Cryptography | 6 to 9 Years | PAN India

Bengaluru, TN, IN

Capgemini

A global leader in consulting, technology services and digital transformation, we offer an array of integrated services combining technology with deep sector expertise.

View company page

Job Description

  • Integrate Cryptography solution with existing database systems, applications, and platforms.
  • Work with clients cross-functional teams to understand application requirements on data protection and plan the cryptography solutions integration.
  • Troubleshoot and resolve issues related to application integration with cryptography solutions.
  • Develop best practice documentation for the onboarding and integration of application on cryptography solutions.

Primary Skills

  • Proficient in using Cryptography solutions and understanding of their features.
  • Strong knowledge of encryption technologies and cryptographic principles.
  • Good understanding and hands-on with KMIP, PKCS#11 and TDE protocols integration
  • Engineer shall have one/ some of the tool hands-on as below:
  1. Protegrity (Application Tokenization)
  2. Fortanix SDKMS (Data Encryption and Key Management)
  3. Thales Vormetric (Data Encryption and Key Management)
  4. Thales CipherTrust Key Management (Data Encryption and Key Management)

Secondary Skills

  • Experience with database management (Oracle, SQL, Postgresql, IBM2 etc.) and data lifecycle processes
  • Familiarity with various operating systems, such as Windows, Linux, and UNIX.
  • Understanding of network security protocols and data transfer mechanisms
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Cryptography Encryption Linux Network security Oracle PostgreSQL SQL UNIX Windows

Region: Asia/Pacific
Country: India
Job stats:  4  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.