We found 255 jobs matching to your search

Advance Search

Skills

Locations

Experience

Job Description

• Job Summary: Senior Backend Engineer - AWS Cloud Expert in Python coding, troubleshooting and design (FASTAPI, Microservices) Expert in AWS cloud services particularly API Gateway, Load balancer, Lambda, Networking VPC, ECS Good expertise on Postgres or similar • Roles and Responsibilities Design & Develop Secure API Integration in AWS platform Develop, package and deploy Microservices, unit tests Design and implement data models

Responsibilities

• Required Skills Expert in Python with strong experience in microservice design, unit test and integration test development Very strong expertise on AWS serverless services Deep understanding of logging, monitoring and observability • Desired Skills: Expert in Python with strong experience in microservice design, unit test and integration test development Very strong expertise on AWS serverless services Deep understanding of logging, monitoring and observability • Soft Skills : Strong in Communication to explain design details, strong in problem solving Good documentation skills
  • Salary : As per industry standard.
  • Industry :IT-Software / Software Services
  • Functional Area : IT Software - Application Programming , Maintenance
  • Role Category :Programming & Design
  • Role :Senior Backend Engineer - AWS Cloud

Job Description

Network Security JD - Palo Alto Networks NGFW | Prisma Access | GlobalProtect Palo Alto Networks NGFW | Prisma Access | GlobalProtect Role Overview The Network & Cloud Security BAU Support Engineer is responsible for business-as-usual (BAU) operations, monitoring, incident support, policy administration, and continuous optimization of Palo Alto Networks security platforms, including Palo Alto NGFW, Prisma Access, and GlobalProtect. The role ensures stable, secure, and compliant network and remote access security services while supporting SOC, IT Operations, Network teams, and business stakeholders. Key Responsibilities 1. BAU Operations & Platform Administration - Perform daily health checks and monitoring of Palo Alto firewalls and cloud security services. - Manage user access, admin roles, authentication profiles, and platform configurations. - Handle BAU service requests, incidents, and changes within defined SLAs. - Maintain operational documentation, SOPs, runbooks, and configuration standards. 2. Palo Alto Networks NGFW (On-Prem / VM-Series) - Manage and support security policies including security rules, NAT, application control, and URL filtering. - Administer Threat Prevention, Antivirus, Anti-Spyware, WildFire, and File Blocking profiles. - Perform log analysis using traffic, threat, and system logs to support investigations. - Support firewall upgrades, backups, HA validation, and rulebase optimization. - Troubleshoot connectivity, performance, and policy enforcement issues. 3. Prisma Access (Cloud Secure Web Gateway / SASE) - Support BAU operations of Prisma Access for mobile users and remote networks. - Manage security policies, routing, service connections, and bandwidth profiles. - Monitor tunnel health, user connectivity, and cloud security enforcement. - Support onboarding of new locations, users, and policy updates. - Coordinate with Palo Alto TAC and internal teams for issue resolution.

Responsibilities

Network Security JD - Palo Alto Networks NGFW | Prisma Access | GlobalProtect Palo Alto Networks NGFW | Prisma Access | GlobalProtect Role Overview The Network & Cloud Security BAU Support Engineer is responsible for business-as-usual (BAU) operations, monitoring, incident support, policy administration, and continuous optimization of Palo Alto Networks security platforms, including Palo Alto NGFW, Prisma Access, and GlobalProtect. The role ensures stable, secure, and compliant network and remote access security services while supporting SOC, IT Operations, Network teams, and business stakeholders. Key Responsibilities 1. BAU Operations & Platform Administration - Perform daily health checks and monitoring of Palo Alto firewalls and cloud security services. - Manage user access, admin roles, authentication profiles, and platform configurations. - Handle BAU service requests, incidents, and changes within defined SLAs. - Maintain operational documentation, SOPs, runbooks, and configuration standards. 2. Palo Alto Networks NGFW (On-Prem / VM-Series) - Manage and support security policies including security rules, NAT, application control, and URL filtering. - Administer Threat Prevention, Antivirus, Anti-Spyware, WildFire, and File Blocking profiles. - Perform log analysis using traffic, threat, and system logs to support investigations. - Support firewall upgrades, backups, HA validation, and rulebase optimization. - Troubleshoot connectivity, performance, and policy enforcement issues. 3. Prisma Access (Cloud Secure Web Gateway / SASE) - Support BAU operations of Prisma Access for mobile users and remote networks. - Manage security policies, routing, service connections, and bandwidth profiles. - Monitor tunnel health, user connectivity, and cloud security enforcement. - Support onboarding of new locations, users, and policy updates. - Coordinate with Palo Alto TAC and internal teams for issue resolution.
  • Salary : As per industry standard.
  • Industry :IT-Software / Software Services
  • Functional Area : IT Software - Application Programming , Maintenance
  • Role Category :Programming & Design
  • Role :Palo Alto Network Engineer

Job Description

Web Application Firewall (WAF) BAU Support Engineer Akamai WAF (Kona Site Defender / App & API Protector) | Akamai CDN Security | Bot & DDoS (as applicable) Role Overview The Web Application Firewall (WAF) BAU Support Engineer is responsible for business-as-usual (BAU) operations, monitoring, incident support, policy administration, and continuous optimization of Akamai WAF services, including Kona Site Defender (KSD) / App & API Protector (AAP) (as applicable). The role ensures stable, secure, and compliant protection of web and API applications by managing rule tuning, onboarding, change execution, alert triage, reporting, and stakeholder coordination with Application, DevOps, SOC, and Network teams. Key Responsibilities 1. BAU Operations & Platform Administration - Perform daily health checks and monitoring of Akamai WAF configurations, alerts, and security events. - Manage user access, roles, and operational workflows in Akamai Control Center (as per governance). - Handle BAU service requests (policy updates, exceptions, onboarding/offboarding, rule changes) within defined SLAs. - Maintain SOPs/runbooks, operational checklists, and knowledge articles for repeatable BAU execution. 2. Akamai WAF Policy Management (KSD / AAP) - Administer and support WAF security configurations: protections, rule sets, attack groups, and threat intelligence controls. - Tune policies to reduce false positives while preserving coverage for OWASP Top 10 and common web attacks. - Manage allowlists/denylists, IP reputation actions, custom rules, and match targets (URLs, headers, cookies, parameters). - Support API protection use-cases (JSON/XML, endpoints, methods) including rule tuning and exception governance. - Validate changes in staging/testing and promote to production through controlled change processes. 3. Incident Triage & Security Operations Support - Triage WAF alerts and incidents; analyze request logs, SIEM alerts, and Akamai security events for suspicious activity. - Work with SOC/IR teams to support investigations by providing evidence (request samples, rule hits, attack timelines). - Support immediate containment actions (temporary blocks, rate controls, rule updates) following approval/workflow. - Coordinate with application owners to confirm legitimate traffic and implement safe mitigations. 4. Onboarding & Change Implementation - Onboard new web applications/APIs into Akamai WAF: requirements gathering, match targets, policy selection, and baselining. - Coordinate DNS/Property changes with Akamai CDN teams where required (property manager alignment and versioning). - Execute changes: configuration updates, rule tuning, exception approvals, and controlled rollouts. - Perform post-change validation and monitoring to ensure no business impact and adequate protection. 5. Reporting, Compliance & Continuous Improvement - Generate BAU reports: top attacks, blocked/allowed trends, false positive analysis, coverage status, and SLA metrics. - Support audit/compliance evidence requests (change records, configuration snapshots, exceptions, approvals). - Drive problem management by identifying recurring issues and improving baselines, automation, and documentation. - Recommend enhancements for posture improvement: rule upgrades, new protections, bot/DoS controls (if in scope). 6. Integration & Tooling (as applicable) - Support integrations with SIEM/SOAR and ticketing tools (ServiceNow/Jira) for alert ingestion and workflow automation. - Monitor API-based integrations and log delivery pipelines; troubleshoot failures and performance issues. - Maintain tagging, dashboards, and operational alerts for proactive detection of configuration/traffic anomalies.

Responsibilities

Web Application Firewall (WAF) BAU Support Engineer Akamai WAF (Kona Site Defender / App & API Protector) | Akamai CDN Security | Bot & DDoS (as applicable) Role Overview The Web Application Firewall (WAF) BAU Support Engineer is responsible for business-as-usual (BAU) operations, monitoring, incident support, policy administration, and continuous optimization of Akamai WAF services, including Kona Site Defender (KSD) / App & API Protector (AAP) (as applicable). The role ensures stable, secure, and compliant protection of web and API applications by managing rule tuning, onboarding, change execution, alert triage, reporting, and stakeholder coordination with Application, DevOps, SOC, and Network teams. Key Responsibilities 1. BAU Operations & Platform Administration - Perform daily health checks and monitoring of Akamai WAF configurations, alerts, and security events. - Manage user access, roles, and operational workflows in Akamai Control Center (as per governance). - Handle BAU service requests (policy updates, exceptions, onboarding/offboarding, rule changes) within defined SLAs. - Maintain SOPs/runbooks, operational checklists, and knowledge articles for repeatable BAU execution. 2. Akamai WAF Policy Management (KSD / AAP) - Administer and support WAF security configurations: protections, rule sets, attack groups, and threat intelligence controls. - Tune policies to reduce false positives while preserving coverage for OWASP Top 10 and common web attacks. - Manage allowlists/denylists, IP reputation actions, custom rules, and match targets (URLs, headers, cookies, parameters). - Support API protection use-cases (JSON/XML, endpoints, methods) including rule tuning and exception governance. - Validate changes in staging/testing and promote to production through controlled change processes. 3. Incident Triage & Security Operations Support - Triage WAF alerts and incidents; analyze request logs, SIEM alerts, and Akamai security events for suspicious activity. - Work with SOC/IR teams to support investigations by providing evidence (request samples, rule hits, attack timelines). - Support immediate containment actions (temporary blocks, rate controls, rule updates) following approval/workflow. - Coordinate with application owners to confirm legitimate traffic and implement safe mitigations. 4. Onboarding & Change Implementation - Onboard new web applications/APIs into Akamai WAF: requirements gathering, match targets, policy selection, and baselining. - Coordinate DNS/Property changes with Akamai CDN teams where required (property manager alignment and versioning). - Execute changes: configuration updates, rule tuning, exception approvals, and controlled rollouts. - Perform post-change validation and monitoring to ensure no business impact and adequate protection. 5. Reporting, Compliance & Continuous Improvement - Generate BAU reports: top attacks, blocked/allowed trends, false positive analysis, coverage status, and SLA metrics. - Support audit/compliance evidence requests (change records, configuration snapshots, exceptions, approvals). - Drive problem management by identifying recurring issues and improving baselines, automation, and documentation. - Recommend enhancements for posture improvement: rule upgrades, new protections, bot/DoS controls (if in scope). 6. Integration & Tooling (as applicable) - Support integrations with SIEM/SOAR and ticketing tools (ServiceNow/Jira) for alert ingestion and workflow automation. - Monitor API-based integrations and log delivery pipelines; troubleshoot failures and performance issues. - Maintain tagging, dashboards, and operational alerts for proactive detection of configuration/traffic anomalies.
  • Salary : As per industry standard.
  • Industry :IT-Software / Software Services
  • Functional Area : IT Software - Application Programming , Maintenance
  • Role Category :Programming & Design
  • Role :WAF Application

Job Description

Role Overview The PKI & Machine Identity Management (MIM) BAU Support Engineer is responsible for business-as-usual (BAU) operations, monitoring, incident support, certificate lifecycle administration, and continuous optimization of Enterprise PKI and Venafi platforms. The role ensures secure, reliable, and compliant issuance, renewal, revocation, and inventory management of certificates and other machine identities across servers, network devices, applications, containers, and cloud services. This position partners with Security, Infrastructure, Network, DevOps, and Application teams to maintain platform health, enable automation, and support audit readiness through strong governance, documentation, and ITIL-aligned operational processes. Key Responsibilities 1. BAU Operations & Platform Administration - Perform daily health checks of PKI and Venafi components (services, databases, connectors, agents, HSM integrations, scheduled jobs). - Monitor certificate expiry, discovery job status, policy changes, queue backlogs, and integration health; proactively address issues to avoid outages. - Manage access controls and RBAC for PKI/Venafi consoles; support access reviews and segregation-of-duties requirements. - Handle BAU requests: certificate issuance/renewal/revocation, template updates, discovery onboarding, exceptions, and reporting within defined SLAs. - Maintain SOPs/runbooks, operational checklists, KB articles, and configuration documentation; keep artifacts current after changes. 2. Enterprise PKI Operations (Microsoft AD CS / Other PKI) - Administer PKI hierarchy components (Root/Issuing CAs as applicable): service availability, backups, CA database health, and certificate chain validation. - Manage certificate templates and enrollment policies: key usage, EKUs, subject/SAN formats, validity, renewal, and authorization controls. - Support certificate enrollment mechanisms: auto-enrollment, SCEP/NDES, EST (if applicable), manual issuance, and API-based requests. - Operate revocation services: CRL/Delta CRL publishing, OCSP responder (where applicable), and ensure reachability/latency SLAs. - Support key protection and HSM operations (if in scope): key ceremonies support, key backup/restore procedures, and rotation/change controls. 3. Venafi – Certificate Lifecycle, Discovery & Policy Support - Administer Venafi policy tree and certificate/device policies to enforce standardized certificate requirements and approvals. - Configure and monitor discovery jobs to identify certificates, keys, and machine identities across on-prem and cloud environments. - Support certificate lifecycle workflows: request intake, approvals, issuance, renewal automation, and revocation handling. - Triage and resolve common Venafi issues: failed renewals, connector errors, CA connectivity failures, permissions, and policy conflicts. - Maintain certificate inventory accuracy: tagging, ownership mapping, metadata hygiene, and decommissioning of stale entries. 4. Automation & Integrations (as applicable) - Support integration and automation use cases for certificate deployment/renewal on platforms such as F5, IIS, Apache/Nginx, Kubernetes Ingress, and load balancers (as in scope). - Maintain integrations with CAs, HSMs, CMDB, ITSM/ticketing tools (ServiceNow/Jira), and monitoring/SIEM for alerts and evidence. - Troubleshoot API-based automation failures and renewal pipelines; support token/certificate rotation and secure credential handling. - Assist DevOps/App teams with onboarding automation patterns (ACME/REST/agent-based deployment) aligned to governance. 5. Incident Response Support & Operational Readiness - Respond to incidents involving certificate expiry, trust chain failures, revoked/compromised certificates, or PKI service outages. - Provide evidence for SOC/IR: issuance logs, access history, certificate timelines, impacted system lists, and root cause indicators. - Execute urgent mitigation actions under approval: emergency renewals, temporary extensions, CRL/OCSP remediation, and policy adjustments. - Coordinate with application owners and infrastructure teams to validate post-fix service restoration and prevent recurrence. 6. Change, Problem & Capacity Management (ITIL-Aligned) - Execute planned changes: CA/Venafi upgrades, connector updates, template modifications, policy changes, and scheduled maintenance with rollback plans. - Drive problem management: RCA for recurring renewal failures, discovery gaps, CRL/OCSP outages, and automation regressions. - Support capacity planning inputs: certificate volume growth, CA performance, database sizing, connector throughput, and HSM utilization. - Ensure change records, approvals, and post-change validations are completed to maintain audit readiness. 7. Reporting, Compliance & Governance - Produce BAU reports: expiring certificates, failed renewals, issuance volumes, policy compliance, and SLA metrics. - Support audit/compliance evidence (e.g., ISO, SOC2, PCI) including: certificate inventory,

Responsibilities

Role Overview The PKI & Machine Identity Management (MIM) BAU Support Engineer is responsible for business-as-usual (BAU) operations, monitoring, incident support, certificate lifecycle administration, and continuous optimization of Enterprise PKI and Venafi platforms. The role ensures secure, reliable, and compliant issuance, renewal, revocation, and inventory management of certificates and other machine identities across servers, network devices, applications, containers, and cloud services. This position partners with Security, Infrastructure, Network, DevOps, and Application teams to maintain platform health, enable automation, and support audit readiness through strong governance, documentation, and ITIL-aligned operational processes. Key Responsibilities 1. BAU Operations & Platform Administration - Perform daily health checks of PKI and Venafi components (services, databases, connectors, agents, HSM integrations, scheduled jobs). - Monitor certificate expiry, discovery job status, policy changes, queue backlogs, and integration health; proactively address issues to avoid outages. - Manage access controls and RBAC for PKI/Venafi consoles; support access reviews and segregation-of-duties requirements. - Handle BAU requests: certificate issuance/renewal/revocation, template updates, discovery onboarding, exceptions, and reporting within defined SLAs. - Maintain SOPs/runbooks, operational checklists, KB articles, and configuration documentation; keep artifacts current after changes. 2. Enterprise PKI Operations (Microsoft AD CS / Other PKI) - Administer PKI hierarchy components (Root/Issuing CAs as applicable): service availability, backups, CA database health, and certificate chain validation. - Manage certificate templates and enrollment policies: key usage, EKUs, subject/SAN formats, validity, renewal, and authorization controls. - Support certificate enrollment mechanisms: auto-enrollment, SCEP/NDES, EST (if applicable), manual issuance, and API-based requests. - Operate revocation services: CRL/Delta CRL publishing, OCSP responder (where applicable), and ensure reachability/latency SLAs. - Support key protection and HSM operations (if in scope): key ceremonies support, key backup/restore procedures, and rotation/change controls. 3. Venafi – Certificate Lifecycle, Discovery & Policy Support - Administer Venafi policy tree and certificate/device policies to enforce standardized certificate requirements and approvals. - Configure and monitor discovery jobs to identify certificates, keys, and machine identities across on-prem and cloud environments. - Support certificate lifecycle workflows: request intake, approvals, issuance, renewal automation, and revocation handling. - Triage and resolve common Venafi issues: failed renewals, connector errors, CA connectivity failures, permissions, and policy conflicts. - Maintain certificate inventory accuracy: tagging, ownership mapping, metadata hygiene, and decommissioning of stale entries. 4. Automation & Integrations (as applicable) - Support integration and automation use cases for certificate deployment/renewal on platforms such as F5, IIS, Apache/Nginx, Kubernetes Ingress, and load balancers (as in scope). - Maintain integrations with CAs, HSMs, CMDB, ITSM/ticketing tools (ServiceNow/Jira), and monitoring/SIEM for alerts and evidence. - Troubleshoot API-based automation failures and renewal pipelines; support token/certificate rotation and secure credential handling. - Assist DevOps/App teams with onboarding automation patterns (ACME/REST/agent-based deployment) aligned to governance. 5. Incident Response Support & Operational Readiness - Respond to incidents involving certificate expiry, trust chain failures, revoked/compromised certificates, or PKI service outages. - Provide evidence for SOC/IR: issuance logs, access history, certificate timelines, impacted system lists, and root cause indicators. - Execute urgent mitigation actions under approval: emergency renewals, temporary extensions, CRL/OCSP remediation, and policy adjustments. - Coordinate with application owners and infrastructure teams to validate post-fix service restoration and prevent recurrence. 6. Change, Problem & Capacity Management (ITIL-Aligned) - Execute planned changes: CA/Venafi upgrades, connector updates, template modifications, policy changes, and scheduled maintenance with rollback plans. - Drive problem management: RCA for recurring renewal failures, discovery gaps, CRL/OCSP outages, and automation regressions. - Support capacity planning inputs: certificate volume growth, CA performance, database sizing, connector throughput, and HSM utilization. - Ensure change records, approvals, and post-change validations are completed to maintain audit readiness. 7. Reporting, Compliance & Governance - Produce BAU reports: expiring certificates, failed renewals, issuance volumes, policy compliance, and SLA metrics. - Support audit/compliance evidence (e.g., ISO, SOC2, PCI) including: certificate inventory,
  • Salary : As per industry standard.
  • Industry :IT-Software / Software Services
  • Functional Area : IT Software - Application Programming , Maintenance
  • Role Category :Programming & Design
  • Role :PKI SUPPORT ENGINEER

Job Description

Robotics process

Responsibilities

  • Salary : As per industry standard.
  • Industry :IT-Software / Software Services
  • Functional Area : IT Software - Application Programming , Maintenance
  • Role Category :Programming & Design
  • Role :Robotics process

Job Description

Requesting your support to identify/share suitable CWR resources at SA level JD is attached. Pls share the JD with the candidates so that they are aware of it. Profiles should be in the above attached format. Please note: They are primarily looking for Bangalore based people for the role.

Responsibilities

Requesting your support to identify/share suitable CWR resources at SA level JD is attached. Pls share the JD with the candidates so that they are aware of it. Profiles should be in the above attached format. Please note: They are primarily looking for Bangalore based people for the role.
  • Salary : As per industry standard.
  • Industry :IT-Software / Software Services
  • Functional Area : IT Software - Application Programming , Maintenance
  • Role Category :Programming & Design
  • Role :Business Analyst

Job Description

Full stack Developer.

Responsibilities

Essential Skills: Full stack Developer. Desirable Skills: Keyword: Skills: Digital : ReactJS~Advanced Java Concepts~Digital : Spring Boot
  • Salary : As per industry standard.
  • Industry :IT-Software / Software Services
  • Functional Area : IT Software - Application Programming , Maintenance
  • Role Category :Programming & Design
  • Role : Full stack Developer.

Job Description

: Digital : Microsoft Azure~Identity and Access Management Implementation| Design & Architecture~Multifactor Authentication (MFA)Role Descriptions: Azure AD AdministrationManaging users andIdentity and Access Management (IAM)Configure SSO for SaaS apps in AAD| setup App Registrations and API permissions| ensure secure token exchange.Design| implement| and troubleshoot hybrid identity with Azure AD Connect| including password hash sync| pass-through authentication groups| enforcing RBAC and implementing Conditional Access with Multi Factor Authentication (MFA) Essential Skills: Azure AD AdministrationManaging users andIdentity and Access Management (IAM)Configure SSO for SaaS apps in AAD| setup App Registrations and API permissions| ensure secure token exchange.Design| implement| and troubleshoot hybrid identity with Azure AD Connect| including password hash sync| pass-through authentication groups| enforcing RBAC and implementing Conditional Access with Multi Factor Authentication (MFA)

Responsibilities

: Digital : Microsoft Azure~Identity and Access Management Implementation| Design & Architecture~Multifactor Authentication (MFA)Role Descriptions: Azure AD AdministrationManaging users andIdentity and Access Management (IAM)Configure SSO for SaaS apps in AAD| setup App Registrations and API permissions| ensure secure token exchange.Design| implement| and troubleshoot hybrid identity with Azure AD Connect| including password hash sync| pass-through authentication groups| enforcing RBAC and implementing Conditional Access with Multi Factor Authentication (MFA) Essential Skills: Azure AD AdministrationManaging users andIdentity and Access Management (IAM)Configure SSO for SaaS apps in AAD| setup App Registrations and API permissions| ensure secure token exchange.Design| implement| and troubleshoot hybrid identity with Azure AD Connect| including password hash sync| pass-through authentication groups| enforcing RBAC and implementing Conditional Access with Multi Factor Authentication (MFA)
  • Salary : As per industry standard.
  • Industry :IT-Software / Software Services
  • Functional Area : IT Software - Application Programming , Maintenance
  • Role Category :Programming & Design
  • Role :: Digital : Microsoft Azure~Identity and Access Management Implementation| Design & Architecture~Multifactor Authentication (MFA)

Job Description

As a Cloud Migration Engineer, you will assess existing solutions and infrastructure to facilitate their migration to the cloud. Your typical day will involve planning, delivering, and implementing application and data migration strategies that leverage both private and public cloud technologies. You will work collaboratively with various teams to ensure that the migration processes are efficient, scalable, and aligned with the organization's business objectives, ultimately driving next-generation business outcomes. Roles & Responsibilities: - Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Assist in the development of migration strategies that align with business goals.- Collaborate with cross-functional teams to ensure seamless integration of cloud solutions. Professional & Technical Skills: - Must To Have Skills: Proficiency in AWS Glue.- Experience with cloud service providers such as Amazon Web Services, Microsoft Azure, or Google Cloud Platform.- Strong understanding of data migration techniques and best practices.- Familiarity with containerization technologies like Docker and Kubernetes.- Knowledge of scripting languages such as Python or Bash for automation tasks. Additional Information: - The candidate should have minimum 3 years of experience in AWS Glue.- This position is based at our Chennai office.- A 15 years full time education is required.

Responsibilities

As a Cloud Migration Engineer, you will assess existing solutions and infrastructure to facilitate their migration to the cloud. Your typical day will involve planning, delivering, and implementing application and data migration strategies that leverage both private and public cloud technologies. You will work collaboratively with various teams to ensure that the migration processes are efficient, scalable, and aligned with the organization's business objectives, ultimately driving next-generation business outcomes. Roles & Responsibilities: - Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Assist in the development of migration strategies that align with business goals.- Collaborate with cross-functional teams to ensure seamless integration of cloud solutions. Professional & Technical Skills: - Must To Have Skills: Proficiency in AWS Glue.- Experience with cloud service providers such as Amazon Web Services, Microsoft Azure, or Google Cloud Platform.- Strong understanding of data migration techniques and best practices.- Familiarity with containerization technologies like Docker and Kubernetes.- Knowledge of scripting languages such as Python or Bash for automation tasks. Additional Information: - The candidate should have minimum 3 years of experience in AWS Glue.- This position is based at our Chennai office.- A 15 years full time education is required.
  • Salary : As per industry standard.
  • Industry :IT-Software / Software Services
  • Functional Area : IT Software - Application Programming , Maintenance
  • Role Category :Programming & Design
  • Role :AWS Glue