Average salary: Rs402,749 /yearly

More stats

Search Results: 28 vacancies

 ...management and resource optimisation techniques ~ Hands-on experience with SQL programming, predicate pushdown, Partitioning, Broadcast join, hash-join, indexing, data caching and query persistence ~ Hands-on experience in building SQL apps on TB data at scale ~ Hands-on... 

Mobileum

Bangalore
8 days ago
 ...businesses to adopt post-quantum cryptography •Explore integrating quantum-resistant cryptographic methods, such as lattice-based and hash-based signatures, into blockchain platforms •Raise awareness among businesses and organisations about the potential risks posed by quantum... 

BITS Pilani, Hyderabad Campus

Hyderabad
12 hours ago
 ...Design (Object oriented programming and design, Design Patterns), ○ High Level Design (Scaling, Load Balancers, Caching, Consistent Hashing, Storage, Architectural Patterns, Web and Application servers Protocols like , WebSockets etc) ● Proven track record of successfully... 

Hero Vired

Delhi
12 hours ago
 ...protection Expert on cryptography concepts symmetric and Asymmetric Knowledge on CRL OSCP NDES SCEP Openssl. Knowledge of Encryption Hashing algorithms. Digital Certificate management S/MIME digital signature. Knowledge of PKI PKCS standards and data security... 

SAM Manpower and Career Services LLP

Noida
11 days ago
 ...Fast API / Flask, Kubernetes/Docker (must), RESTful API Design, Kong API Gateway, AppDynamics & Splunk, Microservices, Linux/UNIX, Hash Corp Vault, Agile testing Responsibilities: Excellent in JAVA/SpringBoot OR Python 3 & Fast API / Flask at a senior level is... 

Webologix Ltd/ INC

Pune
12 days ago
 ...tables, Parquet formats, Working with large and complex datasets) ~ Strong experience with DWH using Synapse (distribution of tables (hash, replicate, round robin - scenario). Partitioning of data and Polybase. ~ ETL (Incremental loading .. SCD1, SCD2, Upserts) ~ Data... 

Quantzig

Bangalore
8 days ago
 ...experience using C.- Excellent knowledge in Symmetric and Asymmetric cryptographic algorithms.- Excellent knowledge in various signing and hashing algorithms.- Hands on experience in development of secure boot for microcontrollers and microprocessors.- Design and Development of... 

Codersbrain technology pvt ltd

Bangalore
1 day ago
 ...configurations, web server (e.g., Nginx) configurations, and common web application attacks (e.g., CSRF).- Knowledge of encryption, hashing, and underlying security technologies.- Experience with security compliance and auditing processes.- Excellent problem-solving and analytical... 

Cephas Consultancy Services Private Limited

Bangalore
1 day ago
 ...Mechanisms :- Devise effective and optimal integrity mechanisms tailored for the Android platform.- Implement and oversee mechanisms such as Hash/Hash chain, Public Key Cryptography, etc.Analysis :- Conduct static and dynamic analysis of patches to assess their impact and... 

Bluetick Consultants LLP

Delhi
9 days ago
 ...local / global variables, call routines, options like mprint, symbolgen etc.- Optimize SAS codes using programming best practices like hashing, data null statements etc.- Use complex functions like intck, intnx, format, informat, index, scan etc.in day-to-day codings-... 

Huquo Consulting

Gurgaon
1 day ago
 ...tables, Parquet formats, Working with large and complex datasets) ~ Strong experience with DWH using Synapse (distribution of tables (hash, replicate, round robin - scenario). Partitioning of data and Polybase. ~ ETL (Incremental loading .. SCD1, SCD2, Upserts) ~ Data factory... 

Quantzig

Bangalore
25 days ago
 ...- Demonstrated experience with Substrate framework and blockchain technology. - Experience with basic cryptographic primitives (hashing, signing) - Knowledge of blockchain architecture, consensus algorithms, and decentralized technologies.   Tech stack: - JS/TypeScript... 

AON

work from home
a month ago
 ...with QA teams and understand test strategy and associated nuisances.Must have knowledge of writing secure code and associated tools to hash out code security issues.Must have taken the website onto production and should have seen the Cloud Deployments.Must have come across at... 

Matter Motors

Ahmedabad
1 day ago
 ...identify potential security risks and vulnerabilities. Knowledge of cryptographic encryption algorithms, key exchange algorithms, hashing/message authentication algorithms, PKI, random number generators, TCP/IP, SSH, SSL/TLS, IKE etc. Tools experience is desirable, exposure... 

UL Solutions

Mumbai
18 days ago
 ...tables, Parquet formats, Working with large and complex datasets) ~ Strong experience with DWH using Synapse (distribution of tables (hash, replicate, round robin - scenario). Partitioning of data and Polybase. ~ ETL (Incremental loading .. SCD1, SCD2, Upserts) ~ Data factory... 

Quantzig

Bangalore
20 days ago
 ...development      (C and Java are Must). ?            Good knowledge about Cryptographic Algorithms (Symmetric, Asymmetric Key Algorithms, Hash      Functions) ?            Good knowledge about Key Management (Generation, Import/Export securely, Encrypt, Decrypt      Keys) ?... 

Forstaffing

Bangalore
more than 2 months ago
 ...development, IP-based real-time communications. An understanding of core security concerns within a typical application. (ex: password hashing, SSL/TLS, encryption at rest, XSS, XSRF) Okta’s Top 5 Core Leadership Competencies are part of the deeply ingrained principles that... 

Okta

Bangalore
a month ago
 ...commonly used for secure software development (C(Must)) Knowledge about Cryptographic Algorithms (Symmetric Asymmetric Key Algorithms Hash Functions) Knowledge about Key Management (Generation Import/Export securely Encrypt Decrypt Keys) Knowledge of Security... 

Cephas Consultancy Services Private Limited

Bangalore
more than 2 months ago
 ...POSIX and the following terminology: socket, pipe, file descriptor, functions as first-class objects, hypervisor, L1 cache, malloc, I/O, hash, interrupts, lock-free data structures. You should have basic knowledge of asymmetric cryptography and one-way functions.... 

Litheum

India
26 days ago
 ...understanding of NAT IPSEC TUNNEL SitetoSite VPN Domain & Route Based VPN IKE & IPSEC Phases / Phase 1 & 2 Modes / PFS / Encryption & Hashing. Upgrade to latest version and patches. Monitoring logs and events. Strong troubleshoot knowledge over proxy specially... 

Esconet Technologies Limited

New Delhi
a month ago