Expoint – all jobs in one place
מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

דרושים Tc-cs-cyber Architecture-ot Engineering-enterprise ב-Ey ב-India, Bengaluru

מצאו את ההתאמה המושלמת עבורכם עם אקספוינט! חפשו הזדמנויות עבודה בתור Tc-cs-cyber Architecture-ot Engineering-enterprise ב-India, Bengaluru והצטרפו לרשת החברות המובילות בתעשיית ההייטק, כמו Ey. הירשמו עכשיו ומצאו את עבודת החלומות שלך עם אקספוינט!
חברה (1)
אופי המשרה
קטגוריות תפקיד
שם תפקיד (1)
India
Bengaluru
נמצאו 168 משרות
Yesterday
EY

EY TC-CS-IAM-CyberArk-Senior India, Karnataka, Bengaluru

Limitless High-tech career opportunities - Expoint
Engage and contribute to the Identity & Access Management projects. Work effectively as a team member, sharing responsibility, providing support, maintaining communication and updating senior team members on progress. Execute...
תיאור:

Your key responsibilities

  • Engage and contribute to the Identity & Access Management projects
  • Work effectively as a team member, sharing responsibility, providing support, maintaining communication and updating senior team members on progress
  • Execute the engagement requirements, along with review of work by junior team members
  • Help prepare reports and schedules that will be delivered to clients and other interested parties
  • Develop and maintain productive working relationships with client personnel
  • Build strong internal relationships within EY Consulting Services and with other services across the organization
  • Help senior team members in performance reviews and contribute to performance feedback for staff/junior level team members
  • Contribute to people related initiatives including recruiting and retaining IAM professionals
  • Maintain an educational program to continually develop personal skills
  • Understand and follow workplace policies and procedures
  • Building a quality culture at GTH
  • Manage the performance management for the direct reportees, as per the organization policies
  • Foster teamwork and lead by example
  • Training and mentoring of project resources
  • Participating in the organization-wide people initiatives

Skills and attributes for success

  • Hands-on experience on end to end implementation of Identity and Access Management tool.
  • Completed at least 2-5 implementations.
  • Good understanding of Identity Access Management solutions.
  • Hands-on Java development and debugging experience.
  • Strong Understanding of Java API’s, libraries, methods and good understanding of XML.
  • Should be capable of dissecting large problems and designing modular, scalable solutions.
  • Familiarity with any Java Framework (Struts/ Spring) is an additional advantage.
  • Should be familiar with application servers such as Tomcat and WebLogic.
  • Should have good understanding of RDMS and SQL queries.
  • Hands-on experience in setting up the Identity and Access Management environment in standalone and cluster environment.
  • Hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements.
  • Strong understanding of LDAP (Lightweight Directory Access Protocol).
  • Capability of understanding the business requirements and converting that into design.
  • Good knowledge of information security, standards and regulations.
  • Should be flexible to work on new technologies in IAM domain.
  • Worked in capacity of techno-functional role of Identity and Access Management Implementation.
  • Worked in client facing role.
  • Need to be thorough in their respective tool with hands-on experience involving configuration, implementation & customization.
  • Deployment of web application & basic troubleshooting of web application issues.
  • Need to liaise with Business stakeholders and seek requirement clarification. Should be able to map business requirements to technical specifications.
  • Use case design, Solution Requirements Specification and mapping business requirements to technical requirements (Traceability Matrix).
  • Architecture Design (optimising the resources made available – servers and load sharing etc.).
  • Involvement in a successful pursuit of a potential client by being part of the RFP response team.

To qualify for the role, you must have

  • Bachelor or master’s degree in related field or equivalent work experience
  • Strong command on verbal and written English language.
  • Experience in HTML, JSP and JavaScript.
  • Strong interpersonal and presentation skills.
  • 3 - 4 Years relevant Work Experience

Skills Expertise

  • Experience in implementing at least two IAM engagements, including requirements gathering, analysis, design,
  • development, testing, deployment, and application support (SailPoint/OIM/CyberArk/Beyond trust/Thycotic).
  • Experience in carrying out advanced application integration with the IAM solution dealing with advanced provisioning (e.g., multilevel workflows), single sign-on (WIA, Forms, HTTP), and PKI concepts
  • Experience in technologies, such as Java, LDAP, SSL RDBMS, and Linux
  • Good knowledge of Web/application servers (IIS, WebSphere, WebLogic, JBoss, and Apache)
  • Experience in development/configuration of standard/custom IAM integrations using Java, .Net, or other major scripting languages
  • Experience in hands-on development, estimations, sizing, and custom IAM integrations
  • Advanced documentation and presentation skills and well-versed with software development life cycle processes
  • Ability to create, plan, and execute advanced IAM trainings and independently drive proof of concepts involving emerging IAM technologies
  • Exposure to process frameworks and methodologies
  • Excellent verbal and written communication

Certifications (preferred):

  • CyberArk Trustee, CyberArk Defender, CyberArk Sentry
  • ITIL or equivalent

Work Requirements:

  • Willingness to travel as required
  • Willingness to be on call support engineer and work occasional overtime as required
  • Willingness to work in shifts as required

What we look for

  • Who has hands on experience in setting up the Identity and Access Management environment in standalone and cluster environment.
  • Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements.

You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer:

  • Support, coaching and feedback from some of the most engaging colleagues around
  • Opportunities to develop new skills and progress your career
  • The freedom and flexibility to handle your role in a way that’s right for you



EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

Show more
Yesterday
EY

EY Quality Engineering-SAP India, Karnataka, Bengaluru

Limitless High-tech career opportunities - Expoint
Develop and implement comprehensive test plans, test cases, and testing strategies for SAP modules and functional workflows. Collaborate with stakeholders to define test requirements and acceptance criteria, ensure alignment of...
תיאור:

Position Overview:

This role requires a combination of hands-on technical expertise and leadership skills to manage testing efforts and drive quality assurance in complex enterprise environments.

Must have skills

  • Develop and implement comprehensive test plans, test cases, and testing strategies for SAP modules and functional workflows.
  • Collaborate with stakeholders to define test requirements and acceptance criteria, ensure alignment of testing processes with business goals and project timelines.
  • Knowledge on testing SAP systems/modules (e.g., SAP S/4HANA, SAP Fiori, SAP ECC, SAP MM, SD, FI/CO, SAP BTP)
  • Ensure testing of integrations between SAP and other enterprise applications, validate data accuracy, reports, and workflows across SAP systems.
  • Identify areas for automation to improve test efficiency and coverage by segregating the test automation into multiple layers like API, UI, Data validations etc
  • Perform functional, integration, regression, and end-to-end testing for SAP applications and related systems.
  • Should work hands-on in designing, developing, and maintaining test automation frameworks / scripts preferably in Selenium, Playwright in Java /Python/Typescript
  • Strong knowledge in git, git hub or similar repository management, defining branching strategies, merging code etc.
  • Experience building or extending automation frameworks with Page Object Model, Page Factory, BDD with Cucumber etc.
  • Should have knowledge in modular test architecture using design patterns like Singleton or Factory method
  • Should have skills in writing exception handling logic, debug test failures using logs, screenshots, and dev tools.
  • Experience in validating data sets for test automation, handling azure pipelines, executing test scripts remotely and analysing test automation results on pipelines
  • Should have skills in handling data from external sources like excel, json, csv or flat files
  • Skills in implementing custom logging using Log4j/SLF4J (Java) or Winston (TypeScript), generating detailed test reports using Extent Reports / Allure or custom HTML reports.
  • Writing efficient locator paths and minimizing test execution time, knowledge on implementing parallel test execution using TestNG, JUnit, or Playwright Test Runner.
  • Candidates should be willing to work in 60/40 ratio on Test automation and Functional Testing
  • Lead and mentor testing team members, ensuring effective knowledge sharing and skill development.
  • Identify, log, and track defects to closure, working with development teams to resolve issues and conduct root cause analysis for critical issues and implement preventive measures.
  • Excellent communication and interpersonal abilities to interact with stakeholders effectively.
  • Ability to work in fast-paced environments and manage multiple priorities

Good to have skills

  • Knowledge and experiences working on Agile based projects.
  • Basic to advanced knowledge of ABAP debugging, SAP cloud configurations is a plus.
  • Knowledge and experiences in API test automation using Karate DSL, Rest assured will be an addon
  • Skills in validating json responses, status codes, headers, json objects and handle json arrays validations will be an addon
  • Experience in performance testing with Gatling, K6 will be an Addon
  • Knowledge of cloud-based testing platforms (e.g., Browser Stack, Docker Containers).

Key Qualifications:

  • 7 - 10 years of experience in software testing with a focus on functional test automation and SAP application testing.
  • Bachelor’s degree (or equivalent experience) - BE/BTech/MCA/
  • Proficiency in hands own designing, developing and executing test automation frameworks.
  • Sound knowledge of automation, preparing data sets for test automation, handling pipelines and evaluating test automation results.
  • Experience in driving automation frameworks/ test suites, in SAP implementations is a plus.
  • Strong ability to mentor and guide junior testers and automation engineers
Show more

משרות נוספות שיכולות לעניין אותך

Yesterday
EY

EY TC - CS Cyber Architecture OT Engineering India, Karnataka, Bengaluru

Limitless High-tech career opportunities - Expoint
Design and implement network security architectures using next-generation firewalls and proxies. Evaluate and deploy zero trust technologies, including Zscaler and Netskope, to secure client environments. Conduct security assessments and vulnerability...
תיאור:

As a Senior Consultant in Network Security at EY, you will play a pivotal role in designing, implementing, and managing advanced security solutions for our clients. You will leverage your expertise in next-generation firewalls, proxies, zero trust technologies, and cloud security to enhance our clients' security posture and ensure compliance with industry standards. This person will interface with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, etc.

Your key responsibilities

  • Design and implement network security architectures using next-generation firewalls and proxies.
  • Evaluate and deploy zero trust technologies, including Zscaler and Netskope, to secure client environments.
  • Conduct security assessments and vulnerability analyses to identify and mitigate risks.
  • Collaborate with cross-functional teams to develop and implement security policies and procedures.
  • Provide guidance and mentorship to junior consultants and team members.
  • Stay updated on the latest security trends, threats, and technologies to ensure best practices are followed.
  • Develop and maintain documentation for security policies, procedures, and configurations.
  • Lead incident response efforts, including investigation, containment, and remediation of security incidents.
  • Conduct training sessions and workshops for clients and internal teams on security best practices and technologies.
  • Assist clients in compliance audits and assessments related to industry standards (e.g., ISO 27001, NIST, GDPR).
  • Design, implement, and oversee security measures for cloud platforms (such as AWS, Azure, and Google Cloud).
  • Create and enforce policies, standards, and best practices for cloud security.
  • Monitor and address security incidents and vulnerabilities within cloud infrastructures.
  • Establish and manage security controls, including network segmentation, data protection, and threat detection.
  • Automate security processes using scripting and infrastructure as code (IaC) methodologies.
  • Deploy and configure security tools and solutions native to the cloud (e.g., firewalls, encryption, identity and access management).
  • Investigate and address cloud security incidents, including data breaches and unauthorized access.
  • Conduct forensic analysis and generate comprehensive reports on security incidents and breaches.
  • Work collaboratively with other teams to resolve security challenges and enhance the overall security posture.
  • Evaluate and recommend security tools and technologies to enhance the security posture of client environments.
  • Collaborate with clients to develop tailored security strategies that align with their business objectives.
  • Monitor and analyze security events and alerts to identify potential threats and vulnerabilities.
  • Participate in security architecture reviews and provide recommendations for improvements.

Skills and attributes for success

  • Should be a good team player.
  • Excellent verbal and written communication skill.
  • Proficient Documentation and Power Point skills
  • Good social, communication and technical writing skills
  • Should interface with internal and external clients.
  • Strong analytical/problem solving skills.
  • Ability to prioritize tasks and work accurately under pressure in order to meet deadlines.
  • Should understand and follow workplace policies and procedures.
  • Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager.

To qualify for the role, you must have

  • Bachelor's degree in Computer Science, Information Security, or a related field.
  • 6 to 8 years of professional of experience in network security consulting/operations or a related role.
  • Strong knowledge of network security principles and practices.
  • Proficiency in configuring and managing next-generation firewalls (e.g., Palo Alto, Fortinet, Check Point).
  • Experience with proxy technologies and their integration into security architectures.
  • In-depth understanding of zero trust security models and implementation strategies.
  • Familiarity with cloud security solutions, particularly Zscaler and Netskope.
  • Implementation/operational experience on Zscaler- ZIA, ZPA,ZDX/ Netskope
  • Knowledge of cloud platforms (e.g., AWS, Azure, Google Cloud) and their security features.
  • Excellent problem-solving skills and the ability to work under pressure.
  • Strong analytical skills to assess security risks and develop effective mitigation strategies.
  • Ability to communicate complex security concepts to non-technical stakeholders.
  • Experience with security information and event management (SIEM) tools.
  • Understanding of network protocols and security technologies (e.g., VPN, IDS/IPS).
  • Familiarity with scripting or programming languages (e.g., Python, PowerShell) for automation and security tasks.
  • Knowledge of data protection regulations and compliance requirements (e.g., GDPR, HIPAA).
  • Strong project management skills to lead security initiatives and manage client engagements.
  • Below relevant certifications are a plus: -
    • Certified Information Systems Security Professional (CISSP)
    • Certified Information Security Manager (CISM)
    • Cisco Certified Network Professional Security (CCNP Security)
    • Palo Alto Networks Certified Network Security Engineer (PCNSE)
    • Fortinet Network Security Expert (NSE)
    • Zscaler Certified Cloud Security Engineer (ZCCSE)
    • Netskope Certified Security Engineer (NCS)
    • AWS Certified Security – Specialty
    • Microsoft Certified: Azure Security Engineer Associate
    • Google Professional Cloud Security Engineer
  • Proficiency in security tools and technologies.
  • Excellent problem-solving skills and attention to detail.
  • Strong communication and teamwork skills.
  • Ability to work independently and manage multiple tasks.
  • Willingness to stay current with evolving security technologies and threats.
  • Ability to communicate in a clear and concise manner.

Ideally, you’ll also have

  • Professional certificate or be actively pursuing related professional certifications such as the CompTia Security+, CEH, CISSP or Vendor/Technical certification. If not, certified candidates are expected to complete one of the business required certifications within 12 months of hire.
  • To expect some weekend work and 20%-30% travel based on job requirement.

What we look for

  • A Team of people with commercial acumen, technical experience and enthusiasm to learn new things in this fast-moving environment with consulting skills.
  • An opportunity to be a part of market-leading, multi-disciplinary team of 1600 + professionals, in the only integrated global transaction business worldwide.
  • Opportunities to work with EY Consulting practices globally with leading businesses across a range of industries

You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer:

  • Support, coaching and feedback from some of the most engaging colleagues around
  • Opportunities to develop new skills and progress your career
  • The freedom and flexibility to handle your role in a way that’s right for you



EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

Show more

משרות נוספות שיכולות לעניין אותך

Yesterday
EY

EY TC - CS CDR Splunk Engineer Staff India, Karnataka, Bengaluru

Limitless High-tech career opportunities - Expoint
Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBA. Minimum of Splunk Power User Certification. Good knowledge in programming or Scripting languages such as Python (preferred), JavaScript...
תיאור:

KEY Capabilities:

  • Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBA
  • Minimum of Splunk Power User Certification
  • Good knowledge in programming or Scripting languages such as Python (preferred), JavaScript (preferred), Bash, PowerShell, Bash, etc.
  • Assist in remote and on-site gap assessment of the SIEM solution.
    • Work on defined evaluation criteria & approach based on the Client requirement & scope factoring industry best practices & regulations
    • Assist in interview with stakeholders, review documents (SOPs, Architecture diagrams etc.)
    • Asist in evaluating SIEM based on the defined criteria and prepare audit reports
  • Good experience in providing consulting to customers during the testing, evaluation, pilot, production and training phases to ensure a successful deployment.
  • Experience in onboarding data into Splunk from various sources including unsupported (in-house built) by creating custom parsers
    • Verification of data of log sources in the SIEM, following the Common Information Model (CIM)
    • Experience in parsing and masking of data prior to ingestion in SIEM
    • Provide support for the data collection, processing, analysis and operational reporting systems including planning, installation, configuration, testing, troubleshooting and problem resolution
    • Assist clients to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources
    • Assist client with technical guidance to configure their log sources (in-scope) to be integrated to the SIEM
  • Experience in SIEM content development which includes :
    • Hands-on experience in development and customization of Splunk Apps & Add-Ons
    • Builds advanced visualizations (Interactive Drilldown, Glass tables etc.)
    • Build and integrate contextual data into notable events
    • Experience in creating use cases under Cyber kill chain and MITRE attack framework
    • Capability in developing advanced dashboards (with CSS, JavaScript, HTML, XML) and reports that can provide near real time visibility into the performance of client applications.
    • Sound knowledge in configuration of Alerts and Reports.
    • Good exposure in automatic lookup, data models and creating complex SPL queries.
    • Create, modify and tune the SIEM rules to adjust the specifications of alerts and incidents to meet client requirement
    • Experience in creating custom commands, custom alert action, adaptive response actions etc.

Qualification & experience:

  • Minimum of 3 years’ experience in Splunk and 3 to 5 years of overall experience with knowledge in Operating System and basic network technologies
  • Experience in SOC as L1/L2 Analyst will be an added advantage
  • Strong oral, written and listening skills are an essential component to effective consulting.
  • Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting
  • Certification in any other SIEM Solution such as IBM QRadar, Exabeam, Securonix will be an added advantage
  • Certifications in a core security related discipline (CEH, Security+, etc.) will be an added advantage.



EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

Show more

משרות נוספות שיכולות לעניין אותך

Yesterday
EY

EY TC - CS Cyber Architecture OT Engineering Zero Trust Senior ... India, Karnataka, Bengaluru

Limitless High-tech career opportunities - Expoint
A Security- Design & Architect professional who is responsible for designing, building, testing and implementing security within an organisation’s IT infrastructure- On Prem & Cloud. Professional is expected to have...
תיאור:

Your key responsibilities

  • A Security- Design & Architect professional who is responsible for designing, building, testing and implementing security within an organisation’s IT infrastructure- On Prem & Cloud.
  • Professional is expected to have a thorough understanding of complex IT systems and stay up to date with the latest security standards, systems and authentication protocols, as well as best practice security products.
  • Identify requirements, design document and implement technical solutions for scalable and resilient network architecture.
  • Well versed with Zero Trust use cases , business & technical requirements
  • Experience in Zero Trust Security Architecture and Solution Design
  • Experience in Zero-Trust and micro-segmentation solutions including Guardicore and Illumio
  • Individual should possess experience in planning, design, deployment, configuration, integration and management of network protection controls including Next gen firewalls- Palo Alto, Checkpoint, Fortinet, SDN Security, DDoS Protection, IPS, VPN, Wireless security, NAC and network authentication solutions to protect IT assets and should be responsible for deployment of any changes, plug-ins, or configuration as requested by client.
  • Plan, design, deploy, configure, integrate, and manage WAF, proxy/Zscaler solutions.
  • Possess hands on experience in segmenting networks, applications, and data to limit exposure to attacks.
  • Plan, design, deploy, configure, integrate and manage platform protection controls including virtualisation protection solutions on Hypervisors and thin client’s security solutions.
  • Good understanding of security concepts and technologies including, but not limited to TCP/IP, LDAP, DHCP, DNS, web filtering etc.
  • Should be well-versed with network documentation that includes network drawings, text descriptions and equipment configurations, designing HLDs and LLDs.

Skills and attributes for success

  • Serve as highly technical security expert to bring security transformation to both new and legacy infrastructure.
  • Deep technical understanding of architecture and solutioning of infrastructure security components.
  • Deep knowledge of services and service delivery approach and methodology for infrastructure security including governance and operating models.
  • Proven track record in building and maintaining trusted relationships with key internal and external stakeholders.
  • Willingness to travel and flex work timings as and when required.
  • Ability to change and adapt in a hyper-growth environment.
  • Self-starter and strategic thinker.
  • Drive C-suite/senior leadership level meetings and discussion.
  • Excellent oral and written communication skills and executive presence that enable effective engagement with senior stakeholders.
  • Ability to work independently and communicate the technical and security related issues to client/business stakeholders.
  • Clearly demonstrates proven extensive abilities with leveraging creative thinking and problem-solving skills, individual initiative, and utilizing Office 365, MS Office (Word, Excel, Access, PowerPoint) and Google Docs.
  • Communicating in an organized and knowledgeable manner in written and verbal formats including delivering clear requests for information and communicating potential conflicts.
  • Must communicate consistently and drive objectives, relying on fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance.
  • Good presentation, project management, facilitation and delivery skills as well as strong analytical and problem-solving capabilities.
  • Ability to create domain specific training content and deliver training effectively.
  • Develop/Implement automation solutions and capabilities that are clearly aligned to client business, technology and threat posture.
  • Demonstrates ability to track developments and changes in the digital business and threat environments to ensure that they're adequately addressed in client’s security strategy plans and architecture artefacts.

To qualify for the role, you must have

6+ years of experience in Information Technology experience, with specialization in Cyber Security roles that include multiple areas of specialization. Professional-level knowledge in areas from the following:

  • Zero Trust Security Strategy and Implementation
  • Security Engineering & Architecture assessments
  • Possess understanding in firewalls, VPNs, NAC, SDWAN, WAF, Proxy, EDR/XDR etc.
  • Expert level experience with deployment, maintenance and operations of one or more major network security Devices
  • Cloud Security Architecture
  • Entrepreneurial approach to solving security problems with consultative skills

Ideally, you’ll also have

  • Good soft skills i.e. verbal & written communication, technical document writing etc
  • Strong project management, negotiation and interpersonal skills
  • Prior experience working in Advisory or Technology Consulting industry
  • Customer orientation skills
  • Industry related certification (e.g. CISSP, CISA, CISM, SABSA, PRINCE2, TOGAF)

What we look for

You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer:

  • Support, coaching and feedback from some of the most engaging colleagues around
  • Opportunities to develop new skills and progress your career
  • The freedom and flexibility to handle your role in a way that’s right for you



EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

Show more

משרות נוספות שיכולות לעניין אותך

18.11.2025
EY

EY Oracle Tech Architecture Middleware-Kong APIM-Senior India, Karnataka, Bengaluru

Limitless High-tech career opportunities - Expoint
Kong API Gateway -Configuring and integrating with existing APIs.Utilizing Kong Developer portal to maintain and document API specifications.Automating configurations within our DevOps pipeline.AWS - Fargate, ECS, EC2, S3, CloudWatch, and...
תיאור:

JD for Kong:

We expect each engineer to have a bachelor’s degree in computer science or relevant field, with at least 3 years of relevant experience.

To be successful in this role, an engineer will need,

Hands-on experience with:

  • Kong API Gateway -
    • Configuring and integrating with existing APIs.
    • Utilizing Kong Developer portal to maintain and document API specifications.
    • Automating configurations within our DevOps pipeline.
    • AWS - Fargate, ECS, EC2, S3, CloudWatch, and CloudFormation
  • Github Actions
    • Java for webservice development and Python for scripting
  • Docker
    • Linux/Unix systems and shell scripting
    • Postman or similar API testing tooling

A firm understanding of:

  • REST-based architecture - SDLC, best practices, and testing
  • API design standards and principles, best practices, and specifications like OpenAPI and JWT
  • AWS - RDS, IAM, Route53, ALB, SCP, NLB, WAF, and Secrets Manager
  • Industry leading practices with Kong architecture to drive modernization and the future proofing of our systems.



EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

Show more

משרות נוספות שיכולות לעניין אותך

18.11.2025
EY

EY Client Technology - Engineering Software India, Karnataka, Bengaluru

Limitless High-tech career opportunities - Expoint
Leads the delivery of solution or infrastructure development services for a large or more complex project, using strong technical capabilities and outstanding hands-on experience!. Takes accountability for the design, development,...
תיאור:

The opportunity

  • Leads the delivery of solution or infrastructure development services for a large or more complex project, using strong technical capabilities and outstanding hands-on experience!
  • Takes accountability for the design, development, delivery and maintenance of solutions or infrastructure, driving compliance with and contributing to the development of relevant standards
  • Fully understands business and user requirements and ensures design specifications meet the requirements from a business and technical perspective

Your key responsibilities

  • Solves complex and escalated aspects of a project, performing coding, debugging, testing and troubleshooting throughout the development process
  • Provides advanced technical expertise to maximize efficiency, reliability and value from current solutions, infrastructure and emerging technologies, showing technical leadership and identifying and implementing continuous improvement plans
  • Develops strong working relationships with peers across Development & Engineering and Architecture teams, collaborating to develop and engineer leading solutions
  • Provides a leadership role for the work group, ensuring the appropriate expectations, principles, structures, tools and responsibilities are in place to deliver the project
  • Drives consistency to the relevant processes, procedures, standards, technical design whilst supporting the definition, maintenance and implementation of technology standard

Skills and attributes for success

  • Advanced technical proficiency in designing, developing, and debugging solutions
  • Advanced knowledge of one or more of: C#/Java or Python
  • Bachelor’s degree in computer science, Engineering, IT, Mathematics, or related field preferred
  • More than 10 years applied experience
  • Significant relevant experience in either an internal or external software or platform engineering role, or similar
  • Technical knowledge and experience in delivering software / platform engineering solutions (depending on specialism), providing comprehensive technical advice and handling user requirements
  • CI/CD delivery using code management, configuration management and automation tools such as GitHub, ADO
  • Proficiency in fine-tuning language models for specific tasks, including text generation, summarization, or question answering
  • Knowledge of embedding models and their application in NLP tasks like similarity matching, clustering, and information retrieval
  • Familiarity with designing and implementing agentic systems that combine AI models with external tools or environments for autonomous decision-making
  • Ability to design robust evaluation frameworks for AI models and agents, including metrics development, A/B testing, and performance benchmarking

Ideally, you’ll also

  • Microsoft/Google/AWS certificates
  • Delivery using modern methodologies
  • Significant proven experience in building application using container-orchestration systems like Kubernetes, and container engines like Docker

Show more

משרות נוספות שיכולות לעניין אותך

Limitless High-tech career opportunities - Expoint
Engage and contribute to the Identity & Access Management projects. Work effectively as a team member, sharing responsibility, providing support, maintaining communication and updating senior team members on progress. Execute...
תיאור:

Your key responsibilities

  • Engage and contribute to the Identity & Access Management projects
  • Work effectively as a team member, sharing responsibility, providing support, maintaining communication and updating senior team members on progress
  • Execute the engagement requirements, along with review of work by junior team members
  • Help prepare reports and schedules that will be delivered to clients and other interested parties
  • Develop and maintain productive working relationships with client personnel
  • Build strong internal relationships within EY Consulting Services and with other services across the organization
  • Help senior team members in performance reviews and contribute to performance feedback for staff/junior level team members
  • Contribute to people related initiatives including recruiting and retaining IAM professionals
  • Maintain an educational program to continually develop personal skills
  • Understand and follow workplace policies and procedures
  • Building a quality culture at GTH
  • Manage the performance management for the direct reportees, as per the organization policies
  • Foster teamwork and lead by example
  • Training and mentoring of project resources
  • Participating in the organization-wide people initiatives

Skills and attributes for success

  • Hands-on experience on end to end implementation of Identity and Access Management tool.
  • Completed at least 2-5 implementations.
  • Good understanding of Identity Access Management solutions.
  • Hands-on Java development and debugging experience.
  • Strong Understanding of Java API’s, libraries, methods and good understanding of XML.
  • Should be capable of dissecting large problems and designing modular, scalable solutions.
  • Familiarity with any Java Framework (Struts/ Spring) is an additional advantage.
  • Should be familiar with application servers such as Tomcat and WebLogic.
  • Should have good understanding of RDMS and SQL queries.
  • Hands-on experience in setting up the Identity and Access Management environment in standalone and cluster environment.
  • Hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements.
  • Strong understanding of LDAP (Lightweight Directory Access Protocol).
  • Capability of understanding the business requirements and converting that into design.
  • Good knowledge of information security, standards and regulations.
  • Should be flexible to work on new technologies in IAM domain.
  • Worked in capacity of techno-functional role of Identity and Access Management Implementation.
  • Worked in client facing role.
  • Need to be thorough in their respective tool with hands-on experience involving configuration, implementation & customization.
  • Deployment of web application & basic troubleshooting of web application issues.
  • Need to liaise with Business stakeholders and seek requirement clarification. Should be able to map business requirements to technical specifications.
  • Use case design, Solution Requirements Specification and mapping business requirements to technical requirements (Traceability Matrix).
  • Architecture Design (optimising the resources made available – servers and load sharing etc.).
  • Involvement in a successful pursuit of a potential client by being part of the RFP response team.

To qualify for the role, you must have

  • Bachelor or master’s degree in related field or equivalent work experience
  • Strong command on verbal and written English language.
  • Experience in HTML, JSP and JavaScript.
  • Strong interpersonal and presentation skills.
  • 3 - 4 Years relevant Work Experience

Skills Expertise

  • Experience in implementing at least two IAM engagements, including requirements gathering, analysis, design,
  • development, testing, deployment, and application support (SailPoint/OIM/CyberArk/Beyond trust/Thycotic).
  • Experience in carrying out advanced application integration with the IAM solution dealing with advanced provisioning (e.g., multilevel workflows), single sign-on (WIA, Forms, HTTP), and PKI concepts
  • Experience in technologies, such as Java, LDAP, SSL RDBMS, and Linux
  • Good knowledge of Web/application servers (IIS, WebSphere, WebLogic, JBoss, and Apache)
  • Experience in development/configuration of standard/custom IAM integrations using Java, .Net, or other major scripting languages
  • Experience in hands-on development, estimations, sizing, and custom IAM integrations
  • Advanced documentation and presentation skills and well-versed with software development life cycle processes
  • Ability to create, plan, and execute advanced IAM trainings and independently drive proof of concepts involving emerging IAM technologies
  • Exposure to process frameworks and methodologies
  • Excellent verbal and written communication

Certifications (preferred):

  • CyberArk Trustee, CyberArk Defender, CyberArk Sentry
  • ITIL or equivalent

Work Requirements:

  • Willingness to travel as required
  • Willingness to be on call support engineer and work occasional overtime as required
  • Willingness to work in shifts as required

What we look for

  • Who has hands on experience in setting up the Identity and Access Management environment in standalone and cluster environment.
  • Who has hands-on Development experience on Provisioning Workflows, triggers, Rules and customizing the tool as per the requirements.

You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer:

  • Support, coaching and feedback from some of the most engaging colleagues around
  • Opportunities to develop new skills and progress your career
  • The freedom and flexibility to handle your role in a way that’s right for you



EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.

Show more
בואו למצוא את עבודת החלומות שלכם בהייטק עם אקספוינט. באמצעות הפלטפורמה שלנו תוכל לחפש בקלות הזדמנויות Tc-cs-cyber Architecture-ot Engineering-enterprise בחברת Ey ב-India, Bengaluru. בין אם אתם מחפשים אתגר חדש ובין אם אתם רוצים לעבוד עם ארגון ספציפי בתפקיד מסוים, Expoint מקלה על מציאת התאמת העבודה המושלמת עבורכם. התחברו לחברות מובילות באזור שלכם עוד היום וקדמו את קריירת ההייטק שלכם! הירשמו היום ועשו את הצעד הבא במסע הקריירה שלכם בעזרת אקספוינט.