Zensar logo
Engineer II - Information Security
full-timePune

Summary

Location

Pune

Type

full-time

Explore Jobs

About this role

What's this role about?

 
Here's how you'll contribute:
  
       You'll do this by:

 
       Core Skills:

 
       Desired Skills:

 
How we’d like you to lead:

 
Advantage Zensar
We are a technology consulting and services company with 11, 800+ associates in 33 global locations. More than 130 leading enterprises depend on our expertise to be more disruptive, agile and competitive. We focus on conceptualizing, designing, engineering, marketing, and managing digital products and experiences for high-growth companies looking to disrupt through innovation and velocity.

 
Zensar Technologies is an Equal Employment Opportunity (EEO) and Affirmative Action Employer, encouraging diversity in the workplace. Please be assured that we will consider all qualified applicants fairly, regardless of race, creed, color, ancestry, religion, sex, national origin, citizen status, age, sexual orientation, gender identity, disability, marital status, family medical leave status, or protected veterans’ status.

 
Zensar is a place where you are free to express yourself in an environment that values individuality, nurtures development and is mindful of wellbeing. We put our people and customers at the center of everything that we do. Our core values include: 

 
  • Putting people first
  • Client-centricity
  • Collaboration
Grow. Own. Achieve. Learn. with Zensar: www.youtube.com/watch?v=i2NZsiQqVnU
 

Architect II Job Description

 

What you will be doing

                                                                                                                                                                                   

This is a good fit for you if you are a mid to senior level Information Security or Cyber Security Professional. As an Information Security Architect, you would hold an influential role. Your key responsibility would be to enhance the security of applications and systems. You would also play a pivotal role in reducing the likelihood of coding, design or configuration vulnerabilities affecting production environments, thereby mitigating potential security risks. Your responsibilities will include collaborating with business and technical resources, reviewing project documentation, and referencing security policy to offer recommendations and guidance. You will also have the authority to approve or reject project artifacts from a security perspective, ensuring the highest level of security for the organization's systems, processes, and software applications. Responsibilities will include:

 

 

 

  • Defining security requirements by evaluating business strategies and requirements; researching information security standards
  • Providing consulting services and security support to internal business and technology customers
  • Serving as the lead security liaison on assigned projects.
  • Providing input and recommendations to the development teams related to architecture, design, coding practices and SDLC elements that could potentially impact the application or solution from a security perspective.
  • Validating controls for Encryption, Access Control, Web Application Vulnerability Detection, OWASP top 10 and other common web application security parameters.
  • Reviewing application architecture and design from an application security and information security perspective ensuring alignment with organization security standards and industry best practices.
  • Serving as a subject matter expert (SME) for performing vendor risk assessments (including Cloud Services) to improve overall vendor risk program.
  • Assisting with the development of secure coding standards
  • Providing technical expertise on secure software development and support of all associated activities, processes, and tools for protecting technology-based information
  • Ensuring that development is done in accordance with industry standards for secure development
  • Facilitating Periodic static code analysis utilizing existing standard service offering.
  • Facilitating dynamic and/or manual security testing utilizing existing standard service offering
  • Reviewing, developing, testing, and implementing security plans, products, and control techniques
  • Reviewing circumstances surrounding security gaps in and designs corrective actions
  • Maintaining awareness of security and technology trends and shares that knowledge with others
  • Evangelizing security policies, standards, and nonfunctional requirements where/when needed
  • Daily and Weekly Status Reporting - for Work in Process and Planned and issues
  • Documenting processes, procedures, assessment outputs, working papers documentation to support existing SDLC and governance requirements
  • Representing security and IT risks among other company risk departments and committees.
  • Evaluating the effectiveness of awareness and training programs and makes recommendations for improvement.
  • Mentoring less-experienced team members and collaborating across Information Technology

What your background should look like 

  • Bachelor's Degree in Computer Science, Information Systems or other related field, or equivalent work experience
  • 10-15 years of combined IT and security work experience with a broad range of exposure to systems analysis, application development, systems administration and over five years of experience designing and deploying security for Business products and services and Enterprise solutions at the enterprise level.
  • Preferred Certification in one or more Information Security relevant areas such as Audit (CISA), Security Management (CISM), Security Professional (CISSP), Cloud Security (CCSP, CCSK, AZ500
  • Requires in-depth knowledge of security issues, techniques and implications across all existing computer platforms.
  • Experience with evaluating and implementing security controls as related to Cloud based services including SaaS, PaaS, IaaS.
  • Strong computer skills to operate effectively with company systems and programs; working knowledge of applicable computer applications used at ABC
  • Working knowledge of network solutions and systems
  • Good analytical and problem-solving skills
  • Ability to communicate effectively both orally and in writing
  • Good interpersonal skills
  • Ability to prioritize workload and consistently meet deadlines
  • Strong organizational skills; attention to detail
  • Ability to lead and provide direction to project/product teams
  • Strong consultative skills: ability to interface effectively with technical and non-technical leaders.
  • Understands Information Security as it relates to the business and other areas of IT; understands direct impacts and risks.
  • Demonstrated sound understanding of at least 3 of the following control frameworks such as ISO 27001/27002, HITRUST, PCI, NIST, GDPR and PCI
  • Business experience in a matrix Organization required

 

 

 

 

 

Other facts

Tech stack
Information Security,Cyber Security,Application Security,Risk Assessment,Secure Coding,Cloud Security,Vendor Risk Management,Security Standards,Analytical Skills,Problem-Solving,Communication Skills,Interpersonal Skills,Organizational Skills,Consultative Skills,Security Policies,SDLC

About Zensar

Zensar stands out as a premier technology consulting and services company, embracing an ‘experience-led everything’ philosophy. We are creators, thinkers, and problem solvers passionate about designing digital experiences that are engineered into scale-ready products, services, and solutions to deliver superior engagement to high-growth companies. This full lifecycle capability – from experience to engineering to engagement – is what makes us unique. This integrated approach also means that we harness the power of technology, creativity, and insight to deliver impact — ensuring our work focuses not just on technology but also on the people who use it.

Part of the $4.4 billion RPG Group, Zensar is headquartered in Pune, India. Our 10,000+ employees work across 30+ locations worldwide, including Seattle, Princeton, Cape Town, London, Singapore, and Mexico City. As an organization, we are diverse and multi-dimensional and unite across geographies and skill sets to deliver products and services that are value-driven, environmentally conscious, and human-centered.

To know more, visit us at www.zensar.com.

Team size: 10,001+ employees
LinkedIn: Visit
Industry: IT Services and IT Consulting
Founding Year: 2001

What you'll do

  • The Engineer II - Information Security will enhance the security of applications and systems while collaborating with business and technical resources. Responsibilities include defining security requirements, providing consulting services, and reviewing project documentation to ensure alignment with security standards.

Ready to join Zensar?

Take the next step in your career journey

Frequently Asked Questions

What does a Engineer II - Information Security do at Zensar?

As a Engineer II - Information Security at Zensar, you will: the Engineer II - Information Security will enhance the security of applications and systems while collaborating with business and technical resources. Responsibilities include defining security requirements, providing consulting services, and reviewing project documentation to ensure alignment with security standards..

Why join Zensar as a Engineer II - Information Security?

Zensar is a leading IT Services and IT Consulting company.

Is the Engineer II - Information Security position at Zensar remote?

The Engineer II - Information Security position at Zensar is based in Pune, India. Contact the company through Clera for specific work arrangement details.

How do I apply for the Engineer II - Information Security position at Zensar?

You can apply for the Engineer II - Information Security position at Zensar directly through Clera. Click the "Apply Now" button above to start your application. Clera's AI-powered platform will help match your profile with this opportunity and guide you through the application process. You can also learn more about Zensar on their website.