Cutshort logo
Delivery Solutions logo
Technical Architect InfoSec
Technical Architect InfoSec
Delivery Solutions's logo

Technical Architect InfoSec

Pranali Salvi's profile picture
Posted by Pranali Salvi
12 - 15 yrs
₹25L - ₹32L / yr
Remote only
Skills
SOC2
HIPAA
SECOPS
PII
GDPR
CISSP
CISM
Secops
compliance
IT governance
Auditing

Job Title: Technical Architect Security

Location: Work From Home

Department: Security 

Reports to: Associate Director - Technology

Job Type: Full-Time

Website: https://deliverysolutions.co/


Delivery Solutions is a Retail eCommerce OXM Platform that provides retailers with out-of-the-box solutions to power Same-Day Delivery, Curbside, In-Store Pickup, Shipping, and post-purchase experiences. We are trusted with some of the biggest names in multiple verticals of retail like Sephora, AT&T, Footlocker, Michael's, Office Depot, GameStop, Total Wine, Sally Beauty, Abercrombie & Fitch Co. Belk, Loblaw, Vineyard Vines etc.


Our SAAS-based solution is highly flexible and interacts seamlessly with E-commerce properties, OMS, WMS, and POS systems for a highly scalable experience and a delighted customer base.

Delivery Solutions is a wholly-owned subsidiary of UPS | We are a certified Great Places To Work Company


Job Overview: As a Technical Architect of security, you will be responsible for leading and managing our Information Security Operations team. You will safeguard our organization's information assets by developing, implementing, and maintaining security processes and protocols. Ensure compliance with relevant laws, regulations, and industry standards (e.g., ISO, SOC2, HIPAA, GDPR) i.e. monitor changes in compliance regulations, adjust policies and procedures as necessary, and oversee the development and implementation of privacy policies and procedures to protect personal data. This role demands a blend of technical expertise and leadership skills to ensure the security and integrity of our systems, networks, and data.


Key Responsibilities:

Technical Responsibilities:

Policy Development and Enforcement

  • Develop, implement, and enforce comprehensive security and privacy policies.
  • Regularly review and update policies to reflect evolving threats and regulatory requirements.
  • Audit adherence to these policies across the organization

Security Operations Centre:

  • Oversee the daily operations of the information security team, ensuring that all security policies, procedures, and protocols are effectively implemented and maintained.
  • Lead the development and implementation of security measures, including firewalls, intrusion detection systems, and encryption protocols.

Incident Response:

  • Manage and respond to security incidents, providing timely and effective resolution.
  • Conduct thorough investigations of security breaches and take appropriate corrective actions.

Vulnerability Management:

  • Conduct regular security assessments and vulnerability scans to identify potential threats.
  • Recommend remediation strategies to address identified vulnerabilities.

Compliance and Audits:

  • Develop policies based on industry best practices and implement the policies defined.
  • Ensure compliance with relevant laws, regulations, and industry standards (e.g., ISO, SOC2, HIPAA, GDPR).
  • Coordinate and support internal and external security audits.

Privacy:

  • Be updated on the privacy laws where the company and customers operate
  • Ensure the company’s processing activities comply with privacy laws


Functional Responsibilities:

Strategic Planning and Development:

  • Collaborate with senior management to develop and implement the overall information security strategy.
  • Identify and prioritize security initiatives and projects based on risk assessment and business impact.

Team Leadership and Development:

  • Resource management, planning and execution, and stakeholder communication.
  • Planning execution of various projects in the domain of security and privacy
  • Lead, mentor, and develop a team of security professionals, fostering a culture of continuous improvement and professional growth.
  • Conduct performance evaluations and provide constructive feedback to team members.

Cross-Department Collaboration:

  • Work closely with IT, legal, marketing, and other departments to ensure cohesive security practices across the organization.
  • Serve as a key advisor to the Associate Directors and other executives on security and privacy matters.
  • Coordination and provide updates to Delivery Solutions' parent organization on security initiatives.

Risk Management:

  • Identify, assess, and mitigate information security risks.
  • Develop and maintain a risk management program that aligns with the organization’s objectives.

Security Awareness and Training:

  • Develop and deliver security awareness training programs to educate employees on security best practices and emerging threats.
  • Promote a security-conscious culture throughout the organization.


Qualifications:

  • Education: Bachelor’s degree in Computer Science, Information Security, or a related field. Master’s degree or professional certifications (CISSP, CISM, etc.) preferred.
  • Experience: Minimum of 7-10 years of experience in information security, governance, and audit processes, with at least 3-5 years in a management or leadership role. Have worked as an auditor for ISO / SOC2 and other frameworks
  • Technical Skills: Experience in setting up a framework and conducting privacy and security audits.Conducting training and awareness, proficiency in security technologies and tools (e.g., SIEM, IDS/IPS, firewalls, endpoint protection), strong understanding of network security, cryptography, and risk management frameworks.
  • Functional Skills: Strong leadership and team management skills, excellent communication and interpersonal abilities, experience in strategic planning and project management.
  • Personal Attributes: Strong analytical and problem-solving skills, high ethical standards, ability to work under pressure and manage multiple priorities.


Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About Delivery Solutions

Founded :
2015
Type
Size
Stage :
Profitable
About

Out-of-the-box solutions are provided by Delivery Solutions to retailers, allowing them to provide customer experiences such as curbside delivery, same-day delivery, shipping, in-store pickup, and post-purchase pickup. The company collaborates with some of the most recognizable names in the retail industry, such as Michael's, Sephora, Loblaw, GameStop, Office Depot, Sally Beauty, Total Wine, Belk, and Abercrombie & Fitch.


Its SAAS-based solution is incredibly adjustable and works in combination with e-commerce sites, warehouse management systems, order management systems, and point-of-sale systems to give a highly scalable experience and a base of delighted customers. They have direct connections to the most prominent businesses in same-day delivery, like DoorDash, Uber, Postmates, and Shipt, amongst others, in addition to the most prominent shipping firms, including UPS, FedEx, USPS, and others.


Perks & Benefits @Delivery Solutions: 

  • Permanent Remote work - (Work from anywhere)
  • Broadband reimbursement
  • Flexi work hours - (Login/Logout flexibility)
  • 21 Paid leaves in a year (Jan to Dec) and 7 COVID leaves
  • Two appraisal cycles in a year
  • Encashment of unused leaves on Gross
  • RNR - Amazon Gift Voucher
  • Employee Referral Bonus
  • Technical & Soft skills training
  • Sodexo meal card
  • Surprise on birthday/ service anniversary/new baby/wedding gifts
  • Annual trip 
Read more
Company video
Delivery Solutions's video section
Delivery Solutions's video section
Photos
Company featured pictures
Company featured pictures
Company featured pictures
Connect with the team
Profile picture
Ayyappan Paramasivam
Profile picture
Pranali Salvi
Profile picture
Digvijay Singh
Profile picture
Rini Chakravarty
Company social profiles
linkedintwitter

Similar jobs

Jeeves
Gokul Dhuraisaami
Posted by Gokul Dhuraisaami
Remote only
8 - 11 yrs
Best in industry
skill iconAmazon Web Services (AWS)
WAF
Information security
devsecops
cloud security
  • Solid experience in designing, implementing, and securing cloud environments, including services such as EC2, S3, RDS, IAM, VPC, and CloudTrail.
  • Strong understanding of DevOps methodologies and experience with CI/CD pipelines and tools (e.g., Jenkins, GitHub, SonarQube).
  • In-depth knowledge of cloud security best practices, industry standards, and compliance frameworks (e.g., NIST, CIS, ISO 27001).
  • Proficiency in scripting languages such as Python, Bash, Groovy.
  • Experience with Infrastructure-as-Code (IaC) tools like AWS CloudFormation or Terraform.
  • Familiarity with security scanning and monitoring tools, such as AWS Security Hub, GuardDuty, Inspector, or third-party solutions.
  • Strong understanding of network security concepts, including firewalls, VPNs, and secure network architectures.
  • Knowledge of secure coding practices and experience with application security testing tools (e.g., SAST, DAST, fuzzing, and secure coding patterns).
  • Excellent problem-solving skills and ability to work collaboratively in a team-oriented environment.
  • Participate in incident handling and other related duties to support the information security function.
  • The ability to learn and apply new concepts quickly
  • Strong written and oral communication skills


Read more
Emids Technologies
at Emids Technologies
2 candid answers
Kiranmai Badisetty
Posted by Kiranmai Badisetty
Bengaluru (Bangalore)
7 - 10 yrs
₹5L - ₹10L / yr
ISO/IEC 27001:2005
ISO/IEC 27000-series
CISA
CISM
Risk Management
+1 more

Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.

Base location: - Bengaluru - Must

Joining requirement: - Not later than second week of June 2023.


Requirements: -

1.      Mandatory - ISO 27001:2013 lead implementor certified

2.      Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)

3.      Good to have – CISA, CISM, Risk management certification, Privacy certifications.

4.      Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.

5.      This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.

6.      Good documentation skills.

7.      Develop, implement, maintain, review and continually improve Information Security policies.

8.      Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.

9.      Manage and maintain a risk register / risk database along with risk treatment plans.

10.  Good understanding of physical and environmental security.

11.  Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.

12.  Provide training to the employees on Privacy & Information Security Management System on regular intervals.

13.  The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.

14.  Mandatory: Good verbal and written communication skills. Eye for details.

15.  Good presentation skills.

16.  Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.

Read more
Emids Technologies
at Emids Technologies
2 candid answers
Darshan K
Posted by Darshan K
Bengaluru (Bangalore)
7 - 14 yrs
Best in industry
Information security
Implementation
Risk Management
Cyber Security
ISO 27001:2013
+7 more

Experience:- Overall 10 to 12 years of experience of which atleast 5 to 7 years’ experience should be in Information Security. Mandatory is 5 to 7 years’ experience in Information security and with one full end to end implementation experience.

Base location: - Bengaluru - Must

Requirements: -

  1. Mandatory - ISO 27001:2013 lead implementor certified
  2. Mandatory - ISO 27001:2013 lead auditor certified (but if it is a good candidate, we can still consider)
  3. Good to have – CISA, CISM, Risk management certification, Privacy certifications.
  4. Mandatory - Atleast one end to end implementation experience of ISO 27001 standard. The candidate should have a good implementation knowledge of ISO 27001, ISO 27002 standards and is required to implement the ISO requirements and run the ISMS program for multiple countries.
  5. This immediate requirement is for implementing the ISMS program for our Canadian office location. The candidate should be willing to work from Bengaluru in EST time zone during this implementation phase whenever required.
  6. Good documentation skills.
  7. Develop, implement, maintain, review and continually improve Information Security policies.
  8. Good understanding and knowledge of applicable legal and regulatory requirements as relevant to information security.
  9. Manage and maintain a risk register / risk database along with risk treatment plans.
  10. Good understanding of physical and environmental security.
  11. Conduct Internal Audits based ISO 27001 standards and Personal Data Protection policies. A good experience in independently conducting Internal and supplier audit with respect to information security.
  12. Provide training to the employees on Privacy & Information Security Management System on regular intervals.
  13. The greater part of the job involves interacting with people, interviewing them / auditing, Preparing audit reports, discussing / persuading / influencing.
  14. Mandatory: Good verbal and written communication skills. Eye for details.
  15. Good presentation skills.
  16. Since this is a trusted role, candidates must be willing to undergo extensive background checks to verify their identity, character, qualifications, skills and experience.
Read more
client of people first consultant
client of people first consultant
Agency job
Bengaluru (Bangalore)
5 - 9 yrs
₹6L - ₹15.2L / yr
skill iconKubernetes
CI/CD
DevOps
skill iconDocker
Splunk
+8 more
Skills:Kuberentes,security tool, security processes,devsecops,three tier architecture,deveops,gitops,docker,kustomize,heim,Sast,Dast,splunk,grafana,azure,unix shell,linux shell.

Years: 5-9 Years

Job Responsibilities

 

Primary:

  • Responsible for security road map for EPDM application
  • Train the CI-CD team on the required technologies security adoptation
  • Lead the upskill program within the team
  • Support Application architect with right inputs on security processes and tools
  • Help setup DevSecOps for EPDM.
  • Find Security vulnerability in development process and sealed secretes
  • Support in defining the Three-tier architecture.

 

 

Secondary:

  • Coordination with different IT stakeholders as and when needed
  • Suggestion and Implementation of further tool chains towards DevOps and GitOps
  • Responsible to train the peer colleagues

 

 

 

Skills:

Mandatory skill:

  • Expert knowledge of container solutions. Must have >3 years of experience working with networking & debugging within Docker and Kubernetes.
  • Hands-on experience with Kubernetes workload deployments using Kustomize & Helm.
  • Good understanding of Bitnami, Hashicorp and other secrete management tools
  • SAST/DAST integration in CI/CD pipeline - design, implementation Expert knowledge of Source Control Systems, build & integration tools (e.g., GIT, Jenkins & Maven).
  • Hands-on experience with designing the CI/CD architecture & building pipelines (on On-prem, Cloud & Hybrid infrastructure services).
  • Experience with Security log management tools (e.g. Splunk ELK/EFK stack, Azure monitor or similar).
  • Experience with monitoring tools like Prometheus-Grafana & Dynatrace.
  • Experience with Infrastructure as a Service / Cloud computing (preferably Azure).
  • Expert in writing automation scripts in Yaml, Unix shell, linux shell.
  • Pulumi would be added advantage.

 

Read more
Global IT risk management company
Global IT risk management company
Agency job
via Selective Global Search by Moon Moon Das (SGS)
Delhi
7 - 12 yrs
Best in industry
ceh
OWASP
Cyber Security
Information security
clair
+3 more
b. Experience
i. Technology Graduate with 8+ years of experience in the IT industry & Information Security / Cyber Security
iii. Provide Security Vision & Strategy to the Organization, strategic direction, development, and implementation of information security programs and projects to address risks relevant to the attainment of organizational strategic goals.
iv. Experience in advising leadership team regarding Security Technology Land scape, product issues, and possible improvements
v. Expertise in providing executive roadmaps for continual improvement in teams, technology, and processes, process across various security & DevSecops teams
vi. Experienced in Information Security Risk Management, gap analyses, Audits.
vii. Hands-on Experience in formulating Cyber Security Policies, Design and implementation of Security Technologies, DevSecOps.
viii. Working Knowledge in implementation of Cyber Security Solution in Open Source, OpenStack environment.
ix. Ability to provide strategies to increase the ability to withstand cyber-attacks, as measured by annual sophisticated attack simulations.
x. Experience in upgrading, troubleshooting and tuning of Cyber Security Solutions, SOC Operations.
xi. Thorough understanding and good knowledge latest Cyber Security technologies, Security Architectures, vulnerabilities, security threats.
xii. Expertise in Test-Driven Development and establishing a DevSecOps practice. Multiple product launches under your belt - from design to launch, having played a key role in their success
xiii. Ability to setup PoC for latest security solutions
xiv. Good understanding of Open Source Technologies, Private Cloud Technologies.
Read more
Rapidly growing fintech SaaS firm that propels business grow
Rapidly growing fintech SaaS firm that propels business grow
Agency job
via Jobdost by Mamatha A
Bangalore
5 - 10 yrs
₹15L - ₹30L / yr
Information security
ISO/IEC 27001:2005
HIPAA
Systems Development Life Cycle (SDLC)
Physical security
+7 more

What are we looking for?

An enthusiastic individual with the following skills. Please do not hesitate to apply if you do not match all of it. We are open to promising candidates who are passionate about their work and are team players.

Key Responsibilities & expectations from the candidate 

  • Must have strong experience in Information Security Management system(ISMS), creation of policy, procedures and implementation.
  • Operates as a key contributor to the RFP, Third-Party Risk assessment, cloud security assessment etc.
  • Lead the strategic and tactical development of information security framework, risk management and new compliance initiatives
  • Subject matter expertise in ISO 27001, SOC2, CCPA, CPRA, GDPR, PCI DSS and HIPAA.
  • Must have a strong experience in the documentation process and reviewing MSA, SCC, SLA & DPA.
  • Good knowledge of BCP/DR, Incident response, VA/PT and Audit methodologies of various compliance frameworks.
  • Good knowledge of Access management, Network, Application Security, Encryption, Backup, Physical Security, ISMS Training & Awareness etc..
  • Ability to deal with the customers and vendors on Security and privacy matters.
  • Knowledge of Core IT processes, SDLC, network infrastructure will be useful.

Personal Attributes

  • Good written, oral, and interpersonal communication skills.
  • Ability to conduct research into IT security issues
  • Ability to present ideas in business-friendly and user-friendly language.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Highly self-motivated and hardworking.

Qualification and certification 

  • Bachelor’s/master's degree in Security, Computer Science, Management Information Systems, Engineering or related field.
  • Should be at least ISO 27001 lead auditor or lead implementer. 
  • 3+ years of related work experience in information security governance, risk and compliance (GRC) or relevant compliance roles in the SaaS industry.

What can you look for?

A wholesome opportunity in a fast-paced environment that will enable you to juggle between concepts, yet maintain the quality of content, interact, and share your ideas and have loads of learning while at work. Work with a team of highly talented young professionals and enjoy the benefits of being here.

We are

It is a rapidly growing fintech SaaS firm that propels business growth while focusing on human motivation. Backed by Giift and Apis Partners Growth Fund II, Company offers a suite of three products - Plum, Empuls, and Compass. Company  works with more than 2000 clients across 10+ countries and over 2.5 million users. Headquartered in Bengaluru, Company  is a 300+ strong team with four global offices in San Francisco, Dublin, Singapore, New Delhi.

Way forward

We look forward to connecting with you. As you may take time to review this opportunity, we will wait for a reasonable time of around 3-5 days before we screen the collected applications and start lining up job discussions with the hiring manager. We however assure you that we will attempt to maintain a reasonable time window for successfully closing this requirement. The candidates will be kept informed and updated on the feedback and application status.

 
Read more
IT services provider based out of the US
IT services provider based out of the US
Agency job
via Jobdost by Mamatha A
Bengaluru (Bangalore)
3 - 5 yrs
₹12L - ₹16L / yr
IT security
IT security audit
Information security
Security audit
ITGC
+13 more

Job description- Information Security(Financial)

Roles and Responsibilities

HTC Global Security Delivery Centre will provide a professional opportunity to work in a dynamic environment where you will have the ability to develop process and Cyber security based skills

 

Work profile of individual

  • As part of the companyC Global cyber security consulting team, individual’s primary role would be to be a part of ISO 27k projects IT audits, ITGC audits, SSAE, SOC audits, IT Process Audit, Systems Audit, Gap assessment TPRM, GDPR, Infosec, GRC , ISMS, Cyber Security, SOX ITGC on customer engagements
  • Will address all aspects of security like physical, logical, data, access etc and review Information Security policy and suggest / recommend necessary changes to the same on customer engagements
  • Will be an active participant in internal / third party system security reviews and audits on customer engagements.
  • Will perform internal audits on all aspects of IT and ensure compliance with the prescribed security norms on customer engagements and will be responsible for tracking the open audit findings and closure of the same
  • Will be able to manage document tracking and updating - policies, processes, procedures, templates etc.
  • Will assist in developing proposals by owning parts of the proposal document and by giving inputs in solution design based on areas of expertise.
  • Will demonstrate ability to clearly and concisely communicate the privacy implications of technology and implementation.

 

Team work

  • Individual would be responsible for contributing to a strong team environment and promoting a positive working relationship with their colleagues.
  • Individual would predominately work with off-shore engagement teams and relevant HTC Territory teams on presale and cyber security delivery.
  • Communication, written and verbal, with these teams would be expected.
  • Team members would be required to apply learning from trainings and on the job experience to work requests and support continuous process improvement.
  • Team members would be required to handle multiple tasks at the same time.
  • Detailed focus when performing work and good project management skills when managing workload and maintaining timelines will be necessary.

Desired Candidate Profile

  • Bachelors
  • Certifications (ISO 27001/ ISO 31000/ or equivalent and other relevant qualification/certification
  • Experience : 3-5 years

 

Knowledge Required:

  • Strong knowledge of information security concepts, risk and controls concepts. Strong understanding of security principals: audit, policies, guidelines, and compliance.
  • Understanding of infrastructure (data centre, network end user computing) security / cloud security / managed security services / security operations centre / compliance risk management and ITGC controls
  • Sound knowledge of Internal financial Controls and Compliance. Must be able to recommend controls around people, process, and technology.
  • Sound knowledge of General Leger / Balance Sheet / Journal Entry / Budgeting / Financial fraud
  • Sound knowledge on business controls and process controls. Good experience with control assessment, check the effectiveness of the implemented controls and recommend mitigation / improvements.
  • Experience with the Microsoft Office suite of products (i.e. Word, Excel, PowerPoint, Visio, etc.),
  • Strong verbal and written communication skills Knowledge / experience in fields of ITGC audits, Internal Audit, External Audit / Statutory Audit projects
  • Candidates should exhibit good client service skill collateral's with a strong focus on building relationships.

 

Additional Responsibilities:

 

  • Ability to develop value-creating strategies and models that enable clients to innovate, drive growth and increase their business profitability
  • Good knowledge on software configuration management systems and license Management systems
  • Awareness of latest technologies and Industry trends
  • Logical thinking and problem solving skills along with an ability to collaborate
  • Understanding of the financial processes for various types of projects and the various pricing models available
  • Ability to assess the current processes, identify improvement areas and suggest the technology solutions
  • One or two industry domain knowledge
  • Client Interfacing skills
  • Project and Team management
Read more
They provide both wholesale and retail funding. PM1
They provide both wholesale and retail funding. PM1
Agency job
via Multi Recruit by Ragul Ragul
Mumbai
5 - 10 yrs
₹15L - ₹20L / yr
Application Security Engineer
Web application security
application Security
Penentration Testing
API Security Assessment
+4 more
  • The candidate must have strong experience in application security assessment. threat modeling, code review, static and dynamic testing.
  • The candidate must have a strong understanding of common security libraries, security controls, and common security flaws.
  • Candidate must have experience in performing application vulnerability Management, penetration testing, application & API security assessment.
  • Candidate must have experience with OWASP, static/dynamic analysis, and common security tools
  • Candidate must have basic knowledge of development or scripting experience
  • Candidate must have experience in identifying security issues through code review during entire SDLC cycle
  • A basic understanding of network and web-related protocols (such as TCP/IP, UDP, HTTP, HTTPS, protocols)
  • Experience in working with developers
  • Candidate must have good communication skills (written & verbal)
  • He / She will be responsible for performing application security assessment, code review, API security assessment.
  • Participate in and support application security reviews and threat modeling, including code review and static/dynamic testing.
  • Ensure that security across all aspects of the software is uniform by setting up checkpoints.
  • Perform threat modeling for applications to determine the potential threats and vulnerabilities to an application and identify points where applications are most vulnerable.
  • Based on assessment results explore the threats that each application is exposed to and ranks them on a severity scale
  • Recommend the countermeasures that could be developed to secure application
  • He / She need to facilitate and support the preparation of security releases
  • He / She needs to support product and development teams in the area of application security.
  • Assist in the creation of best security development practices and security training for developers

Skills

  • He / She must have 5 + Years of experience in Application security assessment & application vulnerability management with strong academic background. 
  • Ability to stay current with emerging threats, security risks, and potential impacts to the business. 
  • Should have strong exposure to application security assessment, code review, secure development practices, and application security tools & technologies.  
  • Candidate should have at least one Information security certification CEH, CASE, or CISSP
Read more
Dental Insurance
Dental Insurance
Agency job
via Bhanven Cyber Tech Inc by Ramya Bhaven
Remote only
6 - 9 yrs
$0.1K - $0.1K / yr
Cyber Security
Cloud Security
IT security
devsecops
HIPAA
+3 more
  • Max rate $85/hr
  • MUST HAVE- Application security covering micro services security and Restful API from technical and business process and architecture. 

  • MUST HAVE -Application security, penetration testing, red team tool (optional), development background, Should have done Application vulnerability Assessments.

  • GOOD TO HAVE - Infrastructure experience in Azure Cloud OR Microsoft 365 product implementations will be handy , network Architecture n design mostly in Azure space

  • GOOD TO HAVE - Enterprise platform – office 365 is plus and such implementation. 

  • Experience as a Azure DevSecOps engineer is desired 

  • Ability to communicate effectively with senior management as well as highly technical engineers to articulate security positions effectively. 

Read more
Pune, Bengaluru (Bangalore)
10 - 15 yrs
₹20L - ₹45L / yr
Information security
Security operations
Penetration testing
Security analysis
Cyber Security
+1 more
Security Architectural solutions, designing, Security Analysis, Infrastructure architecture, Application architecture, DevSecOps and cloud understanding, Threat Modelling, Penetration testing, Governance Risk & Compliance
Read more
Why apply to jobs via Cutshort
people_solving_puzzle
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
people_verifying_people
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
ai_chip
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
21,01,133
Matches delivered
37,12,187
Network size
15,000
Companies hiring
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos