Position 4: CyberArk , Privileged Access Management
1. Plan, design, and implement enterprise-wide Privileged Access Management (PAM) strategies using CyberArk solutions.
2. Define PAM architecture and roadmap aligned with organizational security policies and compliance standards.
3. Build and configure CyberArk components including Vault, PVWA, CPM, and PSM to support secure access operations.
4. Develop onboarding processes and automation scripts for privileged account lifecycle management.
5. Integrate CyberArk with Active Directory, cloud platforms, DevOps tools, and critical infrastructure systems.
6. Operate and maintain CyberArk environments with regular patching, backups, and performance optimization.
7. Monitor privileged sessions, analyze logs, and respond to alerts and anomalies in privileged behavior.
8. Conduct periodic privilege audits, access reviews, and compliance reporting to meet regulatory needs.
9. Collaborate with application, infrastructure, and SOC teams to strengthen least privilege enforcement.
10. Provide ongoing operational support, documentation, and training for PAM administrators and end-users.
Responsibilities
Position 4: CyberArk , Privileged Access Management
1. Plan, design, and implement enterprise-wide Privileged Access Management (PAM) strategies using CyberArk solutions.
2. Define PAM architecture and roadmap aligned with organizational security policies and compliance standards.
3. Build and configure CyberArk components including Vault, PVWA, CPM, and PSM to support secure access operations.
4. Develop onboarding processes and automation scripts for privileged account lifecycle management.
5. Integrate CyberArk with Active Directory, cloud platforms, DevOps tools, and critical infrastructure systems.
6. Operate and maintain CyberArk environments with regular patching, backups, and performance optimization.
7. Monitor privileged sessions, analyze logs, and respond to alerts and anomalies in privileged behavior.
8. Conduct periodic privilege audits, access reviews, and compliance reporting to meet regulatory needs.
9. Collaborate with application, infrastructure, and SOC teams to strengthen least privilege enforcement.
10. Provide ongoing operational support, documentation, and training for PAM administrators and end-users.
Salary : As per industry standard.
Industry :IT-Software / Software Services
Functional Area : IT Software - Application Programming , Maintenance
Position 2:Security Specialist - Secure Arch - Threat Modeling , Software Security Requirements , Microsoft Threat Modeler
Position Summary
We are seeking an experienced Security Specialist with strong expertise in threat modeling and operational excellence to join our global cybersecurity operations team. The successful candidate will be the primary owner of our critical application security management tool (e.g., SDElements), driving platform onboarding, vendor engagement, and security content improvements.
This role demands proactive coordination across geographically dispersed teams, technical tool management skills, and the ability to act as a trusted security advisor during onboarding, integrations, and process enhancements.
Key Responsibilities
Tool Management & Operations :
• Administer, configure, and maintain the application security tool, ensuring both staging and production environments remain updated and fully functional.
• Integrate the tool with other enterprise platforms and applications to optimize security workflows.
• Perform daily operations including monitoring, troubleshooting, and performance checks to ensure seamless tool functionality.
Security Content & Platform Onboarding :
• Review, curate, and update security content within the tool for accuracy and policy alignment.
• Lead the onboarding of new applications and platforms into the tool, ensuring compliance with organizational security standards.
• Collaborate with stakeholders to ensure timely delivery of content updates and platform integrations.
Cross-Functional Collaboration :
• Partner with platform, infrastructure, development, and application teams to embed strong security practices from concept through deployment.
• Coordinate with global stakeholders to align on tool usage, onboarding strategies, and integration timelines.
• Participate in vendor meetings to evaluate capabilities, discuss improvements, and provide feedback for product enhancements.
Security Consultation :
• Act as a security consultant for teams integrating with the tool, offering best practices and guidance during onboarding and ongoing use.
• Provide insights to improve processes, threat modeling capabilities, and integration strategies.
Required Qualifications :
• Certifications: Azure or AWS Cloud certifications (preferred).
• Education: Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent work experience).
Experience:
• 5–8 years in cybersecurity operations or security specialist roles.
• Hands-on experience managing or supporting application security tools such as SDElements.
• Proven record in onboarding applications or platforms into security frameworks.
Technical Skills:
• Working knowledge of APIs and integration workflows.
• Proficient in Microsoft Excel for reporting and analysis.
• Solid understanding of security vulnerabilities and remediation techniques.
• Familiarity with Azure Cloud, AWS Cloud, GitHub, and DevSecOps pipelines.
Key Competencies :
• Excellent written/verbal communication and interpersonal skills for effective global collaboration.
• Able to work independently with minimal supervision as well as in team environments.
• Strong analytical, troubleshooting, and problem-solving abilities.
• Detail-oriented with a proactive approach to identifying and resolving operational challenges.
Responsibilities
Position 2:Security Specialist - Secure Arch - Threat Modeling , Software Security Requirements , Microsoft Threat Modeler
Position Summary
We are seeking an experienced Security Specialist with strong expertise in threat modeling and operational excellence to join our global cybersecurity operations team. The successful candidate will be the primary owner of our critical application security management tool (e.g., SDElements), driving platform onboarding, vendor engagement, and security content improvements.
This role demands proactive coordination across geographically dispersed teams, technical tool management skills, and the ability to act as a trusted security advisor during onboarding, integrations, and process enhancements.
Key Responsibilities
Tool Management & Operations :
• Administer, configure, and maintain the application security tool, ensuring both staging and production environments remain updated and fully functional.
• Integrate the tool with other enterprise platforms and applications to optimize security workflows.
• Perform daily operations including monitoring, troubleshooting, and performance checks to ensure seamless tool functionality.
Security Content & Platform Onboarding :
• Review, curate, and update security content within the tool for accuracy and policy alignment.
• Lead the onboarding of new applications and platforms into the tool, ensuring compliance with organizational security standards.
• Collaborate with stakeholders to ensure timely delivery of content updates and platform integrations.
Cross-Functional Collaboration :
• Partner with platform, infrastructure, development, and application teams to embed strong security practices from concept through deployment.
• Coordinate with global stakeholders to align on tool usage, onboarding strategies, and integration timelines.
• Participate in vendor meetings to evaluate capabilities, discuss improvements, and provide feedback for product enhancements.
Security Consultation :
• Act as a security consultant for teams integrating with the tool, offering best practices and guidance during onboarding and ongoing use.
• Provide insights to improve processes, threat modeling capabilities, and integration strategies.
Required Qualifications :
• Certifications: Azure or AWS Cloud certifications (preferred).
• Education: Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent work experience).
Experience:
• 5–8 years in cybersecurity operations or security specialist roles.
• Hands-on experience managing or supporting application security tools such as SDElements.
• Proven record in onboarding applications or platforms into security frameworks.
Technical Skills:
• Working knowledge of APIs and integration workflows.
• Proficient in Microsoft Excel for reporting and analysis.
• Solid understanding of security vulnerabilities and remediation techniques.
• Familiarity with Azure Cloud, AWS Cloud, GitHub, and DevSecOps pipelines.
Key Competencies :
• Excellent written/verbal communication and interpersonal skills for effective global collaboration.
• Able to work independently with minimal supervision as well as in team environments.
• Strong analytical, troubleshooting, and problem-solving abilities.
• Detail-oriented with a proactive approach to identifying and resolving operational challenges.
Salary : As per industry standard.
Industry :IT-Software / Software Services
Functional Area : IT Software - Application Programming , Maintenance
Suitable candidate will be responsible in creating the visual impact on various creative outlets that team operates in today. The candidate will be part of a team of UI / UX experts who would provide inputs to enhance the look, feel and user experience in some of the following platforms: Portals, Print, iPad Apps, Video, and Email design.
Qualifications
1. Degree in Human Computer Interaction, Interaction Design, or Design-related field or equivalent industry experience
2. Senior Designer: 4+ years of professional experience in UI/UX field of work (people management experience will be an added advantage)
Responsibilities
Role Expectations
1. Create compelling visual design and interaction design
2. Strong understanding of design systems
3. Strong interpersonal skills
4. Use analytics to shape design recommendations
5. Guide/mentor fellow designers
6. Anticipate user needs, and suggest ways for the business to address them
7. Must be comfortable presenting to other stakeholders, hammering out ideas with them, and helping them find better ways to do things.
8. Participate in the design team’s process and decision-making including planning, prioritizing, and scheduling.
9. Participate in concept sessions leveraging ethnographic research and design thinking.
10. Coordinate with client and internal stakeholders for project schedules, quality requirements
11. Stay abreast of new trends in content and technology in the video production communities and suggest new ways to implement these trends/technologies
12. Thinks and Acts Decisively – The ability to anticipate issues and to proactively ensure that they do not materialize is required
Salary : Rs. 6,72,000.0 - Rs. 7,20,000.0
Industry :IT-Software / Software Services
Functional Area : IT Software - Application Programming , Maintenance
Strong working knowledge of:
Order Management
Billing & Invoicing
Customer Support in OTC context
Experience supporting OTC operations in ERP environments.
ERP Knowledge
Oracle E‑Business Suite (EBS) functional expertise in OTC‑related modules.
Understanding of end‑to‑end OTC lifecycle from order creation to billing support.
Soft Skills
Strong analytical and problem‑solving skills.
Good communication skills for interaction with business users and stakeholders.
Ability to manage multiple issues in a support environment.
Good to Have
Experience in ERP AMS or shared services models.
Exposure to AR processes and OTC reconciliations.
Familiarity with ITSM / ticketing tools.
Responsibilities
Strong working knowledge of:
Order Management
Billing & Invoicing
Customer Support in OTC context
Experience supporting OTC operations in ERP environments.
ERP Knowledge
Oracle E‑Business Suite (EBS) functional expertise in OTC‑related modules.
Understanding of end‑to‑end OTC lifecycle from order creation to billing support.
Soft Skills
Strong analytical and problem‑solving skills.
Good communication skills for interaction with business users and stakeholders.
Ability to manage multiple issues in a support environment.
Good to Have
Experience in ERP AMS or shared services models.
Exposure to AR processes and OTC reconciliations.
Familiarity with ITSM / ticketing tools.
Salary : As per industry standard.
Industry :IT-Software / Software Services
Functional Area : IT Software - Application Programming , Maintenance
Position 5: ISO 27001 , Vulnerability Management
1. Design and implement security controls for applications and cloud environments across development and production stages.
2. Conduct threat modeling, secure code review, and vulnerability assessments for web and cloud-native applications.
3. Implement identity and access management, encryption, and key management practices in cloud environments.
4. Collaborate with DevOps teams to integrate security into CI/CD pipelines and automate security testing.
5. Monitor cloud configurations and posture using CSPM and CWPP tools to detect and remediate risks.
6. Enforce compliance with frameworks such as ISO 27001, NIST, and CIS Benchmarks in application and cloud deployments.
7. Investigate and respond to security incidents involving applications, APIs, or cloud resources.
8. Implement Zero Trust and least privilege principles for application and infrastructure access.
9. Provide guidance on secure application architecture, container security, and data protection strategies.
10. Maintain documentation, dashboards, and metrics to report application and cloud security maturity to leadership.
Responsibilities
Position 5: ISO 27001 , Vulnerability Management
1. Design and implement security controls for applications and cloud environments across development and production stages.
2. Conduct threat modeling, secure code review, and vulnerability assessments for web and cloud-native applications.
3. Implement identity and access management, encryption, and key management practices in cloud environments.
4. Collaborate with DevOps teams to integrate security into CI/CD pipelines and automate security testing.
5. Monitor cloud configurations and posture using CSPM and CWPP tools to detect and remediate risks.
6. Enforce compliance with frameworks such as ISO 27001, NIST, and CIS Benchmarks in application and cloud deployments.
7. Investigate and respond to security incidents involving applications, APIs, or cloud resources.
8. Implement Zero Trust and least privilege principles for application and infrastructure access.
9. Provide guidance on secure application architecture, container security, and data protection strategies.
10. Maintain documentation, dashboards, and metrics to report application and cloud security maturity to leadership.
Salary : As per industry standard.
Industry :IT-Software / Software Services
Functional Area : IT Software - Application Programming , Maintenance