EXPERIENCED

We help organizations manage information security risks by protecting data, sofware, people and identities

You know your calling, you have decided on your specialization, and have spent time gaining crucial skills and experience. Now you are yearning for more. Consider applying to join one of our functional practice areas.

Our functional practices deliver innovative services to some of the most demanding and discerning clients across the world.

OPEN POSITIONS

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Practice: Security Verification Services

Experience : 8 - 13 Years

Location : Bangalore/ Mumbai/ Middle East

Role Description:

  • Conduct Penetration testing for thin & thick client-based applications.
  • Conduct application security on Manual & Automated assessments.
  • Conduct Secure Code review or Mobile Application Assessment or Network VAPT.
  • Identify and propose work-around for critical defects.
  • Should be able to deal with multiple platforms like Windows, Linux and technologies like Java, .Net
  • Conduct Threat Modeling of Applications
  • Ability to analyze root causes and deliver strategic recommendations during security reviews
  • Conduct Security Code Review, Penetration Testing and Consult Product Development Team to secure Financial and Telecom Applications
  • Being a key team member for delivering complete project life cycles - from capturing Customer requirements to delivering timely solutions to Customers
  • Adhering to best practices, and alignment with the Customer’s security requirements for project execution, documentation, and reporting
  • Interaction with multi-disciplinary teams for timely meeting of key project milestones and checkpoints

Desired Profile:

Sound understanding of all security related fundamentals

Should be familiar with Vulnerability Assessment, Network Penetration testing, Secure code review, Mobile application testing.

Rich script development in Perl/Ruby/Php/Python will be added advantage.

Excellent time management and prioritization skills Understanding of managed services business and the significance of SLAs SOPs, periodic reporting and escalation matrices

Relevant certifications (OSCP/CSSLP/CISSP) will be an added advantage

Strong Communication skills.

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Business Unit : Security Verification Services

Experience : 2.5 - 5 Years

Location : Bangalore, Mumbai, Gurgaon

Desired Profile:

  • Strong work experience in Penetration testing for thin & thick client-based applications, conducting Mobile application assessments (Android, IOS, Windows, Blackberry), manual assessments of mobile application security.
  • Conduct Mobile application assessment (Android, IOS, Windows, Blackberry).
  • Conduct manual assessment of mobile application security.
  • Conduct DAST & SAST of mobile application security.
  • Should be able to deal with multiple platforms like Windows, Linux and technologies like Java, .Net
  • Ability to analyze root causes and deliver strategic recommendations during security reviews
  • Conduct Penetration Testing and Consult Product Development Team to secure Financial and Telecom Applications
  • Being a key team member for delivering complete project life cycles - from capturing Customer requirements to delivering timely solutions to Customers
  • Adhering to best practices, and alignment with the Customer’s security requirements for project execution, documentation, and reporting
  • Interaction with multi-disciplinary teams for timely meeting of key project milestones and checkpoints
  • Sound understanding of all security related fundamentals
  • Should be familiar with Vulnerability Assessment, Penetration testing, Mobile application security testing.
  • Understanding of enterprise security and auditing requirements will be advantageous
  • Should be open to travel

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Skill set : Archer

Experience : 3+ Years

Location : Mumbai (India)

  • 3+ yrs of exp and atleast 2 yrs hands on exp (both front end and back end) on Archer GRC suite.
  • RSA Archer out-of-the-box application and solution implementation
  • On demand application creation for customized reporting/ views
  • Creating customized workspaces using custom object coding , iviews, reports , notification templates.
  • Experience in configuring Data Feed Manager to import data from external sources like HRMS and AD and creating automated business hierarchy,
  • Prepare Functional Specification Document for the client
  • Hands on implementation experience with multiple Archer Solution packages, at-least 4 of them.

Desired Profile:

  • Experience in managing projects and ensuring quality deliverables for large clients.
  • Minimum of 2 full lifecycle implementation of GRC solution with Archer in a complex, multi- location environment
  • Experience in understanding client’s business environment and proposing “fit for purpose” GRC solution
  • Knowledge and implementation/ consulting experience in managing risk and compliance projects
  • Ability to understand client security requirements and conceptualize / design security controls to ensure the cost of protection is commensurate with the value at risk

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Practice: Security Verification Services

Experience : 2 - 4 Years

Position: Analyst

Primary Skill: Application Security assessment, security design & consulting

Role Description:

  • Work independently or as a part of the team or as a project lead to deliver following:
    • Development of application security program, policies, and processes
    • Conduct security assessments and reviews
    • Provide advisory services to development teams to build secure applications
    • Implementation of scanning technologies (e.g. IBM Appscan, HP Fortify, Qualys etc.)
  • Determine the risk profile of the applications by verifying application controls vs information security policy. 
  • Perform analysis of all scans, both standalone and enterprise, and prepare a written report of analysis.
  • Connect and leverage other resources in information security to ensure accurate assessment of security controls as needed.
  • Assist product owners and technology staff with analysis and interpretation of information system vulnerabilities identified and offer necessary consulting help to remediate vulnerabilities
  • Oversee and manage the documentation of flaws into risk registry and track remediation activities.
  • Secure SDLC Advisory and Implementation: Conduct analysis of security controls considered to be implemented through development lifecycle, gap analysis (against standards and benchmarks), recommend security technology / process controls and project manage implementation.
  • Assist in the generation of metrics to drive the continuous improvement program and present current state of security status to management team.
  • Leverage, keep up-to-date on latest trends and develop application security expertise that is required to successfully assess application controls.
  • Support internal practice development initiatives, including: improving tools, templates and techniques used to deliver engagements, conceptualize new services and solutions, development of technical papers and marketing collaterals.
  • Project management of one or more projects to ensure quality deliverables are produced within timelines, scope and cost. Identify, report and manage project risk, including: escalations, scope creeps, resource issues, customer delays, etc.
  • Support firm’s presales activities, such as attending presales calls, response to RFPs, solution engineering & presentations, effort estimation, staffing etc.

Desired Profile:

  • Working knowledge of application security (OWASP, SANS, NIST, CWE, CVSS, OSSTMM etc.) and programming patterns that lead to them, as well as remediation techniques
  • Experience with software security testing (static and dynamic analysis)
  • Familiarity with high level programming languages (i.e. Java, C#, Python, etc.)
  • Familiar with development lifecycles like waterfall, agile etc.
  • Experience in technical security architecture assessment/advisory, including at application, network, and system levels.
  • Understanding UNIX and/or Windows OS, networking technologies and tools and CIS benchmarks
  • Knowledge of using one or more scanning tools and utilities like IBM Appscan, HP WebInspect, HP fortify, Acunetix, Nessus, Nipper, Qualys, Rapid7 Checkmarx, Burp Professional etc.
  • Demonstrable knowledge on Documentation and business reporting.
  • Ability to work independently with minimal direction; self-starter/self-motivated
  • Strong interpersonal and communication skills; ability to work in a team environment
  • Communicates effectively with clients and seeks to understand and anticipate their needs.
  • Continuously finds new solutions to problems and actively shares knowledge with the team.

Qualification & Experience:

  • Relevant (cybersecurity) experience: 2-4 years of full time.
  • Bachelor’s Degree
  • Preferred Certifications – at least one if not more: CEH, ECSA, OSCP, CISSP, CSSLP, CCSP, etc.

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Practice: Risk Advisory Services

Experience : 2-5 years

Position: Information Security Analyst

Primary Skill: IT Risk and Compliance Automation

Role Description:

  • Work independently or as a part of the team to deliver IT Governance, Risk and Compliance (GRC) Automation projects including:
    • Automating compliance assessments for multiple industry standards and regulations, including: ISO27001, ISO22301, NIST 800-53, PCI DSS, SOX 404, SOC2, NYDFS, HIPAA.
    • Automation of risk assessment and treatment.
  • Understand customer requirements and document business requirements.
  • Define the High level & Low-level design document.
  • Install infrastructure for Archer based on best practices and install RSA Archer application.
  • Configure Data Feeds, Workflows, Data Driven Events, Mail Merge, Notifications, Dashboard and Reports.
  • Manage Archer roles & groups, record permissions and provide administer user access.
  • Develop import templates and populate templates with legacy data.
  • Integrate with third party tool with .csv & xml files.
  • Continue to build on cybersecurity knowledge and skills and improve on documentation & presentation skills
  • Support internal practice development initiatives, including: improving tools, templates and techniques used to deliver engagements, conceptualize new services and solutions, development of technical papers and marketing collaterals.

Desired Profile:

  • At a minimum working knowledge of ISO 27001 ISMS development and implementation.
  • Risk assessment and management, including risk modelling, analysis and mitigation.
  • Compliance assessment and security audit experience.
  • API development and working knowledge of ETL.
  • .NET programming skills and knowledge of SQL is preferred.
  • Demonstrable knowledge on Documentation and business reporting.
  • Excellent communication skills, written and spoken. Analytical thinker, detail-oriented.
  • Uses process/policies/standards knowledge and skills to complete complex work.
  • Communicates effectively with clients and seeks to understand and anticipate their needs.
  • Continuously finds new solutions to problems and actively shares knowledge with the team.

Qualification & Experience:

  • Relevant (cybersecurity) experience: 2-5 years of full time.
  • Bachelor’s Degree
  • Preferred Certifications – at least one if not more: ISO27001, ISO22301, RSA Archer Administration.

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Experience : 8 - 10+ Years

Location :Bangalore, Pune(India)

Purpose: The purpose of this role is for managing & delivering large-scale IMS Consulting & Implementation projects. The project(s) scope is to deliver the service as per schedule in coordination between offshore, onsite cross-functional resources & customer within agreed Plan/Schedule, KPIs & customer satisfaction.

Responsibilities: As a Project Manager, the candidate will be responsible for planning, tracking & managing teams/projects spread across the globe and deliver agreed scope commitments. The responsibility includes:

  • Preparation of the project plan/schedules, track schedule and report
  • Precise coordination between Delivery/Consulting leads, offshore, onsite resources and customer
  • Assembles project team, identifies needed resources, assigns responsibilities and develops timeframes to facilitate successful completion of project activities and deliverables.
  • Manage Governance, collate projects status & report at regular intervals
    • Prepare the daily, weekly & monthly status reports and publish as per the schedule
    • Steer/attend daily, weekly & monthly calls and adhoc calls when needed
    • Prepare, track & report schedule and cost variance of project(s)
  • Identification of issues, risks and track till closure or mitigation/resolution
  • Manage onsite/offshore teams across the globe, track the projects status and take appropriate actions in case of any slippages/issues
  • Closely work with Consulting Leads/ DM/DHs across verticals, provide status updates at regular intervals
  • Performs cost/benefit analysis of actions and initiatives

Required Skills: The candidate must be dynamic, committed and capable of preparing/tracking & managing the Project schedules. Should have very good experience in project management especially on Transitions and any other transformation/migration/consulting projects.

  • Over 10+ years of experience in Infrastructure management services (IMS) out of which over 5 years in project management
  • Should have executed large scale IT Infrastructure implementations, migration and or Transitions
  • Demonstrated leadership qualities such as conflict/issue resolution, the ability to run a project or serve as project manager on a program team and can ensure a successful project lifecycle
  • Should have good knowledge on Infrastructure services like Data Centers, Cloud, Virtualization etc.,
  • Very good skills on preparing the schedule/track & manage
  • Should be very good at reporting (Prepare presentations & work on Excel) & Microsoft Project Plan
  • Ability to handle the issues, escalations and resolve on time
  • Very good people management skills & leadership capabilities
  • Very good communication, coordination skills, dedication & commitment
  • Ability to communicate (verbally and in writing) effectively with stakeholders and senior business leaders both internal and customer.
  • Certifications
    • ITIL V3.0
    • PRINCE2/PMP (Preferred)
    • Any other project management certifications

Good Understanding on Key technologies:

  • Windows, Networking, Virtualization, Cloud etc. (IMS knowledge)

Personal Attributes: Candidates must have the following as a mandatory requirement

  • A proactive in nature and able to handle the pressure
  • Excellent written and verbal communication skills
  • Good planning, commitment and time-keeping skills
  • Capable of delivering migration/managed services in a high-pressure environment
  • Ability to take ownership of issues and manage through resolution
  • Should be able to work closely with different team across the globe
  • Good time management organization, inter-personal skills.
  • Strong problem solving & Analytical skills

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Practice: Identity Access and Secure Intelligence Services

Experience : 3-7 Years

Location : United States

Job Description:

Works independently under limited supervision and applies knowledge of subject matter in Applications Development. Possess sufficient knowledge and skills to effectively deal with issues, challenges within field of specialization to develop applications solutions.

Required qualifications to be successful in this role:

  • Primary Skill: Sailpoint/CyberArk/Forgerock Development, Java Development
  • Secondary Skill: Identity & Access Management concepts
  • 3-7 Years of experience in designing and implementing Identity and Access Management systems using SailPoint/CyberArk/Forgerock
  • Very good Java programming skills
  • Should have understanding of Code deployment process
  • Should have exposure in agile projects
  • Required extensive troubleshooting experience to provide L3 Support.
  • Should have good understanding of Identity & Access Management concepts
  • Knowledge on any other IAM tools are added advantage

Education:

  • Bachelor or master’s degree in computer science and Engineering or equivalent

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Practice : Security Verification Services

Experience : 4 - 6 Years

Location : Mumbai, Bangalore

Role Description:

  • Conduct Vulnerability Assessments and Penetration testing for thin & thick client-based applications.
  • Manual security assessments of web applications on thick & thin clients.
  • Conduct application security on Manual & Automated assessments.
  • Conduct Secure Code review or Mobile Application Assessment or Network VAPT (Either of any one skills will be good- Not All are mandate).
  • Ability to analyze root causes and deliver strategic recommendations during security reviews.
  • Being a key team member for delivering complete project life cycles - from capturing Customer requirements to delivering timely solutions to Customers.
  • Adhering to best practices, and alignment with the Customer’s security requirements for project execution, documentation, and reporting.
  • Interaction with multi-disciplinary teams for timely meeting of key project milestones and checkpoints.

Good to Have Skills:

Sound understanding of all security related fundamentals

Should be familiar with Vulnerability Assessment, Penetration testing.

Rich script development in Perl/Ruby/Php/Python will be added advantage.

Relevant certifications (OSCP/CSSLP/CISSP) will be an added advantage

Strong Communication skills.

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Practice: Security Verification Services

Experience : 4 - 6 Years

Location : Bangalore / Mumbai

Role Description:

  • Experience in Cloud Security or IoT security.
  • Strong in Cloud Security or AWS cloud.
  • Experience in VAPT skills.
  • Conduct Penetration testing for thin & thick client-based applications.
  • Manual security assessments of web applications on thick & thin clients.
  • Conduct application security on Manual & Automated assessments.
  • Should be well-versed with security fundamentals.
  • Implementation of cloud technologies experience would be a plus.

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Practice: Security Engineering Services

Experience : 3 - 7 Years

Location : Bangalore (India)

Job Description for Python:

  • Hands on experience of working in Linux environment
  • Strong programming skills in Python and similar scripting experience (Shell/Perl)
  • Familiarity with Web framework/XML/DB/MySQL.

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Practice: Security Engineering Services

Experience : 3 - 8 Years

Location : Bangalore (India)

Role Description:

  1. AWS (EC2,S3,ECS,Cloudwatch,VPC)
  2. Linux Shell scripting, administration.
  3. Ansible, Docker, Rancher
  4. MySQL, MSSQL, Mongo

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Practice: Security Engineering Services

Experience : 8+ Years

Location : Bangalore (India)

Responsibilities:

  • Transform client’s business requirements into tangible technical requirements, design a high-level enterprise wide IT architecture and accountable for all artefacts related to design as per the Systems Development Life Cycle process
  • Define the relationships, flows and implementation of business (processes / functions / activities / information), applications, data and technology in the enterprise and the transitional process necessary for implementing technology in response to changing business needs
  • Design high quality, high performance, scalable architecture and adhere to standards and best practices
  • Participate in project estimation & conduct reviews
  • Lead a development team, work with them to design the applications and conduct code review
  • Identify and escalate issues and, when necessary, pulls appropriate team together to solve issues or challenges
  • Provide technical end user support during the 'go-live' and post go live period
  • Track technology changes and determine the impact of hardware and/or software upgrades on new and existing applications
  • Ensure clients are supremely confident in the technical differentiation and quality of our deliverables
  • Mentor team members and support recruitment activities to hire people for the team

Desired Profile:

  • Post-Graduation or Graduation in Computer Science or Engineering with a reputed university
  • Hands-on technical experience with large-scale software application development and/or SAAS based solution implementations
  • Excellent programming skills, writing algorithms, and architecting solutions
  • 8 + years of experience writing code (such as, and not limited to, Java, Scala, Python, .Net, C#); databases like SqlServer/ Oracle; noSQL systems; big data platforms and Testing tools
  • Strong experience in multiple full release cycles and understanding of modern software development methodologies
  • Excellent understanding of current cloud based software technologies and development practices/tools, including virtual environments, source control, remote development, issue tracking, build and test automation, and networking management
  • Ability to engage sophisticated global clients in deep technical discussions, build confidence in them.
  • Good verbal and written communication skills, ability to work effectively in a team
  • Great love towards the technology, tinkerer and at the same time understand frameworks, standards and design trade-offs.
  • Prior experience in a services industry is desirable, but not mandatory. You should enjoy working with people, and ideally have a knack for numbers. (And we always help you catch up on areas that you may not be rock solid on).

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Practice: Risk Assessment Services

Experience : 3 - 7 Years

Location : Gurgaon

Responsibilities:

  • Attend review meetings, handle escalations, and advise on DLP and InfoSec governance
  • Ensuring 24*7 DLP system uptime to capture all data sharing events, best of the class rules & policies and stringent monitoring of unauthorized data sharing events 
  • DLP incident management
  • Creation/modification of DLP rules/Policies and Alerts as per requirements
  • Removal / reduction of false positives 
  • Continuous fine tuning of policies
  • Resolve all DLP related issues
  • Troubleshoots and coordination with OEM and backend teams
  • Creation of reports and dashboards as per requirements
  • Information security Incident escalation and management as per PRIPL requirements
  • DLP version, patches and other initiatives for system updation/up gradation
  • Recommendation and implementation of proactive measures to enhance accuracy and effectiveness of DLP tool
  • Implementation of advance DLP techniques e.g. (but not limited to) finger printing, VML and other preventive policies 
  • Co-ordination and work with designated employees.
  • Involvement in detailed technical investigations (at desktop/laptop, server, other IT component level)
  • Assist InfoSec manager in evaluation, implementation and compliance monitoring of log management, end point management or other InfoSec tools
  • Adheres to SLA requirements
  • Assist in new InfoSec and related initiatives
  • Involve in other InfoSec and related management, operations, evaluations etc. (e.g. but not limited to log management, identity management, end point compliance, audit activities, investigations, reporting/dashboards)
  • Manages/monitors new InfoSec tools and initiatives implemented

If you are interested in this role please Apply now or send your CV by e-mail

joinus@aujas.com

Practice: Risk Assessment Services

Experience : 2 - 4 Years

Location : Gurgaon

Role Description:

  • Define and review information security policies and processes and conduct Risk Assessments on Processes, Applications, Networks & Systems.
  • As Information security Risk implementer, assess impacts to business from cyber security, legal and regulatory perspective.
  • Work with Project Managers, Business Analysts, Architecture and Support Teams to ensure that Information security and Risk management standards are being followed.
  • Conduct Information security internal audits.
  • Define and assist in security control implementations

Requirements:

  • 4 - 6 + years of relevant experience, Good understanding of Information Risk Management, Audit (internal and external), and Controls.
  • Knowledge and practical experience with frameworks and standards: ISO 27001 Implementation and Management
  • Good understanding of IT security standards and legal compliance aspects.
  • Technical knowledge & relevant experience in security domains /technologies related to:
    • Business Impact Assessment
    • Infrastructure/Network security
  • Knowledge of Data Security Standards/Privacy Principles
  • Ability to interface and network with Business and IT
  • Ability to foresee and identify mitigation strategies for Risks
  • Must:
    • Display excellent communication and influencing skills
    • Be pro-active and self-motivated
    • Display Ability and eagerness to quickly learn new technologies.


APPLY NOW

Connect with us