Average salary: Rs402,749 /yearly
More statsSearch Results: 28 vacancies
...management and resource optimisation techniques
~ Hands-on experience with SQL programming, predicate pushdown, Partitioning, Broadcast join, hash-join, indexing, data caching and query persistence
~ Hands-on experience in building SQL apps on TB data at scale
~ Hands-on...
...businesses to adopt post-quantum cryptography
•Explore integrating quantum-resistant cryptographic methods, such as lattice-based and hash-based signatures, into blockchain platforms
•Raise awareness among businesses and organisations about the potential risks posed by quantum...
...Design (Object oriented programming and design, Design Patterns),
○ High Level Design (Scaling, Load Balancers, Caching, Consistent Hashing, Storage, Architectural Patterns, Web and Application servers Protocols like , WebSockets etc)
● Proven track record of successfully...
...protection
Expert on cryptography concepts symmetric and Asymmetric
Knowledge on CRL OSCP NDES SCEP Openssl.
Knowledge of Encryption Hashing algorithms. Digital
Certificate management S/MIME digital signature.
Knowledge of PKI PKCS standards and data security...
...Fast API / Flask, Kubernetes/Docker (must), RESTful API Design, Kong API Gateway, AppDynamics & Splunk, Microservices, Linux/UNIX, Hash Corp Vault, Agile testing
Responsibilities:
Excellent in JAVA/SpringBoot OR Python 3 & Fast API / Flask at a senior level is...
...tables, Parquet formats, Working with large and complex datasets)
~ Strong experience with DWH using Synapse (distribution of tables (hash, replicate, round robin - scenario). Partitioning of data and Polybase.
~ ETL (Incremental loading .. SCD1, SCD2, Upserts)
~ Data...
...experience using C.- Excellent knowledge in Symmetric and Asymmetric cryptographic algorithms.- Excellent knowledge in various signing and hashing algorithms.- Hands on experience in development of secure boot for microcontrollers and microprocessors.- Design and Development of...
...configurations, web server (e.g., Nginx) configurations, and common web application attacks (e.g., CSRF).- Knowledge of encryption, hashing, and underlying security technologies.- Experience with security compliance and auditing processes.- Excellent problem-solving and analytical...
...Mechanisms :- Devise effective and optimal integrity mechanisms tailored for the Android platform.- Implement and oversee mechanisms such as Hash/Hash chain, Public Key Cryptography, etc.Analysis :- Conduct static and dynamic analysis of patches to assess their impact and...
...local / global variables, call routines, options like mprint, symbolgen etc.- Optimize SAS codes using programming best practices like hashing, data null statements etc.- Use complex functions like intck, intnx, format, informat, index, scan etc.in day-to-day codings-...
...tables, Parquet formats, Working with large and complex datasets)
~ Strong experience with DWH using Synapse (distribution of tables (hash, replicate, round robin - scenario). Partitioning of data and Polybase.
~ ETL (Incremental loading .. SCD1, SCD2, Upserts)
~ Data factory...
...- Demonstrated experience with Substrate framework and blockchain technology.
- Experience with basic cryptographic primitives (hashing, signing)
- Knowledge of blockchain architecture, consensus algorithms, and decentralized technologies.
Tech stack:
- JS/TypeScript...
...with QA teams and understand test strategy and associated nuisances.Must have knowledge of writing secure code and associated tools to hash out code security issues.Must have taken the website onto production and should have seen the Cloud Deployments.Must have come across at...
...identify potential security risks and vulnerabilities.
Knowledge of cryptographic encryption algorithms, key exchange algorithms, hashing/message authentication algorithms, PKI, random number generators, TCP/IP, SSH, SSL/TLS, IKE etc.
Tools experience is desirable, exposure...
...tables, Parquet formats, Working with large and complex datasets)
~ Strong experience with DWH using Synapse (distribution of tables (hash, replicate, round robin - scenario). Partitioning of data and Polybase.
~ ETL (Incremental loading .. SCD1, SCD2, Upserts)
~ Data factory...
...development (C and Java are Must).
? Good knowledge about Cryptographic Algorithms (Symmetric, Asymmetric Key Algorithms, Hash Functions)
? Good knowledge about Key Management (Generation, Import/Export securely, Encrypt, Decrypt Keys)
?...
...development, IP-based real-time communications.
An understanding of core security concerns within a typical application. (ex: password hashing, SSL/TLS, encryption at rest, XSS, XSRF)
Okta’s Top 5 Core Leadership Competencies are part of the deeply ingrained principles that...
...commonly used for secure software development (C(Must))
Knowledge about Cryptographic Algorithms (Symmetric Asymmetric Key Algorithms Hash
Functions)
Knowledge about Key Management (Generation Import/Export securely Encrypt Decrypt
Keys)
Knowledge of Security...
...POSIX and the following terminology: socket, pipe, file descriptor, functions as first-class objects, hypervisor, L1 cache, malloc, I/O, hash, interrupts, lock-free data structures.
You should have basic knowledge of asymmetric cryptography and one-way functions....
...understanding of NAT IPSEC TUNNEL SitetoSite VPN Domain & Route Based VPN IKE & IPSEC Phases / Phase 1 & 2 Modes / PFS / Encryption & Hashing.
Upgrade to latest version and patches. Monitoring logs and events.
Strong troubleshoot knowledge over proxy specially...