Cryptography Protegrity | 4 to 6 years | Pan India

Bengaluru, TN, IN

Applications have closed

Capgemini

A global leader in consulting, technology services and digital transformation, we offer an array of integrated services combining technology with deep sector expertise.

View all jobs at Capgemini

Job Description

  • Work with clients cross-functional teams to understand application requirements on data protection and application onboarding with Protegrity solution.
  • Onboard applications with Protegrity solution and tokenize their data layer.
  • Understanding the PII data of app for tokenization (i.e., CC number, A/C number etc.)
  • Develop the ruleset in DSG (i.e., service/protocols, groups, extraction, transformation & tunnel etc.)
  • Defining ESA policies and data elements & deploying policies and CoP on DSG
  • Document and verify the tokenization as per the policy
  • Troubleshoot and resolve issues related to Protegrity integration with applications data layer.

Primary Skills

  • Proficient in using Protegrity data security software and understanding its tokenization features.
  • Understand the Application Architecture & Intercept points
  • Strong knowledge of encryption technologies and cryptographic principles.
  • Integrate Protegrity solution data protection capabilities with existing database systems, applications, and platforms.

Secondary Skills

  • Experience with database management and data lifecycle processes
  • Familiarity with various operating systems, such as Windows, Linux, and UNIX.
  • Understanding of network security protocols and data transfer mechanisms

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  10  0  0

Tags: C Cryptography Encryption Linux Network security UNIX Windows

Region: Asia/Pacific
Country: India

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.