1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
DevOps Engineer:Roles & Responsibilities• 6 plus years of experience with DevOps implementations.• Good knowledge of Development tools and test frameworks.• Good knowledge of AWS cloud and services.• Experience with Kubernetes environments, Penetration testing/vulnerability testing/auditing experience.• Writing Infrastructure as Code using Terraform and Cloud-Formation scripts.• Strong Linux administration and scripting experience.• ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
0.00 LPA TO 0.00 LPA
RESPONSIBILITIES:
• Design and integration of cybersecurity toolsets to enable automated discovery, remediation, and alerting of system vulnerabilities.
• Maintain compliance and security certifications.
• Run vulnerability scans and remediate any vulnerabilities.
• Collaboratively drive security incident response.
• Manage our infrastructure, CircleCI, AWS configurations.
• Optimize AWS deployments for scalability, efficiency, and security.
• Continually ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : SW/Application Tech Support Practitioner
Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on ...
3 Opening(s)
3.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : SW/Application Tech Support Practitioner
Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on ...
3 Opening(s)
3.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : SW/Application Tech Support Practitioner
Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on ...
2 Opening(s)
4.0 Year(s) To 7.0 Year(s)
12.00 LPA TO 16.00 LPA
4 - 7 years of experience in operational security roles is required, with previous SOC experience stronglypreferred.ï‚· Deep familiarity with one or more SIEM tools is required.ï‚· A good knowledge of a wide variety of security products is required.ï‚· A strong understanding of technical IT concepts is required, including:o Windows ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
25.00 LPA TO 32.00 LPA
Advanced Technical Skills DevOps & CI/CD Tools Mastery:o Expertise in Jenkins, GitLab CI, CircleCI, Travis CI, or similar tools forautomating build and deployment pipelines.o Advanced knowledge of Docker, Kubernetes, Helm, and ECS forcontainerization, orchestration, and managing microservices.o Proficiency in Infrastructure as Code (IaC) tools like Terraform,CloudFormation, Pulumi, and Ansible for ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
20.00 LPA TO 29.00 LPA
A DevOps (Development, Security, and Operations) Engineer combines softwaredevelopment, security, and IT operations expertise. The role is critical for integratingsecurity practices into the DevOps lifecycle, ensuring that applications are both secureand efficient in deployment.1. Technical Skills DevOps Tools and Practices:o Knowledge of tools like Jenkins, Git, Docker, Kubernetes, Terraform,and Ansible ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Job Summary
We are looking for an experienced and highly skilled Penetration Tester with over 5 years of experience to join our cybersecurity team. The ideal candidate will have a deep understanding of network and application security, a strong background in ethical hacking, and the ability to identify and mitigate security ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...