Cryptography Protegrity | 4 to 6 years | Pan India
Bengaluru, TN, IN
Applications have closed
Capgemini
A global leader in consulting, technology services and digital transformation, we offer an array of integrated services combining technology with deep sector expertise.Job Description
- Work with clients cross-functional teams to understand application requirements on data protection and application onboarding with Protegrity solution.
- Onboard applications with Protegrity solution and tokenize their data layer.
- Understanding the PII data of app for tokenization (i.e., CC number, A/C number etc.)
- Develop the ruleset in DSG (i.e., service/protocols, groups, extraction, transformation & tunnel etc.)
- Defining ESA policies and data elements & deploying policies and CoP on DSG
- Document and verify the tokenization as per the policy
- Troubleshoot and resolve issues related to Protegrity integration with applications data layer.
Primary Skills
- Proficient in using Protegrity data security software and understanding its tokenization features.
- Understand the Application Architecture & Intercept points
- Strong knowledge of encryption technologies and cryptographic principles.
- Integrate Protegrity solution data protection capabilities with existing database systems, applications, and platforms.
Secondary Skills
- Experience with database management and data lifecycle processes
- Familiarity with various operating systems, such as Windows, Linux, and UNIX.
- Understanding of network security protocols and data transfer mechanisms
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
10
0
0
Tags: C Cryptography Encryption Linux Network security UNIX Windows
Region:
Asia/Pacific
Country:
India
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Product Security Engineer jobs
- Open Senior Cybersecurity Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cloud Security Architect jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Senior Network Security Engineer jobs
- Open Senior Product Security Engineer jobs
- Open Security Specialist jobs
- Open Cyber Security Architect jobs
- Open Security Operations Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Information System Security Officer jobs
- Open Security Consultant jobs
- Open Information Systems Security Officer jobs
- Open Senior Information Security Analyst jobs
- Open Information Security Architect jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Security Architect jobs
- Open CISA-related jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open Analytics-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open GCP-related jobs
- Open ISO 27001-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open DoD-related jobs
- Open DevOps-related jobs
- Open Pentesting-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Vulnerability management-related jobs
- Open Security Clearance-related jobs
- Open Kubernetes-related jobs
- Open SaaS-related jobs
- Open CEH-related jobs
- Open Malware-related jobs
- Open Security assessment-related jobs
- Open SQL-related jobs
- Open PowerShell-related jobs