Average salary: Rs1,601,699 /yearly
More statsGet new jobs by email
Rs 1 - 3 lakhs p.a.
...developing REST Services in Spring/Spring Boot/Apache Jersey/RESTLet • Experience in multithreading and concurrent packages • Secure Hashing, difference between hashing and cryptography • Strong fundamentals and clarity of REST web services. Exposure to developing REST...Suggested- ...systems, and experience protecting contractor ecosystems at volume Familiarity with cryptographic technologies including signing, hashing, key rotation, and certificate management workflows Experience with risk engines, adaptive authentication models, and fraud detection...SuggestedFor contractorsSide jobWorldwideFlexible hours
- ...~ Demonstrated knowledge in use of protocol analyzers and debug tools. ~ Exposure to Storage Security features (Encryptions, SPDM, Hash algorithms) are added advantage ~ Effective communicator of technical ideas using verbal as well as written skills ~ Team Player and...Suggested
- ..., or C++) and comfortable reading/writing across others (TypeScript preferred). ~ Strong understanding of cryptographic primitives (hash functions, digital signatures, public-key cryptography). ~ Proven experience designing and scaling fault-tolerant, high-throughput systems...Suggested
- ...coding practices in PHP, JavaScript, and WordPress (proper escaping/sanitization, prepared statements, secure session handling, password hashing). Hands-on experience with WordPress security hardening, including managing updates, secure configuration, user roles/permissions,...SuggestedLong term contractPermanent employmentFull timeContract workRemote jobShift work
- ...). • Solid understanding of SEO, keyword research, and Google Analytics and Tags. • Solid understanding of Meta Ads management and Hash Tags usage. • Excellent copywriting, communication, and storytelling skills. • Ability to deliver creative content (text, image, and...SuggestedInternshipWork at officeShift work
- ...any other props required for a shoot. Manage end-to-end video production for Faceless as well as videos shot with an anchor. Re-hashing videos into multiple formats. Proofing scripts and ensuring they are as per video requirements. Skills Required ~2+ years...SuggestedTraineeship
- ...IPs) and IOAs (behaviors), and how to use Real Time Response (RTR) concepts Basic understanding of Symmetric/Asymmetric encryption, Hashing (SHA/MD5), and PKI Willingness to work in rotational 24/7 shifts (including nights, weekends, and holidays) to support a...SuggestedShift workNight shift
- ...Fortify, Checkmarx, Veracode, SonarQube, Snyk) to detect vulnerabilities in code.- Implement encryption techniques including SSL/TLS, hashing algorithms, key management, and data encryption to protect sensitive information.- Design and develop secure APIs and microservices...Suggested
- ...code in Rust, Go, or TypeScript, contributing directly to Finternet’s open developer ecosystem. · Apply cryptographic primitives (hashing, signatures, key management) to design secure and fault-tolerant systems. · Collaborate with product, protocol, and research teams...SuggestedFull timeRemote job
- ...and maintain infrastructure using Terraform (IaC) across AWS and GCP.- Security & Reliability : Implement robust security (encryption, hashing, VPCs) and manage production deployments, logging, and monitoring.- AI Integration : Collaborate on Python-based AI/ML scripts and...SuggestedFull timeHybrid workWork at office
Rs 4 - 8 lakhs p.a.
...understanding of blockchain architecture, consensus mechanisms, and distributed systems. ~ Strong knowledge of cryptographic principles, hashing algorithms, and digital signatures. ~ Experience in smart contract development, testing frameworks, and auditing practices. ~...SuggestedContract work- ...practical application of cryptographic algorithms:- Symmetric encryption (AES, 3DES – legacy awareness) Asymmetric encryption (RSA, ECC) Hashing algorithms (SHA-256 / SHA-3) Digital signatures and MACs Hardware Security Modules (HSM) – conceptual or hands-on exposure...SuggestedHybrid workRemote jobFlexible hours
- ...shortest path & search algorithms, and bit manipulation. Ability to design scalable systems must have good knowledge of API design, hash tables, sorting algorithms, search algorithms, binary search trees, bit manipulation, and dynamic programming. Qualification Bachelor...Suggested
- ...Information Protection (MIP), Varonis). ~ Strong understanding of encryption algorithms (AES, RSA), tokenization, data masking, and hashing. ~ Proficiency in Python, PowerShell, or SQL for automation and reporting. ~ Ability to explain complex data risks to non-...SuggestedFull timeWorldwide
- ...cryptography and Public Key Infrastructure (PKI). ~ Expert-level knowledge of cryptographic primitives, algorithms (AES, RSA, ECC), hashing functions, and digital signature standards. ~ Proven experience designing and deploying Hardware Security Modules (HSMs) and...Local areaShift work
- ...context with automotive domain . Experience with cybersecurity related functions and their underlying technologies i.e., signing, hashing, Message authentication code, Encryption/Decryption, TLS, KMS, PKI etc. Software Development . Experience of Embedded...
- ..., etc ~ In-depth knowledge of security standards such as OAuth 2.0, JWT tokens, mTLS, SSL/mutual SSL, SAML, encryption algorithms, hashing with SHA-256, etc ~ Experience of using Microservices architecture patterns and working with AWS, Azure, GCP, databases, and huge volumes...
- ...Firebase). Good To Have Basic knowledge of AWS (S3, EC2, RDS). Understanding of REST API development. Awareness of encryption/hashing standards. If you are a motivated individual with a strong technical background and a desire to grow in a dynamic work environment...Remote job
- ...on Linux and/or in Docker ~ Strong application security notions and understanding of the fundamentals of authentication (OAuth, hashing, OCTA , TLS, encryption, digital signatures, JWT, …) ~ Exposure to AWS / Azure services ~ Experience working in Scrum/agile methodology...
- ..., PoW, BFT, etc. ). ~ Experience with chain abstraction and account abstraction concepts. ~ Knowledge of cryptographic primitives (hash functions, digital signatures, Merkle trees). ~ Familiarity with P2P networking, smart contract platforms, and blockchain security practices...Contract work
- ...protocols is a must. Good Knowledge of Networking OS(NOS), Linux Kernel and L1/L2 drivers is desirable. Understanding of PCIe, TCAM, hash memories, SERDES, high speed I/O interfaces, DMA controllers, MDIO, and i2c is desirable Good knowledge of network infrastructure of...Permanent employment
- ...homomorphic encryption, k-anonymity, and secure multi-party computation. Mastery of Anonymization and Pseudonymization methods, including hashing with consistent salts and data masking. Privacy Strategy and Implementation:(Must Have) Lead the implementation of privacy...Local area
- ...threading.- Good knowledge on Design patterns, collection framework, Concurrency packages, DS/Algo.- Good knowledge on Data Structures (Hash map/Linked list/palindromic Sequence/Hashtag) and Algorithms for Problem Solving- Good to have experience in:a. Connection pool,b....
- ...access control (RBAC).Security Best Practices : - A security-first mindset with experience in data encryption (at rest and in transit), hashing algorithms (e.g., bcrypt, scrypt), and preventing common vulnerabilities (e.g., SQL injection, XSS, CSRF, insecure deserialization)....Immediate start
- ...Ingestion of model-based scores into media activation platforms Managing the lifecycle of models within a privacy-safe environment Hashing data for privacy compliance Ensuring model drift is monitored and training datasets are updated (using ETL services like AWS Glue...Hybrid workImmediate startShift work
Rs 3.5 - 8 lakhs p.a.
...complexity (Big O notation) for algorithm optimization. Experience working with different data structures like trees, heaps, graphs, hash tables, and arrays to solve complex problems. 4. Microservices Architecture: Strong understanding of designing and building...Rs 5 - 10 lakhs p.a.
...and secure data transfer and storage App Security validation checking, software attack methodologies Cryptography encryption and hashing Required Even though the SecArch Integrator role is not a development role, the candidate must have understanding in programming,...Rs 12 - 18 lakhs p.a.
...Algorithms (Dijkstra, BFS/DFS, Topological Sort) ~ Dynamic Programming & Greedy Techniques ~ String Algorithms (KMP, Rabin-Karp) ~ Heaps, Hashing, Tries ~ Recursion & Backtracking ~ Concurrency & Multithreading concepts ~ Proficiency in one or more languages: Java, C++,...- ...Analytics. - Performance Engineering (Delta/Spark): Apply file sizing best practices, OPTIMIZE/Z‑ORDER, data skipping, AQE, broadcast/hash/sort‑merge joins, shuffle tuning, caching, checkpointing for streaming, and VACUUM/retention management. - SQL Warehouses...Full time
