1 Opening(s)
15.0 Year(s) To 20.0 Year(s)
30.00 LPA TO 40.00 LPA
Overview :
We're seeking an exceptional Power BI Solutions Architect to lead client engagements and design enterprise-scale BI solutions. You'll translate business requirements into technical
architectures while guiding a team of Power BI developers. This role requires deep Microsoft data platform expertise combined with outstanding client communication skills, with particular
emphasis on embedded analytics and role-based access control (RBAC).
Requirement Location - Bangalore, chennai, Hyderabad, Pune, Vadodara
Key Responsibilities :
∙Lead client discovery sessions and translate business needs into technical solutions
∙Design scalable, secure, and high-performance Power BI architectures
∙Mentor and direct a team of Power BI developers
∙Implement complex features including Power BI Embedded, row-level security, and enterprise deployments
∙Architect data models and optimize DAX for maximum performance
∙Design integrations between Power BI and diverse enterprise data sources
∙Create migration strategies from legacy BI to modern cloud architectures
Required Skills & Experience :
Leadership & Consulting
∙Proven experience leading client-facing technical engagements
∙Ability to communicate complex concepts to diverse stakeholders
∙Experience managing technical teams on complex BI implementations
Power BI Expertise (4+ years)
∙Power BI Embedded: Advanced experience with multi-tenant implementations, app ownership, and JavaScript API integration
∙Security Architecture: Implementing row-level security (RLS), object-level security, and Azure AD integration
∙Advanced DAX: Complex calculation development and performance optimization
∙Power BI Premium: Capacity management, large dataset handling, and deployment pipelines
∙Fabric Integration: Experience with Microsoft Fabric components including Data Factory, Dataflows, and Synapse integration
∙Composite Models: Implementation of mixed storage mode solutions for optimal performance
∙Paginated Reports: Design and deployment within Power BI service
Data Platform Skills
∙SQL Server: Performance tuning, high availability configurations, and clustering
∙Cloud Services: Azure Synapse, Azure SQL DB, and Azure Data Factory implementation
∙Data Modeling: Dimensional modeling for analytics workloads
Technical Proficiencies
Required
1.Power BI Embedded application design and implementation
2.Complex DAX formula development with performance optimization
3.Row-level security (RLS) across organizational hierarchies
4.Reporting database setup and optimization for analytics workloads
Highly Desirable
1.Microsoft Fabric experience
2.DirectQuery and Composite Model optimization
3.Power BI REST API integration
4.AI visual and metrics implementation
What Sets You Apart
∙Experience implementing Copilot for Power BI with advanced natural language query capabilities
∙Experience with Power BI Premium capacity planning, autoscaling, and resource optimization for enterprise workloads
About the Company :
The client is a U.S.-based, AI-first software engineering firm founded . Headquartered in Basking Ridge, New Jersey, the company operates over 40 offices across North America, Europe, and Asia, employing approximately 11,000 professionals.
2 Opening(s)
3.0 Year(s) To 5.0 Year(s)
4.00 LPA TO 6.50 LPA
We are looking for an experienced and proactive HR & Admin Manager to oversee the human resources and administrative functions . The ideal candidate will be responsible for end-to-end HR operations, statutory compliance, recruitment, facility and admin management, and ensuring a high level of productivity and discipline across all departments. ...
1 Opening(s)
2.0 Year(s) To 4.0 Year(s)
5.50 LPA TO 7.00 LPA
Key Responsibilities:
1. Azure DevOps Pipeline Management
2. Cloud Infrastructure and Network Management
3. Intune Device & Application Management
4. Security & Compliance
5. Monitoring and Troubleshooting
6. Collaboration & Documentation
Skills and Qualifications:
1. Strong experience in Azure DevOps, CI/CD pipeline management, and Azure cloud services.
2. Hands-on experience with Microsoft Intune for device and application management,
including creating and managing Intune policies, app deployments, and configuration profiles.
3. Familiarity with monitoring tools like Azure Monitor, Log Analytics, and Application Insights.
Soft Skills:
1. Excellent problem-solving and analytical skills.
2. Strong communication and collaboration skills to work effectively with cross-functional
teams.
1 Opening(s)
7.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 15.00 LPA
Profile Summary:
with 7+ years of experience working in information security.
Post-Graduate /Diploma/Degree in IT
Wide experience in OT/IoT security risk assessment and continuous monitoring, audit
Assessment of OT Security frameworks and standards, configuration and management of firewalls, network and infrastructure security.
Certifications )( any of the below preferred):
PG-DITISS, CEH, RHCE, RHCSA
Knowledge Expertise and Prior ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
12.00 LPA TO 15.00 LPA
Tasks/Duties:
?Communicate with stakeholders at all stages of the project cycle to understand requirements and explain limitations
?The Splunk Specialist is responsible for the design, development, and implementation of the Splunk infrastructure as well as support operations activities.
?The candidate should be proficient with recognizing and onboarding new data sources into Splunk, analysing the data for anomalies and trends, and building dashboards highlighting the key trends of the data. The Splunk
engineer should be proficient within a Linux environment, editing and maintaining Splunk configuration files and apps.
?The selected candidate will assist with providing engineering, and administration in supporting a very large distributed clustered Splunk environment consisting of search heads, indexers, deployers, deployment servers, heavy/universal forwarders, and Splunk Enterprise Cloud premium app, spanning security, performance, and operational roles.
?The Splunk engineer will assist the Enterprise Splunk team, Cybersecurity Engineering team members and will be required to interact with end users to gather requirements, perform troubleshooting, and aid with the creation
of Splunk search queries and dashboards. The Splunk engineer will be required interact with management, as necessary.
Core Skills:
?5+ yrs. of exp in Splunk Administration/ Architect
?Exposure in Cloud architecture
?Detailed understanding of Splunk Deployment Methodology and best practices for planning, data collection, sizing for a distributed deployment and Splunk Apps & Plugins. Hands On knowledge of optimizing Splunk Knowledge
objects and components. Extensive experience with all Splunk Components like UF, HF, Indexers & SHs. Communication & integration between them and other toolsets/Datasets.
?Expert in Splunk Administration, Implementation and Troubleshooting Splunk environment.
?Performs Spunk platform architecture and administration. Monitors security operations and code development. Performs onboarding for new security clients, such as schools and departments
?Develops and manages data, system, and network security architecture
?Coordinates the enforcement and audits of security policies and procedures such as access, breach escalation, use of firewalls, and encryption routines
?Coordinates the administration and monitoring of data security profiles on all platforms, audits, reviews of security violation reports, and investigations of security exceptions, Coordinates investigations of possible security
violations and the completion of investigation reports
?Coordinates IT security incident responses to include, responding to reported machine compromises, and interacting with law enforcement agencies Coordinates the development of risk analysis scenarios and response
procedures, Coordinates and monitor the updates, maintenance, and documentation of security controls, Coordinates and monitor the direct support to the client and internal IT groups for security related issues
?Oversees and coordinates the advice given to technical staff, policy administrators, and clients on the integrity of security procedures, systems, and policies in the design of systems and facilities
?Oversees the process used to document/log information security, Incidents, responses, plans, methods, and procedures. Monitors and audit security documentation and logs
Requirement:
?Excellent communication skill in English and open to work mostly during Central European hours
?Experience of working in Agile delivery
?Proven ability to work creatively and analytically in a problem-solving environment
?Proven ability to work independently
Certified: Microsoft Fundamentals, Splunk Certified Developer, Splunk Enterprise Certified Architect and Splunk Cloud Certified Admin
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
16.00 LPA TO 25.00 LPA
Job Summary:
Under the direction of the IT Portfolio and Security Manager, the SAP Security Administrator will be responsible for implementing and maintaining SAP security policies and segregation of duties across multiple SAP instances. This position will help the SAP security team with project duties such as role and catalog design ...
1 Opening(s)
1.0 Year(s) To 3.0 Year(s)
5.00 LPA TO 10.00 LPA
Role Purpose: The selected candidate is responsible for supporting Information Security and Privacy Program. It involves supporting, monitoring, and documenting the effectiveness of the program. This is a hands-on position that requires practical experience in the areas of information security, privacy and risk management. The candidate is responsible for executing ...
4 Opening(s)
1.0 Year(s) To 4.0 Year(s)
8.00 LPA TO 12.00 LPA
Sr. No.
Job Description
Duty Statements
1
Manual Testing
Perform threat modelling
Perform architectural analysis
Perform logical security assessment
Monitor third party API’s, SDK and libraries are up to date.
Generate assessment report
Report your findings as per severity
2
Automation testing
To use automated scanning tools
Review false positives and true positives
Generate assessment report
Report your findings as per severity
Analyze reports from interactive source code review tool for false positives and include it in the report.
3
Analysis and reporting
Create detailed assessment report as per company standard.
Report issues as per severity
Follow up and review the fixes
4
Ad hoc request
Work on Ad hoc request related to application security
Conduct pen. Test, Design reviews as per the request
5
Trainings and knowledge
transfer
Conduct periodic security awareness training as per the requirement bases on global standards.
Working Relationships:
Team leads
Peers
Developers
Product managers
Other security teams
Support and operations team
Infrastructure teams
Knowledge
Skills
Attributes
Understanding of OWASP Top 10,SANS Top 25 and WASC, NIST.
Black Box, Grey Box security assessment of web application, Mobile application.
Experience of identification and mitigation of vulnerabilities
Good knowledge of TCP/IP and other application and network level protocols.
Security in SDLC (Application Security)
Strong team player
Interpersonal Skills
Good communication
Active listening
Believes in team work over individual contributions
Articulation of thoughts
Able to express view assertively
Ownership and accountability
Passion
Integrity
Team work
Security Analyst :
Shift : Middle Shift 12pm to 9pm
Relevant Exp : Minimum 1 year in App Sec
Condition: 2 years Bond
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
25.00 LPA TO 32.00 LPA
Sr. No.
Area
Responsibility Details
1
Leadership
Understand our business and it’s applications
Lead and manage a group of employees in multiple offices
Set Strategic direction and standards for the team
Define SDLC secure practices
2
Mentor
Mentor the team with your knowledge and experience.
Design and implement Application security methodology and activities.
3
AppSec
Vulnerability assessments of our products
Take lead in identification of new ...
1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
5.00 LPA TO 8.00 LPA
Job Description
CEH or equivalent Certification and Proven work experience as a CEH
In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.
Identifying and recording security flaws and breaches.
Knowledge and understanding of SIEM tools.
Manage the incident and related documents like an incident report, incident plan, etc.
Prepare the ...