Jobs
Interviews

116 Security Architecture Jobs - Page 5

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 10.0 years

10 - 12 Lacs

Bengaluru

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index > 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: F5 Load Balancers.

Posted 2 months ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Bengaluru

Work from Office

Your future role Take on a new challenge and apply your cybersecurity and project management expertise in a new cutting-edge field. You'll work alongside innovative, dedicated teammates. You'll ensure the robust integration of security within our IS&T projects, safeguarding our digital initiatives. Day-to-day, you'll work closely with teams across the business (Security Architecture, GRC and ISMS team, Architects, Project Managers and PMO, Business teams), review and approve security deliverables and much more. You'll specifically take care of validating Security Inquiry for Partners (SIP) and ensuring secure configurations are applied, but also make informed decisions about security acceptance based on residual risk and asset value. We'll look to you for: Reviewing and approving security deliverables Ensuring the application of the "Security into Project" policy Validating and signing off on Security Inquiry for Partners Applying secure configurations for projects or business initiatives Making decisions on security acceptance Implementing design patterns and standards All about you We value passion and attitude over experience. That's why we don't expect you to have every single skill. Instead, we've listed some that we think will help you succeed and grow in this role: Degree in Engineering/Technology 5+years Experience or understanding of cybersecurity, architecture and design Knowledge of security architecture and infrastructure Familiarity with cloud solutions (Microsoft Azure/O365) A CISSP or CISM certification Ability to analyze technical risks and vulnerabilities Fluency in English

Posted 2 months ago

Apply

6.0 - 10.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Your future role Take on a new challenge and apply your comprehensive cybersecurity expertise in a new cutting-edge field. You'll work alongside innovative, dedicated, and forward-thinking teammates. You'll ensure our "Security into Project" policy is seamlessly integrated within assigned IS&T projects, safeguarding our digital initiatives. Day-to-day, you'll work closely with teams across the business (Security Architecture, GRC, ISMS team, Project Managers, and Business teams), review and approve security deliverables, and much more. You'll specifically take care of performing risk analyses, identifying and proposing mitigation plans, but also ensuring secure configurations are applied systematically. We'll look to you for: Reviewing and approving security deliverables Performing risk analysis and proposing mitigation plans Evaluating and documenting residual risk Validating Security Inquiry for Partners (SIP) Applying secure configurations for projects or business initiatives Acting as a first level of support for teammates Proposing patterns and standards evolution All about you We value passion and attitude over experience. That's why we don't expect you to have every single skill. Instead, we've listed some that we think will help you succeed and grow in this role: A Bachelor's/Master's degree in Engineering/Technology Experience or understanding of cybersecurity, architecture, and design Knowledge of Security Architecture/Infrastructure Architecture Familiarity with security tools and mechanisms (IDS/IPS, antivirus, etc.) A CISSP or CISM certification is desirable Proficiency in English and strong communication skills Understanding of cloud solutions and security standards like ISO 27002 and ISO 27005

Posted 2 months ago

Apply

1.0 - 2.0 years

12 - 17 Lacs

Gurugram

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 2 months ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Pune

Work from Office

Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index 7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led Mandatory Skills: Palo Alto Networks - Firewalls. Experience: 8-10 Years.

Posted 2 months ago

Apply

5.0 - 10.0 years

9 - 17 Lacs

Thane, Mumbai (All Areas)

Work from Office

Senior Advisor - Business Security Location: Thane/Vikhroli 5 days work from office in a MONTH Shift: 1.30 P.M. to 10.30 P.M. The Company: UK based one of the largest MNCs is a leading global advisory, broking and solutions company that helps clients around the world turn risk into a path for growth. One of the oldest MNCs, has more than 42,000 employees serving more than 142 countries. Business Unit The mission of the Business Information Security team is to be Information and Cyber Security trusted advisors to senior business and technology stakeholders. When they're forming strategy and delivering business change, we aim to help them ensure that their business continues to be secure and compliant in line with our information and cyber security policies and standards. Job Summary As the Information Security Associate within the Business Security Operations (BusSecOps) team, you will be responsible for implementing and maintaining information & cyber security practices. Candidate would be required to gain a high-level of knowledge and understanding of critical technology applications and security standards. You will need to take a leadership role in building security testing framework for web-based applications which includes Threat Profiling, DAST, SAST, Security Architecture, and Penetration testing. In this role, you are expected to understand the organizations information & cyber security strategy and standards while working collaboratively with technology teams to implement and maintain sound security practices. This role resides in our Information & Cyber Security (ICS) team within Corporate IT. Roles & Responsibilities Build and maintain effective relationship with technology teams and ICS stakeholders Foster a culture of information and cyber security best practices though awareness and support Stay up to date with the latest application security developments and security trends to continually improve internal processes Hold good understanding of Application & Infrastructure testing methodology & support development teams in the remediation of vulnerabilities Work with development teams to improve the secure software development lifecycle Engage in information security activities to support client/business engagements i.e., incidents, vulnerabilities, development lifecycles, risk management and emerging threats Ability to coordinate and execute security testing for applications and cloud environments Engage with key stakeholders to support internal and external audit activities to ensure compliance with regulations such as: SOC, FCA, NYDFS, GDPR, HIPAA Demonstrate a good understanding of security regulations and data privacy laws Support the risk identification & exceptions management process Manage and oversee adhoc projects related to maturing information and cyber security controls across the organizationR. Education Qualification: Degree in a relevant Business or Information Technology area Experience Band: 5 - 12 yrs. Technical Skills: Need to have Degree in a relevant Information Technology area preferably with a focus on information security Significant experience in managing and patching vulnerabilities across a host of assets Expert understanding of all aspects of information security principles, policy and its application in business and technology areas Understanding of core cloud security principles Knowledge and experience on supporting information security audits Technical Skills: Nice to have Client focus: ability to engage positively with clients and business stakeholders. Information Security specific certification is desirable (such as CISM, CISSP, CISA, CEH) Full JD will be shared on email Best Regards, Uma SW +91 98 22 780 197 uma@starlighthr.com I https://starlighthr.com/

Posted 2 months ago

Apply

2.0 - 6.0 years

7 - 13 Lacs

Thane, Mumbai (All Areas)

Work from Office

Senior Advisor - Business Security Location: Thane/Vikhroli 5 days work from office in a MONTH Shift: 1.30 P.M. to 10.30 P.M. The Company: UK based one of the largest MNCs is a leading global advisory, broking and solutions company that helps clients around the world turn risk into a path for growth. One of the oldest MNCs, has more than 42,000 employees serving more than 142 countries. Business Unit The mission of the Business Information Security team is to be Information and Cyber Security trusted advisors to senior business and technology stakeholders. When they're forming strategy and delivering business change, we aim to help them ensure that their business continues to be secure and compliant in line with our information and cyber security policies and standards. Job Summary As the Information Security Associate within the Business Security Operations (BusSecOps) team, you will be responsible for implementing and maintaining information & cyber security practices. Candidate would be required to gain a high-level of knowledge and understanding of critical technology applications and security standards. You will need to take a leadership role in building security testing framework for web-based applications which includes Threat Profiling, DAST, SAST, Security Architecture, and Penetration testing. In this role, you are expected to understand the organizations information & cyber security strategy and standards while working collaboratively with technology teams to implement and maintain sound security practices. This role resides in our Information & Cyber Security (ICS) team within Corporate IT. Roles & Responsibilities Build and maintain effective relationship with technology teams and ICS stakeholders Foster a culture of information and cyber security best practices though awareness and support Stay up to date with the latest application security developments and security trends to continually improve internal processes Hold good understanding of Application & Infrastructure testing methodology & support development teams in the remediation of vulnerabilities Work with development teams to improve the secure software development lifecycle Engage in information security activities to support client/business engagements i.e., incidents, vulnerabilities, development lifecycles, risk management and emerging threats Ability to coordinate and execute security testing for applications and cloud environments Engage with key stakeholders to support internal and external audit activities to ensure compliance with regulations such as: SOC, FCA, NYDFS, GDPR, HIPAA Demonstrate a good understanding of security regulations and data privacy laws Support the risk identification & exceptions management process Manage and oversee adhoc projects related to maturing information and cyber security controls across the organizationR. Education Qualification: Degree in a relevant Business or Information Technology area Experience Band: 2 - 6 yrs. Technical Skills: Need to have Degree in a relevant Information Technology area preferably with a focus on information security Significant experience in managing and patching vulnerabilities across a host of assets Expert understanding of all aspects of information security principles, policy and its application in business and technology areas Understanding of core cloud security principles Knowledge and experience on supporting information security audits Technical Skills: Nice to have Client focus: ability to engage positively with clients and business stakeholders. Information Security specific certification is desirable (such as CISM, CISSP, CISA, CEH) Full JD will be shared on email Best Regards, Uma SW +91 98 22 780 197 uma@starlighthr.com I https://starlighthr.com/

Posted 2 months ago

Apply

2.0 - 4.0 years

0 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Introduction A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe. Youll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio including Software and Red Hat. Curiosity and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role, youll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in ground breaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experience. In this role, youll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology. Your role and responsibilities Candidates must be a CyberArk Certified Delivery Engineer (CCDE) or equivalent. The successful applicant will be an experienced CyberArk PAM consultant to take our clients project forward and support the account. Taking on and further developing/deploying of our clients Privileged Access Management solution based on CyberArk technology. Lead Consultant with demonstrable experience of CyberArk Privileged Access Management solution experience. HLD and LLD experience. Ability to work with the internal Project team and end customer to continue design and deployment activities and further enhance the PAM solution. Documentation skills. Security Policy and Governance experience and appreciation. Identity & Access Management/IDAM experience and knowledge. Design and deliver high quality security architecture and infrastructure setups and/or sub-systems to agreed deadlines. Assist customers in developing a secured privileged access management infrastructure and also to define policies to protect their applications/platforms/targets from unauthorized access Required education Bachelors Degree Preferred education Masters Degree Required technical and professional expertise 2+ years of industry experience with minimum 2+ years relevant experience in CyberArk privileged access solution. Experience in development and implementation, design and architecture of privileged access solution using CyberArk Must possess the technical/functional skills necessary to understand and manage consulting project engagements. Experience in end-to-end implementation lifecycle of CyberArk project Excellent hands-on knowledge on the best practices of deploying CyberArk PAS, including various components like EPV, CPM, PVWA, PSM, PSMP, OPM and PTA. Well versed with Active Directory. Experience in developing custom connectors using automation approaches like AutoIT script Preferred technical and professional experience Experience with Okta ASA, Ping, Saviynt, ForgeRock. Experience with JavaScript and one of the major JavaScript MVC frameworks (preferably Angular). Directory experience (AD, Azure AD, LDAP), SaaS deployment experience. Knowledge of enterprise web technologies, security and cutting-edge infrastructures Knowledge of Cloud architectures and complex enterprise On-Premises IT landscapes and hybrid Cloud/On-Prem architectures. Knowledge of enterprise identity lifecycle management processes and standards Proven track record in working as part of a team, meeting deadlines, tutoring/mentoring. Experience with at least one of the following development environments/languages: J2EE, Java, JavaScript. Experience in specific industry verticals is preferred

Posted 2 months ago

Apply

3.0 - 5.0 years

4 - 8 Lacs

Hyderabad, Bengaluru

Work from Office

Position: Senior Systems Engineer Experience: 3-5 yrs Category: IT Infrastructure Main location: Bangalore, Hyderabad Primary skill- SIEM tools, Incident response, Network Security. Qualification: Bachelor's degree in Computer Science or related field or higher. Position Description Key Responsibilities: Monitor and analyze security events using SIEM tools (e.g., Splunk, QRadar, Azure Sentinel). Detect, investigate, and respond to real-time security incidents and alerts. Triage incidents based on severity and impact; escalate to L3/IR team as required. Perform root cause analysis and document findings in incident tracking tools. Create and update use cases, detection rules, and dashboards within SIEM. Analyze endpoint, firewall, and proxy logs for malicious activity. Conduct log correlation across multiple data sources to identify patterns and anomalies. Collaborate with threat intelligence and vulnerability management teams. Prepare detailed incident reports and threat intelligence summaries. Assist in playbook development and improve response workflows. Participate in regular threat hunting and tabletop exercises. Ensure security controls and monitoring are in place for cloud environments (AWS/Azure). Support compliance and audit requests with log and incident data. Provide mentorship and guidance to junior SOC analysts. Required Skills & Qualifications: Bachelors degree in Computer Science, Information Security, or related field. 35 years of hands-on experience in a SOC or cybersecurity role. Proficiency in SIEM platforms (e.g., Splunk, QRadar, Sentinel, ArcSight). Strong understanding of TCP/IP, DNS, HTTP, VPN, firewall rules, and IDS/IPS. Experience handling phishing, malware, lateral movement, and brute-force attacks. Familiarity with the MITRE ATT&CK framework and cyber kill chain. Knowledge of endpoint detection tools (e.g., CrowdStrike, Defender ATP). Working experience with ticketing tools like ServiceNow or Jira. Good communication skills and ability to work in a high-pressure environment. Flexible to work in 24/7 rotational shifts, including weekends (if required). Preferred / Good-to-Have: Scripting skills (Python, PowerShell, Bash) for automating SOC tasks. Cloud security experience (AWS, Azure, GCP). Certifications: SC-200, CompTIA CySA+, CEH, GSEC, or equivalent. Exposure to SOAR platforms and automated response tools. Skills: English Security Operations Center Security Architecture Security Assessment Security Monitoring AI

Posted 2 months ago

Apply

15.0 - 20.0 years

5 - 8 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

What You ll Need: EE graduate from a reputed school, with post-graduate qualifications preferred. 15+ years of industry experience in RTL design or verification using simulation-based technologies. 5+ years of experience managing medium to large-sized teams. In-depth understanding of Assertion-based verification using formal and simulation methods. Strong knowledge of hardware design (Verilog/VHDL) and micro-architecture. Expertise in Unix/Linux automation shell (bash, csh) and scripting (Tcl, Perl, Python). Excellent oral and written communication skills. Expertise in one or more areas such as Formal Property Verification testbench development, floating point arithmetic operations, C/C++, IEEE math libraries, Security architecture, Automotive Safety (FuSa) verification, and Verification signoff with formal.

Posted 2 months ago

Apply

6.0 - 11.0 years

13 - 23 Lacs

Bengaluru

Work from Office

Key Skills: Risk Assessment, Implementation, Design, Architect, Infrastructure Architecture, Cyber Security, Security Architecture Roles and Responsibilities: Review and approve security deliverables: information system security questionnaires, architecture design documents, security checklist. Perform Risk analysis and identify/propose mitigation plan Make arbitrations evaluating and documenting the residual risk, and ensuring all the exceptions are tracked in the relevant register Ensure that Security Inquiry for Partners (SIP) is validated and signed off for all eligible partners in the ecosystem Ensure that Secure configurations are systematically applied for given projects or business initiatives Security Acceptance: make the right decision considering the residual risk and the asset value Act as first level of support for teammates Propose patterns and standards evolution Skills Required: Mandatory: 4 to 8 years of work experience in cybersecurity 2 to 4 years in architecture and design Desirable: [Not specified] General Competencies & Skills Knowledges and understanding in Security Architecture / Infrastructure Architecture Able to identify and document specific security issues, propose resolution options, and interpret matters from the perspective of involved stakeholders Able to analyse technical risks and vulnerabilities and to design the appropriate network security pattern (firewalling, proxy, WAF, VPN, etc.) Good understanding of security tools and mechanisms (IDS/IPS, antivirus, anti-malware, authentication mechanisms, IAM, PKI, encryption, etc.) Good understanding of cloud solutions (Microsoft Azure/O365, security solutions in and for the cloud) Knowledge of ISO 27002 and ISO 27005 Fluency in English Education: Bachelor's/Master's degree in Engineering/Technology Desirable: CISSP or CISM Experience in Transport Industry is a plus

Posted 2 months ago

Apply

15.0 - 20.0 years

30 - 40 Lacs

Pune, Bengaluru, Vadodara

Work from Office

Overview : We're seeking an exceptional Power BI Solutions Architect to lead client engagements and design enterprise-scale BI solutions. You'll translate business requirements into technical architectures while guiding a team of Power BI developers. This role requires deep Microsoft data platform expertise combined with outstanding client communication skills, with particular emphasis on embedded analytics and role-based access control (RBAC). Key Responsibilities: Lead client discovery sessions and translate business needs into technical solutions Design scalable, secure, and high-performance Power BI architectures Mentor and direct a team of Power BI developers Implement complex features including Power BI Embedded, row-level security, and enterprise deployments Architect data models and optimize DAX for maximum performance Design integrations between Power BI and diverse enterprise data sources Create migration strategies from legacy BI to modern cloud architectures Required Skills & Experience Leadership & Consulting Proven experience leading client-facing technical engagements Ability to communicate complex concepts to diverse stakeholders Experience managing technical teams on complex BI implementations Power BI Expertise (4+ years) Power BI Embedded : Advanced experience with multi-tenant implementations, app ownership, and JavaScript API integration Security Architecture : Implementing row-level security (RLS), object-level security, and Azure AD integration Advanced DAX : Complex calculation development and performance optimization Power BI Premium : Capacity management, large dataset handling, and deployment pipelines Role & responsibilities Fabric Integration : Experience with Microsoft Fabric components including Data Factory, Dataflows, and Synapse integration Composite Models : Implementation of mixed storage mode solutions for optimal performance Paginated Reports : Design and deployment within Power BI service Data Platform Skills : SQL Server : Performance tuning, high availability configurations, and clustering Cloud Services : Azure Synapse, Azure SQL DB, and Azure Data Factory implementation Data Modeling : Dimensional modeling for analytics workloads Technical Proficiencies Preferred candidate profile Required 1.Power BI Embedded application design and implementation 2.Complex DAX formula development with performance optimization 3.Row-level security (RLS) across organizational hierarchies 4.Reporting database setup and optimization for analytics workloads Highly Desirable 1.Microsoft Fabric experience 2.DirectQuery and Composite Model optimization 3.Power BI REST API integration 4.AI visual and metrics implementation What Sets You Apart Experience implementing Copilot for Power BI with advanced natural language query capabilities Experience with Power BI Premium capacity planning, autoscaling, and resource optimization for enterprise workloads

Posted 2 months ago

Apply

5.0 - 10.0 years

5 - 10 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

As a leading technology innovator, Qualcomm pushes the boundaries of what's possible to enable next-generation experiences and drives digital transformation to help create a smarter, connected future for all. As a Qualcomm Hardware Engineer, you will plan, design, optimize, verify, and test electronic systems, bring-up yield, circuits, mechanical systems, Digital/Analog/RF/optical systems, equipment and packaging, test systems, FPGA, and/or DSP systems that launch cutting-edge, world class products. Qualcomm Hardware Engineers collaborate with cross-functional teams to develop solutions and meet performance requirements. Minimum Qualifications: Bachelor's degree in Computer Science, Electrical/Electronics Engineering, Engineering, or related field and 6+ years of Hardware Engineering or related work experience. OR Master's degree in Computer Science, Electrical/Electronics Engineering, Engineering, or related field and 5+ years of Hardware Engineering or related work experience. OR PhD in Computer Science, Electrical/Electronics Engineering, Engineering, or related field and 4+ years of Hardware Engineering or related work experience. We are seeking engineers with experience in system and SoC level automotive cybersecurity concepts and implementations and knowledge of the ISO21434 cyber security standards and process. This position will be a hands-on role in defining and contributing to the architecture for the current cyber security hardware development to meet ISO 21434 standards working with various stakeholders in the Systems/Security Architecture/IP & SoC design teams. Responsibilities shall include the following: Overall responsibility of automotive cybersecurity architecture of the Automotive SoCs. Work with Product Marketing, system/SW security architects and IP security architects to deliver the security architecture of the SoC which addresses the security use case at the System level. Overall responsibility of product auto cybersecurity technical concept, hardware security requirements, cybersecurity architecture specification, review of security requirements for applicable subsystems Perform TARA (Threat Analysis & Risk Assessment) Review and approve TARA at subsystem/IP level Review implementation and verification of cybersecurity vulnerability analysis for applicable subsystems Coordinate technical issues related to cybersecurity with all applicable subsystems, all SoC domains. Work with functional safety architect and ensure there are no conflicting requirements between safety and security. Work closely with SoC and IP design teams, 3rd party IP vendors to review the design implementations and ensure meeting the architecture goals. Maintain a strong knowledge of Automotive cybersecurity best practices. Influence internal stakeholders with actionable data to ensure gaps to expectations are closed in a timely fashion. Establish and maintain healthy relationships with influential/decision making on cyber security throughout the organization. Work in a highly matrixed environment. This role frequently requires working with others to fulfill job responsibilities without direct authority. Minimum Requirements: Bachelor's degree in Electrical or Electronics Engineering, Computer Science, or related field. 8+ years in roles on Systems Engineering / SoC Architecture / Security IP Architecture and design. Minimum 5+ years experience in architecture and design of Security IP/Cores or system level Security Architecture. Has knowledge of cyber security-based product development flow and validation. Experience with ISO 21434 Cyber security standards. Has led Cybersecurity implementation in SOC/Cores/IP. Hands-on experience with automotive Cybersecurity ISO 21434 standard spec and implementation. Structured problem-solving capability and ability to work with teams on root cause analyses. Excellent verbal/written communication, interpersonal skills, and presentation skills Preferred Qualifications 5+ years Automotive cybersecurity experience and familiarity with Security work products Familiarity with ISO 26262 Automotive Functional Safety standards is a plus Relevant Cybersecurity Certification is desired

Posted 2 months ago

Apply

1.0 - 7.0 years

1 - 7 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Bachelors degree in Engineering, Information Systems, Computer Science, or related field and 3+ years of Systems Engineering or related work experience. OR Masters degree in Engineering, Information Systems, Computer Science, or related field and 2+ years of Systems Engineering or related work experience. OR PhD in Engineering, Information Systems, Computer Science, or related field and 1+ year of Systems Engineering or related work experience. Work with Qualcomms security architecture / IP and access control team on next generation SOC for smartphone, tablet, automotive and IOT product categories. is responsible for assisting product development teams throughout the company to apply secure HW design principles to individual blocks, computing cores, and at the SoC level. SW/HW co-design, HW development experience. Familiarity with debug architectures such as JTAG and ARM coresight are a plus Successful candidates will be able to engage with product teams independently with minimal supervision to detect and mitigate security vulnerabilities in hardware architecture and implementations, involve in access control issues at both SW and HW. Minimum Qualifications 5 to 7+ years of industry or academic experience in Security are required. Additionally, applicants must have expertise in two or more of the following areas: Computer architecture and hardware based or assisted access control and security Mobile platform security, Secure Boot, Secure Storage, Access Control, Secure Debug, DDR protection ARM TrustZone, Virtualization Operating system security and hypervisor security languages: C/C++, Python, RTL Teamwork across various teams and geolocations. Able to communicate in English, both verbal and written. Preferred Qualifications The following skills/experience will be considered a plus: ARM architecture SoC security design Applied Cryptography Trusted Computing Working Knowledge on hardware firewalls for access control Knowledge on AI/ML is added advantage SystemVerilog, VHDL, Verilog, SystemC - FPGA/ASIC design is a plus Side channel attacks, power analysis and timing attacks on crypto elements is a plus Memory technology (DDR4, DDR5), storage technologies is (eMMC, UFS) is a plus Educational Requirements: Required: Bachelor degree and above, Computer Engineering and/or Electrical Engineering Experience Requirements: Bachelor s/ Masters with 5-7+ years Systems Engineering or related work experience

Posted 2 months ago

Apply

8.0 - 12.0 years

19 - 21 Lacs

Bengaluru

Work from Office

Responsibilities: * Design, implement, and maintain secure solutions on AWS cloud platform using IAM and security architecture principles.

Posted 2 months ago

Apply

8 - 13 years

35 - 40 Lacs

Pune, Bengaluru, Mumbai (All Areas)

Hybrid

6+ yrs of exp in database administration, management, performance engineering with expertise in MS-SQL databases. Strong hands-on experience with MS SQL, PostgreSQL & Azure Cosmos DB. Required Candidate profile Design, implement & manage database architecture for both relational (SQL) & non-relational (NoSQL) databases, with a focus on security. Optimize database performance through query tuning, indexing

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies