Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
7.0 - 12.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails
Posted 1 week ago
7.0 - 12.0 years
10 - 20 Lacs
Gurugram
Work from Office
arora.rajat@Sammaancapital.com Job Description: Data Privacy Manager Grade: Manager / Senior Manager Department: Information & Cyber Security Sub Department: Data Privacy Location: Gurgaon Reporting To: CISO & DPO Role Summary We are looking for an experienced Data Privacy Manager to lead our organizations efforts toward compliance with the India Digital Personal Data Protection (DPDP) Act, 2023 and applicable RBI data privacy and security guidelines . This role will define, operationalize, and sustain a privacy compliance framework, working across legal, IT, risk, HR, and product functions. Key Responsibilities 1. Privacy Compliance Framework Lead the design and implementation of the organizational privacy framework aligned with: India DPDP Act, 2023 RBI Guidelines (including cybersecurity and outsourcing guidelines) Other relevant industry-specific laws and standards 2. Governance & Program Management Define and implement data privacy policies, SOPs, and governance structures Drive DPDP Act readiness programs including consent management, rights enablement, and breach notification mechanisms Engage with senior management and department Heads on privacy risks and posture 3. Data Protection Operations Manage the data lifecycledata collection, usage, storage, retention, and disposalwith appropriate controls Conduct Data Protection Impact Assessments (DPIAs) for high-risk processing activities Ensure data minimization, purpose limitation, and storage limitation principles are enforced 4. Third-Party & Cross-Border Data Oversight Evaluate and govern third-party processors and vendors for data privacy compliance Draft and manage Data Processing Agreements (DPAs) Ensure lawful cross-border data transfer mechanisms and data localization (where required by RBI) 5. Training, Awareness & Cultural Adoption Lead privacy training and awareness programs across the organization Embed Privacy-by-Design in product development and business operations 6. Monitoring & Incident Response Establish privacy audit controls, metrics, and KPIs Coordinate personal data breach response and regulatory notification processes Maintain breach registers and coordinate with InfoSec for threat mitigation 7. Regulatory Engagement Liaise with regulatory bodies and stay current on evolving privacy laws Support internal and external audits, including RBI inspections and supervisory reviews Requirements Education: Bachelor’s/Master’s in Law, Information Security, Compliance, or related fields Privacy certifications preferred (CIPM, CDPSE, CIPP/IT, DCPP, ISO 27701) Experience: 7–12 years of experience in privacy, information security, legal or risk functions Experience in implementing DPDP Act or GDPR programs, and/or working with RBI regulations Skills & Competencies: Strong understanding of privacy laws (DPDP, IT Act, RBI Master Directions, ISO 27701) Stakeholder management and cross-functional leadership Excellent communication and training abilities Familiarity with tools: DLP, SIEM, consent management, GRC platforms Preferred Industry Background BFSI (Banking, Fintech, NBFC) IT/ITeS Thanks Rajat Arora 98735 66771 arora.rajat@Sammaancapital.com
Posted 1 week ago
2.0 - 7.0 years
12 - 17 Lacs
Chennai
Work from Office
We are seeking a highly motivated Cybersecurity Senior Associate to join our team at Bahwan CyberTek, Chennai . This role requires expertise in assessing security and privacy programs, identifying risks, and developing solutions to enhance cybersecurity capabilities. The ideal candidate will have a solid foundation in cybersecurity consulting, HITRUST (e1, i1, r2) and SOC 2 Type 2 frameworks. Key Responsibilities: Assess security and privacy programs and strategies using industry frameworks (e.g., NIST CSF, ISO, CIS, HIPAA, GDPR) and conduct risk assessments. Conduct regular gap assessments and readiness checks for HITRUST and SOC 2 Type 2. Document and design solutions to remediate security gaps and enhance privacy maturity. Act as a Cybersecurity Consultant , evaluating security processes, advising on security strategies, and presenting solutions for complex security and privacy issues. Review and assess client documentation to understand their security environment. Lead client meetings to establish assessment scope and gather necessary information. Provide well-documented deliverables with accuracy and within established timelines. Ideal Candidate Profile: Bachelors degree in information technology , Security, Systems, Assurance, or a related field. 6 months+ of cybersecurity consulting experience in client-facing roles. Basic understanding of regulatory compliance and security frameworks (NIST, GDPR, ISO 27001/27002, NIST 800 series). Familiarity with key security domains such as IAM, PAM, Logging & Monitoring, Vulnerability & Patch Management, Incident Response, Asset Management, and Vendor Risk Management . Strong analytical, presentation, documentation, and collaboration skills.
Posted 1 week ago
2.0 - 7.0 years
1 - 5 Lacs
Kolkata, Hyderabad, Pune
Work from Office
Security Trust Analyst1 Job Title: Security Trust Analyst Location: Bangalore, India Work Mode: Hybrid (Minimum 2 days/week from office) About the Role We are seeking a Security Trust Analyst to join our Global Trust Office as an individual contributor. In this hands-on role, you will work closely with sales teams and internal security functions to demonstrate that our security and compliance controls meet industry-leading standards. You will also engage with cross-functional stakeholders across Compliance, Legal, Privacy, Product, and Engineering teams. The ideal candidate is detail-oriented, collaborative, and passionate about cybersecurity and compliance, with a strong understanding of industry frameworks such as ISO 27001, PCI DSS, and AICPA SOC . Key Responsibilities Perform first-line review of incoming Trust Office cases in Salesforce, validate case accuracy, and assign for further action. Respond to requests from internal sales teams regarding security and compliance inquiries from customers and prospects. Prepare and distribute weekly reports from Salesforce. Manage distribution of Security and Trust Assurance Packets (STAP) to customers and prospects. Collaborate with internal teams (Security, Product, Engineering, etc.) to communicate and support DocuSigns compliance posture. Contribute to continuous improvement initiatives within the Global Trust Office. Perform additional tasks and responsibilities as assigned. Support after-hours requests on an as-needed basis. What Youll Bring Basic Qualifications: Bachelors degree or equivalent work experience in Computer Science, Cybersecurity, GRC (Governance, Risk & Compliance), or related field. Minimum 2 years of relevant experience in cybersecurity or compliance-related roles. Familiarity with security and compliance frameworks such as:SSAE16, ISO 27001, NIST, PCI DSS, SOC, SIG, CSA, HIPAA, HITRUST, FedRAMP. Experience working in a SaaS or cloud solutions environment. Proficiency with Salesforce and Google Workspace tools. Strong analytical, communication, and presentation skills. Detail-oriented with excellent organizational and time management skills. Comfortable working across cross-functional teams and stakeholders. Strong passion for continuous learning and improvement. Understanding of the role of supply chain security in customer assurance. Work Environment Hybrid Work Model: This is a hybrid position requiring a presence in the Bangalore office a minimum of 2 days per week , with flexibility for remote work based on team and business needs. Location - Pune,Hyderabad,Kolkata,Jaipur,Chandigarh
Posted 1 week ago
8.0 - 13.0 years
0 - 1 Lacs
Gurugram
Work from Office
ABOUT JOB Designation: Associate Professor for subject specialization Computer Science/IT. Job Purpose & Role: To teach, research and serve the institution for academic, institutional & students growth & development. A. Knowledge To have strong command on subject knowledge – Computer Science/IT and have hands on experience in programming Have an ability to stay abreast on the latest trends and development in the subject area like machine learning, artificial intelligence, data science, cloud computing, blockchain technology, cyber security. Have an ability to stay abreast on the latest trends and development in the subject area. To make best use of technology in teaching learning methodology. Proven experience of excellent delivery of the subject for the students and achieve the best results /awards/positions in the university. To fulfill responsibility concerning students in respect of instruction, progress, and examination. To design, develop and deliver a range of programmes of study at various levels To lead the development and clarification of academic standards and quality for the subject area. To work with the leadership team to lead the development & implementation of student learning strategy & innovative assessment methods Meaningfully engaging students in class, seminars, workshops, conferences , events, applied subject knowledge projects. To conduct courses as per syllabus and ordinance issued by the university from time to time. To provide opportunity to students to work on live projects. To connect industry with academia for providing hands on experience leading to skill development of students. To guide junior faculty members to prepare / maintain lesson plans, lecture notes, model question papers, attendance register, manual etc. To ensure discipline and welfare of the students . To ensure Quality (NBA, ISO, NAAC) and innovative education to students by continuous monitoring of subject, books, and journals, teaching aids , Laboratory facilities To do quality research, have good academic record and books/research paper publications/IPR/patents record. To continue to develop one’s position as a leading researcher, including publication, external funding and the pursuit of other relevant indicators of standing in the field. To promote and represent the Institution at National & International level facilitate in branding. To lead and coordinate research activity in the subject area. To manage research and other collaborative partnerships with other Institutions and external bodies. To write publications of an internationally recognised standard or disseminate research findings using media appropriate to the discipline. To liaison and network to contribute to the enhancement of research quality in the subject field by being involved in quality assurance, external bodies, research councils, group and subject associations, research funding & sponsoring bodies B. Functional Skills Seasoned Academician/Researcher/Strategy Thinker Competency of Nurturing & engaging Students constructively Excellent interpersonal & content delivery skills. Ability to engage students constructively. Academic domain knowledge – National (UGC/NBA/NAAC/NIRF/AICTE etc.)/International Competency of Institution Building C. Attributes Dynamic, energetic, team player, thrives among strong colleagues. Ability to work in fast paced evolving environment . Be willing and able to exercise judgment and take risks. Accept criticism and constructive feedback , while being extremely adaptable and flexible. Reflection of an impeccable persona in walk-talk while dealing with academia High spiritual quotient (Social quotient -SQ, Intelligence quotient - IQ, Emotional Quotient - EQ) D. Qualification & Years of Experience as per AICTE/UGC norms: ME/M.Tech and BE/B.Tech in Computer Science /Information Technology from IITs, IISc., IIITs, NITs, reputed university & throughout first class PhD Degree in the relevant field of subject from the Top Tier, reputed university Minimum of 8 years of experience in teaching / research / industry out of which at least 2 years shall be Post Ph.D. experience. Minimum 6 research publications in SCI journals / UGC / AICTE approved list of journals. Post PhD publications and guiding PhD students is desirable. Industry and Global Experience is desirable. E. Salary as per current norms F. Location: Greater Noida, Delhi/NCR G. Apply for the position by sending your CV at careers@glbitm.ac.in H. Visit our website’s career page at www.glbitm.ac.in
Posted 1 week ago
8.0 - 13.0 years
0 - 1 Lacs
Gautam Buddha Nagar
Work from Office
ABOUT JOB Designation: Associate Professor for subject specialization Computer Science/IT. Job Purpose & Role: To teach, research and serve the institution for academic, institutional & students growth & development. A. Knowledge To have strong command on subject knowledge – Computer Science/IT and have hands on experience in programming Have an ability to stay abreast on the latest trends and development in the subject area like machine learning, artificial intelligence, data science, cloud computing, blockchain technology, cyber security. Have an ability to stay abreast on the latest trends and development in the subject area. To make best use of technology in teaching learning methodology. Proven experience of excellent delivery of the subject for the students and achieve the best results /awards/positions in the university. To fulfill responsibility concerning students in respect of instruction, progress, and examination. To design, develop and deliver a range of programmes of study at various levels To lead the development and clarification of academic standards and quality for the subject area. To work with the leadership team to lead the development & implementation of student learning strategy & innovative assessment methods Meaningfully engaging students in class, seminars, workshops, conferences , events, applied subject knowledge projects. To conduct courses as per syllabus and ordinance issued by the university from time to time. To provide opportunity to students to work on live projects. To connect industry with academia for providing hands on experience leading to skill development of students. To guide junior faculty members to prepare / maintain lesson plans, lecture notes, model question papers, attendance register, manual etc. To ensure discipline and welfare of the students . To ensure Quality (NBA, ISO, NAAC) and innovative education to students by continuous monitoring of subject, books, and journals, teaching aids , Laboratory facilities To do quality research, have good academic record and books/research paper publications/IPR/patents record. To continue to develop one’s position as a leading researcher, including publication, external funding and the pursuit of other relevant indicators of standing in the field. To promote and represent the Institution at National & International level facilitate in branding. To lead and coordinate research activity in the subject area. To manage research and other collaborative partnerships with other Institutions and external bodies. To write publications of an internationally recognised standard or disseminate research findings using media appropriate to the discipline. To liaison and network to contribute to the enhancement of research quality in the subject field by being involved in quality assurance, external bodies, research councils, group and subject associations, research funding & sponsoring bodies B. Functional Skills Seasoned Academician/Researcher/Strategy Thinker Competency of Nurturing & engaging Students constructively Excellent interpersonal & content delivery skills. Ability to engage students constructively. Academic domain knowledge – National (UGC/NBA/NAAC/NIRF/AICTE etc.)/International Competency of Institution Building C. Attributes Dynamic, energetic, team player, thrives among strong colleagues. Ability to work in fast paced evolving environment . Be willing and able to exercise judgment and take risks. Accept criticism and constructive feedback , while being extremely adaptable and flexible. Reflection of an impeccable persona in walk-talk while dealing with academia High spiritual quotient (Social quotient -SQ, Intelligence quotient - IQ, Emotional Quotient - EQ) D. Qualification & Years of Experience as per AICTE/UGC norms: ME/M.Tech and BE/B.Tech in Computer Science /Information Technology from IITs, IISc., IIITs, NITs, reputed university & throughout first class PhD Degree in the relevant field of subject from the Top Tier, reputed university Minimum of 8 years of experience in teaching / research / industry out of which at least 2 years shall be Post Ph.D. experience. Minimum 6 research publications in SCI journals / UGC / AICTE approved list of journals. Post PhD publications and guiding PhD students is desirable. Industry and Global Experience is desirable. E. Salary as per current norms F. Location: Greater Noida, Delhi/NCR G. Apply for the position by sending your CV at careers@glbitm.ac.in H. Visit our website’s career page at www.glbitm.ac.in
Posted 1 week ago
2.0 - 4.0 years
2 - 4 Lacs
Mumbai
Work from Office
Minimum 2-4 years of experience in Security Operations Centre Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc. Solid understanding of cyber security, network security, end point security concepts Good understanding of recent cyber threats, latest attack vectors Must have experience in any one SIEM (Splunk), EDR and SOAR solution Must have experience in leading/managing SOC shifts Experience in shift roster creation, resource management etc. Will be responsible for critical incident investigation, use case review, mentoring Shift Leads, SLA management etc.
Posted 1 week ago
7.0 - 12.0 years
9 - 17 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails
Posted 1 week ago
8.0 - 10.0 years
22 - 27 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Threat Protection Experience: 8-10 Years
Posted 1 week ago
8.0 - 10.0 years
22 - 27 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: ServiceNow SecOps Experience: 8-10 Years
Posted 1 week ago
8.0 - 10.0 years
22 - 27 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Palo Alto Networks - Firewall Experience: 8-10 Years
Posted 1 week ago
8.0 - 10.0 years
22 - 27 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Data Security Consulting Experience: 8-10 Years
Posted 1 week ago
3.0 - 8.0 years
5 - 10 Lacs
Bengaluru
Work from Office
Job Title : Data Privacy Manager (C1) - India Legal Compliance This position demands a global perspective, focusing on compliance with data privacy laws across regions, including GDPR in Europe, DPDP in India, CCPA in California, and other international mandates. The Data Privacy Manager must ensure the protection of Personally Identifiable Information (PII) and Sensitive Personal Information (SPI), fostering a robust framework that mitigates risks and strengthens the organizations security posture. Position Overview The Data Privacy Manager is responsible for overseeing the organizations efforts to ensure the protection of sensitive data, compliance with data privacy regulations, and alignment with industry best practices. This role plays a crucial part in maintaining trust with customers, partners, and employees by protecting personal and confidential information. Key Responsibilities Compliance and Regulation Management Monitor and ensure adherence to data protection regulations such as GDPR, DPDP (India), CCPA, HIPAA, or other applicable laws. Creating, maintaining, and updating data privacy policies, procedures, and guidelines to align with legal requirements and industry best practices. Conducting privacy impact assessments (PIAs) and data protection impact assessments (DPIAs) to identify and mitigate potential risks associated with data processing activities. Stay updated on changes in data privacy laws and advise the organization accordingly. Conduct regular audits and risk assessments to identify failure modes and areas of improvement. Strategic Leadership Lead initiatives to promote a culture of data privacy and protection within the organization. Collaborate with cross-functional teams, including IT, legal, and HR, to ensure data privacy compliance across all departments. Develop strategies for data governance and ensure alignment with organizational goals. Privacy by Design Ensuring privacy is embedded into the design and development of new products and services. Incident Response and Prevention Managing data breach incidents, including investigation, remediation, and reporting to relevant authorities. Training and Awareness Organize training sessions and workshops to educate employees on data privacy standards and practices. Ensure that all parties handling sensitive data are aware of their responsibilities under relevant laws and company policies. Vendor Management Overseeing the privacy practices of third-party vendors and ensuring they meet the organization's data protection standards. Educational Requirements A bachelor's degree or higher in fields like Law, Information Technology and Computer Science or a similar field is preferred. Technical Skills: Familiarity with data security concepts like encryption, data masking, anonymization, and pseudonymization is necessary, as well as knowledge of IT systems and data management. Analytical and Problem-Solving Skills: The ability to identify and address data privacy risks and challenges. Communication Skills: Being able to clearly explain complex privacy concepts and policies to various audiences. Certifications: Privacy certifications like CIPP, CIPM, or CIPT can demonstrate expertise in data privacy principles and practices. Soft Skills: Collaboration: Working effectively with various teams across the organization, including IT, Legal, HR, and Marketing. Attention to Detail: Meticulousness is essential when dealing with sensitive data and regulatory compliance. Leadership and Organizational Skills: Overseeing privacy program implementation and managing teams effectively. Ethical Mindset: Handling sensitive information responsibly and upholding privacy rights
Posted 1 week ago
1.0 - 3.0 years
0 - 0 Lacs
hyderabad, bangalore, chennai
On-site
Industrial IoT Engineer Role Summary: Designs and implements IoT solutions to optimize manufacturing processes and enable smart factory operations. Key Responsibilities: Develop and deploy IoT sensors and edge devices. Integrate data from machines into cloud platforms. Ensure cybersecurity and data integrity. Analyze real-time data for predictive insights. Skills Required: IoT protocols (MQTT, CoAP), cloud platforms (AWS, Azure). Embedded systems and microcontrollers. Networking and cybersecurity fundamentals. Data analytics and visualization tools. Qualifications: Bachelors in Electronics, Computer Science, or related field. 2+ years in IoT or industrial automation.
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
pune, maharashtra
On-site
You will be responsible for conducting application security reviews for Web, Mobile (Android and iOS), and API technologies. Your role will involve assessing and identifying potential vulnerabilities in the technology being developed before implementation. You should have expertise in application security testing methodologies such as SAST, DAST, and MAST, with experience in web application, API security, and mobile application security testing according to industry standards like OWASP top 10, SANS top 25, etc. It would be beneficial to have knowledge of programming and scripting languages such as Java, JavaScript, Angular, Spring Boot, Kotlin, and Swift. Familiarity with tools like Burp Suite, Postman, SoapUI, Checkmarx, Netsparker, Nexus IQ, Kryptowire for security testing and analyzing scanned reports is essential. Moreover, a strong understanding of application security tooling and experience in driving automation within the delivery environment is required. You must hold industry-recognized Information Security and Cyber Security qualifications such as CISSP, CISA, OSCP, GIAC GPEN, GIAC GMOB. A deep understanding of security industry trends, major vulnerabilities, and security threat landscape is crucial. Knowledge of Zero Trust security principles and practical implementations is necessary. While a degree is desirable, it is not mandatory. Experience in supporting major programs, security architecture, creating security designs, and displaying positive leadership behaviors related to risk management and mitigation is expected. Proficiency in collaboration tools like SharePoint, Teams, Confluence, and JIRA is advantageous. Hands-on experience in working with DevOps and Agile teams to incorporate security in the software development lifecycle is a key requirement. Additionally, experience in application risk assessment, threat modeling, and working closely with delivery teams for security risk remediation is important. About the Company: Purview is a leading Digital Cloud & Data Engineering company with headquarters in Edinburgh, United Kingdom and a presence in 14 countries including India, Poland, Germany, USA, UAE, Singapore, Australia, among others. The company provides services to Captive Clients and top-tier IT organizations, delivering solutions and resources to clients worldwide. Company Information: Purview Services 3rd Floor, Sonthalia Mind Space Near Westin Hotel, Gafoor Nagar, Hitechcity, Hyderabad Phone: +91 40 48549120 / +91 8790177967 Gyleview House, 3 Redheughs Rigg South Gyle, Edinburgh, EH12 9DQ Phone: +44 7590230910 Email: careers@purviewservices.com Login to Apply!,
Posted 1 week ago
0.0 - 4.0 years
0 Lacs
karnataka
On-site
You will be joining RSA, a global leader in trusted identity and access management, catering to over 12,000 organizations worldwide and managing 25 million enterprise identities. Specializing in providing secure access to millions of users across various industries, including financial services, healthcare, energy, and technology, RSA empowers security-first organizations to excel in the digital landscape. With a rich history of pioneering encryption, authentication, and identity federation technologies, RSA continues to drive innovation in the industry. The company is now at the forefront of digital identity transformation, offering cutting-edge solutions like the RSA Unified Identity Platform, hybrid and cloud solutions, passwordless hardware authenticators, and a seamless mobile-optimized workforce experience. As an RSA Apprentice Engineer, you will be part of a dynamic team that thrives on challenges and is committed to making a real impact. To excel in this role, you should have a basic understanding of the software development life cycle (SDLC) and possess knowledge of Java, scripting, operating systems, databases, and cloud technologies. Familiarity with networking, cyber security concepts, and the ability to quickly grasp complex technical ideas will be essential. Strong interpersonal communication skills are also required to collaborate effectively within the team. Ideally, you should hold a Bachelor's degree in computer science, electronics, IT, or related fields, graduating in 2024 with a CGPA of 7 or above. RSA values diversity and is dedicated to providing equal employment opportunities to all employees and applicants, fostering a work environment free of discrimination and harassment. If you are motivated, eager to take on challenges, and ready to contribute to the future of digital identity, we invite you to be a part of our winning team. To learn more about RSA and this opportunity, visit rsa.com. Please note that RSA maintains a commitment to fair employment practices and does not discriminate based on race, color, or any other legally protected category. If you require any accommodations during the application process, please reach out to the RSA Talent Acquisition Team at rsa.global.talent.acquisition@rsa.com. Remember, RSA and its authorized consultants will never ask for a fee to process your application. We reserve the right to modify or withdraw job postings at our discretion, even before the stated closing date.,
Posted 1 week ago
15.0 - 19.0 years
0 Lacs
hyderabad, telangana
On-site
As an organization focused on re-imagining agricultural insurance through the innovative integration of Public Cloud, GIS, Remote-sensing, and cutting-edge AI-based algorithms, we at Kshema are dedicated to empowering the future of agricultural insurance. Leveraging the latest advancements in Mobile and Geospatial technologies, we are committed to revolutionizing the industry. We are currently seeking a Chief Information Security Officer (CISO) who will play a pivotal role in driving our cyber security strategy and ensuring strict compliance with regulatory and statutory guidelines pertaining to information and cyber security. As the CISO, you will be entrusted with the responsibility of enforcing policies aimed at safeguarding the organization's information assets and coordinating all information/cyber security-related matters internally and externally. **Key Responsibilities:** - Develop a comprehensive Information Security Roadmap for the organization with a forward-looking perspective. - Establish and oversee an enterprise-wide information security and IT risk management program. - Lead the implementation and review of Hardware, Network, and Software Security Standards and Controls to fortify systems, data, and assets against internal and external threats. - Implement Security Assessment and Testing Processes, including Penetration Testing, Secure Software Development, and Vulnerability Management. - Identify and deploy cutting-edge Security Products/Tools for various purposes. - Proactively monitor and address security issues, potential threats, and vulnerabilities to enhance security standards continually. - Conduct Information Security awareness training for all employees. - Execute Security Assessment practices such as Audits and Reviews. - Provide strategic guidance and consultation for IT Projects, including security risk assessments. - Conduct real-time analysis, investigations, and forensics when necessary to enhance security measures. - Develop strategies to manage security incidents and conduct investigations. - Maintain regular communication with stakeholders on Information and Data Security Practices and Activities. - Implement a strategy for deploying information security technologies to mitigate cyber-attack risks. - Continuously evaluate current IT security practices and systems for enhancement. - Ensure compliance with the latest regulations and requirements. - Develop and implement business continuity plans. **Desired Skills and Experience:** - Engineering Graduate/Post-Graduate in fields such as Computer Science, IT, Electronics, Communications, or Cyber Security. - Minimum of 15 years" experience in risk management, information security, or cyber security. - Profound knowledge of information security management frameworks like ISO/IEC 27001 and NIST. - Familiarity with DevSecOps, Secure SDLC, Security Automation, Security Testing, DR & BCP Concepts. - Experience in financial forecasting and budget management. - Understanding of Industry Security Standards, Protocols, and Data Privacy Regulations. - Ability to navigate ambiguity and devise solutions for complex problems. - Experience in contract and vendor negotiations and management. - Proficiency in Agile software development practices. - Collaboration skills to work effectively with cross-functional teams. - Relevant certifications such as CISSP, CEH, CISA, and CISM are advantageous. - Hands-on experience in designing, implementing, and operating security in public clouds like AWS, Azure, Oracle, or GCP. - Strong written and verbal communication skills with a high level of integrity. - Excellent presentation skills. Join us at Kshema and be a part of our mission to redefine agricultural insurance through innovation and technology.,
Posted 1 week ago
0.0 - 4.0 years
1 - 2 Lacs
Noida
Work from Office
"> Teacher Librarian (IB) The primary purpose of a Teacher Librarian s role will be - Aim to provide students with easy access to information and recreational resources. Provide services that allow students to develop skills in online researching, locating, evaluating, synthesizing, and using information. Supervise and manage the school library using Library Management System. Serve as teacher, materials expert, and curriculum adviser to ensure that the library is a part of the instructional programs of the school. Principal Accountabilities and Responsibilities: C1 Academic Responsibilities C1.1 Learning and teaching Collaborate with teachers and Head of Programme to enhance curriculum and provide resources for accomplishing curriculum requirements. Curate and provide digital and other resources that would support inquiry. Actively promote student information literacy across the curriculum. Maintain a collection of current professional resources for teachers including online access to journals, exam material, etc. Help teachers to become independent users of the Learning Centre. Ensure maintenance of bibliographies of UOI and Learner Profile resources. Plan and conduct activities to promote reading amongst learners. Maintain records of the reading levels for each learner in the school. Collaborate with teachers in developing units of inquiry by acting as the resource specialist. To create a book list based on appropriate student literature and knowledge and arrange for procurement. To review books and ensure that all acquired books are age appropriate and in line with the school values. Ensure that the academic honesty policy is understood and practiced in school by all students through library academic honesty program. Plan and conduct online reading and comprehension assessments. C 1.2 Assessment, recording and reporting Maintain reading assessment record for each student, provide these records to the teachers for supporting student in language development and enhance their reading capability. Ensure that information, resources, and services are used to the best possible advantage in every subject and year level. C1.3 Pastoral Care To develop good care habits among children and respect for books. Maintain a record and report the same in the progress report of the students. Be responsible for the social and emotional development of students. Take responsibility of students cyber security and safety. Build & sustain an engaging relationship with students/parents (need basis). C 2 Administrative Responsibilities To ensure the cleanliness of library and its environs. Develop and maintain library policies, handbooks, action plans. Create and update all library displays in support of library assistant. To maintain an accessible database/catalogue of all library books and equipment for information and stock registering. To ensure that the books are kept in good condition and are accessible to students. Develop and maintain library management system on ShriConnect. Develop and manage Library budgeting . Administer library overdue notices and lost book fees in support of library assistant. Develop, implement and manage all Library programs and classes. To manage Library schedule and events. Manage and train Library assistant, interns and volunteers. To facilitate the purchase of a wide range of library resources - books/supplies, library materials, databases and other online resources, to support the learning programme, including materials which reflects a range of cultures, perspectives and languages. Basic Qualifications and experience B. Lib + PG with minimum 2 years of experience as Head Librarian. At least 8 years of experience in taking care of a library. C 5.2 Basic competencies and skills Communication Patience & ability to efficiently communicate relevant information with civility, clarity and purpose to staff, students, parents in a timely manner. Portray exceptional skills in coordinating tasks and activities at various levels. Technical Know-How Experience with using computers and working with electronic databases. Ability to work on MS Office tools and Library Management System. Self-management: Take responsibility to research and work towards one s own professional development and using the outcomes to improve existing practices, consistent with school goals. Ability to encourage and maintain good order and discipline by building positive relationships with students. Adhere to the school s decorum and code of conduct. Be organised, proactive and self-driven. Ability to manage workload and meet deadlines. Show willingness to support the vision and ethos of the school. Thinking: Knowledge & ability to give positive and focused support to students with inclusive needs (in line with Inclusive Education policy). Secure knowledge and understanding of the strategies to inculcate the love for reading and research in students and teachers. Design relevant library programs for students and update the same regularly. Potential to set clear and appropriate goals for student learning and make use of assessment information to promote each student s attainment/progress, and plan future activities. Research: Ability to engage in practitioner enquiry for improvement in educational practices. Research, plan and engage in professional learning activities. Social Skills: Strong social and Interpersonal Skills. Ability to collaborate with members of the school community to build a team environment that supports students learning. Ability to empathise with young people and be firm, fair, and consistent when dealing with them. Ability to establish good and productive working relationships and work well in a team.
Posted 1 week ago
3.0 - 5.0 years
6 - 10 Lacs
Chennai, Bengaluru
Work from Office
Management Level G Core Duties/Responsibilities Risk Identification, Assessment and Analysis Assist and conduct comprehensive risk assessments to identify potential cybersecurity threats and vulnerabilities across EQ s infrastructure, data, applications, mobile and networks. Assist in conducting comprehensive security risk assessments for internal systems, third-party services, and cloud-based infrastructure. Review cloud architecture, deployment models, and services to identify gaps against industry best practices (e.g., CIS Benchmarks, NIST, ISO 27001). Utilise security tools and threat modelling techniques to evaluate the likelihood and impact of various security risks and identify the top priorities. Collaborate with DevOps and Cloud Engineering teams to advise on security controls and risk mitigation strategies in AWS, Azure. Analyse security data from multiple sources (including technical security documents, penetration testing results and code scans) to provide insights into potential risks and security gaps. Assist in designing and recommending risk mitigation strategies based on assessment findings, including updates to policies, security controls and technical solutions. Maintain Risk records and Risk Acceptances regarding IT, Information or Cyber Security in the Company s Risk Register/GRC tool. Regulatory Requirements Identification Research, identify and interpret, with the help of legal and compliance team, cyber security requirements and standards (e.g. GDPR, NIST, ISO27001, SOX, AI Act, DORA). Stay up-to-date with evolving cybersecurity regulations and legal requirements at local, national and international levels in which EQ operates. Assist in compliance assessment and gap analysis to determine EQ s adherence to relevant cybersecurity regulations and frameworks. Ensure that these are incorporated into the Risk Process so that they are rigorously applied, where necessary, to new and changed IT systems and applications. Third-Party Risk Management Conduct Risk Analysis of existing and new third-parties playing a significant role in the Company s supply chain and with access to Company or customer data or the Company s systems Track any significant risk issues arising to completion over agreed timescales. Information Security Metrics & Reporting Assist by collecting and organising data, helping to identify potential risks across various business units and prepare appropriate metrics and reports. Support in the creation of regular and ad-hoc reports for Executives and senior management teams Stakeholder Engagement Engage with various developers and stakeholders across the business in selecting tailored security training on the training platform. Engage in knowledge sharing sessions on emerging threats and security risk trends. Risk Method Development Assist the Information Security Risk Manager in developing and maintaining the EQ Security Risk Process. Assist in developing and implement risk management strategies. Collaborate with IT and security teams to implement technical measures like firewalls, encryption, and MFA. Analysis and improvement of existing information security policies guidelines and procedures, creating new ones where required Define best practice in the design and coding of proprietary systems developed by the Company and support the development teams in adhering to such practices with advice, education and provision of dynamic and static application security testing tools. We are committed to equality of opportunity for all staff and applications from individuals are encouraged regardless of age, disability, sex, gender reassignment, sexual orientation, pregnancy and maternity, race, religion or belief and marriage and civil partnerships. Please note any offer of employment is subject to satisfactory pre-employment screening checks.
Posted 1 week ago
0.0 - 4.0 years
0 Lacs
pune, maharashtra
On-site
The role available at SANA Cyber Forensics Investigation and Data Security Services Pvt. Ltd. is for an Internship Trainee position based in Pune. As an Internship Trainee, you will be actively involved in cyber forensic investigations, data collection, and analysis processes. Your responsibilities will include providing support for ongoing fraud and internal investigations while ensuring the security and integrity of data at all stages of the investigative procedures. To excel in this role, you should have a solid understanding of Cyber Security, Digital Forensics, and Data Analysis. Proficiency in investigation techniques, fraud detection, and internal audits will be advantageous. Strong analytical and problem-solving skills are essential for this position. Effective written and verbal communication skills are also required to convey findings and updates clearly. The ability to work both independently and collaboratively within a team setting is essential. Ideally, you should hold a Bachelor's degree in Cyber Security, Computer Science, Forensics, or a related field. However, current enrollment in such programs will also be considered. Any prior experience with forensic tools and software will be viewed as a positive attribute. Join us at SANA Cyber Forensics Investigation and Data Security Services Pvt. Ltd. and be part of a team dedicated to upholding the principles of Confidentiality, Integrity, and Availability in all our operations.,
Posted 1 week ago
0.0 - 4.0 years
0 Lacs
haryana
On-site
TIKAJ is seeking a passionate individual who is eager to kickstart their cybersecurity career. As a Security Analyst, you will embark on the first step towards becoming a cybersecurity expert and shaping a brighter future in this field. Your responsibilities will include responding to and enforcing actions on cybersecurity incidents, monitoring user activity, network events, and signals from security tools to detect events, categorizing alerts and anomalous activities that pose real threats, remediating attacks, triaging general information security tickets, collecting data for analysis, evaluating attacks, identifying the root causes, and implementing necessary security measures to counter the attacks. Additionally, you will be accountable for investigating information security issues and generating detailed reports. We are seeking candidates who are highly motivated, possess a strong inclination towards self-learning, and thrive in a team-oriented environment. Candidates should hold a degree in computer science or a related field, have beginner to intermediate level proficiency in Python, demonstrate an interest in cybersecurity, phishing, cyber laws, and enforcement, and exhibit excellent written and verbal communication skills. Key Skills: - Security awareness - Cybersecurity - Incident management,
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
navi mumbai, maharashtra
On-site
As a Sailpoint Engineer in the IT Software industry, you will be responsible for providing subject matter expertise on SailPoint technologies and processes to deliver the core Identity and Access Management service of the Bank. Your role involves day-to-day support, maintenance, and development of the Identity Governance and Assurance technology platforms with a primary focus on Sailpoint Technologies. You will be expected to demonstrate technical leadership by proactively driving the ongoing development and strategy of Identity and Access Management to achieve the desired outcomes. Understanding the security requirements of the Bank's major programs of work and ensuring their successful delivery will be a key aspect of your responsibilities. Additionally, you will provide input into designs and supporting documentation for Identity and Access Management solutions when required. Your role will also involve offering advice on IAM technology and contributing to technical and business process strategies. Ensuring the effective and efficient operation of IAM systems and processes, as well as delivering continual improvements to the IAM service in support of the Bank's Cyber investment Programme, will be crucial. Collaborating with Technology Architects, Engineers, and System Owners, you will provide specialist guidance for IAM solutions and contribute to the broader cyber security control set. To excel in this role, you must possess hands-on experience in Sailpoint Technologies, along with a good understanding of enterprise Identity and Access Management and its role in managing business risk effectively. Strong interpersonal skills, the ability to build relationships with key stakeholders, and excellent communication skills are essential. You should also be capable of coordinating IAM partners and internal Bank teams on IAM initiatives, producing detailed designs, and technology roadmaps. Desired qualifications include certifications in SailPoint and broader industry standards, as well as experience in deploying Identity and Access Management capabilities in hybrid, cloud, and multicloud environments. A Bachelor's degree in Any Specialization or an advanced degree in Computer Science or equivalent, along with a minimum of 3 to 5 years of experience, is required for this role.,
Posted 1 week ago
2.0 - 5.0 years
13 - 15 Lacs
Bengaluru
Work from Office
Writing clean, efficient, and well-documented Python code Develop back-end components to improve overall performance and system robustness. Maintaining and updating existing systems Collaborating with team members to identify, design, and implement new features Participating in code reviews to ensure code quality and consistency Required Skills: Great programming skills with expertise in Python Skills to build highly scalable and efficient backend services Good knowledge of SQL and experience in working with relational databases. Experience in working with NoSQL database programs such as MongoDB. Hands-on experience in at least one Python web framework such as FastAPI or Flask. Working knowledge of a message queuing system like RabbitMQ/ SQSKafka Experience with Docker Good to Have: Experience working with kubernetes Experience with AWS cloud services. Hands on skills in Applied-ML
Posted 1 week ago
7.0 - 12.0 years
25 - 30 Lacs
Bengaluru
Work from Office
Technical Delivery & Operational Excellence Build and iterate on product offerings, APIs, platforms, frameworks and tools. Responsible for designing, developing, and maintaining feature buildouts to support a world-class user experience for our customers. Ensure system stability and reliability of your crafted work. Participate in regular code and design reviews as well as team-wide on-call rotation. Write code with testability, readability, edge cases, and errors in mind. Write and review technical design documents. Teamwork & Collaboration Communicate effectively in Async manner with team members to provide updates, discuss challenges and propose solutions. Collaborate closely with product managers, designers, and engineers. Take ownership of projects and is a driver who adds instant adrenaline and drives positive impact when placed on projects and teams. Participate in team roadmap discussions & (good to have) proposing long term plans. Actively contribute to knowledge sharing within the team and participate in professional development activities. Must have Skills Experienced Sr Software Engineer having 7+ years of industry experience with strong software engineering fundamentals. Futuristic, ability to look at the bigger picture, growing system needs. Growth-oriented, looking to increase impact, responsibility, and ownership over time Proven ability to own and drive complex systems end-to-end, with strong knowledge of team-owned services and the ability to collaborate and influence cross-team goals and roadmaps. Strong experience writing production Python code and working with Postgres databases. Solid experience in system design and building resilient, scalable applications with an emphasis on operational excellence. Detail driven and care about code quality, testing, and performance. Ability to make practical trade-offs and propose technical solutions, including writing technical design documents and leading its adoption. Strong understanding of service health, monitoring, fault tolerance, and incident response practices. Strong communication skills and proven ability to work autonomously and asynchronously with remote collaborators and stakeholders. Strong communication and mentorship skills to influence team-wide engineering practices. Nice to Have Skills Experience with Golang and airflow orchestration. Familiarity with ChatGPT, Cursor and other GenAI productivity tools.
Posted 1 week ago
1.0 - 5.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Advance Software Engineer About the Connectivity Enablers The Aircraft Date Gateway routers are avionics networking computers, built to provide Cyber industrial-class security and connectivity to the aircraft. The securely connected platform enhances wireless connectivity, network domain switching, routing and Cyber security operations. ADGs ensure ready to send Avionics data to Honeywell Sentience Cloud. ADGs encompass Connectivity, Computation and Storage capabilities: SATCOM, 4G LTE Air-To-Ground connectivity links throughout the world; and 802. 11ac WiFi for connectivity to passengers, crew, pilot and ground operations. The ADG also supports routing for both wireless and wired network connections and has an internal L2-managed Gigabit Ethernet Switch. The ADG includes other important Avionics interfaces such as ARINC 429, ASCB, AFDX, and aircraft discrete I/O and USB ports. ADG provides edge computing facility, for minimizing the response time, the power consumption, and the bandwidth cost, to deliver functionality such as big data collection, management, real-time communication, expandable peripherals, and various other services. Must have : Bachelor s degree in engineering (Electrical/Systems/Computer) Minimum 7+ years of engineering experience Core Skill Set : C, C++, Linux Protocols, Standard Template Library, Design Patterns, DevOps, Development in Linux Environment. Good understanding of Linux Kernel , Type 1/Type 2 hypervisors. Working experience with hypervisors will be a plus. Understanding various software development lifecycle Demonstrate the ability to develop efficient and high-quality software. Can quickly analyze, incorporate, and apply new information and concepts. Ability to consistently make timely decisions even in the face of complexity, balancing systematic analysis with decisiveness. Ability to convey subtle or complex messages clearly, as appropriate for the topic and audience. Some relevant experience Diverse and global teaming and collaboration Individuals who are self-motivated and able to work with little supervision, who consistently take the initiative to get things done Multi-tasking and has the ability to manage a variety of complicated tasks. Must have : Bachelor s degree in engineering (Electrical/Systems/Computer) Minimum 7+ years of engineering experience Core Skill Set : C, C++, Linux Protocols, Standard Template Library, Design Patterns, DevOps, Development in Linux Environment. Good understanding of Linux Kernel , Type 1/Type 2 hypervisors. Working experience with hypervisors will be a plus. Understanding various software development lifecycle Demonstrate the ability to develop efficient and high-quality software. Can quickly analyze, incorporate, and apply new information and concepts. Ability to consistently make timely decisions even in the face of complexity, balancing systematic analysis with decisiveness. Ability to convey subtle or complex messages clearly, as appropriate for the topic and audience. Some relevant experience Diverse and global teaming and collaboration Individuals who are self-motivated and able to work with little supervision, who consistently take the initiative to get things done Multi-tasking and has the ability to manage a variety of complicated tasks. Job Responsibilities: Implementing Cockpit Connectivity Software Excellent communication and problem-solving skills. Should possess excellent soft skills to work and deliver in an agile environment. Constantly look to automate manual and repetitive tasks while reducing or optimizing build/release times. Automate and implement the Continuous Integration and Continuous Deployment pipeline. Engage with teams and manage build requirements. Follow emerging technologies and build reusable code and libraries. Troubleshoot and debug Exiting product Installers. Serve as an expert on our system s installation for debugging & production. Have a firm understanding of requirements development, test plans and procedures. Job Responsibilities: Implementing Cockpit Connectivity Software Excellent communication and problem-solving skills. Should possess excellent soft skills to work and deliver in an agile environment. Constantly look to automate manual and repetitive tasks while reducing or optimizing build/release times. Automate and implement the Continuous Integration and Continuous Deployment pipeline. Engage with teams and manage build requirements. Follow emerging technologies and build reusable code and libraries. Troubleshoot and debug Exiting product Installers. Serve as an expert on our system s installation for debugging & production. Have a firm understanding of requirements development, test plans and procedures.
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France