Average salary: Rs1,685,833 /yearly
More statsJob Description :- At least 7 to 10 years of S/4HANA Security & GRC Access Control and several years of project experience as SAP Consulting- The SAP Security Architect/Consultant will be responsible for the overall design and approach to SAP security across all of our client...
...systems like DAM Target Analytics AAM CRM Search etc.- In depth understanding of User management roles permissions implementing custom security requirements.- Knowledge of configuring OOTB User interface.- Experience of custom OSGI services development- Defining and...
...Participate in design/code reviews, collaborate, provide direction and implement features.
~Lead by example in writing high quality secure code, improve test coverage and ensure performance and observability
~Mentor junior team members
~Analyze and drive product requirements...
...front-end requests.- Developing high-performance applications by writing testable, reusable, and efficient code.- Implementing effective security protocols, data protection measures, and storage solutions.- Documenting Node.js processes, including database schemas, as well as...
....- Ability to understand and implement high available solutions on Azure across availability zones and regions.- Experience in Azure Security Groups, VPC, Routing Tables, Subnets- Understanding of patch management, Server hardening, TLS/SSL vulnerabilities management.- Very...
...dashboards, and analyses to meet specific business needs.- Utilize OBIEE features like calculations, variables, conditional formatting, and security to deliver interactive and informative visualizations.- Implement data cleansing and transformation techniques within OBIEE to ensure...
...configuration of the development tools.Communicate with all project stakeholders on the project status.Manage, monitor, and ensure the security and privacy of data to satisfy business needs.Contribute to the automation of modules, wherever required.Be proficient in written,...
...Analysis- Experience with tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK/SDK analysis- Code reviews for security policy violations, vulnerabilities, or improper coding practices- Advanced knowledge of Java, Kotlin, JavaScript, and other mobile software...
...platform trends in the space of distributed systems (Incl. Kubernetes, Dockers)- Working knowledge in Application and services-based security understanding (oauth2, CORS, SQL Injection, etc.)- Good knowledge of Domain-Driven Design, Test Driven Development- Hands-on in design...
...that align with business requirements.3. Architect and design scalable and maintainable systems, considering aspects of performance, security, and user experience.4. Lead code reviews, mentor team members, and enforce coding standards to maintain code quality and consistency...
...management to improve Salesforce data quality, implementing rules and automation as needed.- Proactive system maintenance, including Security Reviews, Release Updates, Health Check, and Optimizer- User support tickets- Monitor and improve user adoption.- New user and ongoing...
...adopt new technologies for improved DevSecOps processes.- Independently address challenges, errors, and gaps in automation.- Integrate security practices into the DevOps pipeline.- Collaborate with security teams for effective controls.- Identify process improvement...
...scalability concepts in a microservices-driven architecture.- Experience in collaboration with other technical domain experts such as cloud, security, SRE, and DevOps.- Awareness of headless architecture and some experience working with headless or classic CMS platforms.- Strong...