1 Opening(s)
7.0 Year(s) To 12.0 Year(s)
14.00 LPA TO 20.00 LPA
We are seeking a seasoned Cloud Management Lead with 7+ years of experience in managing multi-cloud environments, including AWS, Azure, and GCP. The ideal candidate will have a strong background in cloud infrastructure, security implementation, cost management, resource allocation, and disaster recovery planning. Expertise in Linux Administration, VPC configurations, networking, ...
1 Opening(s)
6.0 Year(s) To 9.0 Year(s)
Not Disclosed by Recruiter
Key Responsibilities:1. Backend Development:o Develop and maintain backend services and APIs using Node.js OR Python.o Design and implement RESTful and GraphQL APIs.o Build reusable, efficient, and scalable server-side components.o Ensure seamless integration with databases, third-party services, and front-endapplications.2. Database Management:o Design and manage databases (SQL and NoSQL) such as MongoDB,PostgreSQL, ...
1 Opening(s)
8.0 Year(s) To 12.0 Year(s)
22.00 LPA TO 40.00 LPA
JD:Attached
Responsibilities include:
Act as the liaison between Product Owners and technical developers, translating new requirements into designs, development strategies, and implementation plans.
Build, and implement a Data Lake by ingesting and integrating commercial data from diverse sources to support both descriptive and predictive analytics.
Lead a cross-functional team of AWS developers, Snowflake developers, ...
10 Opening(s)
7.0 Year(s) To 12.0 Year(s)
10.00 LPA TO 18.00 LPA
AppSec (Application Security) Key Terms:
Secure Coding: Writing software with security best practices to prevent vulnerabilities.
Vulnerability: Weaknesses in an application that could be exploited.
SAST (Static Application Security Testing): Code analysis to find vulnerabilities without executing the program.
DAST (Dynamic Application Security Testing): Security testing of running applications to find vulnerabilities.
Penetration Testing: Simulated ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Job Title: DBA Developer
Location: Bangalore
Job Type: Full-Time
Job Description: with API integration. Additionally, you will be responsible for ensuring database and data security. You will play a crucial role in designing, implementing, and maintaining database solutions that support our software applications and their integ
We had a JD clarity call on this today. PFB the ...
1 Opening(s)
8.0 Year(s) To 12.0 Year(s)
Not Disclosed by Recruiter
Job Title: DevSecOps Lead Engineer
Location: Pune, Maharashtra (Hybrid/Work from Office)
Experience Required: 8+ years
Position Overview:
We are seeking an experienced DevSecOps Lead Engineer to join our dynamic team. The ideal candidate will have extensive experience in DevSecOps practices, with a strong focus on application security OR API security. This role requires hands-on ...
1 Opening(s)
5.0 Year(s) To 9.0 Year(s)
Not Disclosed by Recruiter
Position: Consultant/Asst Manager
Location: Delhi/NCR
Job Type: Full-time
Job Summary: We are looking for a talented and experienced Information Security resources.
Key Responsibilities:
Conduct cybersecurity assessments, including ISO (27001) Audit, CPM, ITGC, NIST, Privacy, etc.,
Develop cybersecurity frameworks, policies, and procedures tailored to clients' specific needs and requirements, in alignment with industry best practices and regulatory standards.
Assist clients in designing ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
7.00 LPA TO 8.00 LPA
This role is to implement organization’s loyalty program strategy in a particular geography and drive the sameas a loyalty champion in his / her region with a responsibility of scaling up the program as per agreed metricesand create a monthly reporting mechanism for the internal stakeholders for real time update ...
1 Opening(s)
7.0 Year(s) To 12.0 Year(s)
Not Disclosed by Recruiter
The role
As Lead Security Operations Engineer, you will provide technical leadership for a growing team of Security Engineers in the management of vulnerabilities from identification through to resolution. You will work closely with IT Operations, Cyber Security and the wider IT teams including line of business teams to ensure vulnerabilities ...