Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8.0 - 13.0 years
3 - 7 Lacs
Karnataka
Work from Office
Immediate Openings on SAP ABAP BTP RAP - PAN INDIA - Contract 7+ Years SAP ABAP BTP RAP PAN INDIA Period :Immediate Employment Mode Contract Working Mode Hybrid Description Strong hands-on experience in SAP ABAP development, including classical and object-oriented programming Expertise in RAP (Restful Application Programming Model) for building cloud-ready applications on SAP BTP Experience with SAP BTP ABAP Environment and Business Application Studio (BAS) Deep understanding of CDS (Core Data Services), AMDP (ABAP Managed Database Procedures), and OData services Knowledge of event-driven architecture and side-by-side extensibility on SAP BTP Experience in developing custom Fiori applications and integrating them with SAP backend using OData services Strong understanding of cloud security concepts, authentication mechanisms (OAuth, SAML, JWT), and SAP Identity Authentication Service Experience with performance optimization, debugging, and troubleshooting of ABAP-based applications Secondary Skills Exposure to SAP CAP (Cloud Application Programming Model) for cloud-native application development Knowledge of SAP BTP services like Workflow Management, Business Rules, and Integration Suite Experience with Git-based version control systems and CI/CD pipelines for SAP BTP deployments Interested candidates share profiles at srilakshmi.k
Posted 1 month ago
5.0 - 8.0 years
10 - 15 Lacs
Pune
Work from Office
Company Overview: At Codvo, software and people transformations go hand-in-hand We are a global empathy led technology services company Product innovation and mature software engineering are part of our core DNA Respect, Fairness, Growth, Agility, and Inclusiveness are the core values that we aspire to live by each day We continue to expand our digital strategy, design, architecture, and product management capabilities to offer expertise, outside-the-box thinking, and measurable results Roles and Responsibilities:- Tier 3 end user support Creating, reviewing, and maintaining custom OAuth and OIDC integrations with Okta Management of application, org, and authorization server access policies Architecting, Maintaining, developing, and supporting integrations with critical platforms such as Oracle, Workday, Active Directory, and Azure Managing and integrating applications integrated with the Okta Access Gateway Developing Okta Workflows to drive critical business processes Developing custom code to interact with Oktas public facing APIs Terraform and PowerShell experience is encouraged Managing Org2Org federations with other companies in the Hitachi Group Implementing advanced Okta features including FastPass, Device Management and Assurance Policies, Desktop MFA, and Identity Threat Management Mentoring more junior team members Completing code reviews for automation and tenant management Experience implementing Okta Identity Governance is encouraged What you bring to the team Strong/expert level understanding of authentication mechanisms and protocols including OIDC/OAuth and SAML, and key related security concepts such as MFA, and how these are used with Okta and other IdPs, and the ability to trouble shoot issues in this realm Familiarity with Oktas public facing API collections and development SDKs is a must Knowledge of advanced Okta SKUs such as the Okta Access Gateway, Okta Workflows, and Okta Identity Governance are crucial Okta certifications are highly encouraged for this role- Okta Certified Administrator or higher Strong/expert-level experience integrating applications with Okta for SSO Comfort and skill with PowerShell, Terraform, CI/CD tooling, and Infrastructure as Code best practices Understanding and knowledge of modern cybersecurity threats and how a successful IAM program can assist an enterprise in mitigating those threats Great interpersonal skillsgood written & oral communication in English Show more Show less
Posted 1 month ago
6.0 - 8.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Product Security Testing Specialist - IoT, Embedded Devices, Hardware, Medical Instruments and automotive connected cars securityWe are seeking a highly skilled and motivated Product Security Testing Engineer with 6-8 years of proven expertise in IoT, embedded devices, hardware medical instruments and automotive/connected car security. The ideal candidate will have a strong background in security testing methodologies, risk assessment, and a deep understanding of the unique challenges posed by IoT, medical devices and software defined vehicle. This role requires a practical approach to identifying, assessing, and mitigate security flaws in our products as well as expertise in leading and mentoring a group of product security experts. Roles & Responsibilities:Conduct and lead thorough security assessments of IoT devices, embedded systems, hardware components, and medical instruments.Conduct security assessments of connected car systems, including in-vehicle networks, infotainment systems, telematics, and communication interfaces.Identify vulnerabilities and weaknesses in the design, implementation, and configurations of automotive software and hardware components.Assess the security of in-vehicle communication networks, including CAN bus, Ethernet, and wireless protocols.Perform penetration testing, vulnerability assessments, and code reviews to identify security weaknesses.Evaluate the security of IoT ecosystems, including communication protocols, cloud interfaces, and firmware.Assess the security of embedded systems and identify potential vulnerabilities in both software and hardware.Perform hardware penetration testing to identify vulnerabilities in electronic systems.Assess the security of medical devices, ensuring compliance with industry regulations and standards.Identify and address security risks associated with healthcare information systems and connected medical instruments.Evaluate and prioritize security risks based on potential impact and likelihood.Provide recommendations and collaborate with cross-functional teams to implement effective security controls.Stay current with emerging security threats, vulnerabilities, and testing methodologies.Implement best practices for security testing and collaborate with development teams to integrate security into the development lifecycle.Document security testing processes, findings, and remediation recommendations.Generate comprehensive reports for stakeholders, including technical details and actionable insights. Professional & Technical Skills: Excellent communication skills, including the ability to convey complex security concepts to technical and non-technical stakeholders.Demonstrated proficiency in autonomously managing client relationships with a high level of independence and accountability.Experience of effectively leading teams of various sizes, ranging from small to large, and actively contributing to their skill development and upskilling.Ability to manage multiple tasks and deadlines.Hands on experience with penetration testing tools and methodologies.Proven experience in security testing with a focus on IoT, embedded systems, hardware, and medical instruments.Knowledge of secure coding practices and the ability to review code for security vulnerabilities.Familiarity with industry standards and regulations related to product security, such as ISO 27001, ISO/SAE 21434, UNECE WP.29, IEC 62443, UNR-155 and FDA cybersecurity guidelines.Experience with threat modeling and risk assessment frameworks.Familiarity with secure development practices for embedded systems.Understanding of regulatory requirements for medical device security.Strong understanding of networking protocols, encryption, and authentication mechanisms. Additional Information:Bachelors or masters degree in engineering or computer science, Information Security, or a related field.Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP).- 5 or more years experience require in cyber security field including penetration testing, thread modeling, hardware security.- This position is based at our Bengaluru office- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 months ago
15.0 - 20.0 years
3 - 7 Lacs
Bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Product Security Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time educationProduct Security Testing Specialist - IoT, Embedded Devices, Hardware, Medical Instruments and automotive connected cars securityWe are seeking a highly skilled and motivated Product Security Testing Engineer with 4-6 years of proven expertise in IoT, embedded devices, hardware medical instruments and automotive/connected car security. The ideal candidate will have a strong background in security testing methodologies, risk assessment, and a deep understanding of the unique challenges posed by IoT, medical devices and software defined vehicle. This role requires a practical approach to identifying, assessing, and mitigate security flaws in our products as well as expertise in leading and mentoring a group of product security experts. Roles & Responsibilities:Conduct and lead thorough security assessments of IoT devices, embedded systems, hardware components, and medical instruments.Conduct security assessments of connected car systems, including in-vehicle networks, infotainment systems, telematics, and communication interfaces.Identify vulnerabilities and weaknesses in the design, implementation, and configurations of automotive software and hardware components.Assess the security of in-vehicle communication networks, including CAN bus, Ethernet, and wireless protocols.Perform penetration testing, vulnerability assessments, and code reviews to identify security weaknesses.Evaluate the security of IoT ecosystems, including communication protocols, cloud interfaces, and firmware.Assess the security of embedded systems and identify potential vulnerabilities in both software and hardware.Perform hardware penetration testing to identify vulnerabilities in electronic systems.Assess the security of medical devices, ensuring compliance with industry regulations and standards.Identify and address security risks associated with healthcare information systems and connected medical instruments.Evaluate and prioritize security risks based on potential impact and likelihood.Provide recommendations and collaborate with cross-functional teams to implement effective security controls.Stay current with emerging security threats, vulnerabilities, and testing methodologies.Implement best practices for security testing and collaborate with development teams to integrate security into the development lifecycle.Document security testing processes, findings, and remediation recommendations.Generate comprehensive reports for stakeholders, including technical details and actionable insights. Professional & Technical Skills: Excellent communication skills, including the ability to convey complex security concepts to technical and non-technical stakeholders.Demonstrated proficiency in autonomously managing client relationships with a high level of independence and accountability.Experience of effectively leading teams of various sizes, ranging from small to large, and actively contributing to their skill development and upskilling.Ability to manage multiple tasks and deadlines.Hands on experience with penetration testing tools and methodologies.Proven experience in security testing with a focus on IoT, embedded systems, hardware, and medical instruments.Knowledge of secure coding practices and the ability to review code for security vulnerabilities.Familiarity with industry standards and regulations related to product security, such as ISO 27001, ISO/SAE 21434, UNECE WP.29, IEC 62443, UNR-155 and FDA cybersecurity guidelines.Experience with threat modeling and risk assessment frameworks.Familiarity with secure development practices for embedded systems.Understanding of regulatory requirements for medical device security.Strong understanding of networking protocols, encryption, and authentication mechanisms.- Additional Information:Bachelors or masters degree in engineering or computer science, Information Security, or a related field.Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP).- 5 or more years experience require in cyber security field including penetration testing, thread modeling, hardware security.- This position is based at our Bengaluru office- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 months ago
4.0 - 9.0 years
15 - 30 Lacs
Hyderabad, Pune, Bengaluru
Work from Office
Greting of the Day.... I am Hiring now BeyondTrust security consultant one of my top clients. Location: PAN india Experienece: 4-13 Years NP: Immediate-45 days What is the Job? • Collaborate with IT teams to integrate PAM solutions into existing systems and ensure compliance with security policies and best practices. • Provide guidance and recommendations on access management strategies and technologies to various schools and units. • Onboard Linux/Windows servers to PAM Solutions, ensuring configuration aligns with least privilege principles. • Write Python and PowerShell scripts to integrate Beyond Trust Password Safe with organizational infrastructure through API integration. • Troubleshoot issues related to PAM system integrations with directories and client devices. What is Needed? • Experience with leading PAM solutions (BeyondTrust) and hands-on experience with privilege password management. • Prior experience in setting up, configuring, onboarding accounts, and creating policies within the PAM environment. • Active Directory and LDAP knowledge for managing user identities and ensuring PAM solution integration. • Experience integrating systems through API with Python and/or PowerShell. • Strong understanding of modern authentication protocols like SAML, OAuth2, OIDC, and Kerberos. What is in it for me? • Opportunity to work in a dynamic and collaborative environment. • Engage in innovative projects that enhance security and access management. • Gain valuable experience with cutting-edge PAM technologies. • Contribute to process improvements and optimization strategies. • Be part of a team that values diversity and inclusion. To apply drop me your updated resume at chanchal@oitindia.com
Posted 2 months ago
5.0 - 10.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Product Security Good to have skills : Google Cloud Data TransferMinimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :GCP Security Architect Cloud Security Strategy, Governance, and ArchitectureWe are seeking an accomplished GCP Security Architect with 12+ years of experience in cloud security architecture, threat modeling, and governance across enterprise-scale environments. This strategic role involves defining secure cloud architecture standards, driving security-first GCP adoption, and automating risk mitigation initiatives across business units. Roles & Responsibilities:Define and implement enterprise-wide GCP security architecture strategy.Design and implement secure GCP architectures aligned with business and compliance needs.Lead design reviews covering IAM (IDP, SSO, MFA), VPC security, VPNs, data encryption, and secure interconnects.Implement Cloud Armor, Cloud Security Command Center, and threat detection pipelines.Conduct threat modeling, risk analysis, and vulnerability assessments for high-impact platforms.Define automated controls and audit checks using Terraform, Cloud Shell, and GCP APIs.Ensure monitoring, logging, and auditing using Cloud Operations Suite.Lead enterprise security design and architecture governance forums.Mentor a team of cloud security professionals and guide platform standardization.Represent GCP security strategy to CISO teams, compliance leadership, and auditors.Define secure-by-design templates and enforce zero-trust access architectures Professional & Technical Skills: Excellent communication skills, including the ability to convey complex security concepts to technical and non-technical stakeholders.Demonstrated proficiency in autonomously managing client relationships with a high level of independence and accountability.Experience of effectively leading teams of various sizes, ranging from small to large, and actively contributing to their skill development and upskilling.Ability to manage multiple tasks and deadlines.Expertise in GCP IAM roles, Identity Federation, and Policy Troubleshooting.Advanced knowledge of VPC SC, KMS, security perimeters, and encryption standards.Hands-on with IaC tools like Terraform, Cloud Shell scripting, and GCP-native tools.Strong understanding of networking protocols, encryption, and authentication mechanisms.Confident communicator with executive presence.Proactive leader capable of owning enterprise transformation initiatives.Strategic thinker with deep technical foundations.- Additional Information:Bachelors or masters degree in engineering or computer science, Information Security, or a related field.Certifications such as Google Cloud Certified Professional Cloud Security Engineer is a must; CISSP or CCSP preferred.- 12+ years in security, including 5+ years specifically with GCP.- This position is based at our Bengaluru office- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 months ago
1.0 - 5.0 years
2 - 4 Lacs
Kolkata
Work from Office
Job Title: Android Developer Job ID: DE/BACK/APR25 Company: AKOVA FINTECH SOLUTIONS PVT. LTD. Location: 18 Rabindra Sarani, Poddar Court Building, Gate No: 3, 3rd Floor, Room No: U, Kolkata - 700001 Salary: Competitive, based on experience About Us: Akova is a leading provider of innovative FastTag services, revolutionizing the way toll payments are made across the country. As a rapidly growing fintech company, we are dedicated to delivering seamless, efficient, and customer-friendly solutions. With our expansion, we are looking for enthusiastic and skilled individuals to join our team. We are expanding our tech team and looking for a skilled Android Developer with backend expertise and AWS deployment experience to enhance our mobile backend infrastructure. Key Responsibilities: Design, develop, and maintain backend services for Android applications Kotlin/JAVA. Deploy, manage, and optimize AWS cloud services (e.g., EC2, Lambda, S3, RDS, API Gateway) for mobile backend operations. Optimize API performance RESTful/gRPC for high-traffic mobile applications. Integrate with databases (Firebase, Room, PostgreSQL/MySQL) and caching solutions. Implement (OAuth, JWT, encryption) for transactions. Monitor and optimize backend performance (latency, scalability, AWS cost efficiency). Collaborate with cross-functional teams to design, build, and deliver new features. Write clean, scalable, and maintainable code with good documentation. Support and coordinate on basic iOS app components written in Swift. Contribute to UI/UX discussions to improve app usability and design. Follow agile development principles and participate in sprint planning and reviews. Ensure Unit testing & UI testing (JUnit, Mockito, Espresso). Required Skills & Tools: Strong command over Java/Kotlin , Android SDK, Jetpack libraries and Material Design. AWS deployment experience (e.g., EC2, Lambda, Amplify, ECS, CloudFront). Knowledge of Swift and familiarity with iOS development concepts Experience with RESTful APIs , JSON , WebSockets and third-party SDKs Familiarity with MVP , MVVM , LiveData , and ViewModel architecture. Strong OOP and Programming Concepts. Extensive experience with Andriod Frameworks such as Jetpack components and Andriod Architecture Components. (Navigation, WorkManager, Dependency injection with Dagger-Hit and etc). Strong understanding of Multi-threading (Coroutines/Rx Java). Experience using Room , Retrofit , Dagger/Hilt , Firebase , etc. Proficient in Git, GitHub/Bitbucket, and version control best practices . Good to Have: Experience working with Push Notifications ( FCM ) , Deep Linking and in-app messaging . Awareness of security best practices (SSL pining, encryption) in mobile development. Experience with CI/CD pipelines . How to Apply: Interested candidates are requested to send their updated CV to: pratik.ghosh@akova.in Or call us directly at 9147067841
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Overview We are seeking a highly skilled Cloud IAM (Entra/Azure) Senior Engineer to design, implement, and manage Identity and Access Management (IAM) solutions within Microsoft Entra ID (formerly Azure AD). The ideal candidate will have extensive experience in cloud IAM technologies, security best practices, and integration with enterprise applications. Key Responsibilities IAM Design & Implementation Architect, configure, and manage Microsoft Entra ID (Azure AD) for authentication, authorization, and identity governance. Implement Conditional Access Policies, MultiFactor Authentication (MFA), and Privileged Identity Management (PIM) to enhance security. Develop and enforce rolebased access control (RBAC) and least privilege principles for cloud and hybrid environments. Good to know, SSO (Single SignOn) integrations with SaaS, PaaS, and onprem applications using SAML, OAuth, and OpenID Connect. Security & Compliance Monitor IAM security posture, detect threats, and implement remediation strategies. Ensure IAM solutions comply with industry standards (ISO 27001, NIST, CIS Benchmarks, etc.). Conduct IAM audits, access reviews, and compliance reporting. Automation & Integration Develop PowerShell scripts, Azure Logic Apps, and APIs to automate IAM processes such as user provisioning, deprovisioning, and access management. Integrate IAM solutions with Microsoft Defender, Sentinel, and thirdparty security tools. Operations & Support Troubleshoot IAMrelated issues, provide L3 support, and collaborate with crossfunctional teams. Optimize IAM workflows to improve efficiency and security. Required Skills & Qualifications 5+ years of experience in Identity & Access Management, focusing on Microsoft Entra ID (Azure AD). Deep expertise in Azure IAM services, including Conditional Access, PIM, Identity Protection, and B2B/B2C authentication. Strong understanding of authentication protocols (SAML, OAuth, OpenID Connect, Kerberos, LDAP). Experience with PowerShell scripting for automation and IAM management. Handson experience integrating IAM with Microsoft 365, Azure, and hybrid Active Directory environments. Knowledge of Zero Trust principles and security frameworks (NIST, CIS, etc.). Familiarity with SIEM solutions (Microsoft Sentinel, Splunk, etc.) for identity threat detection. Preferred Qualifications Azure certifications (AZ500, SC300, MS102). Experience working in enterprise IAM projects and cloud migrations. Knowledge of thirdparty IAM solutions (SailPoint, Ping Identity). Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Microsoft Entra ID. Experience5-8 Years.
Posted 2 months ago
2.0 - 7.0 years
3 - 9 Lacs
Jaipur
Work from Office
Architect, develop, and maintain backend systems using PHP (Laravel) and MySQL . Design, implement, and optimize RESTful APIs Enhance system performance. Implement best methodologies for user authentication, data protection, and system integrity . Health insurance
Posted 2 months ago
3.0 - 8.0 years
15 - 20 Lacs
Hyderabad, Chennai, Bengaluru
Work from Office
We are looking for a skilled Cloud Native Developer to join our team and help us design, build, and deploy state-of-the-art cloud-native solutions. In this role, you will work with cutting-edge technologies to create scalable, resilient, and efficient software systems tailored for the cloud environment. Responsibilities Develop microservice applications using Java 11 and above (preference for Java 17+), leveraging Spring/Spring Boot frameworks Apply design patterns and best practices to architect cloud-native solutions Create and manage RESTful services, ensuring adherence to concepts and standards Utilize Swagger/OpenAPI specifications to document APIs effectively Implement authentication mechanisms, such as OAuth2, for secure communication between services Write and maintain unit tests using established frameworks Build event-driven architectures incorporating asynchronous communication principles Integrate and work with message broker tools like Kafka or Pub/Sub effectively Collaborate on hands-on delivery of cloud-based microservices leveraging Public Cloud platforms such as Google Cloud Platform (GCP preferred) Follow Git Workflow practices for version control and code management Contribute to database design, optimizations, and queries, including proficiency in SQL and NoSQL databases Maintain a basic understanding of CI/CD pipelines and contribute to continuous deployment activities Requirements 3-5 years of working experience in software development using Java, Spring/Spring Boot Familiarity with design patterns and their implementation within cloud-native projects Expertise in building and consuming RESTful services and effective usage of Swagger/OpenAPI specifications for API documentation Proficiency in authentication mechanisms such as OAuth2, with hands-on exposure to secure microservice development Understanding of unit testing frameworks and practices, including testing microservices Background in event-driven architecture and competency in tools like Kafka or Pub/Sub Knowledge of microservices architecture principles and hands-on deployment Familiarity with Git Workflow practices and basic understanding of CI/CD pipelines Experience with Public Cloud environments, with a preference for Google Cloud Platform Skills in SQL and NoSQL database concepts, including efficient query building Nice to have Background in Apache Kafka and Google Cloud Platform for production use cases Familiarity with OpenAPI Specifications and CI/CD pipeline optimization workflows Showcase of recent projects using Java 17 or Java 21 infrastructure Expertise in SQL database optimizations combined with unit testing strategies Understanding of advanced Java Microservice Infrastructure patterns and tools
Posted 2 months ago
2.0 - 6.0 years
7 - 10 Lacs
Jaipur
Work from Office
The role: Design, develop, and maintain Kong gateways using API Gateway, Docker, Kubernetes, Ansible, Terraform, and authentication protocols. Experienced Kong Gateway Architect to lead the design, implementation, and governance of API gateway. Work from home
Posted 2 months ago
6.0 - 8.0 years
3 - 7 Lacs
Bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Product Security Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Product Security Testing Specialist - IoT, Embedded Devices, Hardware, Medical Instruments and automotive connected cars securityWe are seeking a highly skilled and motivated Product Security Testing Engineer with 6-8 years of proven expertise in IoT, embedded devices, hardware medical instruments and automotive/connected car security. The ideal candidate will have a strong background in security testing methodologies, risk assessment, and a deep understanding of the unique challenges posed by IoT, medical devices and software defined vehicle. This role requires a practical approach to identifying, assessing, and mitigate security flaws in our products as well as expertise in leading and mentoring a group of product security experts. Roles & Responsibilities:Conduct and lead thorough security assessments of IoT devices, embedded systems, hardware components, and medical instruments.Conduct security assessments of connected car systems, including in-vehicle networks, infotainment systems, telematics, and communication interfaces.Identify vulnerabilities and weaknesses in the design, implementation, and configurations of automotive software and hardware components.Assess the security of in-vehicle communication networks, including CAN bus, Ethernet, and wireless protocols.Perform penetration testing, vulnerability assessments, and code reviews to identify security weaknesses.Evaluate the security of IoT ecosystems, including communication protocols, cloud interfaces, and firmware.Assess the security of embedded systems and identify potential vulnerabilities in both software and hardware.Perform hardware penetration testing to identify vulnerabilities in electronic systems.Assess the security of medical devices, ensuring compliance with industry regulations and standards.Identify and address security risks associated with healthcare information systems and connected medical instruments.Evaluate and prioritize security risks based on potential impact and likelihood.Provide recommendations and collaborate with cross-functional teams to implement effective security controls.Stay current with emerging security threats, vulnerabilities, and testing methodologies.Implement best practices for security testing and collaborate with development teams to integrate security into the development lifecycle.Document security testing processes, findings, and remediation recommendations.Generate comprehensive reports for stakeholders, including technical details and actionable insights. Professional & Technical Skills: Excellent communication skills, including the ability to convey complex security concepts to technical and non-technical stakeholders.Demonstrated proficiency in autonomously managing client relationships with a high level of independence and accountability.Experience of effectively leading teams of various sizes, ranging from small to large, and actively contributing to their skill development and upskilling.Ability to manage multiple tasks and deadlines.Hands on experience with penetration testing tools and methodologies.Proven experience in security testing with a focus on IoT, embedded systems, hardware, and medical instruments.Knowledge of secure coding practices and the ability to review code for security vulnerabilities.Familiarity with industry standards and regulations related to product security, such as ISO 27001, ISO/SAE 21434, UNECE WP.29, IEC 62443, UNR-155 and FDA cybersecurity guidelines.Experience with threat modeling and risk assessment frameworks.Familiarity with secure development practices for embedded systems.Understanding of regulatory requirements for medical device security.Strong understanding of networking protocols, encryption, and authentication mechanisms. Additional Information:Bachelors or masters degree in engineering or computer science, Information Security, or a related field.Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP).-5 or more years experience require in cyber security field including penetration testing, thread modeling, hardware security.-This position is based at our Bengaluru office-A 15 years full time education is required. Qualification 15 years full time education
Posted 2 months ago
15.0 - 20.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Product Security Testing Specialist - IoT, Embedded Devices, Hardware, Medical Instruments and automotive connected cars securityWe are seeking a highly skilled and motivated Product Security Testing Engineer with 7-11 years of proven expertise in IoT, embedded devices, hardware medical instruments and automotive/connected car security. The ideal candidate will have a strong background in security testing methodologies, risk assessment, and a deep understanding of the unique challenges posed by IoT, medical devices and software defined vehicle. This role requires a practical approach to identifying, assessing, and mitigate security flaws in our products as well as expertise in leading and mentoring a group of product security experts. Roles & Responsibilities:Conduct and lead thorough security assessments of IoT devices, embedded systems, hardware components, and medical instruments.Conduct security assessments of connected car systems, including in-vehicle networks, infotainment systems, telematics, and communication interfaces.Identify vulnerabilities and weaknesses in the design, implementation, and configurations of automotive software and hardware components.Assess the security of in-vehicle communication networks, including CAN bus, Ethernet, and wireless protocols.Perform penetration testing, vulnerability assessments, and code reviews to identify security weaknesses.Evaluate the security of IoT ecosystems, including communication protocols, cloud interfaces, and firmware.Assess the security of embedded systems and identify potential vulnerabilities in both software and hardware.Perform hardware penetration testing to identify vulnerabilities in electronic systems.Assess the security of medical devices, ensuring compliance with industry regulations and standards.Identify and address security risks associated with healthcare information systems and connected medical instruments.Evaluate and prioritize security risks based on potential impact and likelihood.Provide recommendations and collaborate with cross-functional teams to implement effective security controls.Stay current with emerging security threats, vulnerabilities, and testing methodologies.Implement best practices for security testing and collaborate with development teams to integrate security into the development lifecycle.Document security testing processes, findings, and remediation recommendations.Generate comprehensive reports for stakeholders, including technical details and actionable insights. Professional & Technical Skills: Excellent communication skills, including the ability to convey complex security concepts to technical and non-technical stakeholders.Demonstrated proficiency in autonomously managing client relationships with a high level of independence and accountability.Experience of effectively leading teams of various sizes, ranging from small to large, and actively contributing to their skill development and upskilling.Ability to manage multiple tasks and deadlines.Hands on experience with penetration testing tools and methodologies.Proven experience in security testing with a focus on IoT, embedded systems, hardware, and medical instruments.Knowledge of secure coding practices and the ability to review code for security vulnerabilities.Familiarity with industry standards and regulations related to product security, such as ISO 27001, ISO/SAE 21434, UNECE WP.29, IEC 62443, UNR-155 and FDA cybersecurity guidelines.Experience with threat modeling and risk assessment frameworks.Familiarity with secure development practices for embedded systems.Understanding of regulatory requirements for medical device security.Strong understanding of networking protocols, encryption, and authentication mechanisms.- Additional Information:Bachelors or masters degree in engineering or computer science, Information Security, or a related field.Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP).- 5 or more years experience require in cyber security field including penetration testing, thread modeling, hardware security.- This position is based at our Bengaluru office- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 months ago
3.0 - 5.0 years
4 - 9 Lacs
Noida
Work from Office
Req ID: 325998 We are currently seeking a Network Security Senior Specialist to join our team in Noida, Uttar Pradesh (IN-UP), India (IN). Roles and Responsibilities"¢ Work on requests, changes, incidents, and problem records to support customers"™ network security environment "¢ Provide technical escalation to L2 support engineers "¢ Provide on call support for high severity incidents in a 24x7 environment "¢ Detect security issues, create customer tickets, and manage problems until closure "¢ Act as point of escalation for the Network Security team and collaborate with internal support teams to ensure timely resolution of issues "¢ Ensure that Service Level Agreements and operational standards are met "¢ Perform system maintenance, check-ups and maintain current documentation "¢ Provide resolution plans for device issues "¢ Propose service, process, and technical improvements to management "¢ Mid-level experience and proven knowledge in at least three of different network security products likes Firewalls (Cisco, Palo Alto), Content Filtering (Bluecoats, Websense, McAfee Web gateway) and IDS/IPS "¢ Mid-level networking troubleshooting skills and extensive knowledge of web connectivity and protocols (WCCP, PAC files, TCP/IP, HTTP, HTTPS, SSL, FTP, Telnet, SSH, etc.) "¢ Understanding the integration with authentication protocols such as LDAP, IWA, IWA-direct, SSO, Active directory "¢ At least two mid-level certifications in Network Security from any of the vendors like Cisco, Palo Alto, BlueCoat, SourceFire (PCNSE, CCNP Security etc.) "¢ Over 3-5 years of network troubleshooting experience and at least 2 years Network Security administration and design experience "¢ Bachelor"™s degree or equivalent experience "¢ Flexible to changing needs of customer, account, and team "¢ Drive for results, ability to grasp complex issues to arrive at optimal solutions "¢ Excellent customer facing communication skills, customer support and knowledge of ITIL best practices "¢ Work Timings24/7 work environment, India
Posted 2 months ago
15.0 - 20.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Email Security Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitating the transition to cloud security-managed operations. You will engage in discussions to align security strategies with organizational objectives, ensuring that all security measures are effectively integrated into the cloud environment. Your role will also require you to stay updated on the latest security trends and technologies to enhance the overall security posture of the organization. Roles & Responsibilities:-Monitor email traffic for suspicious activities.-Configure and manage email security platforms-Analyze and respond to phishing attacks, spam, and malware delivered via email-Implement and maintain email authentication protocols (SPF, DKIM, DMARC).-develop and enforce email security policies (e.g., email encryption,-Respond to email-related security incidents.-Conduct forensic analysis of email-based attacks.-Work with SOC teams during breach investigations.-Conduct phishing user training.-Automate detection and response using SOAR tools.-Analysis of Email Header and Email body analysis Professional & Technical Skills: - Email protocols:SMTP, IMAP, POP3 -DNS records:SPF, DKIM, DMARC Additional Information:- The candidate should have minimum 5 years of experience in Email Security.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 months ago
8.0 - 13.0 years
8 - 12 Lacs
Hyderabad
Work from Office
We are seeking a Senior Cyber Security Consultant with extensive experience in enterprise IT security, risk management, and cloud-based security solutions. The ideal candidate will have a deep understanding of managing cyber security risks during digital transformations and will be responsible for leading hands-on engagements and delivering results that address critical security concerns. This role involves working closely with both technical and business teams to identify and mitigate risks in complex environments. Key Responsibilities Leadership in Execution & DeliveryLead hands-on engagements, managing the development of deliverables from start to finish. Work with teams to analyze requirements and produce prioritized results aligned with client needs and risk profiles. Expert Cyber Security AdvisoryProvide expert advice on best practices for managing cyber security risks during digital transformation, including adoption of cloud, DevOps, containerization, microservices, and zero trust frameworks. Security Reviews & AssessmentsConduct security reviews and maturity assessments across technology and business teams to identify and address cyber risks. Provide clear, organized findings and actionable recommendations for risk mitigation. Trusted Engineer for ClientsAct as a trusted advisor and security engineer for customers' engineering teams, ensuring that security is integrated into every phase of digital transformation. Risk and Vulnerability AnalysisAssess and implement security measures to safeguard IT environments. Identify vulnerabilities, focusing on security protocols, cryptography, authentication, authorization, and performance. Security ImplementationLead the implementation of security solutions, including multi-factor authentication (MFA), single sign-on (SSO), identity management, and related technologies. Client Interaction & CommunicationEffectively communicate security measures and solutions to a broad audience, including both technical and executive teams. Manage client expectations with clear, concise verbal and written communication. Continuous Learning & InnovationStay updated with the latest security protocols, vulnerabilities, and best practices to ensure the adoption of the most effective security controls and technologies. Security MaturityWork with clients to evaluate and improve their security maturity, providing insights into the current cyber threat landscape. Minimum Qualifications 8+ years of total IT experience. 5+ years of consulting experience in enterprise security environments. Expertise in information security, IT risk management, and performance reliability. Solid understanding of security protocols, cryptography, and authentication technologies. Experience in implementing multi-factor authentication, SSO, and identity management. Ability to explain and enforce security measures to a broad range of stakeholders. Excellent verbal and written communication skills. Degree in Information Technology, Computer Science, or related fields. Preferred Qualifications Google Cloud Security Engineer certification. Strong knowledge of infrastructure, OS, application vulnerabilities, security architecture, and controls. 5+ years of experience with cloud computing security concepts and solutions. Security-related certifications such as CISSP, CISM, or GCIH.
Posted 2 months ago
7.0 - 9.0 years
8 - 12 Lacs
Hyderabad
Work from Office
Job Information Job Opening ID ZR_2405_JOB Date Opened 09/11/2024 Industry IT Services Job Type Work Experience 7-9 years Job Title Senior Cyber Security Consultant City Hyderabad Province Telangana Country India Postal Code 500001 Number of Positions 1 We are seeking a Senior Cyber Security Consultant with extensive experience in enterprise IT security, risk management, and cloud-based security solutions. The ideal candidate will have a deep understanding of managing cyber security risks during digital transformations and will be responsible for leading hands-on engagements and delivering results that address critical security concerns. This role involves working closely with both technical and business teams to identify and mitigate risks in complex environments. Key Responsibilities Leadership in Execution & DeliveryLead hands-on engagements, managing the development of deliverables from start to finish. Work with teams to analyze requirements and produce prioritized results aligned with client needs and risk profiles. Expert Cyber Security AdvisoryProvide expert advice on best practices for managing cyber security risks during digital transformation, including adoption of cloud, DevOps, containerization, microservices, and zero trust frameworks. Security Reviews & AssessmentsConduct security reviews and maturity assessments across technology and business teams to identify and address cyber risks. Provide clear, organized findings and actionable recommendations for risk mitigation. Trusted Engineer for ClientsAct as a trusted advisor and security engineer for customers' engineering teams, ensuring that security is integrated into every phase of digital transformation. Risk and Vulnerability AnalysisAssess and implement security measures to safeguard IT environments. Identify vulnerabilities, focusing on security protocols, cryptography, authentication, authorization, and performance. Security ImplementationLead the implementation of security solutions, including multi-factor authentication (MFA), single sign-on (SSO), identity management, and related technologies. Client Interaction & CommunicationEffectively communicate security measures and solutions to a broad audience, including both technical and executive teams. Manage client expectations with clear, concise verbal and written communication. Continuous Learning & InnovationStay updated with the latest security protocols, vulnerabilities, and best practices to ensure the adoption of the most effective security controls and technologies. Security MaturityWork with clients to evaluate and improve their security maturity, providing insights into the current cyber threat landscape. Minimum Qualifications8+ years of total IT experience. 5+ years of consulting experience in enterprise security environments. Expertise in information security, IT risk management, and performance reliability. Solid understanding of security protocols, cryptography, and authentication technologies. Experience in implementing multi-factor authentication, SSO, and identity management. Ability to explain and enforce security measures to a broad range of stakeholders. Excellent verbal and written communication skills. Degree in Information Technology, Computer Science, or related fields. Preferred QualificationsGoogle Cloud Security Engineer certification. Strong knowledge of infrastructure, OS, application vulnerabilities, security architecture, and controls. 5+ years of experience with cloud computing security concepts and solutions. Security-related certifications such as CISSP, CISM, or GCIH. This position is ideal for individuals with a strong technical background in security, a strategic mindset, and a passion for helping organizations secure their IT environments. check(event) ; career-website-detail-template-2 => apply(record.id,meta)" mousedown="lyte-button => check(event)" final-style="background-color:#2B39C2;border-color:#2B39C2;color:white;" final-class="lyte-button lyteBackgroundColorBtn lyteSuccess" lyte-rendered=""> I'm interested
Posted 2 months ago
12.0 - 18.0 years
9 - 10 Lacs
Paithan
Work from Office
We are hiring candidates for Manager - Research & Development for our plant into manufacturing of Active Pharmaceutical Ingredients (APIs) and Pharmaceutical Intermediates. Interested candidates can mail their resume at admin@bioaltuslabs.com Post : Manager -Research & Development, Active Pharmaceutical Ingredients (APIs) and Pharmaceutical Intermediates. Experience : Minimum 12-18 years Location : Paithan (Chhatrapati Sambhaji Nagar) Educational Qualification : PHD in Organic Chemistry, M. SC (Organic Chemistry) Job Responsibilities : * Develop robust process for APIs & Pharmaceutical intermediates considering factors such as stability & manufacturing feasibility as per plant scale. * Optimize manufacturing process for APIs & Pharmaceutical intermediates synthesis to enhance efficiency, reduce cost & improve product quality meeting as per ICH guideline. * Ensure compliance with regulatory guidelines & standards throughout the PDL including the preparation of documentation for regulatory submissions. * Excellent analytical, problem-solving & decision making skills. * Effective communication & interpersonal skills, with the ability to collaborate effectively in a team environment. * Developing different route of synthesis which enhance product quality and reduces costing for active pharmaceutical ingredients (APIs) & Pharmaceutical intermediates. * Passionate of developing the new APIs and Pharmaceutical intermediates.
Posted 2 months ago
6.0 - 11.0 years
4 - 8 Lacs
Hyderabad
Work from Office
Primary Skills Strong hands-on experience in SAP ABAP development, including classical and object-oriented programming Expertise in RAP (Restful Application Programming Model) for building cloud-ready applications on SAP BTP Experience with SAP BTP ABAP Environment and Business Application Studio (BAS) Deep understanding of CDS (Core Data Services), AMDP (ABAP Managed Database Procedures), and OData services Knowledge of event-driven architecture and side-by-side extensibility on SAP BTP Experience in developing custom Fiori applications and integrating them with SAP backend using OData services Strong understanding of cloud security concepts, authentication mechanisms (OAuth, SAML, JWT), and SAP Identity Authentication Service Experience with performance optimization, debugging, and troubleshooting of ABAP-based applications Secondary Skills Exposure to SAP CAP (Cloud Application Programming Model) for cloud-native application development Knowledge of SAP BTP services like Workflow Management, Business Rules, and Integration Suite Experience with Git-based version control systems and CI/CD pipelines for SAP BTP deployments Familiarity with Kubernetes, Docker, or other containerization technologies for cloud-native applications Good understanding of Agile methodologies, DevOps practices, and SAP Fiori Elements for UI development
Posted 2 months ago
2.0 - 5.0 years
3 - 7 Lacs
Hyderabad
Work from Office
What you will do Let’s do this. Let’s change the world. In this vital role you will Guide and support junior team members by offering technical advice, conducting code reviews, and sharing knowledge to promote their professional development. Perform security testing (e.g., penetration testing, code reviews) and ensure continuous security monitoring across the organization’s IT landscape. Identify vulnerabilities in networks, systems, applications, and infrastructure through hands-on penetration testing. Attempt to exploit discovered vulnerabilities to demonstrate their impact and prove their existence (e.g., retrieving sensitive data, elevating user privileges, or gaining access to admin functionality). Perform assessments on web applications, cloud environments, and network infrastructure. Use automated tools and manual techniques to identify security weaknesses. Conduct advanced post-exploitation tasks to simulate real-world attack scenarios. Work with third-party security vendors for audits, product testing, and external assessments when required. Use automated tools (e.g., Burp Suite, OWASP ZAP, or Acunetix) to identify common vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and others. Document identified vulnerabilities in detail, explaining how they were found, their severity, and their potential impact. Include proof-of-concept (PoC) for critical vulnerabilities. Offer actionable, practical solutions for fixing the vulnerabilities, such as secure coding practices, configuration changes, or security controls. Use risk-based prioritization, categorizing issues by their severity and business impact (e.g., high, medium, low) to help the organization focus on the most critical issues. Continuously learn about the latest vulnerabilities, exploits, and security trends. Present the findings to stakeholders, security teams, and management, explaining the business risk and potential impacts of the vulnerabilities discovered. Familiarity with industry standards and compliance requirements (e.g., PCI-DSS, NIST, ISO 27001) and their relevance to penetration testing. What we expect of you We are all different, yet we all use our unique contributions to serve patients. This role has a strong focus on ensuring the organization's infrastructure, applications, and systems are secure from external and internal threats. This role is responsible for conducting authorized security tests on IT infrastructure to evaluate the strength of its systems against potential cyberattacks. A variety of automated tools and manual techniques are leveraged to simulate real-world attacks. The penetration tester then works with the organization to prioritize, remediate and report on identified issues, strengthening the overall security posture. Basic Qualifications: Bachelor’s degree with 6 - 8 years of experience in Computer Science, Cybersecurity or Information Systems related field . Preferred Qualifications: Must-Have Skills: Strong knowledge of common vulnerabilities (e.g., OWASP Top 10, SANS Top 25), network protocols, encryption standards, application security and common penetration testing methodologies (ISSAF, OSSTMM, PTES). Familiarity with tools like Burp Suite, OWASP ZAP and Metasploit. A deep understanding of web application architecture, databases, and authentication mechanisms. Ability to think critically and creatively when testing and attempting to exploit vulnerabilities. Good-to-Have Skills: Experience with threat intelligence and incorporating emerging threats into penetration testing practices Proficiency in scripting and automation (e.g., Python, Bash) is a plus Professional Certifications (please mention if the certification is preferred or mandatory for the role): PreferredeJPT, eCPPT, eWPT, OSCP, OSWA, GWAPT What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 2 months ago
5.0 - 10.0 years
7 - 12 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Job Description:Product Security Testing Specialist - IoT, Embedded Devices, Hardware, Medical Instruments and automotive connected cars securityWe are seeking a highly skilled and motivated Product Security Testing Engineer with 6-8 years of proven expertise in IoT, embedded devices, hardware medical instruments and automotive/connected car security. The ideal candidate will have a strong background in security testing methodologies, risk assessment, and a deep understanding of the unique challenges posed by IoT, medical devices and software defined vehicle. This role requires a practical approach to identifying, assessing, and mitigate security flaws in our products as well as expertise in leading and mentoring a group of product security experts.Key responsibilities: Conduct and lead thorough security assessments of IoT devices, embedded systems, hardware components, and medical instruments. Conduct security assessments of connected car systems, including in-vehicle networks, infotainment systems, telematics, and communication interfaces. Identify vulnerabilities and weaknesses in the design, implementation, and configurations of automotive software and hardware components. Assess the security of in-vehicle communication networks, including CAN bus, Ethernet, and wireless protocols. Perform penetration testing, vulnerability assessments, and code reviews to identify security weaknesses. Evaluate the security of IoT ecosystems, including communication protocols, cloud interfaces, and firmware. Assess the security of embedded systems and identify potential vulnerabilities in both software and hardware. Perform hardware penetration testing to identify vulnerabilities in electronic systems. Assess the security of medical devices, ensuring compliance with industry regulations and standards. Identify and address security risks associated with healthcare information systems and connected medical instruments. Evaluate and prioritize security risks based on potential impact and likelihood. Provide recommendations and collaborate with cross-functional teams to implement effective security controls. Stay current with emerging security threats, vulnerabilities, and testing methodologies. Implement best practices for security testing and collaborate with development teams to integrate security into the development lifecycle. Document security testing processes, findings, and remediation recommendations. Generate comprehensive reports for stakeholders, including technical details and actionable insights.Technical experience: Hands on experience with penetration testing tools and methodologies. Proven experience in security testing with a focus on IoT, embedded systems, hardware, and medical instruments. Knowledge of secure coding practices and the ability to review code for security vulnerabilities. Familiarity with industry standards and regulations related to product security, such as ISO 27001, ISO/SAE 21434, UNECE WP.29, IEC 62443, UNR-155 and FDA cybersecurity guidelines. Experience with threat modeling and risk assessment frameworks. Familiarity with secure development practices for embedded systems. Understanding of regulatory requirements for medical device security. Strong understanding of networking protocols, encryption, and authentication mechanisms.Professional attributes: Excellent communication skills, including the ability to convey complex security concepts to technical and non-technical stakeholders. Demonstrated proficiency in autonomously managing client relationships with a high level of independence and accountability. Experience of effectively leading teams of various sizes, ranging from small to large, and actively contributing to their skill development and upskilling. Ability to manage multiple tasks and deadlines. Qualifications: Bachelor's or master's degree in engineering or computer science, Information Security, or a related field. Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP). Qualifications 15 years full time education
Posted 2 months ago
4.0 - 5.0 years
6 - 7 Lacs
Tamil Nadu
Work from Office
Specializes in Identity and Access Management (IAM) using SailPoint. Implements role-based access controls, identity governance, and authentication protocols.
Posted 2 months ago
1.0 - 5.0 years
3 - 6 Lacs
Karnataka
Work from Office
As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations Since 2011, our mission hasnt changed "” were here to stop breaches, and weve redefined modern security with the worlds most advanced AI-native platform Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward Were also a mission-driven company We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers Were always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other Ready to join a mission that mattersThe future of cybersecurity starts with you. About The Role As a Technical Support Engineer, you will be part of a highly skilled talented Customer Support team who work with CrowdStrike customers globally focusing on multiple security product offerings The role involves working with CrowdStrike internal teams to resolve customer problems including troubleshooting, identification of root cause and issue resolution to help them receive the most benefit from their investment. The ideal candidate will have the energy and drive to discover and learn new technologies Be fanatical about the customer, relentlessly focused on innovation and have limitless passion to drive their unlimited potential This is a high energy, fast paced working environment that helps CrowdStrike achieve customer success. What Youll Do As a Technical Support Engineer, you will be part of a highly skilled Customer Support team who support CrowdStrike customers 24x7 globally. Work in a dynamic and exciting technical environment with relentless focus on delighting our customers, partners and teammates. Demonstrate ownership of customers concerns assess impact, troubleshoot logically, engage relevant stakeholders, identify root cause and resolve them to the satisfaction of our customers. Communicate effectively with internal and external stakeholders Collaborate with them to resolve customer escalations quickly. Work with Product experts/Engineering to fix bugs or enhance product features. Manage time and work to meet or exceed operational goals. Learn cutting edge technologies and new product features Create/Share Knowledge articles and contribute to mentoring/training efforts. May be scheduled to work on shifts/holidays as per the business requirement. What Youll Need 3-8 years experience in Product Technical support role supporting Global enterprise customers Outstanding oral and written communication skills. Customer focus Analytical thinking and Logical troubleshooting aptitude. Proven experience in troubleshooting and diagnosing issues at the application and operating system level within either Windows, Linux or Mac environments. Understanding of operating system fundamentals including user and kernel space, memory management, shared libraries, file and network IO, Windows registry, software distribution, etc Hands on experience using the tools and techniques to debug problems within either Windows, Linux or Mac environments Siem/Soar Bonus Points: Hands on experience working on log management tool that offers self-hosted options & leverages kafka and/or containers Strong Skills in container administration & orchestration Good understanding of Regex & any query language. Certifications in SIEM/SOAR platforms would be a plus Identity Management Hands on experience in Windows Servers/Active Directory, MFA. Experience with Identity Protection and Zero Trust solutions Excellent knowledge of authentication protocols Kerberos, LDAP, NTLM, SAML Good understanding of TCP/IP and troubleshoot network issues using Wireshark/PCAP analysis. Operational understanding of networking devices such as Routers, Switches and Firewalls would be a plus. Cloud Technologies Experience working and troubleshooting in a SaaS cloud environment. Proven experience debugging and troubleshooting customer facing API/REST interfaces at both the JSON/HTTPS browser/client side and server-side web service termination, but also navigating within the backend cloud architecture which is responsible for fielding the request. Good understanding of SaaS components and large-scale databases like Cassandra, Kafka, Elasticsearch, Splunk, etc, and the role that they play within a cloud service. Familiarity with cloud orchestration tools like Docker, Kubernetes, etc Certification in any common Cloud platforms would be a plus. Benefits Of Working At CrowdStrike Remote-friendly and flexible work culture Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role s, geographic neighbourhood groups and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified„¢ across the globe CrowdStrike is proud to be an equal opportunity employer We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed We support veterans and individuals with disabilities through our affirmative action program. CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance. Show more Show less
Posted 2 months ago
4.0 - 7.0 years
10 - 18 Lacs
Hyderabad, Chennai, Mumbai (All Areas)
Work from Office
Role : Offensive Security Location: Mumbai/Hyderabad/Chennai Experience: 4 to 6 years Qualification & Experience M.Tech/B.E. /B.Tech/MCA/BCA/BSC More than 4 years of experience in conducting Red Team and offensive security. Certifications in different Security products, ITIL, CEH, OSCP, OSCE, OSWE, SANS/GIAC etc. would be an added advantage. Job Responsibilities: 3-4 years of experience in Pentest, Red Team, offensive security engagements. Deep understanding of network, web and API security vulnerabilities and mitigation. Good understanding on Active directories and ways of exploitation. In-Depth knowledge of Linux operating system. Ability to model threats and risks for large and complex systems. Good knowledge of IPS/IDS, Firewalls, WAF, Switch and Router. Advance knowledge on Authentication, security protocols, Cryptography etc. Ability to think critically and identify areas of technical and non-technical risk. Ability to write technical reports and communicate technical content to non-technical audiences. Relevant security certification i.e. OSCP, OSCE, OSWE, SANS/GIAC, Published CVEs is an added advantage. Good understanding and experience in offensive security tools and techniques i.e. Metasploit, Burpsuite, Armitage, MITRE ATT&CK Framework. Knowledge in one of the scripting language. Has basic knowledge to write exploits for known vulnerabilities.
Posted 3 months ago
2 - 5 years
3 - 7 Lacs
Hyderabad
Work from Office
ABOUT AMGEN Amgen harnesses the best of biology and technology to fight the world’s toughest diseases, and make people’s lives easier, fuller and longer. We discover, develop, manufacture and deliver innovative medicines to help millions of patients. Amgen helped establish the biotechnology industry more than 40 years ago and remains on the cutting-edge of innovation, using technology and human genetic data to push beyond what’s known today. ABOUT THE ROLE Role Description This role has a strong focus on ensuring the organization's infrastructure, applications, and systems are secure from external and internal threats . T his role is responsible for conducting authorized security tests on IT infrastructure to evaluate the strength of its systems against potential cyberattacks. A variety of automated tools and manual techniques are leveraged to simulate real-world attacks. The penetration tester then works with the organization to prioritize , remediate and report on identified issues, strengthening the overall security posture. Roles & Responsibilities Perform security testing (e.g., penetration testing, code reviews) and ensure continuous security monitoring across the organization’s IT landscape. Identify vulnerabilities in networks, systems, applications, and infrastructure through hands-on penetration testing. Attempt to exploit discovered vulnerabilities to demonstrate their impact and prove their existence (e.g., retrieving sensitive data, elevating user privileges, or gaining access to admin functionality). Perform assessments on web applications, cloud environments, and network infrastructure. Use automated tools and manual techniques to identify security weaknesses. Conduct advanced post-exploitation tasks to simulate real-world attack scenarios. Work with third-party security vendors for audits, product testing, and external assessments when required . Use automated tools (e.g., Burp Suite, OWASP ZAP, or Acunetix ) to identify common vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and others. Document identified vulnerabilities in detail, explaining how they were found, their severity, and their potential impact. Include proof-of-concept (PoC) for critical vulnerabilities. Offer actionable, practical solutions for fixing the vulnerabilities , such as secure coding practices, configuration changes, or security controls. Use risk-based prioritization, categorizing issues by their severity and business impact (e.g., high, medium, low) to help the organization focus on the most critical issues. Continuously learn about the latest vulnerabilities, exploits, and security trends. Present the findings to stakeholders, security teams, and management, explaining the business risk and potential impacts of the vulnerabilities discovered. Familiarity with industry standards and compliance requirements (e.g., PCI-DSS, NIST, ISO 27001) and their relevance to penetration testing. Basic Qualifications and Experience Master’s degree with a 1 - 2 years of experience in Computer Science, Cybersecurity or Information Systems related field OR Bachelor’s degree with 2 - 4 years of experience in Computer Science, Cybersecurity or Information Systems related field OR Diploma with 4 - 6 years of experience in Computer Science, Cybersecurity or Information Systems related field Functional Skills: Must-Have Skills: Strong knowledge of common vulnerabilities (e.g., OWASP Top 10, SANS Top 25), network protocols, encryption standards, application security and common penetration testing method ologies (ISSAF, OSSTMM, PTES) . Familiarity with tools like Burp Suite, OWASP ZAP and Metasploit. A deep understanding of web application architecture, databases, and authentication mechanisms. Ability to think critically and creatively when testing and attempting to exploit vulnerabilities. Good-to-Have Skills: Experience with threat intelligence and incorporating emerging threats into penetration testing practices Proficiency in scripting and automation (e.g., Python, Bash) is a plus Professional Certifications Preferred eJPT , eCPPT , eWPT , OSCP, OSWA , GWAPT Soft Skills: Strong analytical and troubleshooting skills Strong verbal and written communication skills Ability to work effectively with global, virtual teams High degree of initiative and self-motivation Team oriented, with a focus on achieving team goals Strong presentation and public speaking skills EQUAL OPPORTUNITY STATEMENT Amgen is an Equal Opportunity employer and will consider you without regard to your race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, or disability status. We will ensure that individuals with disabilities are provided with reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request an accommodation . Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
54024 Jobs | Dublin
Wipro
24262 Jobs | Bengaluru
Accenture in India
18733 Jobs | Dublin 2
EY
17079 Jobs | London
Uplers
12548 Jobs | Ahmedabad
IBM
11704 Jobs | Armonk
Amazon
11059 Jobs | Seattle,WA
Bajaj Finserv
10656 Jobs |
Accenture services Pvt Ltd
10587 Jobs |
Oracle
10506 Jobs | Redwood City