The point where experts and best companies meet
Share
Job Description
Build cutting FinTech solutions for banking, front office trading, and risk across all segments of the global market. These include award winning web & mobile applications, data science and analytics, complex event processing, cloud solutions, low latency applications, and responsive experiences.
• Low latency electronic trading including algorithmic trading
• Complex derivatives and structured products trading
• Real time and intra-day risk including Monte Carlo simulations, climate risk valuations
• Auto-hedging and portfolio optimizations
• Intelligent automation of trade processing including applied robotics
• Intelligent anti-money laundering and fraud detection
• Real time cash flow predictive modelling
• Modernization of global real time payments
• Digital Banking Assistants and enhanced BOT capabilities
• Design and architect solutions based on requirements or based on your innovative ideas
• Develop software in agile and iterative cycles using continuous improvement tools and techniques
• Work with global development teams and business partners across USA, UK, Europe and Asia Pacific including quants, strategists, traders, and risk managers.
• Test software using test driven development and embedded QA teams
Campus Job Description - Tech
We work on cutting edge technologies like AI, Machine Learning, Hadoop, Python, Scala, Pega, .NET, Java, Angular, TOSCA, selenium, React, Cassandra, memSQL, Tableau, ETL among several others
Testing (Functional & Technical)
Specialist in discovering the unexpected & bring confidence in software
• Good at problem solving and quantitative skills
• Verify that the application meets all functional business requirements
• Ensure that all component changes are tested against areas impacted and that solutions work from an integration/operations perspective
• Include the scope, test cycles, risks, regression testing approach, environment requirements, data requirements, metrics, and work plan
• Develop test conditions and build test scripts based on functional design specifications and the test approach
• Confirm the architectural stability of the system with a focus on functional, load testing, fail-over/recoverability and operational testing. In some systems will also monitor, measure, and optimize individual and combined hardware and/or software components for optimal performance
• Perform unit testing and component integration testing
• Design and Develop Technical Test Approach, Load Tests, Fail-over and Recoverability Tests and Operational Tests
• Document and execute Test Scripts & report the execution progress
• Identify & escalate stoppers / concerns /issues to the project management team early.
• Ability to work as a team player in an agile way of working.
• Serve as a quality gatekeeper for the application releases.
Risk Management
As a Risk Management Analyst, you will be an integral part of our control function, focusing on areas such as Cloud Governance, Model Governance, Risk and Controls, Issue Management, and Cyber Security. This entry-level role is designed for recent graduates who are passionate about risk management and eager to contribute to a dynamic and fast-paced environment.
• Cloud Governance: Support the implementation and monitoring of cloud governance frameworks. Ensure that cloud-related risks are identified, assessed, and mitigated in accordance with company policies.
• Model Governance: Assist in the governance of financial and operational models by ensuring they are properly validated, documented, and aligned with industry standards and regulatory requirements.
• Risk and Controls: Contribute to the identification, assessment, and mitigation of operational risks across the organization. Assist in the development and maintenance of controls to manage these risks effectively.
• Issue Management: Support the tracking, reporting, and resolution of risk-related issues. Collaborate with stakeholders to ensure timely and effective issue remediation. Review the sustenance of the controls implemented as part of the issue remediation and report the gaps to management.
• Cyber Security: Participate in the identification and assessment of cybersecurity risks. Assist in the implementation of controls and monitoring mechanisms to protect against cyber threats.
Infrastructure Operations
This role is responsible for developing and delivering software to accomplish business goals. Key responsibilities of the role include ensuring that software is developed to meet functional/non-functional requirements, coding solutions, and unit testing. These individuals are aware of the development practices of the bank.
• Contribute to story refinement/defining requirements.
• Participate in estimating work necessary to realize a story/requirement through the delivery lifecycle.
• Understand and utilize basic architecture components in solution development.
• Code solution and unit test to deliver a requirement/story per the defined acceptance criteria.
• Execute automated test suites (integration, regression, performance); collect results and flag issues.
• Document and communicate required information for deployment, maintenance, support, and business functionality.
• Adhere to team delivery/release process and cadence pertaining to code deployment and release.
• Solution Design, Test Engineering, DevOps and Release Automation, Application & Architecture
This role is an entry level to multiple technology positions. Performs commoditized activities which may include monitoring, event management, service requests, and engineering. Technical Analysts will build foundational experience in network, systems, application, access requests, production support, or security engineering.
• Manages and prioritizes assigned tasks
• Executes procedures reliable, responds with urgency, and escalates appropriately to senior team members
• Opens triage bridge line, updates bridge board, engages teams as required
• Monitoring all installed systems and infrastructure
• Maintains solutions that are aligned to security, redundancy, and archiving blueprints and strategies
• Supports client on boarding
• Proactively ensures the highest levels of systems and infrastructure availability within a technical domain
• Responsible for event management and request fulfilment
• Supports change activities
• Writes and maintains documentation
Campus Job Description - Tech
• Production Support, Solution Design, DevOps Practices & Automation, App & Infrastructure Architecture
Production support, problem and incident management
This includes direct responsibility for production support, problem and incident management, operational change, as well as service and program delivery. Also supporting vertical functions (Release, Deployment & Environment Management, Application Integration & Engineering) to deepen concentration stability and innovation.
Individual is expected to work in production services and will play an individual contributor role to understand stakeholder’s expectations & objectives and drive outcomes. Support Services include event management, handling batch, Start of day and end of the day checks and status updates, incident timely escalations and work with key stakeholder on restoration, weekend/holiday support
• Application Monitoring - Respond to alerts & incidents, and escalate in a timely manner
• Understand the basic functionality of Business and its dependent upstream and downstream requirements – work with key stakeholders to ensure that the business queries are answered and resolved within defined SLA
• Working to resolve problems and incidents of varying complexity to enable smooth operation
• Self-motivated to further enhance the stability and performance of the production management environment
• Understands effects of IT Architecture on production performance, tuning queries, auto sys batch job scheduling/monitoring
• Provide status reporting of all production issues and should be able to provide regular, ad-hoc status reports to management as required
• Build good relationship with Business users, CIO/Dev partners and other support teams.
• Good team player and can work independently
Cyber Security Defense and Assessment
Front face for Cyber Security events, incidents and an all-rounder in technical & operational support
• Regular analysis of Cyber Security information
• Replying to general Cyber Security queries
• Assist in Cyber Security investigation
• Supporting Identity and Access Management
• Identify vulnerability in Cyber Security which requires remediation
• Recording and responding to Cyber Security events and incidents in timely fashion
• Review, monitor and maintain Cyber Security controls and their implementation
• Auditing of systems, services and processes against policy, best practice and standards in a methodical and clearly documented fashion
Identity & Access Management (IAM)
IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
• Provides provisioning services and break/fix support related to access management for hundreds of applications, Windows platforms, Mainframe and Midrange platforms.
• Contributes to provide consulting, subject matter expertise, control management, risk mitigation, and oversight related to Authentication, MFA and Privileged Access Management.
• Governance & monitoring of the human and nonhuman identity lifecycle. Password complexity & rotation and Access Certification Services.
• Provides support on Access Bundling and Business Rule Engines (BRE)
• Enables service support and provides subject matter expertise for many of the IAM tools and services such as; ARM/ DDAR, CSDB, Dormancy, PCAT, STR/STP
• Conducts data analytics and data engineering activities to provide businesses with IAM insights and reduce organizational risk.
• Provides platform operations and security engineering for the iSeries platform including maintenance, problem mgmt. & security solutions.
• Contributing to the development of innovative software capabilities to secure Bank products using DevSecOps pipelines and automation
• Participating in rapid prototyping and product security software research and development projects
• Innovating new software-based capabilities to secure software containers from internal and external cyber-attacks by being able to detect, respond, and recover without human intervention or mission degradation
• Participating in the development of algorithms, interfaces and designs for cyber-secure and resilient software systems
• Performing collaborative design & development with other engineers and suppliers
• Joining a team performing cyber risk assessments and developing risk mitigation plans
• Performing analysis of systems and components for risks, vulnerabilities, and threats
• Supporting incident response and mitigation
• Monitor networks for security breaches and investigate a violation when one occurs
• Develop security standards and best practices
• Assist with maintaining a strong cybersecurity posture
• Assist in developing new policies, design processes, and procedures, and develop technical designs to secure the development environment and trainer systems
• Assess system vulnerabilities, implement risk mitigation strategies, and validate secure systems, and test security products and systems to detect security weakness
Core Security
• Monitoring security alerts, analyzing potential threats, and responding to security incidents
• Investigating cyber incidents, collecting digital evidence, and analyzing data to determine the source and impact of security breaches
• Conducting automated and manual scans to discover known vulnerabilities and misconfigurations
• Conducting vulnerability assessments and recommending security solutions. Identifying potential vulnerabilities in systems, networks, applications, and devices
• Conducting penetration tests to assess the organization's security posture. Conducting all testing within ethical boundaries and legal frameworks, obtaining proper authorization, and adhering to responsible disclosure practices
• Mimicking the tactics, techniques, and procedures (TTPs) used by real-world threat actors
• Designing and overseeing the implementation of secure systems, applications, and networks. Ensuring that security measures are integrated into the architecture
• Collecting, analyzing, and interpreting cyber threat intelligence data to anticipate and respond to potential threats
• Investigating cyber incidents, collecting digital evidence, and analyzing data to determine the source and impact of security breaches
• Reverse-engineering applications to understand their inner workings and potential attack vectors
• Assessing the security of web applications by identifying injection flaws, cross-site scripting (XSS), cross-site request forgery (CSRF), and other vulnerabilities
Campus Hiring Eligibility for students is as listed below:
✓
✓ Must Have Major Specialization inONLY
✓ Must have scored 60% in the last semesterCGPA of 6 on a scale of 10 in the last semester
✓ No Active Backlogs in any of the current or prior semesters
Campus Job Description - Tech
✓ Students should be willing to join any of the roles/skills/segment as per company requirement
✓ Students should be willing to work in any shifts/night shifts as per company requirement
✓ Students should be willing to work in any locations namely – Mumbai, Chennai, Gurugram, Gandhinagar (GIFT), Hyderabad as per company requirement
These jobs might be a good fit