time education is required Good to have Certifications in ISO 21434, CISSP, CEH, OSCP, GICSP Qualification 15 years full time education

Posted 1 month ago

Apply

7 - 12 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : Google Cloud Data Services Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :GCP Security Architect – Solution Design, Compliance, and Security EngineeringWe are hiring GCP Security Architects with 7+ years of experience in designing secure GCP environments and integrating automated security across deployments. This role emphasizes applied engineering, platform security control implementation, and ensuring audit-ready, secure-by-default environments. Roles & Responsibilities: Design and implement secure, scalable GCP architectures. Configure and maintain IAM (roles, policies, IDP integrations, MFA, SSO). Establish secure configurations for VPCs, VPNs, Data Encryption (KMS), and Cloud Armor. Manage Cloud Security Command Center for visibility, governance, and incident response. Implement Cloud Operations Suite for logging, alerting, and security analytics. Conduct threat modeling, vulnerability assessments, and define remediation paths. Automate security checks and controls using Terraform, Cloud Shell, and CI/CD integrations. Collaborate with platform, DevOps, and risk teams to embed security into development lifecycles. Support audit preparation, policy compliance, and security documentation efforts. Review solution designs and assist with enforcing GCP security guardrails. Professional & Technical Skills: Analytical and detail-oriented with a strong problem-solving mindset. Strong communicator with cross-functional collaboration experience. Continuously stays updated with evolving cloud threat landscapes. Excellent communication skills, including the ability to convey complex security concepts to technical and non-technical stakeholders. Strong working knowledge of IAM, VPC SC, Cloud Armor, encryption practices, and security policy enforcement. Experience with Terraform, automated auditing, and log analysis tools. Additional Information:Bachelor's degree in engineering or computer science, Information Security, or a related field.Certifications such as Google Cloud Certified – Professional Cloud Security Engineer is a must; CCSP preferred. 7+ years in security roles, with 3+ years in hands-on GCP security delivery. This position is based at our Bengaluru office A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

5 - 10 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : Security Architecture Design Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Automotive Cybersecurity Specialist, you will support the implementation and validation of security measures across vehicle systems and embedded platforms. You will assist in penetration testing, contribute to threat analysis activities, and help ensure secure communication and firmware integrity in alignment with automotive cybersecurity standards. Roles & Responsibilities: Assist in the execution of penetration testing activities targeting ECUs, in-vehicle communication networks, and diagnostic services to identify common vulnerabilities and misconfigurations. Support the use of automotive security tools such as CANoe, Wireshark, Scapy, and basic fuzzing frameworks to simulate attacks and gather system responses for analysis. Collect and organize logs, analyze test outputs, and document findings to assist senior security engineers in remediation and tracking of identified issues. Execute validation of standard UDS diagnostic services, including support for testing access controls, session management, and secure diagnostic configurations. Participate in asset identification and support foundational threat modeling efforts, including contributing to risk assessments and mitigation tracking under guidance. Assist in documenting security design considerations and implementation steps in alignment with ISO/SAE 21434 and internal cybersecurity processes. Collaborate with cybersecurity, software, and validation teams to support the integration of security controls across vehicle platforms. Continuously learn and apply core concepts of automotive cybersecurity, including secure communication, ECU hardening, and regulatory standards like WP.29 and ISO 26262. Professional & Technical Skills: 5+ years of experience in embedded systems, automotive engineering, or related fields, with growing specialization in cybersecurity principles and practices. Familiarity with in-vehicle communication protocols including CAN, UDS, and DoIP, with hands-on exposure to using tools such as CANoe, Wireshark, and Scapy for traffic analysis and basic attack simulation. Foundational understanding of penetration testing methodologies, vulnerability identification, and the use of fuzzers to evaluate ECU communication robustness. Exposure to diagnostics security concepts, including secure diagnostic sessions, seed-key mechanisms, and access control layers for UDS services. Basic knowledge of cybersecurity frameworks and risk assessment methodologies such as STRIDE, HEAVENS, and ISO/SAE 21434. Experience contributing to documentation of test results, secure design inputs, and mitigation reports under guidance from senior cybersecurity engineers. Understanding of secure firmware update concepts and cryptographic basics, including symmetric/asymmetric encryption, HSM usage, and key management fundamentals. Experience working in Agile or V-model development environments, collaborating with cross-functional teams including validation, software, and systems engineering. Demonstrated eagerness to learn new cybersecurity tools, standards, and technologies relevant to modern connected vehicle platforms. Strong analytical skills and attention to detail, with the ability to follow structured testing and security validation procedures. Additional Information: 3+ years' experience implementing and performing Automotive Cybersecurity Knowledge of tools like CANoe, Wireshark, or Ghidra. Basic understanding of ISO 21434, seed/key security, OTA updates, and cryptographic modules. This position is based at our Bengaluru office A 15-year full-time education is required Good to have Certifications in ISO 21434, CISSP, CEH, OSCP, GICSP Qualification 15 years full time education

Posted 1 month ago

Apply

5 - 10 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : Security Architecture Design Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Automotive Cybersecurity Specialist, you will support the implementation and validation of security measures across vehicle systems and embedded platforms. You will assist in penetration testing, contribute to threat analysis activities, and help ensure secure communication and firmware integrity in alignment with automotive cybersecurity standards. Roles & Responsibilities: Assist in the execution of penetration testing activities targeting ECUs, in-vehicle communication networks, and diagnostic services to identify common vulnerabilities and misconfigurations. Support the use of automotive security tools such as CANoe, Wireshark, Scapy, and basic fuzzing frameworks to simulate attacks and gather system responses for analysis. Collect and organize logs, analyze test outputs, and document findings to assist senior security engineers in remediation and tracking of identified issues. Execute validation of standard UDS diagnostic services, including support for testing access controls, session management, and secure diagnostic configurations. Participate in asset identification and support foundational threat modeling efforts, including contributing to risk assessments and mitigation tracking under guidance. Assist in documenting security design considerations and implementation steps in alignment with ISO/SAE 21434 and internal cybersecurity processes. Collaborate with cybersecurity, software, and validation teams to support the integration of security controls across vehicle platforms. Continuously learn and apply core concepts of automotive cybersecurity, including secure communication, ECU hardening, and regulatory standards like WP.29 and ISO 26262. Professional & Technical Skills: 5+ years of experience in embedded systems, automotive engineering, or related fields, with growing specialization in cybersecurity principles and practices. Familiarity with in-vehicle communication protocols including CAN, UDS, and DoIP, with hands-on exposure to using tools such as CANoe, Wireshark, and Scapy for traffic analysis and basic attack simulation. Foundational understanding of penetration testing methodologies, vulnerability identification, and the use of fuzzers to evaluate ECU communication robustness. Exposure to diagnostics security concepts, including secure diagnostic sessions, seed-key mechanisms, and access control layers for UDS services. Basic knowledge of cybersecurity frameworks and risk assessment methodologies such as STRIDE, HEAVENS, and ISO/SAE 21434. Experience contributing to documentation of test results, secure design inputs, and mitigation reports under guidance from senior cybersecurity engineers. Understanding of secure firmware update concepts and cryptographic basics, including symmetric/asymmetric encryption, HSM usage, and key management fundamentals. Experience working in Agile or V-model development environments, collaborating with cross-functional teams including validation, software, and systems engineering. Demonstrated eagerness to learn new cybersecurity tools, standards, and technologies relevant to modern connected vehicle platforms. Strong analytical skills and attention to detail, with the ability to follow structured testing and security validation procedures. Additional Information: 3+ years' experience implementing and performing Automotive Cybersecurity Knowledge of tools like CANoe, Wireshark, or Ghidra. Basic understanding of ISO 21434, seed/key security, OTA updates, and cryptographic modules. This position is based at our Bengaluru office A 15-year full-time education is required Good to have Certifications in ISO 21434, CISSP, CEH, OSCP, GICSP Qualification 15 years full time education

Posted 1 month ago

Apply

12 - 17 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : NA Minimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :AI Red Teaming Expert – Adversarial ML, Threat Simulation, and AI Security StrategyWe are seeking a highly experienced and visionary AI Red Teaming Expert 12+ years of experience across cybersecurity and machine learning. This role is ideal for professionals who thrive in dynamic environments and possess a passion for securing cutting-edge AI/ML systems. You will lead red teaming operations, simulate adversarial threats, and guide the organization's AI security posture at strategic and technical levels. The ideal candidate demonstrates deep technical expertise, exceptional leadership, and a keen understanding of adversarial machine learning and risk mitigation frameworks. Roles & Responsibilities: Define and execute the AI red teaming strategy across the organization. Simulate realistic and advanced adversarial attacks against AI/ML systems aligned with business contexts. Review AI/ML system architecture to identify security gaps and advocate for secure design patterns. Establish internal standards and workflows for AI threat modeling, risk assessment, and adversarial testing. Stay ahead of evolving adversarial ML threats and guide the development of defensive strategies. Contribute to secure development practices for model deployment pipelines and lifecycle management. Lead and mentor a specialized team of AI security analysts and red teamers. Represent AI security strategy in executive forums and drive cross-functional alignment. Collaborate with engineering, data science, compliance, and legal stakeholders to integrate security into AI innovation cycles. Drive internal policy-making efforts around responsible and secure AI development practices. Own and lead remediation initiatives, translating findings into actionable improvements across teams. Professional & Technical Skills: Exceptional communication and leadership skills with the ability to convey technical issues to non-technical stakeholders. Proven experience managing high-impact security initiatives and leading diverse teams. Strategic thinker capable of aligning AI security objectives with business goals. Passionate about AI safety, responsible innovation, and emerging threat landscapes. Strong analytical and problem-solving skills in high-pressure environments. Hands-on expertise in red teaming AI/ML systems at scale. Strong understanding of adversarial ML techniques, threat simulation tools, and AI model manipulation tactics. Experience implementing and aligning with frameworks such as OWASP Top 10 for LLMs, ISO 42001, NIST AI RMF. Proficiency in AI/ML pipeline security, model risk evaluation, and secure MLOps practices. Familiarity with deep learning frameworks (e.g., TensorFlow, PyTorch) and their associated vulnerabilities. Demonstrated ability to design, execute, and scale red teaming programs in AI-native environments. Additional Information:Bachelor's or Master's degree in Computer Science, Information Security, Machine Learning, or related field.Recognized certifications such as CEH, OSCP, CISSP, or credentials specific to AI security (e.g., MITRE ATLAS experience) are a plus. 12+ years of experience spanning cybersecurity, AI/ML, and adversarial testing This position is based at our Bengaluru office A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

2 - 6 years

15 - 20 Lacs

Hyderabad

Work from Office

Naukri logo

Job Area: Engineering Group, Engineering Group > Software Engineering General Summary: Overview The Secure Systems Group (SSG) Product Engineering team is responsible for leading a chipset bring up activities starting from Pre-Silicon phase to commercialization and bring the processes that improve overall execution efficiency in chipset execution in organization . Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 2+ years of Software Engineering or related work experience. OR Master's degree in Engineering, Information Systems, Computer Science, or related field and 1+ year of Software Engineering or related work experience. OR PhD in Engineering, Information Systems, Computer Science, or related field. 2+ years of academic or work experience with Programming Language such as C, C++, Java, Python, etc. Preferred Qualifications: Bachelor's/master's degree in engineering, Information Systems, Computer Science or related field. Responsibilities Experience in security software development. Hands on C programing for embedded platforms on ARM / RISCV processors. Expert understanding of and experience with SMC call implementation and ARM Trace32. Handle increased complexity and ambiguity of new, exploratory, multi-domain, or multi-disciplinary tasks. Strong technical expertise and ownership for the modules owned with limited direction and oversight. Analyze product requirements, identify impacted areas, derive requirements, and produce suitable designs. Independently represent the team to internal and external stake holders / partners on their area of responsibility. Collaborate within and cross functional teams as required to ensure quality work products are delivered. Keep oneself up-to-date with industry trends and technology developments around the related areas of work. Responsible and accountable for timeliness and quality of own deliverables and work products and that of the team. Minimum Qualifications Bachelor's / Master's degree in Engineering, Information Systems, Computer Science, Electronics or related field. Minimum 4 + years of exp. in Software development preferably in Embedded and programming in C / Assembly. Strong understanding of Embedded hardware, Computer Architecture and Operating System concepts. Good understanding of OS concepts such as tasks, signals, timers, priorities, deadlocks, stacks, etc. Understanding of RTOS fundamentals like multi-threading, interrupt management, cache/memory management etc. Experience with code versioning tools (git / perforce) build tools (Makefiles/SCons), and debuggers like JTAG. Experience in leading and driving software development activities independently and working with multiple teams. Experience in managing software projects across all phases like Requirement analysis, Design and validations. Good understanding of Software Security Concepts, Public Key Cryptography, ARM Trust zone, Virtualization etc. Good communication skills & ability to work with engineers, partners & customers across cultures / geographical sites Good expertise and experience on product security for embedded devices, which may include a subset of the following skillsets Trusted execution environment. Debugging overall system level issues using ARM Trace32. Experience in working on Qualcomm snapdragon chipsets (If any). Device integrity & Authentication, OS level Secure use-cases knowledge. Protected virtualization Embedded/real time OS security, Vulnerability detection methods, Hardware access control, Secure provisioning and debug,

Posted 1 month ago

Apply

2 - 5 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation. Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive. Our technologies are at the heart of modern applications that are enabling digital transformation across the globe! We give the world’s largest businesses, service providers, governments, and consumer brands the ability to securely deliver every app, anywhere—with confidence. We do this by working collaboratively in an innovative environment, helping each other succeed. We take extraordinary pride in being trusted advisers to our customers, offering the best solutions for their interests. If our mission and culture excite you, we would love to talk with you! We are seeking a Distributed Cloud Support Engineer II who is hardworking and committed to customer success. You are comfortable in both the Support and Engineering environments, translating technical documentation and conversations into clear, concise directions for customers and partners. You are passionate about helping our customers tackle and solve problems. You will provide support via phone, email, messaging, and web portal. Support requests range in complexity from "how to" questions through involved debugging and forensic efforts when prioritizing operational issues. Visualizing problems remotely is key to being successful in this role along with excellent analytic and troubleshooting skills. You will have a significant career growth opportunity within a fast-paced SaaS company. What will you do? Fix reported issues and advocate for the customer. Collaborate with sales and engineering teams to provide support to resellers, service provider and enterprise customers, as well as end users via telephone, e-mail, Slack and the web portal. Issue reproduction and concise documentation of solutions provided through technical notes, case studies and knowledge base articles. Critical issue management and customer assurance when handling reported issues. Coordinate fixes by Engineering or Developers when required and relay appropriate information to our partners and customers. Provide recommendations on how to improve supportability, reliability, availability, and serviceability based on lessons learned through issue resolution. Training and enabling our service partners to ensure that they can sufficiently support customer issues. How do you qualify? 2 or more years of experience working in an operations environment. Background in customer service/support and IT, networking, or IT security incident management. Experience driving efficiencies, handling growth, and delivering results. Good understanding of IT, Network, or IT SOC best practices and a real passion for continuous improvement. Strong organizational skills and work well with contacts in various business subject areas. Conversationally and technically fluent in English verbally and written. Advantageous to have: Strong understanding of Networking and Layer 7 Protocols. Familiarity with Container technologies (Docker and Kubernetes). Knowledge of Data Representation types (XML, JSON, YAML). Public cloud experience with Amazon Web Services (AWS), Google Cloud Platform (GCP) and/or Microsoft Azure is preferred. Security product/solutions experience (Firewalls, WAFs, DDoS Mitigation) is preferred. Strong troubleshooting skills, independent and collaborative. Approachable disposition and steadfast in delivering. Ability to prioritize and multitask when leading sophisticated technical issues. Proven understanding of routing and switching technologies. Ability to read different scripting and automation languages (Python, Shell and Ansible). Bachelor’s degree in technologically relatable field or equivalent practical experience. Physical Demands and Work Environment This role requires availability outside normal business hours to align with the distributed team or to respond to critical security events. Some travel may be required (less than 10%). The About The Role is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change. Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com ) . Equal Employment Opportunity It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates . Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.

Posted 1 month ago

Apply

4 - 7 years

6 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

In this role, you will have the opportunity to: Perform vulnerability assessment on periodic basis and report the findings. Develop mitigations/resolutions to vulnerabilities assessed, in conjunction with the development teams. Collaborate with various product development teams to identify vulnerabilities and needed mitigations. Support the cybersecurity compliance activities. Research and perform analysis on new vulnerabilities within out tech landscape and support the remediation activities. Identify missing patch’s and support the product team in fixing them. Knowledge in working with Security modules like Encryption, Authentication and Authorization. Proven ability to deliver high quality results in a timely fashion while working on different projects concurrently. Performing security development activities as part medical device SDLC & Design Controls procedures. Developing Product security documentation for 510(k) submissions. The essential requirements of the job include: Bachelor’s degree in computer science, Computer Engineering or a related field with 3 – 6 years of proven experience Good knowledge and understanding of the security concepts like CIA and Defense in Depth. Proven expertise across a range of operating systems and environments, such as MS Windows, Linux, Embedded OS Hands on experience with security tools and products like Nessus / etc. Hands on experience with Secure Development Lifecycle and testing. It would be a plus if you also possess previous experience in: Industry-recognized certification like CEH etc. Experience with Healthcare products is good to have. Good knowledge of windows/Linux vulnerability management. Exposure to Good Documentation Practices followed in Medical Device products.

Posted 2 months ago

Apply

4 - 6 years

6 - 8 Lacs

Pune

Work from Office

Naukri logo

About the Job is looking for a Product Security Engineer to join our global Resilient Development team. Red Hat's Resilient Development Team focuses on Secure Development and improving proactively the security posture of our Products and Services portfolio and their build pipelines. You will perform security architecture reviews and security assessments of those offerings throughout their development life cycle, in collaboration with Engineering and other Product Security teams, to make sure the expectations of our Secure Software Development Framework implementation are met. This process includes analyzing and documenting architecture from a security point of view, questioning security assumptions, finding potential problems, proposing improvements, performing code reviews, defining testing expectations, and promoting secure development best practices from our offerings through to their related open source communities. As a Product Security Engineer, you will represent the security needs of our customers to our Engineering teams, advocating and planning for a solid foundation of security architecture across the open source ecosystem. Successful applicants must reside in a state where Red Hat is registered to do business. What will you do Engage with engineering teams to promote security-aware development of Red Hat technologies/solutions. Understand current and emerging threats in the enterprise product and service space. Analyze complex software systems and identify potential weaknesses in their architecture. Plan and carry out threat modeling activities, and realistic threat simulations across our offerings. Consult with software developers and product teams on improved security architecture. Ensure that product roadmaps and new features mitigate risk, adhere to security policies, and provide customers with minimal security risk. Contribute to customer facing security documentation, reference, and other data as used by the common vulnerabilities and exposures (CVE) pages. Promote Red Hat Product Security efforts within the community and the greater public. What will you bring Bachelor's degree in computer science/engineering or equivalent/relevant work experience. Strong understanding of common security vulnerabilities, (e.g. OWASP Top Ten) including how to detect, demonstrate, mitigate and resolve them. Good understanding of Linux security technologies and product security experience; for example: - POSIX Permissions, ACL, SELinux; - Seccomp, Linux namespaces and cgroups; - Linux administrations related to security: secure boot, TPMs, trusted execution environment, Linux boot chain, virtualization, containers and hypervisor security. Experience with one or more programming languages like Go, Python, C/C++, and a willingness to learn new ones. Knowledge and experience with modern container orchestration systems: Kubernetes, Openshift; comfortable with container technologies. Ability to work with minimal supervision, in a fast-paced environment with a multicultural team distributed across multiple countries and time zones. Solid communication and negotiation skills. Excellent collaboration skills and dedication as a teammate. The following will be considered a plus: Familiarity with open source software and open source as a business model. Linux-specific and/or security-related certifications (e.g. RHCSA, RHCE, RHCA, CISSP, CISM, CSSLP, CISA, etc.) Work experience and/or certifications with cloud providers and cloud-related technologies (AWS, Azure, GCP, Tekton, Jenkins, etc.)

Posted 2 months ago

Apply

13 - 18 years

50 - 55 Lacs

Pune, Gurgaon

Hybrid

Naukri logo

We are Hiring: Principal Cybersecurity Engineer Location: Pune / Gurugram Experience: 13-18 Years Deep understanding of cybersecurity principles and concepts , including cryptography, network security, authentication, authorization, and data protection . Expertise in medical device cybersecurity standards and regulations (FDA, IEC 62304, ISO 14971, IEC 81001-5-1) Proven experience in threat modelling, risk assessment, and vulnerability management within the medical device context Strong knowledge of secure coding practices and software development methodologies Experience with penetration testing tools a nd techniques for medical devices Excellent communication and collaboration skills to work effectively with cross-functional teams Bachelor's degree in computer science, electrical engineering, or a related field 10+ years of experience with cybersecurity and software systems Advanced cybersecurity certifications (e.g., CISSP, CISA, OSCP) are highly desirable

Posted 2 months ago

Apply

1 - 6 years

7 - 11 Lacs

Hyderabad

Work from Office

Naukri logo

We are seeking a Distributed Cloud Support Engineer-I , who is hardworking and committed to customer success. You are comfortable in both the Support and Engineering environments, translating technical documentation and conversations into clear, concise directions for customers and partners. You are passionate about helping our customers tackle and solve problems. You will provide support via phone, email, messaging, and web portal. Support requests range in complexity from "how to" questions through involved debugging and forensic efforts when prioritizing operational issues. Visualizing problems remotely is key to being successful in this role along with excellent analytic and troubleshooting skills. You will have a significant career growth opportunity within a fast-paced SaaS company. What will you do? Fix reported issues and advocate for the customer. Collaborate with sales and engineering teams to provide support to resellers, service provider and enterprise customers, as well as end users via telephone, e-mail, Slack and the web portal. Issue reproduction and concise documentation of solutions provided through technical notes, case studies and knowledge base articles. Critical issue management and customer assurance when handling reported issues. Coordinate fixes by Engineering or Developers when required and relay appropriate information to our partners and customers. Provide recommendations on how to improve supportability, reliability, availability, and serviceability based on lessons learned through issue resolution. How do you qualify? 1 or more years of experience working in an operations environment. Background in customer service/support and IT, networking, or IT security incident management. Experience driving efficiency, handling growth, and delivering results. Good understanding of IT, Network, or IT SOC best practices and a real passion for continuous improvement. Strong organizational skills and work well with contacts in various business subject areas. Conversationally and technically fluent in English verbally and written. Advantageous to have: Strong understanding of Networking and Layer 7 Protocols. Familiarity with Container technologies (Docker and Kubernetes). Knowledge of Data Representation types (XML, JSON, YAML). Public cloud experience with Amazon Web Services (AWS), Google Cloud Platform (GCP) and/or Microsoft Azure is preferred. Security product/solutions experience (Firewalls, WAFs, DDoS Mitigation) is preferred. Strong troubleshooting skills, independent and collaborative. Approachable disposition and steadfast in delivering. Ability to prioritize and multitask when leading sophisticated technical issues. Proven understanding of routing and switching technologies. Ability to read different scripting and automation languages (Python, Shell and Ansible). Bachelors degree in technologically relatable field or equivalent practical experience. Physical Demands and Work Environment This role requires availability outside normal business hours to align with the distributed global teams or to respond to critical security events. Some travel may be required (less than 10%). The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change.

Posted 2 months ago

Apply

7 - 10 years

30 - 32 Lacs

Pune, Delhi NCR, Noida

Work from Office

Naukri logo

Dear Candidate, We are seeking a Firmware Security Engineer to play a critical role in identifying, analyzing, and mitigating security risks in firmware and embedded systems . As cyber threats increasingly target firmware layers, securing these components is crucial for protecting devices, industrial systems, and IoT ecosystems . Key Responsibilities: Analyze and assess firmware security in embedded systems, IoT devices, and industrial control systems (ICS) . Perform reverse engineering and static/dynamic analysis to detect backdoors, malware implants, and unauthorized modifications in firmware. Identify and mitigate vulnerabilities such as buffer overflows, stack/heap exploitation, and privilege escalation in embedded environments. Implement secure boot mechanisms and firmware authentication methods to prevent unauthorized execution. Develop and integrate firmware integrity verification techniques , including code signing, cryptographic hashing, and trusted execution environments (TEE) . Conduct hardware penetration testing on IoT and embedded systems to assess potential attack vectors. Research and implement defenses against firmware rootkits, BIOS/UEFI attacks, and bootkit threats . Collaborate with hardware engineers and chip manufacturers to enhance hardware security features such as TPM (Trusted Platform Module), ARM TrustZone, and secure enclaves . Work with Secure OTA (Over-the-Air) Update Mechanisms to ensure firmware updates are encrypted and verified. Design and develop custom security tools for binary analysis, firmware extraction, and vulnerability assessment . Assess and improve hardware security for medical devices, automotive ECUs, smart appliances, and industrial controllers . Monitor and respond to emerging firmware security threats , vulnerabilities (CVE analysis), and zero-day exploits in embedded software. Perform side-channel analysis and fault injection testing to detect potential weaknesses in hardware cryptographic implementations. Ensure compliance with security standards such as NIST 800-193, ISO 26262 (automotive security), and IEC 62443 (industrial security) . Develop security best practices and secure coding guidelines for firmware developers. Required Skills & Qualifications: Strong experience in firmware security analysis, reverse engineering, and embedded software development . Proficiency in C, C++, and assembly language for low-level embedded programming. Hands-on expertise with reverse engineering tools such as Ghidra, IDA Pro, Binwalk, Radare2, and Firmware Analysis Toolkit. Deep knowledge of hardware debugging tools like JTAG, UART, SPI, I2C sniffers, and logic analyzers . Experience in UEFI/BIOS security, secure boot implementations, and trusted execution environments (TEE) . Strong understanding of binary exploitation techniques, stack/heap manipulation, and firmware patching . Familiarity with cryptographic security mechanisms such as AES, RSA, ECC, TPM, HSMs (Hardware Security Modules) . Experience securing IoT protocols , including MQTT, CoAP, Zigbee, LoRaWAN, and BLE security . Strong understanding of ARM Cortex-M, RISC-V, and x86 firmware architectures . Hands-on experience with penetration testing on embedded systems and hardware hacking . Ability to analyze firmware binaries for vulnerabilities and create proof-of-concept exploits . Understanding of automotive security (CAN bus, AUTOSAR, ISO 21434) and industrial IoT security . Soft Skills: Strong problem-solving and analytical skills. Excellent communication skills to work with cross-functional teams. Ability to work independently and as part of a team. Detail-oriented with a focus on delivering high-quality solutions Note: If you are interested, please share your updated resume and suggest the best number & time to connect with you. If your resume is shortlisted, one of the HR from my team will contact you as soon as possible. Srinivasa Reddy Kandi Delivery Manager Integra Technologies

Posted 2 months ago

Apply

3 - 8 years

3 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

Hello Candidate, Greetings from Hungry Bird IT Consulting Services Pvt. Ltd.! We are hiring a Network Engineer for our client. Location: Hyderabad Industry: IT - Hardware / Networking / IT Security No Of Working Days : 6 days working Timings : 08:00 AM to 05:00 PM Experience: 3+ years in Network Engineer or Computer Networking (if B.Tech), 5+ years in Cyber Security or Computer Networking (if not B.Tech) Key Responsibilities (KRAs) Knowledge of security products from leading OEMs such as Firewall, 2FA, DLP, SIEM, Backup etc. Understanding of cloud security solutions Product OEM and Partner Relationship Management Knowledge and understanding of the IT industry especially System Integrations Strong knowledge and understanding of the cyber security industry and security solutions landscape Strong knowledge and understanding of the security industry and ability to eliminate sales obstacles through creative and adaptive approaches. Knowledge of Routing, Switching with network security devices/systems such as firewalls, IDS, and IPS. Hands-on experience configuring security devices is preferred Should also have security product hands-on experience Good understanding of cloud security solutions and Security architecture and design experience Key Skills & Abilities: Netskope , FortiGate firewalls Strong knowledge of cybersecurity solutions & industry trends Experience with system integration in IT security . Application Process: (Interested candidates can share their CV at aradhana@hungrybird.in or call +91 9959417171.) Please furnish the below-mentioned details that would help us expedite the process. PLEASE MENTION THE RELEVANT POSITION IN THE SUBJECT LINE OF THE EMAIL. Example: KRISHNA, HR MANAGER, 7 YEARS, 20 DAYS NOTICE Name: Position applying for: Total experience: Notice period: Current Salary: Expected Salary: Thanks and Regards Aradhana +91 9959417171

Posted 2 months ago

Apply

7 - 12 years

9 - 14 Lacs

Noida

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary:As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your role will involve documenting the implementation of cloud security controls and transitioning to cloud security-managed operations. You will play a crucial role in safeguarding our organization's digital assets and ensuring the security of our cloud infrastructure. Roles & Responsibilities:- Expected to be an SME, collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and maintain the cloud security framework and architecture.- Document the implementation of cloud security controls.- Transition to cloud security-managed operations.- Conduct risk assessments and vulnerability testing.- Stay updated with the latest security trends and technologies. Professional & Technical Skills:- Must To Have Skills:Proficiency in Product Security.- Experience with cloud security frameworks and architectures.- Strong understanding of cloud security best practices.- Knowledge of security controls and compliance frameworks.- Experience in conducting risk assessments and vulnerability testing. Additional Information:- The candidate should have a minimum of 7.5 years of experience in Product Security.- This position is based at our Noida office.- A 15 years full time education is required. 0

Posted 2 months ago

Apply

2 - 6 years

5 - 14 Lacs

Mumbai Suburbs

Work from Office

Naukri logo

Role & responsibilities Perform fuzzing of network protocols on devices like routers, Wi-Fi routers, ONT/OLT, firewalls, and other network appliances. Research and develop fuzzing strategies to test network protocols, identify vulnerabilities, and improve security. Work with tools such as Synopsys Defensics, AFL, Peach Fuzzer, or similar for fuzzing network protocols. Collaborate with hardware and firmware teams to understand device functionality and how to target fuzzing effectively. Analyze crash reports and debug logs to identify root causes of vulnerabilities and provide detailed remediation steps. Prepare technical documentation and reports on the findings from fuzzing activities. Stay updated with the latest security trends, techniques, and tools in network protocol fuzzing. Preferred candidate profile Minimum 1 year of experience in fuzzing network protocols or security testing of network devices. Strong understanding of network protocols (e.g.TCP/IP, DHCP, DNS, HTTP, SIP, etc.). Experience with fuzzing tools (e.g., Synopsys, Defensics, AFL, Peach Fuzzer, Sulley, or custom fuzzers). Knowledge of network hardware, embedded systems, and operating systems. Familiarity with router, firewall, Wi-Fi router, ONT/OLT technologies, and associated protocols. Hands-on experience with debuggers, crash analysis, and memory corruption vulnerabilities. Solid understanding of network security concepts and vulnerability assessment techniques. Prior experience with security assessments and penetration testing of network appliances. Familiarity with scripting languages (e.g., Python, Bash) for automation of testing processes. Knowledge of reverse engineering and static/dynamic analysis of firmware. Certifications (Optional but Preferred) : OSCP, CEH, or other relevant security certifications.

Posted 2 months ago

Apply

10 - 15 years

30 - 37 Lacs

Bengaluru

Hybrid

Naukri logo

Cybersecurity Architect 10+ Years Educational Background: A Bachelors or Master’s degree in Information technology, cybersecurity, computer science, or a related field is essential. [10+] years of experience in cybersecurity, previous experience in a security engineering role highly desired Holding professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or certifications recognized by the NCSC is highly regarded. Familiarity with relevant cybersecurity frameworks and standards, including the CIISec Skills Framework and guidelines provided by the NCSC, is essential Must have extensive experience of architecture design, security regulations and security implementation in Infra and Cloud Security, Product Security, etc

Posted 2 months ago

Apply

15 - 17 years

20 - 22 Lacs

Pune

Remote

Naukri logo

What You'll DoAs the Technical Lead for Technical Privacy within the Product Security organization, you will help ensure that our products are designed with robust data security and privacy controls. You will lead a team of security engineers, collaborate with cross-functional teams, and drive the implementation of privacy-by-design principles throughout the product lifecycle. Your primary responsibilities will focus on safeguarding personal data and other regulated data, ensuring compliance, and mitigating data security risks across Avalara's product ecosystem. You will be reporting to Sr. Manager, Product Security What Your Responsibilities Will Be Technical Leadership: Technical Lead for the technical privacy team focused on incorporating data privacy and security controls into product design processes. You will develop a comprehensive technical privacy strategy with a focus on data privacy. Partner with engineering, legal, compliance, and development and other product security teams to ensure privacy and security features are integrated into all stages of the product lifecycle. Create privacy-by-design principles and advocate for secure development practices across the organization. Data Privacy Governance: You will ensure products comply with relevant data privacy regulations such as GDPR, CCPA, HIPAA, and other regulatory standards. Develop product security procedures that align with legal, regulatory, and industry requirements. Guide privacy impact assessments (PIAs) and security risk assessments (SRAs) on products and services. Risk Management: Identify privacy and security risks related to product development and deployment. Implement controls and measures to mitigate data breaches, unauthorized access, and other security incidents. Lead incident response efforts related to privacy violations or data security breaches in collaboration with legal and IT teams. Collaboration and Communication: Collaborate with engineering teams to integrate security tools, practices, and automated testing into CI/CD pipelines. Work with the legal and compliance teams to interpret and respond to data privacy regulations and standards. Communicate privacy and security issues, and solutions to senior leadership and other team members. Training and Awareness: You will conduct training programs to educate product development teams on privacy and security best practices. Stay up to date with latest data privacy trends, threats, and technologies and ensure the team is aligned with industry best practices. Monitor and Reporting: Oversee monitoring of product security and privacy controls to ensure ongoing compliance and risk mitigation. Provide regular updates to leadership on the status of product security programs, privacy compliance, and risk management activities. What You'll Need To Be Successful 15 years of experience in product security, data privacy, or a related field, with experience technical leadership. Technical Skills: Understanding of data protection technologies, encryption methods, and privacy-enhancing techniques. Education: Bachelor's degree in computer science, Cybersecurity, or a related discipline (or equivalent experience).

Posted 2 months ago

Apply

6 - 8 years

8 - 10 Lacs

Hyderabad

Work from Office

Naukri logo

Job Area: Engineering Group, Engineering Group > Software Engineering General Summary: As a leading technology innovator, Qualcomm pushes the boundaries of what's possible to enable next-generation experiences and drives digital transformation to help create a smarter, connected future for all. As a Qualcomm Software Engineer, you will design, develop, create, modify, and validate embedded and cloud edge software, applications, and/or specialized utility programs that launch cutting-edge, world class products that meet and exceed customer needs. Qualcomm Software Engineers collaborate with systems, hardware, architecture, test engineers, and other teams to design system-level software solutions and obtain information on performance requirements and interfaces. Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 3+ years of Software Engineering or related work experience. OR Master's degree in Engineering, Information Systems, Computer Science, or related field and 2+ years of Software Engineering or related work experience. OR PhD in Engineering, Information Systems, Computer Science, or related field and 1+ year of Software Engineering or related work experience. 2+ years of academic or work experience with Programming Language such as C, C++, Java, Python, etc. Responsibilities Demonstrate consistent, high quality, on-time, independent execution on moderately complex technical tasks. Strong technical expertise and ownership for the modules owned with limited direction and oversight. Lead development efforts for Security software in C for embedded platforms on ARM / RISCV processors. Responsible for planning, time management, and quality of own deliverables and of the team. Follow defined methodologies, processes, and procedures for various software development activities. Triage, Debug, and resolve issues and bugs in the software through good problem-solving skills. Collaborate within and cross functional teams as required to ensure quality work products are delivered. Work on multiple assignments and demonstrate an ability and flexibility to cater to changing priorities. Effectively resolve ambiguities in requirements and priorities; And independently resolve blocking issues. Keep oneself up to date with industry trends and technology developments around the related areas of work. Minimum Qualifications Bachelor's / Master's degree in Engineering, Information Systems, Computer Science, Electronics or related field. Minimum 6-8 years of experience in Embedded software development and programming in C / C++ / Assembly. Strong understanding of Embedded hardware, Computer Architecture and Operating System concepts. Good understanding of OS concepts such as tasks, signals, timers, priorities, deadlocks, stacks, etc. Understanding of RTOS fundamentals like multi-threading, interrupt management, cache/memory management etc. Understanding of YOCTO/OWRT/Android build framework. Exposure of Linux device driver development, debugging, system stability, etc. Experience in leading and driving software development activities independently and working with multiple teams. Good expertise and experience on product security for embedded devices, which may include a subset of the following skillsets: Symmetric & Asymmetric Cryptography, Device integrity & Authentication, Secure communications, Trusted execution environment, Protected virtualization Platform isolation techniques, Embedded/real time OS security, Vulnerability detection methods, Exploit mitigation techniques, Hardware access control, Secure provisioning and debug, Key management and applied cryptography Desirable Qualifications Good understanding of and experience on embedded processor architectures like ARMv8/9 or RISC-V processors. Experience with code versioning tools (git / perforce) build tools (Makefiles / SConscript / Python), and debuggers like JTAG. Understanding of a broad range of topics Linux Kernel, Android Frameworks, Secure software development etc.

Posted 3 months ago

Apply

3 - 8 years

3 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

Hello Candidate, Greetings from Hungry Bird IT Consulting Services Pvt. Ltd.! We are hiring a Cyber Security Engineer for our client. Location: Hyderabad Industry: IT - Hardware / Networking / IT Security No Of Working Days : 6 days working Timings : 08:00 AM to 05:00 PM Experience: 3+ years in Cyber Security or Computer Networking (if B.Tech), 5+ years in Cyber Security or Computer Networking (if not B.Tech) Key Responsibilities (KRAs) Knowledge of security products from leading OEMs such as Firewall, 2FA, DLP, SIEM, Backup etc. Understanding of cloud security solutions Product OEM and Partner Relationship Management Knowledge and understanding of the IT industry especially System Integrations Strong knowledge and understanding of the cyber security industry and security solutions landscape Strong knowledge and understanding of the security industry and ability to eliminate sales obstacles through creative and adaptive approaches. Knowledge of Routing, Switching with network security devices/systems such as firewalls, IDS, and IPS. Hands-on experience configuring security devices is preferred Should also have security product hands-on experience Good understanding of cloud security solutions and Security architecture and design experience Key Skills & Abilities: Netskope , FortiGate firewalls Strong knowledge of cybersecurity solutions & industry trends Experience with system integration in IT security . Application Process: (Interested candidates can share their CV at aradhana@hungrybird.in or call +91 9959417171.) Please furnish the below-mentioned details that would help us expedite the process. PLEASE MENTION THE RELEVANT POSITION IN THE SUBJECT LINE OF THE EMAIL. Example: KRISHNA, HR MANAGER, 7 YEARS, 20 DAYS NOTICE Name: Position applying for: Total experience: Notice period: Current Salary: Expected Salary: Thanks and Regards Aradhana +91 9959417171

Posted 3 months ago

Apply

4 - 9 years

6 - 14 Lacs

Chennai

Work from Office

Naukri logo

We are seeking a dynamic Cyber Security/Product Security Specialist to strengthen our security initiatives. This pivotal role involves championing a robust security culture, refining our secure Software Development Lifecycle (SDLC) for products, and supporting audit requirements. The specialist will collaborate closely with product teams to integrate stringent security practices, reduce vulnerabilities, and coordinate with internal and external teams, including those focused on network security. Job description Lead the integration of security practices into the product development lifecycle, ensuring adherence to secure SDLC principles. Support Code reviews, DevSecOps, and Architecture Design reviews. Perform Application security reviews like Penetration testing and code reviews on Mobile applications, APIs, and web applications using OWASP standards. Identify security loopholes in the product design by performing threat modelling. Proficient in identifying vulnerabilities, guiding remediation steps and tracking the timely closure of issues based on severity. Deploy and manage security tools integration into CI/CD pipeline. Perform SAST, DAST, and SCA scans using in-house preferred tools, review the scan results for false positives and deliver them to engineering teams. Develop, implement, and enforce tailored security policies and procedures to fortify product security. Lead product security efforts during security incident management and define post-incident product security remediation plans. Keep abreast of the latest security vulnerabilities and security trends. You might be a strong candidate if you have/are: At least 3 years of experience in the Application security domain. Hold any security certification such as OSCP, OSWE, GPEN, GWAPT, CRTP, etc Experience with web application scanning tools, including Qualys WAS, Appspider, Acutenitx, Veracode, Burp Suite, Netsparker, OWASP Zap, Checkmarx, Whitesource, Snyk or similar. Good knowledge in secure protocols, encryption standards, authentication mechanisms, etc Outstanding communication and interpersonal skills, with the ability to engage effectively with diverse stakeholders. Qualifications Cyber Security Job Responsibilities: Safeguards information system assets by identifying and solving potential and actual security problems. Protects system by defining access privileges, control structures, and resources. Recognizes problems by identifying abnormalities; reporting violations. Implements security improvements by assessing current situation; evaluating trends; anticipating requirements. Determines security violations and inefficiencies by conducting periodic audits. Keeps users informed by preparing performance reports; communicating system status. Maintains quality service by following organization standards. Maintains technical knowledge by attending educational workshops; reviewing publications. Contributes to team effort by accomplishing related results as needed. Cyber Security Qualifications / Skills: System administration Network security Problem solving Information security policies Network protocols Education, Experience, and Licensing Requirements: Bachelors degree in Computer Science, Information Systems, or equivalent education or work experience 4+ years of prior relevant experience Advanced certifications such as SANS GIAC/GCIA/GCIH, CISSP or CASP and/or SIEM-specific training and certification are a value add Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements. Experience with vulnerability scanning solutions Familiarity with the DOD Information Assurance Vulnerability Management program. Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security Experience developing and deploying signatures will be added advantage (e.g. YARA, Snort, Suricata, HIPS) Understanding of mobile technology and OS (i.e. Android, iOS, Windows), VMware technology, and Unix and basic

Posted 3 months ago

Apply

6 - 10 years

15 - 25 Lacs

Mumbai

Work from Office

Naukri logo

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role At Kyndryl, our Security Consultants are game-changers, constantly pushing the boundaries of what's possible and transforming the way our customers do business. We're looking for a talented individual who thrives in a dynamic environment and is ready to take on the challenge of protecting organizations from threats both known and unknown – being the defender of tomorrow’s digital world. As a Security Consultant, you'll be the guardian of confidentiality, integrity, and availability, ensuring organizations are shielded from the ever-evolving threat landscape. Your expertise will be sought after as you assess, analyze, and implement effective security measures in customer environments, leaving no stone unturned when it comes to safeguarding their most sensitive data. Collaboration will be your forte, as you work closely with clients to understand their unique security requirements and assess their current security posture. Armed with this knowledge, you'll provide expert guidance and recommendations on the best security practices, risk management strategies, and robust security policies that will fortify their defenses. You won't stop at providing advice; you'll roll up your sleeves and get hands-on. Designing and implementing security controls, policies, and procedures will be your playground. You'll work alongside cross-functional teams to deploy state-of-the-art technologies, including firewalls, intrusion detection/prevention systems, access controls, and encryption technologies, ensuring a comprehensive security framework. The thrill of uncovering vulnerabilities and risks is what motivates you. Armed with your extensive knowledge, you'll conduct thorough security assessments, leaving no stone unturned in identifying potential security breaches. Your findings will serve as the foundation for meticulous security audits and reviews, ensuring adherence to policies and procedures. Your reports and findings will be the catalyst for management decisions and actions. In the fast-paced world of cybersecurity, staying ahead of the game is crucial. That's why you'll continuously immerse yourself in the latest security threats, technologies, and best practices. Your recommendations will drive enhancements to the organization's security posture, ensuring it remains at the cutting edge of defense. Your influence won't be limited to systems alone. You'll lend your expertise to the design and review of IT infrastructure, systems, and applications, ensuring they are secure by design from inception. Not only will you make an impact within our organization, but you'll also collaborate with customers and vendors on security assessments, audits, and due diligence activities. Your knowledge and experience will be instrumental in shaping secure collaborations and partnerships. Our consultants are restless for innovation. They are at the edge of technology, changing the way our customers implement business solutions – so, if you’re a problem-solver, an innovative thinker, and a self-starter with a passion high impact assignments which align technology to business outcomes, then we want to hear from you! Apply today to join our team that has a host of exciting projects and customers waiting for you to work with them to solve complex transformation puzzles through technology. Your Future at Kyndryl As a Security Consultant at Kyndryl you will join the Kyndryl Consultant Profession, working with other Kyndryl Consultants, Architects, Project Managers, and cross-functional Technical Subject Matter Experts – presenting unlimited opportunities with unmatched support through our investment in your learning, training, and career growth Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Skills and Experience F5 Big-IP (LTM , GTM , ASM/WAF Modules, iRules) Should analyze, design, implement and maintain the network s F5 Load Balancer infrastructure. Should inspect data packets and TCP, IP flow in network and application flow. Must be an expert in F5Load Balancing platforms and will possess a working knowledge of switches, routers, and firewall concepts. Should be able to configure and maintain F5 Load Balancers, load balancing best practices and WAN/LAN network management. Should also take the responsibility to upgrade network operating systems software and hardware as per the management requirements. Must provide inputs into security technology plan. Must ensure that the plans are integrated effectively with the other aspects of the technical infrastructure. Should provide all the necessary support for large scale infrastructure migrations and baseline reviews. The engineer should have a good understanding to work with other networking security groups as well. The professionals should be able to handle any issues related to engineering design and deployment implementation. Should have sound understanding of F5 Architecture, Product and Installation process. Should have hands-on exposure to handle troubleshoot LTM module: concepts, design, iRules, Profiles, configuration, troubleshooting, best practices, Automations, upgrades, Performance -tuning. Should have hands-on exposure to handle troubleshoot GTM : concepts, design, iRules, Profiles, configuration, troubleshooting, best practices, Automation, upgrades, Performance-tuning. Should has working exposure of ASM/WAF : concepts, design, iRules, Profiles, configuration, troubleshooting, best practices, Automation, upgrades, Performance-tuning. Relevant Certification on F5. Knowledge of F5 migration OR migration to F5 would be an added advantage. Perform administration tasks for F5 load balancers, including configuration, monitoring, troubleshooting, and user administration Design, implement, and deploy F5 load balancing solutions for applications and services Collaborate with application teams to understand requirements and optimize load balancing configurations Implement and test F5 load balancer upgrades, migrations, and new deployments Maintain documentation, runbooks, and knowledge base articles for F5 load balancing systems and processes Stay up-to-date with the latest F5 product releases, features, and industry trends Ready to work on 24/7 shifts to support client requirement. 5-7 years of experience in F5 load balancer administration and support roles and 10-12 years of experience over all in network and security products. Solid understanding of load balancing concepts, technologies, and best practices Proficiency in F5 BIG-IP administration, including configuration, monitoring, and scripting Knowledge of network protocols, web application architectures, and security concepts Strong troubleshooting, problem-solving, and analytical skills Excellent communication abilities and teamwork Work from client location in Airoli, Navi Mumbai. Understanding of ITIL concepts. Aptitude to acquire new technology and concepts quickly Understanding and daily use of Microsoft Office 365 Suite and other productivity tools (e.g., Excel, Word, PowerPoint, SharePoint) to accomplish audit and compliance related tasks Technical Graduation is must. Prefer B.E Preferred Skills and Experience Strong verbal and written communications skills are a must Ability to work effectively across internal and external organizations Strong technology background is required Aptitude to acquire new technology and concepts quickly Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 3 months ago

Apply

5 - 10 years

7 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Product Security Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education About The Role ::Product Security Testing Specialist - IoT, Embedded Devices, Hardware, Medical Instruments and automotive connected cars securityWe are seeking a highly skilled and motivated Product Security Testing Engineer with 6-8 years of proven expertise in IoT, embedded devices, hardware medical instruments and automotive/connected car security. The ideal candidate will have a strong background in security testing methodologies, risk assessment, and a deep understanding of the unique challenges posed by IoT, medical devices and software defined vehicle. This role requires a practical approach to identifying, assessing, and mitigate security flaws in our products as well as expertise in leading and mentoring a group of product security experts.Key responsibilities: Conduct and lead thorough security assessments of IoT devices, embedded systems, hardware components, and medical instruments. Conduct security assessments of connected car systems, including in-vehicle networks, infotainment systems, telematics, and communication interfaces. Identify vulnerabilities and weaknesses in the design, implementation, and configurations of automotive software and hardware components. Assess the security of in-vehicle communication networks, including CAN bus, Ethernet, and wireless protocols. Perform penetration testing, vulnerability assessments, and code reviews to identify security weaknesses. Evaluate the security of IoT ecosystems, including communication protocols, cloud interfaces, and firmware. Assess the security of embedded systems and identify potential vulnerabilities in both software and hardware. Perform hardware penetration testing to identify vulnerabilities in electronic systems. Assess the security of medical devices, ensuring compliance with industry regulations and standards. Identify and address security risks associated with healthcare information systems and connected medical instruments. Evaluate and prioritize security risks based on potential impact and likelihood. Provide recommendations and collaborate with cross-functional teams to implement effective security controls. Stay current with emerging security threats, vulnerabilities, and testing methodologies. Implement best practices for security testing and collaborate with development teams to integrate security into the development lifecycle. Document security testing processes, findings, and remediation recommendations. Generate comprehensive reports for stakeholders, including technical details and actionable insights.Technical experience: Hands on experience with penetration testing tools and methodologies. Proven experience in security testing with a focus on IoT, embedded systems, hardware, and medical instruments. Knowledge of secure coding practices and the ability to review code for security vulnerabilities. Familiarity with industry standards and regulations related to product security, such as ISO 27001, ISO/SAE 21434, UNECE WP.29, IEC 62443, UNR-155 and FDA cybersecurity guidelines. Experience with threat modeling and risk assessment frameworks. Familiarity with secure development practices for embedded systems. Understanding of regulatory requirements for medical device security. Strong understanding of networking protocols, encryption, and authentication mechanisms.Professional attributes: Excellent communication skills, including the ability to convey complex security concepts to technical and non-technical stakeholders. Demonstrated proficiency in autonomously managing client relationships with a high level of independence and accountability. Experience of effectively leading teams of various sizes, ranging from small to large, and actively contributing to their skill development and upskilling. Ability to manage multiple tasks and deadlines. Qualifications: Bachelor's or master's degree in engineering or computer science, Information Security, or a related field. Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP). Qualifications 15 years full time education

Posted 3 months ago

Apply

5 - 7 years

8 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

A degree in Computer Science, Computer Systems Engineering, or a related field. 5+ years of experience performing security design reviews and Threat modeling of products and features. Expertise in Web and Network Security Strong communication skills Excellent problem-solving skills Ability to translate technical security requirements and risks into terms that anyone can understand. Ability to work independently and handle multiple tasks concurrently.

Posted 3 months ago

Apply

5 - 10 years

15 - 25 Lacs

Bengaluru

Hybrid

Naukri logo

Experience with serverless and microservices based container architectures. Having worked in a DevSecOps team Experience with Cloud applications infrastructure and design, in particular: IoT, Data Lakes and knowledge of cyber security.

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies