Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
7.0 - 12.0 years
8 - 18 Lacs
Bengaluru
Hybrid
Qualification: Bachelors degree in computer Science or IT higher-level qualification Perform 3rd-party audits and trainings according to ISO/IEC 27001, ISO 9001 & other IT specific standards/ frameworks Provide timely and accurate reviews of client’s corrective action and closure. Minimum 5+ years’ Experience in IT /Management system Implementation / certification and Minimum 2 years of profound experience in the field of information security. Great attitude, Analytical skills and communication skills. Preferred: IRCA Certified, ITIL Certified, CISA, CISM, CISSP, MCSE, MCSA and/or MBA Good understanding of relevant regulations and industry standards (e.g. ITIL Framework, FFIEC, SOX, COSO, COBIT, ITIL, ISO27001, PCI, HIPAA, HiTrust and GLBA), best practices and methodologies and the ability to apply these requirements to organizational internal control frameworks. Able to travel for business purpose(70-80%).
Posted 1 day ago
7.0 - 12.0 years
8 - 18 Lacs
Hyderabad
Hybrid
Qualification: Bachelors degree in computer Science or IT higher-level qualification Perform 3rd-party audits and trainings according to ISO/IEC 27001, ISO 9001 & other IT specific standards/ frameworks Provide timely and accurate reviews of client’s corrective action and closure. Minimum 5+ years’ Experience in IT /Management system Implementation / certification and Minimum 2 years of profound experience in the field of information security. Great attitude, Analytical skills and communication skills. Preferred: IRCA Certified, ITIL Certified, CISA, CISM, CISSP, MCSE, MCSA and/or MBA Good understanding of relevant regulations and industry standards (e.g. ITIL Framework, FFIEC, SOX, COSO, COBIT, ITIL, ISO27001, PCI, HIPAA, HiTrust and GLBA), best practices and methodologies and the ability to apply these requirements to organizational internal control frameworks. Able to travel for business purpose(70-80%).
Posted 1 day ago
5.0 - 7.0 years
7 - 9 Lacs
Pune
Work from Office
The IZOT product line includes BMCs Intelligent Z Optimization & Transformation products, which help the worlds largest companies to monitor and manage their mainframe systems. The modernization of mainframe is the beating heart of our product line, and we achieve this goal by developing products that improve the developer experience, the mainframe integration, the speed of application development, the quality of the code and the applications security, while reducing operational costs and risks. We acquired several companies along We are looking for Application Security Engineer to take ownership of security testing for enterprise products deployed on mainframe environments. In this role, you will assess application-layer security risks, identify vulnerabilities in product implementations, and lead secure architecture reviews. The ideal candidate brings deep offensive security skills along with familiarity in testing applications running on or integrated with IBM mainframe systems. Primary Roles and Responsibilities: Conduct penetration testing and red teaming exercises targeting mainframe environments and the surrounding application ecosystem. Perform code-assisted and black-box penetration testing against enterprise applications/systems interacting with RACF, DB2, CICS, MQ, and related subsystems. Identify risks in authentication, authorization, data handling, and communications within mainframe-integrated products. Create threat models and guide product teams in mitigating high-impact vulnerabilities early in the SDLC. Drive remediation efforts through hands-on collaboration and secure design guidance. Author technical reports and deliver executive summaries tailored to various audiences. Stay current on vulnerabilities, exploits, and testing techniques relevant to legacy enterprise technologies and mainframe ecosystems. Assess common integration patterns (SOA, REST/JSON, MQ) for security risks. To ensure youre set up for success, you will bring the following skillset & experience: 3+ years of experience in penetration testing, with a specialization in systems/applications integrating with mainframe environments. Deep knowledge of mainframe communication protocols and security mechanisms. Demonstrated experience conducting red team-style assessments or advanced threat emulation on mainframe systems. Proficient in tools such as: Mainframe utilities: REXX, ISPF panels, NetView Security tools: Nmap, Burp Suite, Wireshark, custom scripts Strong scripting and automation skills (Python, REXX, Bash, or similar). Strong communication and leadership skills, with a proven ability to lead technical teams or projects. Experience producing board-level reports and presenting findings to stakeholders. Exposure to hybrid environments (mainframe to cloud integrations, modernization efforts). Familiarity with modern enterprise integration methods (REST, SOAP, MQ, FTP) that interface with mainframe services Whilst these are nice to have, our team can help you develop in the following skills: Industry certifications such as OSCP, OSCE, CRTP, GIAC GPEN, GXPN, or CISSP. Background in regulated industries such as banking, insurance, or government, where mainframes are core infrastructure. Knowledge of COBOL, PL/I, or other mainframe-centric programming languages. Experience with compliance standards like PCI-DSS, NIST, or SOX as they apply to mainframes.
Posted 1 day ago
8.0 - 12.0 years
11 - 21 Lacs
Hyderabad
Work from Office
Greetings from People Tech Group! Please find the below Job Description Job Title: Linux PCI Lead Location: Hyderabad Deep understanding of Linux kernel internals, especially drivers/pci and subsystems like hotplug, MSI, IOMMU, DMA API. Hands-on experience with PCIe Gen3/Gen4/Gen5 devices and related PHY bring-up issues. Familiarity with ARM64 and x86 architectures, DT/ACPI handling for PCI devices. Proficient in C programming, Linux kernel debugging (GDB, crash dumps), and tools like dmesg, lspci, pcie_check. Expertise in power management (runtime, suspend/resume flows) for PCI devices. Experience with Secure Boot, TrustZone, and virtualization passthrough (VFIO/SR-IOV) for PCIe devices is a strong plus. Experience using Yocto, Buildroot, or other embedded Linux build systems. Note: Except Sunday Everyday we have Walk - In.
Posted 1 day ago
5.0 - 10.0 years
7 - 12 Lacs
Bengaluru
Work from Office
FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity As a part of FICOs highly modern and innovative analytics and decision platform, the Cyber-Security Engineer will help shape the next generation security for FICOs Platform. You will address cutting edge security challenges in a highly automated, complex, cloud & microservices driven environments inclusive of design challenges and continuous delivery of security functionality and features to the FICO platform as well as the AI/ML capabilities used on top of the FICO platform." VP, Software Engineering . What Youll Contribute Secure the design of next generation FICO Platform, its capabilities and services. Support full-stack security architecture design from cloud infrastructure to application features for FICO customers. Work closely with product managers, architects and developers on the implementation of the security controls within products. Develop and maintain Kyverno policies for enforcing security controls in Kubernetes environments. Collaborate with platform, DevOps, and application teams to define and implement policy-as-code best practices. Contribute to automation efforts for policy deployment, validation, and reporting. Stay current with emerging threats, Kubernetes security features, and cloud-native security tools. Proof the security implementations within infrastructure & application deployment manifests and the CI/CD pipelines. Implement required controls and capabilities for the protection of FICO products and environments. Build & validate declarative threat models in continuous and automated manner. Prepare the product for compliance attestations and ensure adherence to best security practices. What Were Seeking 5+ years of experience in architecture, security reviews and requirement definition for complex product environments. Familiarity with industry regulations, frameworks, and practices. For example, PCI, ISO 27001, NIST, etc. Strong knowledge and hands-on experience with Kyverno and OPA/Gatekeeper (optional but a plus). Experience in threat modeling, code reviews, security testing, vulnerability detection, attacker exploit techniques, and methods for their remediation. Hands-on experience with programming languages, such asJava, Python, etc. Experience of deploying services and securing cloud environments, preferably AWS Experience of deploying and securing containers, container orchestration and mesh technologies (such as EKS, K8S, ISTIO). Ability to articulate complex architectural challenges with the business leadership and product management teams. Independently drive transformational security projects across teams and organizations. Experience with securing event streaming platforms like Kafka or Pulsar. Experience with ML/AI model security and adversarial techniques within the analytics domains. Hands-on experience with IaC (Such as Terraform, Cloudformation, Helm) and with CI/CD pipelines (such as Github, Jenkins, JFrog). Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at www.fico.com/Careers FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at https://www.fico.com/en/privacy-policy
Posted 1 day ago
4.0 - 8.0 years
6 - 10 Lacs
Bengaluru
Work from Office
Educational MCA,MTech,Bachelor Of Technology,Bachelor of Engineering,BCA Service Line Application Development and Maintenance Responsibilities 1. IAM Solution Design and Implementation:o Design and deploy IAM solutions using tools like ForgeRock, Okta, Ping Identity, or similar platforms.o Develop and maintain role-based access control (RBAC) and attribute-based access control (ABAC) models.2. Authentication and Authorization:o Implement and manage Single Sign-On (SSO), Multi-Factor Authentication (MFA), and passwordless authentication solutions.o Configure and support authentication protocols such as SAML, OAuth2, OpenID Connect, and LDAP.3. User Lifecycle Management:o Automate user provisioning, de-provisioning, and access reviews.o Integrate IAM solutions with HR systems and directories for seamless user lifecycle management.4. Access Governance:o Conduct periodic access reviews and audits to ensure compliance with internal policies and regulatory requirements.o Implement identity governance solutions to manage entitlements and certifications.5. Integration and Customization:o Integrate IAM solutions with enterprise applications, directories, and third-party systems.o Customize IAM workflows and policies to meet organizational needs.6. Monitoring and Incident Response:o Monitor IAM systems for anomalies and unauthorized access attempts.o Respond to and resolve IAM-related incidents and issues.7. Documentation and Training:o Create and maintain documentation for IAM processes, configurations, and policies.o Provide training and support to end-users and administrators on IAM tools and best practices. Additional Responsibilities: Technical Expertise:o IAM development experience using Java/Pythono Hands-on experience with IAM tools such as ForgeRock, Okta, Ping Identity, SailPoint, or similar platforms.o Strong knowledge of authentication protocols (SAML, OAuth2, OpenID Connect, LDAP).o Experience with directory services (Active Directory, LDAP) and user provisioning systems. Compliance and Governance:o Familiarity with regulatory frameworks such as GDPR, HIPAA, PCI-DSS, and SOX.o Experience with identity governance solutions for access reviews and certifications. Soft Skills: o Strong problem-solving and analytical skills.o Excellent communication and collaboration abilities. Certifications (Preferred):o ForgeRock Certified Access Management Specialisto Okta Certified Professionalo Ping Identity Certified Professionalo CISSP or CISM Preferred Skills: Technology-Java-Java - ALL Technology-Identity Management-Identity Management - ALL Technology-Identity Management-IAM Architecture Consultancy Technology-Machine Learning-Python
Posted 1 day ago
3.0 - 8.0 years
4 - 8 Lacs
Bengaluru
Work from Office
Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Infrastructure Security Vulnerability Management Operations Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking a skilled Imperva DAM Administrator to manage, maintain, and enhance our Imperva Database Activity Monitoring infrastructure. The ideal candidate will have deep experience with Imperva DAM, database security, and compliance frameworks such as PCI-DSS, SOX, and HIPAA. This role is crucial for ensuring real-time monitoring, alerting, and reporting of database activity to detect and prevent unauthorized or anomalous access. Roles & Responsibilities:- Administer, configure, and maintain the Imperva SecureSphere DAM platform across various environments (development, staging, production).- Deploy DAM agents/connectors across databases (Oracle, SQL Server, DB2, MySQL, etc.).- Develop and tune security policies, rules, and alerts for detecting suspicious database activity.- Monitor the DAM system health, logs, and performance metrics to ensure high availability and optimal operation.- Manage integrations with SIEM, ticketing systems, and other security tools.- Support audits and compliance reporting through custom report creation and event tracking.- Perform regular upgrades, patches, and configuration changes in accordance with security best practices.- Troubleshoot issues with DAM sensors, agents, and logging mechanisms.- Work closely with database administrators, application teams, and InfoSec stakeholders to ensure seamless data protection and policy enforcement.- Provide documentation, standard operating procedures (SOPs), and training to relevant stakeholders. Professional & Technical Skills: - Must To Have Skills: Proficiency in Infrastructure Security Vulnerability Management Operations.- Strong understanding of risk assessment methodologies and frameworks.- Experience with security tools and technologies for vulnerability scanning and management.- Knowledge of compliance standards and regulations related to cybersecurity.- Ability to communicate complex security concepts to non-technical stakeholders. Additional Information:- The candidate should have minimum 3 years of experience in Infrastructure Security Vulnerability Management Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 day ago
3.0 - 8.0 years
13 - 17 Lacs
Noida
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Identity and Access Management (IAM) Operations, Microsoft Active Directory Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitate the transition to cloud security-managed operations, ensuring that all security measures align with organizational objectives and compliance standards. You will engage in discussions to refine security strategies and provide insights that enhance the overall security posture of the organization. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Analyze and assess security risks associated with cloud operations and recommend appropriate mitigation strategies.- Develop and maintain comprehensive documentation of security policies, procedures, and standards. Professional & Technical Skills: - Must To Have Skills: Proficiency in Identity and Access Management (IAM) Operations, Microsoft Active Directory.- Strong understanding of cloud security principles and best practices.- Experience with identity governance and administration tools.- Familiarity with regulatory compliance frameworks such as GDPR, HIPAA, or PCI-DSS.- Knowledge of security incident response and management processes. Additional Information:- The candidate should have minimum 3 years of experience in Identity and Access Management (IAM) Operations.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 day ago
3.0 - 8.0 years
4 - 8 Lacs
Pune
Work from Office
Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Data Encryption Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Advisor, you will provide enterprise-level advice to make organizations cyber resilient. Your typical day will involve engaging with various stakeholders to assess their cybersecurity posture, identifying potential vulnerabilities, and recommending strategies to enhance their digital asset protection. You will also stay updated on the latest cyber threats and trends, ensuring that your guidance is relevant and effective in maintaining trust with stakeholders. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular assessments of organizational cybersecurity measures and provide actionable recommendations.- Collaborate with cross-functional teams to develop and implement security policies and procedures. Professional & Technical Skills: - Must To Have Skills: Proficiency in Data Encryption.- Good To Have Skills: Experience with network security protocols and frameworks.- Strong understanding of risk management principles and practices.- Familiarity with compliance standards such as GDPR, HIPAA, and PCI-DSS.- Experience in conducting security audits and vulnerability assessments. Additional Information:- The candidate should have minimum 3 years of experience in Data Encryption.- This position is based at our Pune office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 day ago
9.0 - 14.0 years
6 - 10 Lacs
Hyderabad
Work from Office
Candidate must be PCI-compliant and will be responsible for Audit and Compliance related initiativesCandidate must possess the desire to drive projects and remediation efforts to their conclusion in an environment undergoing transformationRole Effective written and verbal communication with subordinates peers and supervisor Work with External Auditors as requiredFacilitate interactions and documentation requests Assist with compliance framework assessmentsCoordinate remediation of observations noted from AuditGap Analyses Conduct Internal Audits; each quarter Conduct Audits for New Product, Review and edit policies as necessaryDevelop technical security training programs for application usersMaintains the Internal Audit manual and leads updates to audit templatesConducting investigations on irregularities and errors seen during the AuditDisaster Recovery and Incident Response. Update Risk Assessment trackerComplete internal vulnerability scans and plan for their remediationProvide consultation and advisement to the business and project leads around compliance initiativesComply with and enforce company policies and proceduresManage vulnerability cycles (identification, remediation, and mitigation) for OS and Non OS Patch.TSL/SSL and Cryptographic Standards.Hands-on experience with TSL/SSL and cryptography lifecycle (identify and mitigate risks from deprecated algorithms or vulnerabilities).In-depth understanding and experience integrating security practices into the software development lifecycle, from secure coding to automated deployment of security measures.
Posted 2 days ago
10.0 - 15.0 years
11 - 15 Lacs
Bengaluru
Work from Office
FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity "As a part of FICOs highly modern and innovative analytics and decision platform, the Senior Software Security Engineer will help shape the next generation security for FICOs Platform. You will address cutting edge security challenges in a highly automated, complex, cloud & microservices driven environments inclusive of design challenges and continuous delivery of security functionality and features to the FICO platform as well as the AI/ML capabilities used on top of the FICO platform" VP of Engineering. What Youll Contribute Secure the design of next next-generation FICO Platform, its capabilities, and services. Provide full-stack security architecture design from cloud infrastructure to application features for FICO customers. Work closely with product managers, architects, and developers on implementing the security controls within products. Develop and maintain Kyverno policies for enforcing security controls in Kubernetes environments. Collaborate with platform, DevOps, and application teams to define and implement policy-as-code best practices. Contribute to automation efforts for policy deployment, validation, and reporting. Stay current with emerging threats, Kubernetes security features, and cloud-native security tools. Define required controls and capabilities for the protection of FICO products and environments. Build & validate declarative threat models in a continuous and automated manner. Prepare the product for compliance attestations and ensure adherence to best security practices. What Were Seeking 10+ years of experience in architecture, security reviews, and requirement definition for complex product environments. Strong knowledge and hands-on experience with Kyverno and OPA/Gatekeeper (optional but a plus). Familiarity with industry regulations, frameworks, and practices. For example, PCI, ISO 27001, NIST, etc. Experience in threat modeling, code reviews, security testing, vulnerability detection, attacker exploit techniques, and methods for their remediation. Hands-on experience with programming languages, such as Java, Python, etc. Experience in deploying services and securing cloud environments, preferably AWS. Experience deploying and securing containers, container orchestration, and mesh technologies (such as EKS, K8S, ISTIO). Experience with Crossplane to manage cloud infrastructure declaratively via Kubernetes. Certifications in Kubernetes or cloud security (e.g., CKA, CKAD, CISSP) are desirable. Proficiency with CI/CD tools (e.g., GitHub Actions, GitLab CI, Jenkins, Crossplane). Independently drive transformational security projects across teams and organizations. Experience with securing event streaming platforms like Kafka or Pulsar. Experience with ML/AI model security and adversarial techniques within the analytics domains. Hands-on experience with IaC (Such as Terraform, Cloudformation, Helm) and with CI/CD pipelines (such as Github, Jenkins, JFrog). Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at www.fico.com/Careers FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at https://www.fico.com/en/privacy-policy
Posted 2 days ago
4.0 - 8.0 years
11 - 15 Lacs
Bengaluru
Work from Office
FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity "As a part of FICOs highly modern and innovative analytics and decision platform, the Senior Software Security Engineer will help shape the next generation security for FICOs Platform. You will address cutting edge security challenges in a highly automated, complex, cloud & microservices driven environments inclusive of design challenges and continuous delivery of security functionality and features to the FICO platform as well as the AI/ML capabilities used on top of the FICO platform" VP of Engineering. What Youll Contribute Secure the design of next next-generation FICO Platform, its capabilities, and services. Provide full-stack security architecture design from cloud infrastructure to application features for FICO customers. Work closely with product managers, architects, and developers on implementing the security controls within products. Develop and maintain Kyverno policies for enforcing security controls in Kubernetes environments. Collaborate with platform, DevOps, and application teams to define and implement policy-as-code best practices. Contribute to automation efforts for policy deployment, validation, and reporting. Stay current with emerging threats, Kubernetes security features, and cloud-native security tools. Define required controls and capabilities for the protection of FICO products and environments. Build & validate declarative threat models in a continuous and automated manner. Prepare the product for compliance attestations and ensure adherence to best security practices. What Were Seeking 10+ years of experience in architecture, security reviews, and requirement definition for complex product environments. Strong knowledge and hands-on experience with Kyverno and OPA/Gatekeeper (optional but a plus). Familiarity with industry regulations, frameworks, and practices. For example, PCI, ISO 27001, NIST, etc. Experience in threat modeling, code reviews, security testing, vulnerability detection, attacker exploit techniques, and methods for their remediation. Hands-on experience with programming languages, such as Java, Python, etc. Experience in deploying services and securing cloud environments, preferably AWS Experience deploying and securing containers, container orchestration, and mesh technologies (such as EKS, K8S, ISTIO). Experience with Crossplane to manage cloud infrastructure declaratively via Kubernetes. Certifications in Kubernetes or cloud security (e.g., CKA, CKAD, CISSP) are desirable Proficiency with CI/CD tools (e.g., GitHub Actions, GitLab CI, Jenkins, Crossplane, ). Independently drive transformational security projects across teams and organizations. Experience with securing event streaming platforms like Kafka or Pulsar. Experience with ML/AI model security and adversarial techniques within the analytics domains. Hands-on experience with IaC (Such as Terraform, Cloudformation, Helm) and with CI/CD pipelines (such as Github, Jenkins, JFrog). Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at www.fico.com/Careers FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at https://www.fico.com/en/privacy-policy
Posted 2 days ago
10.0 - 15.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Project description The project will focus on ensuring data privacy and compliance in the client environment by implementing and managing data masking solutions using the Delphix platform. This role involves collaboration with cross-functional teams to secure sensitive data while maintaining data integrity for development, testing, and analytics. Responsibilities Key Responsibilities: Design and Implementation: -Develop and implement robust data masking solutions using the Delphix platform. -Analyze data sets to identify sensitive information that requires masking. -Create and maintain masking rules, algorithms, and templates for various data environments. Data Security & Compliance: -Ensure sensitive data complies with regulatory requirements, such as GDPR, HIPAA, PCI-DSS, and CCPA. -Collaborate with security and compliance teams to establish masking policies and standards. Testing & Validation: -Conduct thorough testing to validate the effectiveness of masking solutions. -Troubleshoot and resolve issues related to data masking processes. Collaboration & Support: -Work closely with database administrators, developers, and QA teams to integrate masking into workflows. -Provide training and documentation on the Delphix platform and data masking techniques. Monitoring & Optimization: -Continuously monitor and optimize data masking performance. -Stay updated on the latest trends and updates in data masking technologies. Skills Must have Required Skills and Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field with 10+ years of IT industry experience. 8-10 years of experience in data masking, data privacy, or a related field. Expertise in the Delphix platform with 4+ years, including data virtualization and masking. Strong understanding of database management systems (e.g., Oracle, SQL Server, MySQL). Understanding of mainframe databases is an added advantage. Knowledge of data privacy regulations (GDPR, HIPAA, PCI-DSS, etc.). Proficiency in scripting languages such as Java, Python, Shell, or SQL. Excellent problem-solving and troubleshooting skills. Strong communication skills and ability to work in a collaborative team environment. Nice to have Preferred Qualifications: Mainframe exposure -Experience with cloud platforms (AWS, Azure, or GCP). -Familiarity with other data masking tools and technologies. -Certification in data privacy or data security (e.g., CIPP, CDPSE). Other Languages EnglishC2 Proficient Seniority Senior
Posted 2 days ago
6.0 - 10.0 years
13 - 18 Lacs
Bengaluru
Work from Office
Project description The project is focused on ensuring data privacy and compliance in the client environment by implementing and managing data masking solutions using the Delphix platform. This role involves collaboration with cross-functional teams to secure sensitive data while maintaining data integrity for development, testing, and analytics. Responsibilities Key Responsibilities: Design and Implementation: Develop and implement robust data masking solutions using the Delphix platform. Analyze data sets to identify sensitive information that requires masking. Create and maintain masking rules, algorithms, and templates for various data environments. Data Security & Compliance: -Ensure sensitive data complies with regulatory requirements, such as GDPR, HIPAA, PCI-DSS, and CCPA. -Collaborate with security and compliance teams to establish masking policies and standards. Testing & Validation: Conduct thorough testing to validate the effectiveness of masking solutions. Troubleshoot and resolve issues related to data masking processes. Collaboration & Support: Work closely with database administrators, developers, and QA teams to integrate masking into workflows. Provide training and documentation on the Delphix platform and data masking techniques. Monitoring & Optimization: Continuously monitor and optimize data masking performance. Stay updated on the latest trends and updates in data masking technologies. Skills Must have Required Skills and Qualifications: -Bachelor's degree in Computer Science, Information Technology, or a related field. -10+ years of experience in mainframe environments with expertise of 1 year in Hogan applications. -Strong knowledge of COBOL, JCL, VSAM, DB2, and CICS. Knowledge of ---IMS is an added advantage. -Experience with Hogan modules such as IDS, CIS, or Loans. -Familiarity with banking processes and financial services. -Excellent problem-solving, debugging, and analytical skills. -Strong communication skills, with the ability to collaborate across technical and business teams. Nice to have Preferred Qualifications: -Experience with mainframe modernization or migration projects. -Knowledge of automation tools for mainframe systems. -Familiarity with Agile and DevOps methodologies in a mainframe environment. -Certification in mainframe technologies and Hogan systems. Other Languages EnglishC2 Proficient Seniority Senior
Posted 2 days ago
10.0 - 15.0 years
7 - 11 Lacs
Pune
Work from Office
Data Network Engineer - L3 Job Brief Description We are looking for a Network Engineer to design, implement, maintain, and support our growing network infrastructure. You will be part of data network team that is responsible for designing and developing scalable, maintainable, highly available network architectures that meet business objectives and SLAs. Responsibilities Scoping and architecting of Network infrastructure solutions Design of WAN/MPLS, and LAN networks, SDWAN Implementation experience Design company LANs, WANs, trust zone architectures, wireless networks, internet access, 3rd party access, Wireless network, cloud service provider connectivity and VPN solutions. Must have Depth knowledge of Routing & Switching. Strong security understanding and well versed with Infoblox, Firewall, Load Balancer, Zscaler (proxy) and other multi-vendor technologies. Develop and communicate network infrastructure strategies, design standards, and related tactical plans. Research and recommend next generation network technology, products, & services. Consult peer groups, business units and corporate stakeholders in the development of project plans & architectures. Provide technical direction and assistance to Network Engineers, peer infrastructure groups and other technology stakeholders in the company. Take a holistic approach to developing technology plans incorporating technical, business, financial, process and human resourcing aspects. Conduct research and make recommendations on products, services, protocols, and standards in support of all network procurement and development efforts. Serve as Tier 4 Support for network operations in corporate, retail, cloud and data center network environments. Support typically involves very occasional troubleshooting, maintenance, repair, and integration activities upon escalation. REQUIREMENTS FOR SUCCESS: Must have CCIE ( Lab) or equivalent certification or skillset Advanced Switching/Routing, Security and/or Cloud certs or equivalent experience. Experience with designing and building LAN, MAN, WAN, internet, VPN, WiFi, data center network environments. 10+ years in a multinational enterprise environment that operates 7x24 services to a multitude of customers and business units. At least 4 of those 7 years in an architect or principal engineer role for one or more large, complex networks. Technical leadership experience in a large, complex enterprise Experience dealing with compliance-related regulations like PCI, HIPAA, GDPR, etc. is preferred. Deliver NoPerformance ParameterMeasure1Operations of the towerSLA adherence Knowledge management CSAT/ Customer Experience Identification of risk issues and mitigation plans Knowledge management2New projectsTimely delivery Avoid unauthorised changes No formal escalations
Posted 3 days ago
10.0 - 15.0 years
10 - 14 Lacs
Bengaluru
Work from Office
Job Area: Engineering Group, Engineering Group > Software Engineering General Summary: 10+ years of experience in the embedded domain to design, develop and support software solutions on multi-core ARM (V7A or V8A)/CPUs, Strong C/C++ programming skills. Embedded Platforms experience including low-level firmware, kernel (Linux or QNX), Hypervisor/Virtualization and user-space components. Design and development of software for heterogeneous compute platforms consisting of ARMs, GPUs, DSPs, and specialized hardware accelerators in an embedded SoC systems with J-TAG or ICE debuggers. Experience in real-time SW development for embedded products. Hands-on experience using JTAG to debug real-time problems Hands-on experience using different version control systems like perforce, GIT Expertise in Development of PCI RC/EP Device Driver. Expertise in writing kernel space device drivers in areas of MMU, Power(clocks/thermal). Solid understanding of Linux/QNX boot flow on embedded systems. Solid understanding of computer system architecture (core, cache, memory models, bus architecture, etc.). Experience in Board Bring-up, Device drivers, peripheral buses (SPI, I2C, USB), Memory controller DDR, eMMC, UFS and Performance. Solid understanding of different debug methods offered by Linux Kernel/QNX. Motivated self-starter with excellent verbal and written communication skills, demonstrated ability to work with engineers/partners/customers across different geographies. Hands-on technical lead who is not hesitant to dig into the details where needed to get first-hand knowledge of the issues and play an active and personal role in steering team success Collaborate with internal teams and external partners on analysis and debugging. Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field.
Posted 4 days ago
5.0 - 10.0 years
13 - 17 Lacs
Hyderabad
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : Bachelor or college degree in related field or equivalent work experience Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitating the transition to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and maintain comprehensive documentation of security architecture and frameworks.- Conduct regular assessments and audits to ensure compliance with security policies and standards. Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityIQ.- Strong understanding of cloud security principles and practices.- Experience with identity and access management solutions.- Familiarity with regulatory compliance frameworks such as GDPR, HIPAA, or PCI-DSS.- Ability to analyze and mitigate security risks in cloud environments. Additional Information:- The candidate should have minimum 7.5 years of experience in SailPoint IdentityIQ.- This position is based in Hyderabad.- A Bachelor or college degree in related field or equivalent work experience is required. Qualification Bachelor or college degree in related field or equivalent work experience
Posted 4 days ago
3.0 - 8.0 years
3 - 7 Lacs
Chennai
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : SailPoint IdentityIQ Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Be a crucial part of ensuring the security of the organization's digital assets and operations. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work-related problems.- Implement security measures to protect computer systems, networks, and data.- Conduct regular security assessments and audits to identify vulnerabilities and risks.- Develop and implement security policies, protocols, and procedures.- Stay updated on the latest security trends, threats, and technologies.- Collaborate with cross-functional teams to enhance overall security posture. Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityIQ.- Strong understanding of identity and access management principles.- Experience with security tools and technologies such as SIEM, IDS/IPS, and DLP.- Knowledge of regulatory compliance requirements like GDPR, HIPAA, or PCI DSS.- Hands-on experience in incident response and security incident management. Additional Information:- The candidate should have a minimum of 3 years of experience in SailPoint IdentityIQ.- This position is based at our Chennai office.- A 15 years full-time education is required. Qualification 15 years full time education
Posted 5 days ago
2.0 - 7.0 years
12 - 22 Lacs
Hyderabad
Work from Office
Role : Design Verification Engineer Location: Hitech city ,Hyderabad Qualification: Bachelor's Degree Experience : 2-6 years of professional experience. Work Mode : Work from office, 5 days a week. Job Description Strong Familiarity with System Verilog and OVM/UVM Verification Methodology. Knowledge of system-level architecture including buses like AXI/AHB/APB/ACE5 Excellent waveform debug skills using front end industry standard design tools like VCS, NCSIM, Verdi, Model Sim . Proficiency in developing the TB environment Good Knowledge on writing coverage and assertions Good knowledge in scripting(Perl/Tcl/Python) and automation of verification flows/process Knowledge on the PCIE is required. Knowledge of mipi, video Ips like ISP/Encoder/Decoder would be useful. Functional Skills Ability to work with cross-functional teams
Posted 5 days ago
3.0 - 6.0 years
5 - 8 Lacs
Indore, Hyderabad, Ahmedabad
Work from Office
Role Overview As a Data Governance Developer at Kanerika, you will be responsible for developing and managing robust metadata, lineage, and compliance frameworks using Microsoft Purview and other leading tools. Youll work closely with engineering and business teams to ensure data integrity, regulatory compliance, and operational transparency. Key Responsibilities Set up and manage Microsoft Purview: accounts, collections, RBAC, and policies. Integrate Purview with Azure Data Lake, Synapse, SQL DB, Power BI, Snowflake. Schedule & monitor metadata scanning, classification, and lineage tracking jobs. Build ingestion workflows for technical, business, and operational metadata. Tag, enrich, and organize assets with glossary terms and metadata. Automate lineage, glossary, and scanning processes via REST APIs, PowerShell, ADF, and Logic Apps. Design and enforce classification rules for PII, PCI, PHI. Collaborate with domain owners for glossary and metadata quality governance. Generate compliance dashboards and lineage maps in Power BI. Tools & Technologies Governance Platforms: Microsoft Purview, Collibra, Atlan, Informatica Axon, IBM IG Catalog Integration Tools: Azure Data Factory, dbt, Talend Automation & Scripting: PowerShell, Azure Functions, Logic Apps, REST APIs Compliance Areas in Purview: Sensitivity Labels, Policy Management, Auto-labeling Data Loss Prevention (DLP), Insider Risk Mgmt, Records Management Compliance Manager, Lifecycle Mgmt, eDiscovery, Audit DSPM, Information Barriers, Unified Catalog Required Qualifications 46 years of experience in Data Governance / Data Management. Hands-on with Microsoft Purview, especially lineage and classification workflows. Strong understanding of metadata management, glossary governance, and data classification. Familiarity with Azure Data Factory, dbt, Talend. Working knowledge of data compliance regulations: GDPR, CCPA, SOX, HIPAA. Strong communication skills to collaborate across technical and non-technical teams.
Posted 5 days ago
8.0 - 13.0 years
8 - 12 Lacs
Bengaluru
Work from Office
Cybersecurity Incident Manager is responsible for managing and mitigating enterprise-level cybersecurity incidents leading the coordination and communication of incident response efforts. The main priorities are ensuring timely detection, containment, eradication, and recovery from cyber threats while minimizing operational disruptions. Key Responsibilities Monitor, detect, and respond to security incidents using various security tools and technologies. Execute containment, eradication, and recovery procedures during incidents to minimize impact and restore normal operations. Develop and maintain incident response playbooks and escalation procedures to ensure a consistent and efficient response to incidents. Collaborate with other IT and security teams to remediate vulnerabilities and improve the overall security posture. Prepare detailed and accurate incident reports and documentation for internal use and for external stakeholders, if necessary. Stay current with the latest threats, vulnerabilities, and security technologies to ensure effective detection and response capabilities. Serve as the primary coordinator during cybersecurity incidents, aligning efforts across technical and business teams. Conduct real-time analysis and correlation of security events from multiple sources including SIEM, IDS/IPS, firewalls, and endpoint security solutions. Perform in-depth investigation and analysis of security incidents, including malware analysis, forensic investigations, and reverse engineering. Participate in threat hunting activities to proactively identify and mitigate potential security risks. Stay informed about new threats and trends in cybersecurity to enhance response skills. Ensure compliance with the organization's incident response framework and regulatory requirements. Coordinate with Enterprise Risk Management, SOC, Legal, IT, Data Privacy, and other functions for a unified response. Collaborate with third-party vendors and MSSPs as needed. Act as the primary contact for incident updates to executive leadership and stakeholders. Generate comprehensive reports during and after incidents, including root cause analysis and mitigation strategies. Supervise the creation of post-incident reports and ensure that lessons learned are integrated into future planning strategies. Propose security improvements to prevent the reoccurrence of incidents. Perform regular tabletop exercises and simulations to train and prepare teams. Qualifications Bachelors degree in Computer Science, Information Security, or a related field, or equivalent work experience. At least 12+8 years of experience in a SOC or similar security-focused environment. Experience in managing large-scale cybersecurity incidents. Understanding of regulatory requirements and industry standards (e.g. GDPR, HIPAA, PCI-DSS). Proficient written and verbal communication skills. Strong hands-on experience with SIEM platforms (e.g. Palo Alto XSIAM, Splunk, QRadar), IDS/IPS systems, firewalls, endpoint security tools and service management tools (e.g. ServiceNow) Proficiency in conducting forensic investigations and malware analysis. Experience with scripting and automation tools (e.g., Python, PowerShell) to streamline incident response tasks. Deep understanding of network protocols, operating systems, and common attack vectors. Relevant certifications such as CISSP, CISA, CISM, CEH, or GIAC are highly desirable. Excellent problem-solving skills and the ability to work under pressure in a fast-paced environment. Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Posted 6 days ago
2.0 - 6.0 years
9 - 13 Lacs
Noida
Work from Office
Paytm is India's leading mobile payments and financial services distribution company. Pioneer of the mobile QR payments revolution in India, Paytm builds technologies that help small businesses with payments and commerce. Paytm’s mission is to serve half a billion Indians and bring them to the mainstream economy with the help of technology. About Team : The Internal Audit team at Paytm comprises seasoned professionals with diverse skill sets and experience across different verticals like process audits, technology audits and forensics. The team focuses on implementing the approved audit plan, ensuring delivery of qualitative audits and conducting internal / special reviews while leveraging technology & data analytics and gauging key risks across business processes. About the role: We are seeking an experienced and detail-oriented Information Security and Cloud Security Auditor to join our team. The ideal candidate will have 3-7 years of expertise in data security and privacy control implementation, internal auditing, third-party risk management, cybersecurity governance, and cloud security (banking sector preferred). This role will be responsible for conducting comprehensive IT and cloud security audits, ensuring compliance with regulatory requirements, and enhancing our information security policies and procedures. Key Responsibilities: Conduct IT and cloud security audits across various domains, including IT General Controls, Information Security Controls, Cloud Security, Network Security, Vulnerability Management, and Vendor Risk Assessments. Assess compliance with relevant laws, regulations, and organizational policies, providing expertise in regulatory requirements specific to both on-premises and cloud environments. Develop and enhance information security and cloud security policies and procedures in alignment with industry best practices. Maintain thorough documentation of audit findings, risk assessments, and security measures for internal and external reporting. Validate ITGC, cloud security, and application-specific controls, and manage audit documentation including risk assessments, working papers, audit program checklists, and evidence gathering. Follow up on and ensure closure of non-compliance issues identified during audits. Manage and oversee third-party risk assessments and audits, ensuring robust security controls are in place for both traditional and cloud-based service providers. Lead and participate in the development, migration, and implementation of security controls and policies for network and cloud security solutions. Conduct risk-based security assessments on internal, vendor, and third-party hosted environments, focusing on both traditional IT and cloud infrastructure. Participate in product and vendor selection processes, contributing to the implementation and integration of new technologies, with a strong emphasis on cloud security solutions. Experience/ Skills Required: Minimum 5 years of experience in information security and auditing, with a strong background in cloud security, and the banking and IT industries. Proven experience in performing IT and cloud security audits, validating ITGC and cloud application controls, and maintaining audit documentation. Hands-on experience with vulnerability management, risk management, physical security, identity & access management, encryption, secure development, incident management, security infrastructure, and security policy for both on-premises and cloud environments. Expertise in third-party risk management, regulatory compliance, and managing IT audit findings in both traditional and cloud-based contexts. Strong analytical and problem-solving skills. Excellent communication and documentation skills. Ability to manage multiple projects and meet deadlines. Strong understanding of IT, cloud security, and cybersecurity frameworks and standards. Proficiency in using various security assessment tools and technologies, particularly those related to cloud environments. Strong analytical and problem-solving skills. Excellent communication and documentation skills. Ability to manage multiple projects and meet deadlines. Strong understanding of IT, cloud security, and cybersecurity frameworks and standards. Proficiency in using various security assessment tools and technologies, particularly those related to cloud environments. Qualifications & Certification: Bachelor's / Master’s degree in Information Technology, Cyber Security, or a related field. ISO 27001/CNSS/CCNA/CISA/CISM/CISSP Preferred Detailed knowledge of security tools, PCI-DSS, general ITGC controls, compliance testing, cloud risk assessment, GRC, OWASP, MITRE ATT&CK, change management, and policies and procedures. Proficiency in various security and cloud technologies including AWS, Azure, Google Cloud Platform, Palo Alto, Fortinet & Checkpoint Firewalls, SOAR (Cortex), Force scout Why join us 1. A collaborative output driven program that brings cohesiveness across businesses through technology 2. Improve the average revenue per use by increasing the cross-sell opportunities 3. A solid 360 feedback from your peer teams on your support of their goals 4. Compensation: If you are the right fit, we believe in creating wealth for you With enviable 500 mn+ registered users, 21 mn+ merchants and depth of data in our ecosystem, we are in a unique position to democratize credit for deserving consumers & merchants – and we are committed to it. India’s largest digital lending story is brewing here. It’s your opportunity to be a part of the story!
Posted 1 week ago
15.0 - 20.0 years
70 - 90 Lacs
Bengaluru
Work from Office
Key Skills: Architect, System Verilog, Verilog, PCI Roles and Responsibilities: Architecture Design: Develop and optimize PCIe architectures for high-performance SoC designs, including switches, interconnects, and communication protocols. Protocol Expertise: Design and implement PCIe solutions that support various communication protocols such as PCIe, CXL, and AMBA/AXI. System Understanding: Contribute to overall SoC design by ensuring seamless communication between various IP blocks and subsystems. Performance Analysis: Conduct detailed performance analysis and benchmarking of PCIe designs to identify bottlenecks and improvement areas. Collaboration: Work closely with hardware, software, and verification teams to meet system and performance requirements. Troubleshooting: Identify and resolve complex PCIe design and simulation issues. Research and Development: Stay updated on PCIe specifications; contribute to new standards, methodologies, and tools. Engage in research projects to explore new PCIe programs and protocols. Skills Required: Primary Skills: Proficient in PCIe design and optimization techniques Strong understanding of digital design principles and SoC architecture Experience with Verilog and SystemVerilog Knowledge of RTL simulation tools and verification environments (e.g., Cadence, Synopsys, UVM) Expertise in PCIe, CXL, and AMBA/AXI protocols Soft Skills: Excellent problem-solving and analytical abilities Strong communication and collaboration skills Ability to work independently and within a team High attention to detail and quality focus Passion for research and innovation Preferred Skills: Experience with PCIe Gen-4/5/6 protocols Knowledge of ASIC design flows Familiarity with scripting languages (e.g., Python, Perl) Experience with version control systems (e.g., DesignSync, Git) Background in PCIe architecture, SerDes concepts, and low-power design Experience with synthesis tools (DC/DC-NXT, Fusion Compiler) Understanding of synthesis constraints and timing (STA) Experience with Spyglass (Lint, DFT, PM, CLK/RST, CDC/RDC) Formal verification using tools like Formality or Conformal LEC Publication history in technical journals or IEEE conferences is a plus Education: Bachelor's or Master's degree in Engineering or a related field
Posted 1 week ago
8.0 - 12.0 years
50 - 60 Lacs
Bengaluru
Work from Office
Key Skills: Asic Verification, System Verilog, Verilog, PCI, Ethernet Roles and Responsibilities: Verify a block or a functional feature and lead it to closure. Write and architect scalable and reusable testbenches from scratch, using the framework of the verification methodology. Create test cases, functional coverage models, and bring the verification to closure. Think differently and out-of-the-box to stress the DUT and verify it in an efficient way. Be involved in documenting the verification strategy including test plans, verification micro-architecture, coverage objects, etc. Participate in and own verification strategic decisions that will help in the long run. Skills Required: Deep understanding of the full ASIC cycle, from conceptualization to TapeOut. Strong experience writing and debugging test benches. Proficiency in constrained random verification methodologies like UVM, VMM, or OVM. Strong knowledge of SystemVerilog. Solid command over object-oriented programming (OOP) principles. Open to learning and applying innovative verification methodologies and strategies. Motivated, self-driven, and able to work independently. Education: Bachelor's or BE degree in Engineering.
Posted 1 week ago
10.0 - 15.0 years
3 - 7 Lacs
Bengaluru
Work from Office
As a PC@IBM Windows Engineer, you wi be responsibe for designing, managing, configuring, and maintaining PC@IBM’s M365 tenant for managing IBM empoyee devices. You wi ensure the avaiabiity, security, and reiabiity of PC@IBM services whie coaborating with various teams to meet their technica requirements. Your responsibiities wi incude: Impement and manage poicies required for IBM security compiance. Monitor Microsoft Intune service heath, swifty addressing issues to maintain system integrity. Impement stringent security measures such as muti-factor authentication. Conduct reguar security assessments to strengthen data protection and ensure compiance with reguations. Deveop detaied user documentation to faciitate system navigation and troubeshooting. Design and impement backup strategies and disaster recovery pans to safeguard M365 data. Empoy PowerShe for monitoring system performance and service metrics, proactivey identifying potentia issues. Required education Master's Degree Required technica and professiona expertise Required Professiona and Technica Expertise: Overa 10+ years of experience in security and compiance roes. In-depth knowedge of compiance frameworks such as NIST, CMMC, ITAR/EAR, GDPR, HIPAA, and PCI. Expertise in Intune MDM for device security and management. Strong understanding of Microsoft 365 security and compiance capabiities. Exceent anaytica and probem-soving skis. Abiity to work in a fast-paced, high-stakes environment. Preferred technica and professiona experience Preferred Professiona and Technica Expertise: Mastery in PowerShe for automation and system management. Exceptiona probem-soving skis and the abiity to communicate compex technica concepts ceary.
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane