1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
16.00 LPA TO 25.00 LPA
Job Summary:
Under the direction of the IT Portfolio and Security Manager, the SAP Security Administrator will be responsible for implementing and maintaining SAP security policies and segregation of duties across multiple SAP instances. This position will help the SAP security team with project duties such as role and catalog design ...
8 Opening(s)
3.0 Year(s) To 6.0 Year(s)
10.00 LPA TO 14.00 LPA
We are looking for a skilled Cloud Developer to design, develop, and maintain cloud-based applications and solutions. You will work with a diverse technology stack, ensuring scalability, security, and efficiency in our cloud infrastructure. The ideal candidate has experience in cloud computing, software development, and system integration, along with strong problem-solving skills.
Develop, ...
1 Opening(s)
2.0 Year(s) To 4.0 Year(s)
5.50 LPA TO 7.00 LPA
Key Responsibilities:
1. Azure DevOps Pipeline Management
2. Cloud Infrastructure and Network Management
3. Intune Device & Application Management
4. Security & Compliance
5. Monitoring and Troubleshooting
6. Collaboration & Documentation
Skills and Qualifications:
1. Strong experience in Azure DevOps, CI/CD pipeline management, and Azure cloud services.
2. Hands-on experience with Microsoft Intune for device and application management,
including creating and managing Intune policies, app deployments, and configuration profiles.
3. Familiarity with monitoring tools like Azure Monitor, Log Analytics, and Application Insights.
Soft Skills:
1. Excellent problem-solving and analytical skills.
2. Strong communication and collaboration skills to work effectively with cross-functional
teams.
4 Opening(s)
2.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
We are looking for a Distribution Network Sales Executive to build and strengthen our distribution network for CCTV and surveillance products. The ideal candidate will manage distributor relationships, develop new channel partners, and ensure consistent growth in product sales through a robust distribution strategy.
Key Responsibilities:-
Distributor Relationship Management
Identify, onboard, and ...
25 Opening(s)
0.5 Year(s) To 4.0 Year(s)
3.50 LPA TO 4.20 LPA
Do you have a passion for helping others and giving them peace of mind? Protecting people and businesses from fraudulent activities? You’ll review and analyze cases to prevent and detect fraud. You’ll work to resolve issues and protect the interests of the client and their customers via verbal and nonverbal ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
16.00 LPA TO 22.00 LPA
Your primary responsibility will be to develop, optimize, and maintain Power BI solutions that support data-driven decision-making across the organization.
In this role, you will be expected to work closely with business representatives to capture requirements and translate them into scalable and efficient BI solutions. A strong understanding of backend data structures is essential, and experience with full-stack development is ...
1 Opening(s)
7.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 15.00 LPA
Profile Summary:
with 7+ years of experience working in information security.
Post-Graduate /Diploma/Degree in IT
Wide experience in OT/IoT security risk assessment and continuous monitoring, audit
Assessment of OT Security frameworks and standards, configuration and management of firewalls, network and infrastructure security.
Certifications )( any of the below preferred):
PG-DITISS, CEH, RHCE, RHCSA
Knowledge Expertise and Prior ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
12.00 LPA TO 15.00 LPA
Tasks/Duties:
?Communicate with stakeholders at all stages of the project cycle to understand requirements and explain limitations
?The Splunk Specialist is responsible for the design, development, and implementation of the Splunk infrastructure as well as support operations activities.
?The candidate should be proficient with recognizing and onboarding new data sources into Splunk, analysing the data for anomalies and trends, and building dashboards highlighting the key trends of the data. The Splunk
engineer should be proficient within a Linux environment, editing and maintaining Splunk configuration files and apps.
?The selected candidate will assist with providing engineering, and administration in supporting a very large distributed clustered Splunk environment consisting of search heads, indexers, deployers, deployment servers, heavy/universal forwarders, and Splunk Enterprise Cloud premium app, spanning security, performance, and operational roles.
?The Splunk engineer will assist the Enterprise Splunk team, Cybersecurity Engineering team members and will be required to interact with end users to gather requirements, perform troubleshooting, and aid with the creation
of Splunk search queries and dashboards. The Splunk engineer will be required interact with management, as necessary.
Core Skills:
?5+ yrs. of exp in Splunk Administration/ Architect
?Exposure in Cloud architecture
?Detailed understanding of Splunk Deployment Methodology and best practices for planning, data collection, sizing for a distributed deployment and Splunk Apps & Plugins. Hands On knowledge of optimizing Splunk Knowledge
objects and components. Extensive experience with all Splunk Components like UF, HF, Indexers & SHs. Communication & integration between them and other toolsets/Datasets.
?Expert in Splunk Administration, Implementation and Troubleshooting Splunk environment.
?Performs Spunk platform architecture and administration. Monitors security operations and code development. Performs onboarding for new security clients, such as schools and departments
?Develops and manages data, system, and network security architecture
?Coordinates the enforcement and audits of security policies and procedures such as access, breach escalation, use of firewalls, and encryption routines
?Coordinates the administration and monitoring of data security profiles on all platforms, audits, reviews of security violation reports, and investigations of security exceptions, Coordinates investigations of possible security
violations and the completion of investigation reports
?Coordinates IT security incident responses to include, responding to reported machine compromises, and interacting with law enforcement agencies Coordinates the development of risk analysis scenarios and response
procedures, Coordinates and monitor the updates, maintenance, and documentation of security controls, Coordinates and monitor the direct support to the client and internal IT groups for security related issues
?Oversees and coordinates the advice given to technical staff, policy administrators, and clients on the integrity of security procedures, systems, and policies in the design of systems and facilities
?Oversees the process used to document/log information security, Incidents, responses, plans, methods, and procedures. Monitors and audit security documentation and logs
Requirement:
?Excellent communication skill in English and open to work mostly during Central European hours
?Experience of working in Agile delivery
?Proven ability to work creatively and analytically in a problem-solving environment
?Proven ability to work independently
Certified: Microsoft Fundamentals, Splunk Certified Developer, Splunk Enterprise Certified Architect and Splunk Cloud Certified Admin
1 Opening(s)
1.0 Year(s) To 3.0 Year(s)
5.00 LPA TO 10.00 LPA
Role Purpose: The selected candidate is responsible for supporting Information Security and Privacy Program. It involves supporting, monitoring, and documenting the effectiveness of the program. This is a hands-on position that requires practical experience in the areas of information security, privacy and risk management. The candidate is responsible for executing ...
4 Opening(s)
1.0 Year(s) To 4.0 Year(s)
8.00 LPA TO 12.00 LPA
Sr. No.
Job Description
Duty Statements
1
Manual Testing
Perform threat modelling
Perform architectural analysis
Perform logical security assessment
Monitor third party API’s, SDK and libraries are up to date.
Generate assessment report
Report your findings as per severity
2
Automation testing
To use automated scanning tools
Review false positives and true positives
Generate assessment report
Report your findings as per severity
Analyze reports from interactive source code review tool for false positives and include it in the report.
3
Analysis and reporting
Create detailed assessment report as per company standard.
Report issues as per severity
Follow up and review the fixes
4
Ad hoc request
Work on Ad hoc request related to application security
Conduct pen. Test, Design reviews as per the request
5
Trainings and knowledge
transfer
Conduct periodic security awareness training as per the requirement bases on global standards.
Working Relationships:
Team leads
Peers
Developers
Product managers
Other security teams
Support and operations team
Infrastructure teams
Knowledge
Skills
Attributes
Understanding of OWASP Top 10,SANS Top 25 and WASC, NIST.
Black Box, Grey Box security assessment of web application, Mobile application.
Experience of identification and mitigation of vulnerabilities
Good knowledge of TCP/IP and other application and network level protocols.
Security in SDLC (Application Security)
Strong team player
Interpersonal Skills
Good communication
Active listening
Believes in team work over individual contributions
Articulation of thoughts
Able to express view assertively
Ownership and accountability
Passion
Integrity
Team work
Security Analyst :
Shift : Middle Shift 12pm to 9pm
Relevant Exp : Minimum 1 year in App Sec
Condition: 2 years Bond