Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
7.0 - 12.0 years
35 - 60 Lacs
Bengaluru
Hybrid
Who are we? FalconX is a pioneering team of operators, investors, and builders committed to revolutionising institutional access to the crypto markets. Operating at the intersection of traditional finance and cutting-edge technology, FalconX addresses the industry's foremost challenges: Navigating the digital asset market can be complex and fragmented, with limited products and services that support trading strategies, structures, and liquidity found in conventional financial markets. As a comprehensive solution for all digital asset strategies from start to scale, FalconX operates as the connective tissue empowering clients with seamless navigation through the ever-evolving cryptocurrency landscape. Who is on the team? We are entrepreneurs. Many in our company have been founders or have aspirations to eventually start their own company. We take these ambitions and experiences to bring a solutions-oriented mindset to the problems we encounter day-to-day. We have been fortunate to have learned from mentors and peers at institutions such as Google, LinkedIn, JUMP Trading, Citadel, PEAK6 Investments, Goldman Sachs, JP Morgan, Harvard Business School, Carnegie Mellon, IIT, IIM +more. The team you would report to all have technical backgrounds in Application Security and Product Security. They cover a wide variety of products that fall within Cryptocurrency, High-Frequency Trading, and AI systems. In this role, youll dive deeply into these product lines and provide guidance as well as implementation when needed. Responsibilities : Engineer systems and internal security tools to improve application security across all of FalconX via SSDLC improvements; Interface with the rest of Engineering on the security of Falconxs software products (Cryptocurrency; High Frequency Trading; AI systems). Youll provide guidance / recommendations / and drive the Engineers to implement your recommendations. Review and provide eng-design / architectural guidance for application systems Occasional Vulnerability Management Occasional Pentesting Educate and Train Engineers on Application Security fundamentals Execute and improve security reviews and consulting processes with runbooks and automation. Knowledge, Skills & Abilities : Strong software engineering skills in Python, Golang or Ruby. You have a past of writing production-grade code and can comfortably interact with SWEs throughout FalconX. Bonus points if you have a background of security exposure in the contexts of cryptocurrency, high-frequency trading system, or AI development Proven impact in two or more of the following AppSec domains: AppSec Education and Training, API Security, Implementation of a SSDLC, App-Layer Pentesting (BurpSuite), Manual / Automated Secure Code Reviews (SAST Tools, DAST Tools), Application Security Architecture and Design, Implementation of Security Controls (Encryption; MFA / RBAC Permissions; etc), OWASP Top Ten, BSIMM / OpenSAMM Proficiency in threat modeling risks to product applications / associated infrastructure and driving the implementation of preventative controls in partnership with Engineering. Technical Project Management Strong familiarity with what a secure SDLC should look like and tools / techniques to implement an SSDLC Ability to collaborate with internal and external stakeholders while prioritizing tasks and work independently under minimal supervision. Vulnerability management, incident response Qualifications : Minimum of 6+ years of direct experience as a Software Engineer / Software Architect in Python, Ruby, Go, etc Minimum of 6+ years of direct experience in Product or Application Security as a hands-on-keyboard AppSec or ProdSec Engineer / Consultant Practical experience performing detailed application-layer risk assessments, performing secure code reviews, doing eng-design reviews with Engineers Exceptional written and verbal communication skills Strong technical curiosity within the spaces of Cryptocurrency, AI, and High Frequency Trading Systems
Posted 1 month ago
8.0 - 13.0 years
30 - 35 Lacs
Pune
Work from Office
We are seeking an experienced, strategic, and hands-on Manager - Product Security to lead a growing team of penetration testers supporting BMCs IZOT product line. This team focuses on offensive security assessments across mainframe-based solutions and modern application ecosystems. In this leadership role, you will manage a team of skilled professionals performing deep security testing, red teaming, vulnerability analysis, and secure architecture reviews. Youll be responsible for setting strategic goals, driving security initiatives, and ensuring secure-by-design practices are embedded across product development lifecycles. This position requires a solid blend of technical expertise in offensive security, deep understanding of mainframe and modern application architectures, and strong leadership to influence and drive results across cross-functional teams. To ensure youre set up for success, you will bring the following skillset & experience: Bachelor's or master's degree in computer science, Information Security, or related field. 8+ years in cybersecurity roles, with 3+ years in technical leadership or management capacity. Proven experience leading or performing penetration testing on both mainframe and modern platforms. Demonstrated experience conducting red team-style assessments or advanced threat emulation on mainframe and modern systems. Proficient in tools such as: Mainframe utilities: REXX, ISPF, JCL Security tools: Nmap, Burp Suite, Wireshark, custom scripts Proficient in scripting and automation skills (Python, REXX, Bash, or similar). Experience delivering technical and executive-level security reports. Strong communication and leadership skills, with a proven ability to lead technical teams or projects. Experience producing board-level reports and presenting findings to senior stakeholders. Exposure to hybrid environments (mainframe to cloud integrations, modernization efforts). Familiarity with modern enterprise integration methods (REST, SOAP, MQ, FTP) that interface with mainframe services.
Posted 1 month ago
8.0 - 12.0 years
13 - 18 Lacs
Bengaluru
Work from Office
At Juniper, we believe the network is the single greatest vehicle for knowledge, understanding, and human advancement the world has ever known, To achieve real outcomes, we know that experience is the most important requirement for networking teams and the people they serve. Delivering an experience-first, AI-Native Network pivots on the creativity and commitment of our people. It requires a consistent and committed practice, something we call the Juniper Way, About the Job:. Juniper Network’s Security Incident Response Team (SIRT) is the focal point for discovering and remediating product security vulnerabilities. The role of an Incident Manager (IM) is to drive security defects to resolution by understanding the software flaw, its impact, its proper resolution, and then communicating that to customers through Juniper Security Advisories. SIRT IMs are part of a global team that works closely with both the support and engineering organizations. The role requires understanding of secure software development and the consequences of security flaws. The successful candidate will have a passion for security and an ability to see problems with a security professional’s perspective, Responsibilities:. Juniper is seeking an experienced Security Incident Response Manager to join the Juniper SIRT, The SIRT IM is responsible for:. Investigating reports of potential vulnerabilities. Analyzing software flaws and working with engineering teams to ensure proper remediation. Authoring and presenting Security Advisories. Working with external security communities, security researchers, and customers. Managing the response to product security incidents. Requirements:. Should have 2-4 years of product security incident response experience, Familiarity with secure programming concepts and testing, Good understanding of web application security threats and defenses (SQL Injection, XSS, CSRF, etc,,), Good understanding of database security threats and defenses (cloud/container configuration, access control, authentication, misconfigured and abused privileges, logging and auditing), Familiarity with OWASP guidelines. Participation in a local OWASP chapter or similar security focused communities is a plus, Familiarity with Common Vulnerabilities and Exposure (CVE) systems, Coordinated Vulnerability Disclosure (CVD), Familiarity with the Common Weakness Enumeration (CWE) types and CERT Secure Coding Standards, Familiarity with the Common Vulnerability Scoring System (CVSS), Familiarity with agile software development/continuous integration/automation, Minimum of a Bachelor’s Degree in Engineering or Computer Science or Cybersecurity or similar, Excellent written and verbal communication skills. Should be able to produce a writing sample: A blog entry or other long-form post on a technical issue, comment on a mailing list or open source issue or other technical comment on social media, a self-written academic paper, Strong analytical and problem-solving skills, and the ability to work independently, Ability to collaborate across functional teams as well as external partners, researchers, and other security teams, Ability to track multiple issues in various states of progress, Desired Qualifications:. A strong ability to use scripting languages such as Perl, Python, TCL, and UNIX shell programming, Demonstrated experience (such as academic projects) in JavaScript, NodeDot js, Pug, PHP, Python, Java, C/C++, R, Rust, relational and NoSQL databases, Experience with HTML, CSS, JSON, XML file creation and management. Experience with AWS, Azure, GCP, Snowflake, Should be able to produce a sample code such as a project hosted on GitHub or personal site, Linux and/or FreeBSD experience along with the ability to read and understand multiple programming languages, Familiarity with routing and switching protocols and security firewalls, About Juniper Networks. Juniper Networks challenges the inherent complexity that comes with networking and security in the multicloud era. We do this with products, solutions and services that transform the way people connect, work and live. We simplify the process of transitioning to a secure and automated multicloud environment to enable secure, AI-driven networks that connect the world. Additional information can be found at Juniper Networks (www,juniperDot Net) or connect with Juniper on Twitter, LinkedIn and Facebook, WHERE WILL YOU DO YOUR BEST WORK?. Wherever you are in the world, whether it's downtown Sunnyvale or London, Westford or Bengaluru, Juniper is a place that was founded on disruptive thinking where colleague innovation is not only valued, but expected. We believe that the great task of delivering a new network for the next decade is delivered through the creativity and commitment of our people. The Juniper Way is the commitment to all our colleagues that the culture and company inspire their best work-their life's work. At Juniper we believe this is more than a job it's an opportunity to help change the world, At Juniper Networks, we are committed to elevating talent by creating a trust-based environment where we can all thrive together. If you think you have what it takes, but do not necessarily check every single box, please consider applying. We’d love to speak with you, Additional Information for United States jobs:. ELIGIBILITY TO WORK AND E-VERIFY. In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire, Juniper Networks participates in the E-Verify program. E-Verify is an Internet-based system operated by the Department of Homeland Security (DHS) in partnership with the Social Security Administration (SSA) that allows participating employers to electronically verify the employment eligibility of new hires and the validity of their Social Security Numbers, Information for applicants about E-Verify / E-Verify Informacin en espaol: This Company Participates in E-Verify / Este Empleador Participa en E-Verify. Immigrant and Employee Rights Section (IER) The Right to Work / El Derecho a Trabajar. E-Verify® is a registered trademark of the U.S. Department of Homeland Security, Juniper is an Equal Opportunity workplace. We do not discriminate in employment decisions on the basis of race, color, religion, gender (including pregnancy), national origin, political affiliation, sexual orientation, gender identity or expression, marital status, disability, genetic information, age, veteran status, or any other applicable legally protected characteristic. All employment decisions are made on the basis of individual qualifications, merit, and business need, Show more Show less
Posted 1 month ago
6.0 - 10.0 years
13 - 18 Lacs
Mumbai
Work from Office
Are you a Product Security Analyst expert looking for a challenging opportunity?. Join our Product Security team.. We operate at the heart of the digital transformation of our business. Our team is responsible for Product Security including application security for our global organization.. Partner with the best.. We are looking for a Lead Product Security Analyst, with a focus in Product Security. In this role, you will work in a team and demonstrate working knowledge of systems and products and how they are secured in customers' businesses.. As a Senior Lead Product Security Engineer, you will be responsible for:. Building and executing engineering processes for early detection of design flaws, vulnerabilities, weaknesses, missing security controls, and secure implementation of product features.. Applying existing technologies, approaches, methodologies in new combinations to design new products, systems, or processes. Viewed internally and externally as a specialist in the discipline.. Presenting plans, technical roadmaps, ri Senior Lead Product Security Engineer Are you a Product Security Analyst expert looking for a challenging opportunity?. Join our Product Security team.. We operate at the heart of the digital transformation of our business. Our team is responsible for Product Security including application security for our global organization.. Partner with the best.. We are looking for a Lead Product Security Analyst, with a focus in Product Security. In this role, you will work in a team and demonstrate working knowledge of systems and products and how they are secured in customers' businesses.. As a Senior Lead Product Security Engineer, you will be responsible for:. Building and executing engineering processes for early detection of design flaws, vulnerabilities, weaknesses, missing security controls, and secure implementation of product features.. Applying existing technologies, approaches, methodologies in new combinations to design new products, systems, or processes. Viewed internally and externally as a specialist in the discipline.. Presenting plans, technical roadmaps, risks and recommendations to senior business and technical leaders. Lead programs related to Product Security Incident Response, Product Inventory, etc. Driving awareness, engagement, and improvements of Product Security metrics with business leaders. Demonstrating working knowledge of systems and products and how they are secured in a customer environment.. Implementing tools to automate and scale security processes.. Providing security leadership to the business segment product security teams. Experiencing with cyber security framework (NIST 800-53, ISO 27001, IEC 62443, etc.) implementation and governance. Familiarity with cyber regulations (EU NIS2, CRA, etc). Fuel your passion. To be successful in this role you will:. Have a bachelor’s degree in computer science or “STEM” Majors (Science, Technology, Engineering, and Math).. Have a minimum of 10 years of professional experience in a STEM-related degree preferably with a Product Security / OT Security focus.. Have project management experience, and expertise with Agile development teams.. Have prior work experience with various development tools including threat modelling, vulnerability technologies, application security, and secure coding principles.. Have experience with penetration testing and ethical hacking.. Have experience securing applications within cloud platforms such as AWS, Azure, and alike.. Have experience with a broad set of information security technologies and processes within a SaaS, IaaS, PaaS, or cloud environment.. Working with us. Our people are at the heart of what we do at Baker Hughes. We know we are better when all our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other.. Working for you. Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we must push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect:. Contemporary work-life balance policies and wellbeing activities. Comprehensive private medical care options. Safety net of life insurance and disability programs. Tailored financial programs.. Additional elected or voluntary benefits. About Us:. We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet.. Join Us:. Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward.. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law.. R136394. Show more Show less
Posted 1 month ago
7.0 - 10.0 years
25 - 27 Lacs
Pune
Work from Office
Greetings from HR Central!!! We do have an Urgent Opening for One of the Leading Global Product Development Company for Sr Product Cybersecurity Engineer for Pune Location. (Working from Office) Please go through the JD below and let me know your interest to proceed with:Please share your updated CV. Role: Sr Product Cybersecurity Engineer Location: Pune Job Title: Sr. Product Cybersecurity Engineer Location: Pune, India What you will do: In this pivotal role within the Global Product Security team, you will be responsible for driving continuous improvement initiatives aligned with our cybersecurity maturity framework, ensuring proactive management of security and data privacy risks throughout the product lifecycle. You will leverage your expertise in secure software development practices to embed security and privacy by design within our product offerings. How you will do it: Provide cybersecurity guidance and expertise to product development teams and business leaders during all phases of the software development lifecycle. Architect security and privacy by design into software applications for mobile, embedded systems, and cloud environments. Drive secure SDLC activities including security requirements, architectures, threat models, and testing. Periodically assess and refine security policies, standards, and compliance metrics. Quantify product risk and identify appropriate security controls. Review product architectures for security vulnerabilities and collaborate on remediation strategies. Coordinate with third-party penetration testing teams to ensure comprehensive security assessments. Maintain awareness of current security threats and vulnerabilities impacting our products. Support incident response operations and vulnerability remediation activities. Drive security awareness and training initiatives across the organization. What we look for: Bachelor's or higher degree in Engineering, Cybersecurity, or a related technical field. 7-10 years of experience in product or application cybersecurity. Strong knowledge of secure SDLC practices, security architectures, and compliance activities. Proven experience in delivering results using agile methodologies. Solid understanding of security threats, attack vectors, and appropriate security controls. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills to convey complex security concepts to diverse audiences. Familiarity with security frameworks such as NIST, ISO 27001, and GDPR. Relevant cybersecurity certifications (e.g., CISSP, CEH) are a plus. What we offer: Competitive salary and performance-based bonuses. Comprehensive benefits package including health, dental, and retirement plans. Opportunities for professional development and continuous learning. Collaborative and inclusive work environment. Candidates should have experience in the Application Security side and not Network Security. The role requires experience in software development/engineering with some cybersecurity experience. If interested, please share CV to anisha@hr-central.in or call me @ +91-95620-44988
Posted 1 month ago
6.0 - 10.0 years
11 - 15 Lacs
Bengaluru
Work from Office
Responsibilities for the position: • Subject Matter Expert on cyber security domain for our engine power plant automation & control systems (OT) • Own the development of plant automation & control systems product features towards agreed certifications or standards • Further develop cyber security guidelines, control system access policies, compliance related processes for engine power plants • Ensure cyber compliance and market competitiveness of the power plant automation & controls. Capture and translate global regulations / contract requirements to the development roadmap • Implement and ensure applicable security lifecycle controls to the products in accordance with SDL framework and IEC 62443 • Train and educate key stakeholders on cyber security requirements, internal guidelines, processes and access policies • Guide and support technical, sales, and engineering teams in validating project related cyber security requirements • Participate in customer negotiations and assurance activities Qualifications Master’s or bachelor’s degree in computer science, electrical engineering, information technology, automation engineering or a related field • In-depth understanding of operational technology related Purdue Enterprise Reference Architecture and product security requirements • Expertise in cyber legislations and standards for example IEC 62443, NERC CIP, NIS2, SOC2, AESCSF, SOCI and EU CRA • Experience in working with product security, vulnerability handling and cyber security in an industrial company context • Team player and collaborator mindset • Excellent presentation skills, as well as written, and verbal communication skills • Fluent language skills in English • Cyber security certifications are beneficial • Experience in agile methodologies is seen as a plus
Posted 1 month ago
2.0 - 5.0 years
4 - 8 Lacs
Bengaluru
Work from Office
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation. Our technologies are at the heart of modern applications that are enabling digital transformation across the globe! We give the worlds largest businesses, service providers, governments, and consumer brands the ability to securely deliver every app, anywherewith confidence. We do this by working collaboratively in an innovative environment, helping each other succeed. We take extraordinary pride in being trusted advisers to our customers, offering the best solutions for their interests. If our mission and culture excite you, we would love to talk with you! We are seeking a Distributed Cloud Support Engineer II who is hardworking and committed to customer success. You are comfortable in both the Support and Engineering environments, translating technical documentation and conversations into clear, concise directions for customers and partners. You are passionate about helping our customers tackle and solve problems. You will provide support via phone, email, messaging, and web portal. Support requests range in complexity from "how to" questions through involved debugging and forensic efforts when prioritizing operational issues. Visualizing problems remotely is key to being successful in this role along with excellent analytic and troubleshooting skills. You will have a significant career growth opportunity within a fast-paced SaaS company. What will you do Fix reported issues and advocate for the customer. Collaborate with sales and engineering teams to provide support to resellers, service provider and enterprise customers, as well as end users via telephone, e-mail, Slack and the web portal. Issue reproduction and concise documentation of solutions provided through technical notes, case studies and knowledge base articles. Critical issue management and customer assurance when handling reported issues. Coordinate fixes by Engineering or Developers when required and relay appropriate information to our partners and customers. Provide recommendations on how to improve supportability, reliability, availability, and serviceability based on lessons learned through issue resolution. Training and enabling our service partners to ensure that they can sufficiently support customer issues. How do you qualify 2 or more years of experience working in an operations environment. Background in customer service/support and IT, networking, or IT security incident management. Experience driving efficiencies, handling growth, and delivering results. Good understanding of IT, Network, or IT SOC best practices and a real passion for continuous improvement. Strong organizational skills and work well with contacts in various business subject areas. Conversationally and technically fluent in English verbally and written. Advantageous to have: Strong understanding of Networking and Layer 7 Protocols. Familiarity with Container technologies (Docker and Kubernetes). Knowledge of Data Representation types (XML, JSON, YAML). Public cloud experience with Amazon Web Services (AWS), Google Cloud Platform (GCP) and/or Microsoft Azure is preferred. Security product/solutions experience (Firewalls, WAFs, DDoS Mitigation) is preferred. Strong troubleshooting skills, independent and collaborative. Approachable disposition and steadfast in delivering. Ability to prioritize and multitask when leading sophisticated technical issues. Proven understanding of routing and switching technologies. Ability to read different scripting and automation languages (Python, Shell and Ansible). Bachelors degree in technologically relatable field or equivalent practical experience. Physical Demands and Work Environment This role requires availability outside normal business hours to align with the distributed team or to respond to critical security events. Some travel may be required (less than 10%). The is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change. Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com ) . Equal Employment Opportunity It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates . Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.
Posted 1 month ago
6.0 - 10.0 years
15 - 25 Lacs
Mumbai
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Infrastructure Architects are the key link between Kyndryl and our clients. You’re in a technical leadership role, uniting and guiding stakeholders from clients, governance, and project executives to delivery and sometimes even the vendors who work with the client. You’ll be there from the start of a project — understanding what’s needed and figuring out the best technical solution. And you’ll be there at the finish, delivering the right product on time and within budget. As an Infrastructure Architect, you’ll draw upon the full breadth of your talent and experience. This is a technical leadership role, so we want you to bring your vision, knowledge, and leadership to each project. To the client, you’re the subject matter expert – consulting early, gathering inputs, understanding what they need from our solution. You define what Kyndryl can do to meet this solution. You design the best solution for the job. And finally, you’re the tech leader for implementation. At Kyndryl we support all major cloud platforms, so you’ll get the chance to use everything you know – and then some. You’ll also become expert at knowing when and how to call on other SMEs outside your wheelhouse. Thinking your way around pre-existing limitations will grow your creativity and flexibility. You’ll learn a lot here, and if you want to work toward certifications there are plenty of opportunities.The rewards for all this are many. You’ll get to influence, create, and deliver something from start to finish. You will have the power to delight our clients. Your future at Kyndryl This role opens the door to many career paths, both vertical and horizontal, and there may be opportunity to travel. It’s a great chance for database administrators or other techs to break into the cloud. It’s also a solid path to become enterprise or chief architect or a distinguished engineer! Whatever you see for yourself, you’ll find the opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Experience 5-7 years of experience in F5 load balancer administration and support roles and 10-12 years of experience over all in network and security products. Education Qualification- Any Graduate F5 Big-IP (LTM , GTM , ASM/WAF Modules, iRules) Should analyze, design, implement and maintain the network s F5 Load Balancer infrastructure. Should inspect data packets and TCP, IP flow in network and application flow. Must be an expert in F5Load Balancing platforms and will possess a working knowledge of switches, routers, and firewall concepts. Should be able to configure and maintain F5 Load Balancers, load balancing best practices and WAN/LAN network management. Should also take the responsibility to upgrade network operating systems software and hardware as per the management requirements. Must provide inputs into security technology plan. Must ensure that the plans are integrated effectively with the other aspects of the technical infrastructure. Should provide all the necessary support for large scale infrastructure migrations and baseline reviews. The engineer should have a good understanding to work with other networking security groups as well. The professionals should be able to handle any issues related to engineering design and deployment implementation. Should have sound understanding of F5 Architecture, Product and Installation process. Should have hands-on exposure to handle troubleshoot LTM module: concepts, design, iRules, Profiles, configuration, troubleshooting, best practices, Automation, upgrades, Performance -tuning. Should have hands-on exposure to handle troubleshoot GTM : concepts, design, iRules, Profiles, configuration, troubleshooting, best practices, Automatons, upgrades, Performance-tuning. Should has working exposure of ASM/WAF : concepts, design, iRules, Profiles, configuration, troubleshooting, best practices, Automatons, upgrades, Performance-tuning. Relevant Certification on F5. Knowledge of F5 migration OR migration to F5 would be an added advantage. Perform administration tasks for F5 load balancers, including configuration, monitoring, troubleshooting, and user administration Design, implement, and deploy F5 load balancing solutions for applications and services Collaborate with application teams to understand requirements and optimize load balancing configurations Implement and test F5 load balancer upgrades, migrations, and new deployments Maintain documentation, run books, and knowledge base articles for F5 load balancing systems and processes Stay up-to-date with the latest F5 product releases, features, and industry trends Ready to work on 24/7 shifts to support client requirement. Solid understanding of load balancing concepts, technologies, and best practices Proficiency in F5 BIG-IP administration, including configuration, monitoring, and scripting Knowledge of network protocols, web application architectures, and security concepts Strong troubleshooting, problem-solving, and analytical skills Excellent communication abilities and teamwork Work from client location in Airoli, Navi Mumbai. Understanding of ITIL concepts. Aptitude to acquire new technology and concepts quickly Understanding and daily use of Microsoft Office 365 Suite and other productivity tools (e.g., Excel, Word, PowerPoint, SharePoint) to accomplish audit and compliance related tasks Preferred Skills and Experience Strong verbal and written communications skills are a must Ability to work effectively across internal and external organizations. Strong technology background is required Aptitude to acquire new technology and concepts quickly Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 1 month ago
15.0 - 20.0 years
45 - 60 Lacs
Pune
Work from Office
What You'll Do As a Principal Talent Acquisition Partner , you will help build world-class technology and business teams. You will be the trusted advisor to hiring managers, guiding end-to-end hiring strategies, across India and global markets. The role will report to Director TA Job Location: Remote What Your Responsibilities Will Be Strategic Talent Partnering: You will collaborate with business leaders and hiring managers to define hiring strategies aligned with our workforce needsfrom entry-level to Director-level roles. Full-Cycle Recruitment: Own the end-to-end recruitment process, including sourcing, interviewing, negotiating offers, and onboarding, across technology and business functions. Market Expertise: Leverage knowledge of Indian talent marketsincluding Tier 1/Tier 2 engineering campuses and senior tech leadership poolsto attract top talent. Talent Analytics: Use data and talent intelligence to guide hiring decisions, report on pipeline health, and improve recruitment strategies. Leadership Hiring: Build scalable programs for hiring across all levelsfrom mid to seasoned architects and executive roles. Employer Branding: You will Partner with marketing and HR to strengthen our employer brand across digital channels, campuses, and talent communities. Global Collaboration: You will work in cross-cultural teams across geographies; bring sensitivity and awareness to diverse work styles and backgrounds. Tech Hiring: You will Understand the nuances of hiring for AI/ML, data engineering, and SaaS platform roles, and use modern sourcing and assessment tools. Diversity & Inclusion: You will Guide inclusive hiring practices and build diverse candidate pipelines. Process Improvement: You will enhance recruitment workflows, candidate experience, and talent engagement practices using feedback and data. What You'll Need to be Successful 15+ years of experience in talent acquisition, with a track record in technology hiring. Experience the Indian hiring landscape and global recruiting environments. 15+ years of experience sourcing tools (e.g., LinkedIn Recruiter, ATS platforms), analytics dashboards, and hiring technologies. MANDATORILY FROM GLOBAL PRODUCT FIRMS have hired senior tech leads, architects and technologies - Generative AI, product security, SaaS, cloud
Posted 1 month ago
15.0 - 20.0 years
4 - 8 Lacs
Bengaluru
Work from Office
Project Role : Software Development Engineer Project Role Description : Analyze, design, code and test multiple components of application code across one or more clients. Perform maintenance, enhancements and/or development work. Must have skills : SDV Product Security Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Software Development Engineer, you will engage in a dynamic work environment where you will analyze, design, code, and test various components of application code across multiple clients. Your typical day will involve collaborating with team members to perform maintenance and enhancements, ensuring that the software meets the highest standards of quality and functionality. You will also be responsible for developing new features and addressing any issues that arise, contributing to the overall success of the projects you are involved in. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Mentor junior team members to enhance their skills and knowledge.- Continuously evaluate and improve development processes to increase efficiency.Perform penetration testing of SoC Automotive products.Establish the Security goals and requirements.Verification strategies in compliance with ISO 21434Develop test specifications, test cases, and test plans for security vulnerability testing.Scan vulnerabilities with regards to CVSS levels and patch fixing from NIST database.Perform code-level fuzz testing using open source tools.Support documentation of test results and collaborate with the development teamParticipate in automating test process within CI/CD environments.Setup and maintain traceability in compliance with Automotive SPICE requirementsExperience in tools like OpenVAS, Nmap , wireshark, penetration testing for embedded systems. Experience in Automotive domain is a must.Practical experience performing TARA, security concepts and other Cybersecurity Artefacts mentioned in IS021434 Professional & Technical Skills: - Must To Have Skills: Proficiency in SDV Product Security.- Strong understanding of secure software development practices.- Experience with threat modeling and risk assessment.- Familiarity with security testing tools and methodologies.- Knowledge of compliance standards related to software security. Additional Information:- The candidate should have minimum 5 years of experience in SDV Product Security.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
6.0 - 8.0 years
3 - 7 Lacs
Bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Product Security Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Product Security Testing Specialist - IoT, Embedded Devices, Hardware, Medical Instruments and automotive connected cars securityWe are seeking a highly skilled and motivated Product Security Testing Engineer with 6-8 years of proven expertise in IoT, embedded devices, hardware medical instruments and automotive/connected car security. The ideal candidate will have a strong background in security testing methodologies, risk assessment, and a deep understanding of the unique challenges posed by IoT, medical devices and software defined vehicle. This role requires a practical approach to identifying, assessing, and mitigate security flaws in our products as well as expertise in leading and mentoring a group of product security experts. Roles & Responsibilities:Conduct and lead thorough security assessments of IoT devices, embedded systems, hardware components, and medical instruments.Conduct security assessments of connected car systems, including in-vehicle networks, infotainment systems, telematics, and communication interfaces.Identify vulnerabilities and weaknesses in the design, implementation, and configurations of automotive software and hardware components.Assess the security of in-vehicle communication networks, including CAN bus, Ethernet, and wireless protocols.Perform penetration testing, vulnerability assessments, and code reviews to identify security weaknesses.Evaluate the security of IoT ecosystems, including communication protocols, cloud interfaces, and firmware.Assess the security of embedded systems and identify potential vulnerabilities in both software and hardware.Perform hardware penetration testing to identify vulnerabilities in electronic systems.Assess the security of medical devices, ensuring compliance with industry regulations and standards.Identify and address security risks associated with healthcare information systems and connected medical instruments.Evaluate and prioritize security risks based on potential impact and likelihood.Provide recommendations and collaborate with cross-functional teams to implement effective security controls.Stay current with emerging security threats, vulnerabilities, and testing methodologies.Implement best practices for security testing and collaborate with development teams to integrate security into the development lifecycle.Document security testing processes, findings, and remediation recommendations.Generate comprehensive reports for stakeholders, including technical details and actionable insights. Professional & Technical Skills: Excellent communication skills, including the ability to convey complex security concepts to technical and non-technical stakeholders.Demonstrated proficiency in autonomously managing client relationships with a high level of independence and accountability.Experience of effectively leading teams of various sizes, ranging from small to large, and actively contributing to their skill development and upskilling.Ability to manage multiple tasks and deadlines.Hands on experience with penetration testing tools and methodologies.Proven experience in security testing with a focus on IoT, embedded systems, hardware, and medical instruments.Knowledge of secure coding practices and the ability to review code for security vulnerabilities.Familiarity with industry standards and regulations related to product security, such as ISO 27001, ISO/SAE 21434, UNECE WP.29, IEC 62443, UNR-155 and FDA cybersecurity guidelines.Experience with threat modeling and risk assessment frameworks.Familiarity with secure development practices for embedded systems.Understanding of regulatory requirements for medical device security.Strong understanding of networking protocols, encryption, and authentication mechanisms. Additional Information:Bachelors or masters degree in engineering or computer science, Information Security, or a related field.Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP).-5 or more years experience require in cyber security field including penetration testing, thread modeling, hardware security.-This position is based at our Bengaluru office-A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
15.0 - 20.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Product Security Testing Specialist - IoT, Embedded Devices, Hardware, Medical Instruments and automotive connected cars securityWe are seeking a highly skilled and motivated Product Security Testing Engineer with 7-11 years of proven expertise in IoT, embedded devices, hardware medical instruments and automotive/connected car security. The ideal candidate will have a strong background in security testing methodologies, risk assessment, and a deep understanding of the unique challenges posed by IoT, medical devices and software defined vehicle. This role requires a practical approach to identifying, assessing, and mitigate security flaws in our products as well as expertise in leading and mentoring a group of product security experts. Roles & Responsibilities:Conduct and lead thorough security assessments of IoT devices, embedded systems, hardware components, and medical instruments.Conduct security assessments of connected car systems, including in-vehicle networks, infotainment systems, telematics, and communication interfaces.Identify vulnerabilities and weaknesses in the design, implementation, and configurations of automotive software and hardware components.Assess the security of in-vehicle communication networks, including CAN bus, Ethernet, and wireless protocols.Perform penetration testing, vulnerability assessments, and code reviews to identify security weaknesses.Evaluate the security of IoT ecosystems, including communication protocols, cloud interfaces, and firmware.Assess the security of embedded systems and identify potential vulnerabilities in both software and hardware.Perform hardware penetration testing to identify vulnerabilities in electronic systems.Assess the security of medical devices, ensuring compliance with industry regulations and standards.Identify and address security risks associated with healthcare information systems and connected medical instruments.Evaluate and prioritize security risks based on potential impact and likelihood.Provide recommendations and collaborate with cross-functional teams to implement effective security controls.Stay current with emerging security threats, vulnerabilities, and testing methodologies.Implement best practices for security testing and collaborate with development teams to integrate security into the development lifecycle.Document security testing processes, findings, and remediation recommendations.Generate comprehensive reports for stakeholders, including technical details and actionable insights. Professional & Technical Skills: Excellent communication skills, including the ability to convey complex security concepts to technical and non-technical stakeholders.Demonstrated proficiency in autonomously managing client relationships with a high level of independence and accountability.Experience of effectively leading teams of various sizes, ranging from small to large, and actively contributing to their skill development and upskilling.Ability to manage multiple tasks and deadlines.Hands on experience with penetration testing tools and methodologies.Proven experience in security testing with a focus on IoT, embedded systems, hardware, and medical instruments.Knowledge of secure coding practices and the ability to review code for security vulnerabilities.Familiarity with industry standards and regulations related to product security, such as ISO 27001, ISO/SAE 21434, UNECE WP.29, IEC 62443, UNR-155 and FDA cybersecurity guidelines.Experience with threat modeling and risk assessment frameworks.Familiarity with secure development practices for embedded systems.Understanding of regulatory requirements for medical device security.Strong understanding of networking protocols, encryption, and authentication mechanisms.- Additional Information:Bachelors or masters degree in engineering or computer science, Information Security, or a related field.Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP).- 5 or more years experience require in cyber security field including penetration testing, thread modeling, hardware security.- This position is based at our Bengaluru office- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
7.0 - 10.0 years
9 - 12 Lacs
Bengaluru
Work from Office
As our foundational Staff UX Researcher in Bengaluru, Karnataka, India, you will lead and establish user research efforts locally, embedding UXR practices within our growing India-based cross-functional teams and taking ownership of high-impact research initiatives for a key Okta product area. This is a unique opportunity to promote and cultivate a user-centered culture, guiding local product, design, and engineering partners who are new to direct collaboration with UX research. You will work closely with these local teams daily, while also collaborating effectively with your global UXR colleagues and stakeholders. Your research will directly inform critical decisions, contributing to both the product's long-term vision and near-term development. You will be instrumental in establishing research operations in India, ensuring that foundational and evaluative insights are effectively leveraged to drive exceptional user experiences. Location: Bengaluru, Karnataka, India Work Mode Hybrid (2-3 days Onsite per week) Note: "This role requires in-person onboarding and travel to our Bengaluru, IN office during the first week of employment." In this role, you ll get to: Champion user-centered best practices and build strong, trusted relationships with product, design, and engineering leaders within our growing Bengaluru office Drive collaborative research initiatives with cross-functional teams and guide them in leveraging insights to inform decisions and foster a culture of curiosity Communicate complex insights clearly and persuasively to diverse audiences across all levels and time zones, ensuring seamless alignment within our global team Help define how our UX Research team best collaborates with and supports product development in the APAC region Establish and refine UX research processes, operational frameworks, and supporting tools tailored to the needs of the Bengaluru office, aligning with our global UX Research standards Build and manage key research operations, including leading APAC participant recruitment efforts and collaborating with our global UX Research Operations team to optimize our Dovetail research repository for local stakeholders Drive UX research enablement for local product designers, guiding them to effectively conduct evaluative research and ensuring foundational artifacts like personas are developed, maintained, and widely adopted Lead end-to-end research initiatives, expertly applying a flexible range of methodologies (generative and evaluative) to illuminate customer needs and deliver high-impact insights that drive product growth Share your expertise and insights with the global UX Research team, and play a pivotal role in building UX Research capacity within the Bengaluru office as the team grows Access global learning resources and collaborate with experienced researchers worldwide to continuously enhance your skills You could be a fit if you have: Approximately 7-10+ years of dedicated UX Research experience, with a significant portion dedicated to leading complex research initiatives and driving product strategy Demonstrated ability to effectively introduce and integrate UX research into teams with limited prior exposure, clearly articulating its value and driving buy-in Experience thriving in a remote, globally distributed team environment, with a proven ability to manage asynchronous communication, maintain alignment across different time zones, and proactively build strong virtual working relationships Demonstrated ability to build rapport and influence stakeholders remotely, fostering a collaborative research environment across cultures A proactive and self-driven approach, with the ability to identify research opportunities, define project scope, and manage research end-to-end with minimal direct oversight in a new and evolving environment Proven ability to successfully project manage complex research initiatives, consistently delivering high-quality insights on time and within scope. Strong ability to plan, prioritize and organize effectively and independently Resourcefulness in navigating ambiguity and establishing new processes where needed Proven experience as an embedded UX Researcher with a track record of identifying and elevating user needs and driving the delivering of value to them Deep expertise and practical application of a wide range of research methodologies (e.g., usability studies, contextual inquiry, surveys, etc.), with a strong ability to select and adapt methods to diverse contexts Able to translate business problems into human-centered research questions, applying your technical understanding to inform company goals Proficiency in communicating user research findings with cross-functional partners to drive alignment and informed decisions Experience with products made for developers, administrators, or other technical audiences Handle multiple projects and tasks concurrently Strong decision making and problem solving capabilities while working with constraints Skilled at tailoring research presentations for diverse internal audiences, including senior leadership Empathy for users and a passion for understanding technical experiences Experience working on security products is a plus Proven ability to guide collaborative sessions with cross-functional partners towards shared objectives A proactive and curious mindset with a dedication to continuous professional development, and a proven ability to contribute positively to the team's research culture and skill set Education Bachelor's or Master s degree in Anthropology, Sociology, Psychology, Human-Computer Interaction (HCI), or a related field, or equivalent demonstrable experience leading impactful user research initiatives #LI-Hybrid #LI-MM #LI-ASITRAY What you can look forward to as a Full-Time Okta employee! Amazing Benefits Making Social Impact Developing Talent and Fostering Connection + Community at Okta Okta cultivates a dynamic work environment, providing the best tools, technology and benefits to empower our employees to work productively in a setting that best and uniquely suits their needs. Each organization is unique in the degree of flexibility and mobility in which they work so that all employees are enabled to be their most creative and successful versions of themselves, regardless of where they live. Find your place at Okta today! https://www.okta.com/company/careers/ . If reasonable accommodation is needed to complete any part of the job application, interview process, or onboarding please use this Form to request an accommodation. Okta is committed to complying with applicable data privacy and security laws and regulations. For more information, please see our Privacy Policy at https://www.okta.com/privacy-policy/ . U.S. Equal Opportunity Employment Information Read more Individuals seeking employment at this company are considered without regards to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, or sexual orientation. When submitting your application above, you are being given the opportunity to provide information about your race/ethnicity, gender, and veteran status. Completion of the form is entirely voluntary . Whatever your decision, it will not be considered in the hiring process or thereafter. Any information that you do provide will be recorded and maintained in a confidential file. If you believe you belong to any of the categories of protected veterans listed below, please indicate by making the appropriate selection. As a government contractor subject to Vietnam Era Veterans Readjustment Assistance Act (VEVRAA), we request this information in order to measure the effectiveness of the outreach and positive recruitment efforts we undertake pursuant to VEVRAA. Classification of protected categories is as follows: A "disabled veteran" is one of the followinga veteran of the U.S. military, ground, naval or air service who is entitled to compensation (or who but for the receipt of military retired pay would be entitled to compensation) under laws administered by the Secretary of Veterans Affairs; or a person who was discharged or released from active duty because of a service-connected disability. A "recently separated veteran" means any veteran during the three-year period beginning on the date of such veteran's discharge or release from active duty in the U.S. military, ground, naval, or air service. An "active duty wartime or campaign badge veteran" means a veteran who served on active duty in the U.S. military, ground, naval or air service during a war, or in a campaign or expedition for which a campaign badge has been authorized under the laws administered by the Department of Defense. An "Armed forces service medal veteran" means a veteran who, while serving on active duty in the U.S. military, ground, naval or air service, participated in a United States military operation for which an Armed Forces service medal was awarded pursuant to Executive Order 12985. Pay Transparency Okta complies with all applicable federal, state, and local pay transparency rules. For additional information about the federal requirements, click here . Voluntary Self-Identification of Disability Form CC-305 Page 1 of 1 OMB Control Number 1250-0005 Expires 04/30/2026 Why are you being asked to complete this form Completing this form is voluntary, and we hope that you will choose to do so. Your answer is confidential. No one who makes hiring decisions will see it. Your decision to complete the form and your answer will not harm you in any way. If you want to learn more about the law or this form, visit the U.S. Department of Labor s Office of Federal Contract Compliance Programs (OFCCP) website at www.dol.gov/agencies/ofccp . How do you know if you have a disability A disability is a condition that substantially limits one or more of your major life activities. If you have or have ever had such a condition, you are a person with a disability. Disabilities include, but are not limited to: Alcohol or other substance use disorder (not currently using drugs illegally) Autoimmune disorder, for example, lupus, fibromyalgia, rheumatoid arthritis, HIV/AIDS Blind or low vision Cancer (past or present) Cardiovascular or heart disease Celiac disease Cerebral palsy Deaf or serious difficulty hearing Diabetes Disfigurement, for example, disfigurement caused by burns, wounds, accidents, or congenital disorders Epilepsy or other seizure disorder Gastrointestinal disorders, for example, Crohn's Disease, irritable bowel syndrome Intellectual or developmental disability Mental health conditions, for example, depression, bipolar disorder, anxiety disorder, schizophrenia, PTSD Missing limbs or partially missing limbs Mobility impairment, benefiting from the use of a wheelchair, scooter, walker, leg brace(s) and/or other supports Nervous system condition, for example, migraine headaches, Parkinson s disease, multiple sclerosis (MS) Neurodivergence, for example, attention-deficit/hyperactivity disorder (ADHD), autism spectrum disorder, dyslexia, dyspraxia, other learning disabilities Partial or complete paralysis (any cause) Pulmonary or respiratory conditions, for example, tuberculosis, asthma, emphysema Short stature (dwarfism) Traumatic brain injury Okta The foundation for secure connections between people and technology Follow Okta Apply
Posted 1 month ago
7.0 - 10.0 years
18 - 33 Lacs
Pune
Remote
Application & product security, including threat modeling and secure SDLC Cloud security (AWS/GCP/Azure), container security (Docker, Kubernetes & API protection DevSecOps- automation in IaC & CI/CD pipelines Scripting (Python/Shell), Linux security Required Candidate profile Sr Security Egr - 7+ yrs exp. to lead & enhance security across the SDLC. expertise in application security, threat modeling, cloud security (AWS/GCP/Azure), DevSecOps practices & strong communication
Posted 1 month ago
3.0 - 8.0 years
19 - 25 Lacs
Hyderabad
Work from Office
Job Area: Engineering Group, Engineering Group > Software Engineering General Summary: As a leading technology innovator, Qualcomm pushes the boundaries of what's possible to enable next-generation experiences and drives digital transformation to help create a smarter, connected future for all. As a Qualcomm Software Engineer, you will design, develop, create, modify, and validate embedded and cloud edge software, applications, and/or specialized utility programs that launch cutting-edge, world class products that meet and exceed customer needs. Qualcomm Software Engineers collaborate with systems, hardware, architecture, test engineers, and other teams to design system-level software solutions and obtain information on performance requirements and interfaces. Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 3+ years of Software Engineering or related work experience. OR Master's degree in Engineering, Information Systems, Computer Science, or related field and 2+ years of Software Engineering or related work experience. OR PhD in Engineering, Information Systems, Computer Science, or related field and 1+ year of Software Engineering or related work experience. 2+ years of academic or work experience with Programming Language such as C, C++, Java, Python, etc. Responsibilities Demonstrate consistent, high quality, on-time, independent execution on moderately complex technical tasks. Strong technical expertise and ownership for the modules owned with limited direction and oversight. Lead development efforts for Security software in C for embedded platforms on ARM / RISCV processors. Responsible for planning, time management, and quality of own deliverables and of the team. Follow defined methodologies, processes, and procedures for various software development activities. Triage, Debug, and resolve issues and bugs in the software through good problem-solving skills. Collaborate within and cross functional teams as required to ensure quality work products are delivered. Work on multiple assignments and demonstrate an ability and flexibility to cater to changing priorities. Effectively resolve ambiguities in requirements and priorities; And independently resolve blocking issues. Keep oneself up to date with industry trends and technology developments around the related areas of work. Minimum Qualifications Bachelor's / Master's degree in Engineering, Information Systems, Computer Science, Electronics or related field. Minimum 6-8 years of experience in Embedded software development and programming in C / C++ / Assembly. Strong understanding of Embedded hardware, Computer Architecture and Operating System concepts. Good understanding of OS concepts such as tasks, signals, timers, priorities, deadlocks, stacks, etc. Understanding of RTOS fundamentals like multi-threading, interrupt management, cache/memory management etc. Understanding of YOCTO/OWRT/Android build framework. Exposure of Linux device driver development, debugging, system stability, etc. Experience in leading and driving software development activities independently and working with multiple teams. Good expertise and experience on product security for embedded devices, which may include a subset of the following skillsets: Symmetric & Asymmetric Cryptography, Device integrity & Authentication, Secure communications, Trusted execution environment, Protected virtualization Platform isolation techniques, Embedded/real time OS security, Vulnerability detection methods, Exploit mitigation techniques, Hardware access control, Secure provisioning and debug, Key management and applied cryptography Desirable Qualifications Good understanding of and experience on embedded processor architectures like ARMv8/9 or RISC-V processors. Experience with code versioning tools (git / perforce) build tools (Makefiles / SConscript / Python), and debuggers like JTAG. Understanding of a broad range of topics Linux Kernel, Android Frameworks, Secure software development etc.
Posted 1 month ago
2.0 - 7.0 years
11 - 16 Lacs
Hyderabad
Work from Office
Job Area: Engineering Group, Engineering Group > Software Engineering General Summary: As a leading technology innovator, Qualcomm pushes the boundaries of what's possible to enable next-generation experiences and drives digital transformation to help create a smarter, connected future for all. As a Qualcomm Software Engineer, you will design, develop, create, modify, and validate embedded and cloud edge software, applications, and/or specialized utility programs that launch cutting-edge, world class products that meet and exceed customer needs. Qualcomm Software Engineers collaborate with systems, hardware, architecture, test engineers, and other teams to design system-level software solutions and obtain information on performance requirements and interfaces. Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 2+ years of Software Engineering or related work experience. OR Master's degree in Engineering, Information Systems, Computer Science, or related field and 1+ year of Software Engineering or related work experience. OR PhD in Engineering, Information Systems, Computer Science, or related field. 2+ years of academic or work experience with Programming Language such as C, C++, Java, Python, etc. We are looking for a passionate and skilled software professionals to provide software engineering solutions for development projects in the Security systems team. In this position, you will work with a team of multi-disciplined professionals to develop and optimize systems, tools and methods for QTI security solutions. The position will require you to work on security software development that needs close interactions with internal teams and potentially with external customers as well. You will be contributing on various Security related technologies across Mobile platform Security, Cryptography, Trusted Execution environments, Access control mechanisms, vulnerability detection etc. You will work across multiple processors, Embedded software platforms, and operating systems. Your work will contribute towards making mobile platforms safe and secure to use and thus creating a positive impact on end user of the handset. Responsibilities Designing, developing, coding, testing and debugging Security related software on Embedded platforms. Developing software in C, Assembly. Python to run on ARM, RISCV & Proprietary CPU platforms. Develop Software modules for proprietary or high level operating systems (Linux/Windows). Follow defined methodologies, processes and procedures for various software development activities. Triage, Debug and resolve issues and bugs in the software through good problem solving skills. Collaborate within and cross functional teams as required to ensure quality work products are delivered. Demonstrate Self motivation and strong initiative and ability to work with minimal supervision or direction. Minimum Qualifications Bachelor's / Master's degree in Engineering, Information Systems, Computer Science, Electronics or related field. 3-5 years of experience in Embedded software development and programming in C / C++ / Assembly. Strong understanding of Embedded hardware, Computer Architecture and Operating System concepts. Good understanding of OS concepts such as tasks, signals, timers, priorities, deadlocks, stacks, etc. Proficiency in MMU concepts, including virtual memory management, address translation, and protection mechanisms Experience with SMMU and its functions, such as address translation, attribute control, and access permissions Understanding of security features related to memory management, such as TrustZone and secure memory regions Understanding of RTOS fundamentals like multi-threading, interrupt management, cache/memory management etc. Good expertise and experience on product security for embedded devices, which may include a subset of the following skillsets Symmetric & Assymmetric Cryptography, Device integrity & Authentication, Secure communications, Trusted execution environment, Protected virtualization Platform isolation techniques, Embedded/real time OS security, Vulnerability detection methods, Exploit mitigation techniques, Hardware access control, Secure provisioning and debug, Key management and applied cryptography Desirable Qualifications Good understanding of and experience on embedded processor architectures like ARMv8/9 or RISC-V processors. Experience with code versioning tools (git / perforce) build tools (Makefiles/SCons), and debuggers like JTAG.
Posted 1 month ago
7.0 - 12.0 years
18 - 33 Lacs
Pune
Remote
Role & responsibilities Application & product security, including threat modeling and secure SDLC Cloud security (AWS/GCP/Azure), container security (Docker, Kubernetes & API protection DevSecOps- automation in IaC & CI/CD pipelines Scripting (Python/Shell), Linux security Preferred candidate profile With more than 7+ years of Total industry experience Advanced experience in securing applications and application settings Advanced experience in app and product security Advanced understanding in securing cloud technologies Experience with technologies from at least one public cloud (AWS, GCP, Azure) Experience in securing containerization (Docker, K8s, etc) and API Experience with modern DevSecOps practices including implementing automated security in IaC and CI/CD pipelines Strong scripting skills Python/Shell Scripting experience Mid to advanced level Linux knowledge in a physical, virtual, or public cloud environment. Exceptional verbal and written communication skills are necessary to effectively collaborate with peers, and to present and explain highly technical information to stakeholders who may have limited technical knowledge. Bonus Points: CISSP, CASP+, GSLC, CISM certified. Qualifications Bachelor's or Master's degree in Computer Science, Engineering, or a related field.
Posted 1 month ago
5.0 - 10.0 years
15 - 30 Lacs
Hyderabad, Pune, Bengaluru
Work from Office
Job Description: Experience: At least 6 years in static code analysis/SAST (Static Application Security Testing), secure coding, and software development. Technical Skills: Proficiency in static code analysis tools (e.g., SonarQube, Veracode, Checkmarx) and experience with secure code review of multiple programming languages, including: Java Python .NET/C# C/C++ Code Review Skills: Ability to read and understand source code across various programming languages and tech stacks, troubleshoot false positives, and confirm genuine issues. Secure Coding Knowledge: Strong understanding of secure coding practices, including OWASP Top 10, SANS 25, and CWE, applicable to cloud and non-cloud environments. Communication and Collaboration Skills: Excellent communication and interpersonal skills, with the ability to: Effectively explain complex technical concepts to non-technical stakeholders Collaborate with developers across multiple teams to drive remediation efforts Facilitate training and awareness programs for developers Work independently and as part of a distributed team
Posted 1 month ago
1.0 - 4.0 years
6 - 9 Lacs
Mumbai
Work from Office
What will you do every day As a Security & Compliance Specialist, you are responsible for helping the implementation of the organization's information security and compliance programs You will also help in implementing and reviewing data protection and privacy controls through technical, operational, and administrative measures The ideal candidate will have good experience in Security in SaaS products, a deep understanding of regulatory requirements, and a proactive approach to managing security threats and third-party risks; someone who enjoys security work and possesses both deep and wide expertise in the security space Job Responsibilities Develop and Implement Security & Privacy Policies (Primary | Must have) Create and maintain comprehensive security policies and procedures for cloud environments and application security that align with organizational goals and regulatory requirements Ensure policies are regularly updated and communicated to relevant stakeholders; should be an SME for Enterprise Security and Privacy related activities Third-Party Risk Management (Primary | Must have) Handle the third-party risk management activities (TPRM) covering both inbound and outbound assessments (through the Customer & Vendor lifecycles) Collaborate with procurement and legal teams to ensure third-party contracts include appropriate security and compliance requirements (this includes reviews of MSA, Bids, RFPs) Compliance Oversight (Primary | Must have) Ensure the organizations compliance with relevant laws, regulations, and standards (e g-, GDPR, HIPAA, ISO 27001, ISO 27701, DPDP, SOC 2); should be an SME for compliance Implementation of minimum 3 standards from GDPR, HIPAA, ISO 27001, ISO 27701, DPDP, SOC 2 Lead internal and external audits and manage responses to audit findings Product Security Practices (Primary | Must have) Integrate security practices into the software development lifecycle (SDLC) and review the releases based on the established Secure SDLC processes Review the Products from time to time checking the availability of enterprise security features Cloud & Infra Security (Secondary | Good to have) Implement, review and maintain robust security controls for cloud platforms (AWS/Azure/GCP) as per the industry best practices (DevSecOps) Perform security assessments/reviews and VA scans (non-mandatory) on cloud infra Cybersecurity (Secondary | Good to have) Knowledge on Cyber Attack Vectors, Cyber Threat Intelligence, Attack Surface Mgmt , etc- Adequate knowledge on Incident Response, Business Resilience and Risk Management Other responsibilities To act as a Security & Privacy champion/catalyst for all functions/BUs within the Company This role needs an avert-risk mindset and should handle Incident Management (able to Identify, Analyze, and Resolve Security Incidents) Contribute to the Cloud & CyberSecurity roadmap and act as an internal advisory/consultant Training entire staff about security and privacy best practices whenever necessary Experience & Other Requirements Degree/Diploma in Computer Science / Information Technology / Cybersecurity or equivalent 2+ years (2-5) of experience in information security, with a focus on compliance Proven track record in implementing security and compliance policies & controls in a Product based Product company (preferably in a SaaS-based company) At least 2 years of working and implementation knowledge for any three of the compliances (ISO 27001, 27701, GDPR, HIPAA, SOC 2, DPDP) Good to have working knowledge of Cloud security practices & involved in DevSecOps activities Good research mindset with a zeal to explore, learn, share, and implement Preferable who can join in 30 days Show more Show less
Posted 1 month ago
3.0 - 7.0 years
8 - 12 Lacs
Hyderabad
Work from Office
Distributed Cloud Support Engineer I Our technologies are at the heart of modern applications that are enabling digital transformation across the globe! We give the world s largest businesses, service providers, governments, and consumer brands the ability to securely deliver every app, anywhere with confidence. We do this by working collaboratively in an innovative environment, helping each other succeed. We take extraordinary pride in being trusted advisers to our customers, offering the best solutions for their interests. If our mission and culture excite you, we would love to talk with you! We are seeking a Distributed Cloud Support Engineer I , who is hardworking and committed to customer success. You are comfortable in both the Support and Engineering environments, translating technical documentation and conversations into clear, concise directions for customers and partners. You are passionate about helping our customers tackle and solve problems. You will provide support via phone, email, messaging, and web portal. Support requests range in complexity from "how to" questions through involved debugging and forensic efforts when prioritizing operational issues. Visualizing problems remotely is key to being successful in this role along with excellent analytic and troubleshooting skills. You will have a significant career growth opportunity within a fast-paced SaaS company. What will you do Fix reported issues and advocate for the customer. Collaborate with sales and engineering teams to provide support to resellers, service provider and enterprise customers, as well as end users via telephone, e-mail, Slack and the web portal. Issue reproduction and concise documentation of solutions provided through technical notes, case studies and knowledge base articles. Critical issue management and customer assurance when handling reported issues. Coordinate fixes by Engineering or Developers when required and relay appropriate information to our partners and customers. Provide recommendations on how to improve supportability, reliability, availability, and serviceability based on lessons learned through issue resolution. How do you qualify 1 or more years of experience working in an operations environment. Background in customer service/support and IT, networking, or IT security incident management. Experience driving efficiency, handling growth, and delivering results. Good understanding of IT, Network, or IT SOC best practices and a real passion for continuous improvement. Strong organizational skills and work well with contacts in various business subject areas. Conversationally and technically fluent in English verbally and written. Advantageous to have: Strong understanding of Networking and Layer 7 Protocols. Familiarity with Container technologies (Docker and Kubernetes). Knowledge of Data Representation types (XML, JSON, YAML). Public cloud experience with Amazon Web Services (AWS), Google Cloud Platform (GCP) and/or Microsoft Azure is preferred. Security product/solutions experience (Firewalls, WAFs, DDoS Mitigation) is preferred. Strong troubleshooting skills, independent and collaborative. Approachable disposition and steadfast in delivering. Ability to prioritize and multitask when leading sophisticated technical issues. Proven understanding of routing and switching technologies. Ability to read different scripting and automation languages (Python, Shell and Ansible). Bachelor s degree in technologically relatable field or equivalent practical experience. Physical Demands and Work Environment This role requires availability outside normal business hours to align with the distributed global teams or to respond to critical security events. Some travel may be required (less than 10%). The is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change. Please note that F5 only contacts candidates through F5 email address (ending with @f5.com) or auto email notification from Workday (ending with f5.com or @myworkday.com ) . Equal Employment Opportunity It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates . Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com .
Posted 1 month ago
6.0 - 11.0 years
5 - 13 Lacs
Chennai
Work from Office
We are seeking an experienced Product Security professional with a background in Manufacturing or Electronics Manufacturing industries (candidates from IT industry will not be considered). The role involves ensuring the safety and security of personnel, property, and assets within our manufacturing facilities by enforcing stringent security protocols and managing security personnel effectively. Key Responsibilities: Manage checkpoint operations and building access control to maintain a secure facility environment. Enforce security protocols and standard operating procedures across the manufacturing premises. Coordinate security for public safety involving customers, VIPs, government officials, and vendors. Conduct shift-wise inspection of emergency exit doors and checkpoint doors for compliance and safety. Perform regular perimeter and internal patrolling to prevent security breaches. Lead investigations related to security violations, unauthorized entry, theft, process violations, and suspicious materials found on-site. Maintain guard profiles and ensure accurate documentation. Oversee guard recruitment, retention strategies, training, and deployment plans to maintain an effective security workforce. Liaise with guard vendors for service quality and contract management. Address guard welfare concerns and resolve grievances. Design and implement guard incentive programs to motivate the security team. Conduct regular guard assessments to ensure performance standards and compliance. Required Profile: 6 to 13 years of relevant experience in security management within Manufacturing or Electronics Manufacturing industries. Strong understanding of physical security, access control, and emergency protocols specific to manufacturing environments. Proven experience in managing security personnel and vendor relationships. Ability to conduct investigations and enforce compliance effectively. Excellent communication and stakeholder management skills. Strong organizational and documentation skills. Proactive and detail-oriented approach to security challenges.
Posted 2 months ago
7.0 - 12.0 years
30 - 45 Lacs
Pune
Work from Office
We are seeking an experienced, strategic, and hands-on Manager - Product Security to lead a growing team of penetration testers supporting BMCs IZOT product line. This team focuses on offensive security assessments across mainframe-based solutions and modern application ecosystems. Leadership & Management Lead and mentor a team of penetration testers with diverse skill sets (mainframe, distributed, web, and cloud security). Define and execute the teams roadmap, goals, and priorities in alignment with product and organizational objectives. Foster a culture of innovation, continuous learning, and technical excellence in security testing. Manage staffing, performance, and career development of team members. REQUIRED SKILLS: Bachelor's or master's degree in computer science, Information Security, or related field. 8+ years in cybersecurity roles, with 3+ years in technical leadership or management capacity. Proven experience leading or performing penetration testing on both mainframe and modern platforms. Demonstrated experience conducting red team-style assessments or advanced threat emulation on mainframe and modern systems. Proficient in tools such as: Mainframe utilities: REXX, ISPF, JCL Security tools: Nmap, Burp Suite, Wireshark, custom scripts Proficient in scripting and automation skills (Python, REXX, Bash, or similar). Experience delivering technical and executive-level security reports. Strong communication and leadership skills, with a proven ability to lead technical teams or projects. Experience producing board-level reports and presenting findings to senior stakeholders. Exposure to hybrid environments (mainframe to cloud integrations, modernization efforts). Familiarity with modern enterprise integration methods (REST, SOAP, MQ, FTP) that interface with mainframe services.
Posted 2 months ago
5.0 - 10.0 years
15 - 30 Lacs
Pune, Ahmedabad
Work from Office
Job Title: Senior Security Engineer Medical Device Cybersecurity & Compliance Experience Level: 5 to 10 years Location- Ahmedabad/Pune Key Responsibilities: Drive end-to-end cybersecurity integration across the medical device product development life cycle, ensuring security is embedded from concept to release. Develop and maintain cybersecurity for medical products, including security requirements specifications, risk assessments, threat models, and product security architecture documentation. Conduct thorough gap assessments to evaluate compliance with IEC 81001-5-1, IEC 60601-4-5, AAMI TIR 57, and AAMI TIR 97 standards, and implement remediation measures. Perform hands-on vulnerability assessments, penetration testing, and secure code reviews of embedded devices, IoMT (Internet of Medical Things) components, and connected systems. Collaborate closely with development, compliance, and regulatory teams to ensure product security measures meet both internal security policies and external regulatory expectations. Support SBOM management, software supply chain risk evaluations, and third-party component analysis to maintain software transparency and mitigate risks. Provide expert input on secure communication protocols, encryption standards, data protection for both at-rest and in-transit data, and cloud-based connectivity of medical systems. Assist in developing incident response strategies and bring working knowledge of HIPAA, GDPR, and HL7 to address data privacy and healthcare-specific regulatory concerns. Contribute to the continuous enhancement of internal secure development processes, tools, and methodologies, while championing security best practices within product teams. We are inviting applications from candidates who can join 15 to 30 days notice. Interested candidates please email your latest updated resume to: ravindra.m@creenosolutions.com For more details please free to reach out to RAVINDRA @ 6305363701
Posted 2 months ago
8.0 - 13.0 years
15 - 30 Lacs
Bengaluru
Work from Office
Role & responsibilities Staff Cyber Security Architect Preferred candidate profile
Posted 2 months ago
5.0 - 10.0 years
7 - 12 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Job Description:Product Security Testing Specialist - IoT, Embedded Devices, Hardware, Medical Instruments and automotive connected cars securityWe are seeking a highly skilled and motivated Product Security Testing Engineer with 6-8 years of proven expertise in IoT, embedded devices, hardware medical instruments and automotive/connected car security. The ideal candidate will have a strong background in security testing methodologies, risk assessment, and a deep understanding of the unique challenges posed by IoT, medical devices and software defined vehicle. This role requires a practical approach to identifying, assessing, and mitigate security flaws in our products as well as expertise in leading and mentoring a group of product security experts.Key responsibilities: Conduct and lead thorough security assessments of IoT devices, embedded systems, hardware components, and medical instruments. Conduct security assessments of connected car systems, including in-vehicle networks, infotainment systems, telematics, and communication interfaces. Identify vulnerabilities and weaknesses in the design, implementation, and configurations of automotive software and hardware components. Assess the security of in-vehicle communication networks, including CAN bus, Ethernet, and wireless protocols. Perform penetration testing, vulnerability assessments, and code reviews to identify security weaknesses. Evaluate the security of IoT ecosystems, including communication protocols, cloud interfaces, and firmware. Assess the security of embedded systems and identify potential vulnerabilities in both software and hardware. Perform hardware penetration testing to identify vulnerabilities in electronic systems. Assess the security of medical devices, ensuring compliance with industry regulations and standards. Identify and address security risks associated with healthcare information systems and connected medical instruments. Evaluate and prioritize security risks based on potential impact and likelihood. Provide recommendations and collaborate with cross-functional teams to implement effective security controls. Stay current with emerging security threats, vulnerabilities, and testing methodologies. Implement best practices for security testing and collaborate with development teams to integrate security into the development lifecycle. Document security testing processes, findings, and remediation recommendations. Generate comprehensive reports for stakeholders, including technical details and actionable insights.Technical experience: Hands on experience with penetration testing tools and methodologies. Proven experience in security testing with a focus on IoT, embedded systems, hardware, and medical instruments. Knowledge of secure coding practices and the ability to review code for security vulnerabilities. Familiarity with industry standards and regulations related to product security, such as ISO 27001, ISO/SAE 21434, UNECE WP.29, IEC 62443, UNR-155 and FDA cybersecurity guidelines. Experience with threat modeling and risk assessment frameworks. Familiarity with secure development practices for embedded systems. Understanding of regulatory requirements for medical device security. Strong understanding of networking protocols, encryption, and authentication mechanisms.Professional attributes: Excellent communication skills, including the ability to convey complex security concepts to technical and non-technical stakeholders. Demonstrated proficiency in autonomously managing client relationships with a high level of independence and accountability. Experience of effectively leading teams of various sizes, ranging from small to large, and actively contributing to their skill development and upskilling. Ability to manage multiple tasks and deadlines. Qualifications: Bachelor's or master's degree in engineering or computer science, Information Security, or a related field. Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP). Qualifications 15 years full time education
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough