- Databricks
- PySpark
- Spark SQL
- Python
- Concepts of Azure Cloud
- Familiarity with Azure DevOps, Azure LogicApp, ADLS, Delta lake/tables
- Spark
- Hadoop
- BigData
· The candidate must have Architecture knowledge of Big data & related concepts. · The candidate must be hands on experienced in Azure Databricks, Pyspark, SparkSQL & Python. · Candidate must be very strong in SQL & PL/SQL. · Candidate should have some familiarity on CRM Concepts. Nice to have idea on Sales Force Marketing Cloud. · Must be familiar with Azure. · Familiarity with Azure DevOps, Azure LogicApp, ADLS, Delta lake/tables · Must have strong communication skills. · Must have good working knowledge of Spark & Hadoop. |
- Enhance existing data pipelines as per business requirements
- Perform Data analysis as needed
- Review code with client leads
- Create jobs to schedule data pipelines as per requirements
- Work with Azure DevOps team for production implementation and release activities
- Post production monitoring of jobs and handle any defects.
- Databricks
- PySpark
- Spark SQL
- Python
- Concepts of Azure Cloud
- Familiarity with Azure DevOps, Azure LogicApp, ADLS, Delta lake/tables
- Spark
- Hadoop
- BigData
· The candidate must have Architecture knowledge of Big data & related concepts. · The candidate must be hands on experienced in Azure Databricks, Pyspark, SparkSQL & Python. · Candidate must be very strong in SQL & PL/SQL. · Nice to have some familiarity on MDM Concepts. · Must be familiar with Azure. · Familiarity with Azure DevOps, Azure LogicApp, ADLS, Delta lake/tables · Must have strong communication skills. · Must have good working knowledge of Spark & Hadoop. |
- Enhance existing data pipelines as per business requirements
- Perform Data analysis as needed
- Review code with client leads
- Create jobs to schedule data pipelines as per requirements
- Work with Azure DevOps team for production implementation and release activities
- Post production monitoring of jobs and handle any defects.
Qualification:
Security Check Point certification is preferred
Job Description:
The Candidate should take care of the day-to-day operations and data structures by overseeing operational performance.
They configure Expertise in Checkpoint Firewall.
The professionals must have an in-depth understanding of the CheckPoint Firewall.
Tasks and Responsibilities:
Plan, implement, and upgrade checkpoint firewalls.
Protect digital files and information systems against unauthorized access, modification, or destruction.
Managing all CheckPoint Firewall related issues.
Plan and document the configuration and verification of routing protocols and their optimization in enterprise networks.
Designing and planning networks are specific to client requirements and industry-standard principles.
Ability to independently troubleshooting and debugging broad, complex, and unique networks solution involving mixed media.
Maintain data and monitor security.
Conduct internal and external security audits.
Manage network, intrusion detection, and prevention systems.
Analyze security breaches to determine their root cause.
Recommend and install appropriate tools and countermeasures.
Define, implement, and maintain corporate security policies.
Security awareness training.
Coordinate security plans with outside vendors.
Technical skills required:
Good experience in the CheckPoint firewall.
Analyze business requirements to develop technical network solutions and their framework.
In-depth knowledge of Checkpoint Firewall and Firewall management systems - Tufin.
Good knowledge on Checkpoint firewall and F5 Load Balancer design/ implementation.
In-depth knowledge on site to site VPN design and build
Develop technology roadmaps.
Develop test plans, implementation plans, and project timelines for various projects.
Write functional requirements/specifications documents.
Upgrade hardware and software components as required.
Solve complex problems with many variables and solutions.
Social engineering – given that humans are the weakest link in the security chain, an analyst’s expertise can help with awareness training.
Forensics – investigation, and analysis of how and why a breach or other compromise occurred.
Troubleshooting – the skill to recognize the cause of a problem.
TCP/IP, computer networking, routing, and switching – an understanding of the fundamentals: the language, protocol, and functioning of the internet.
ISO27001 assessment – specifications for a framework of policies and procedures that include all legal, physical, and technical controls involved in an organization’s risk management.
Cloud computing – the risks and benefits of using a vendor’s remote servers to store, manage and process an organization’s data.
- Candidate must have strong understanding of NSX components and their function of VSphere architecture
- Candidate must have experience with NSX for micro segmentation and distributed, edge firewall architecture and routing
- Candidate must have experience with configure and manage NSX with VMware vSphere web client
- Able to perform troubleshoot the distributed firewall from the VMware ESXi command-line interface (CLI) and distributed firewall from the NSX central CLI
- Candidate must be able to configure both NSX distributed and edge firewalls and migrating applications from V & T environment to NSX firewalling
- Candidate must have background of Windows, VMWare experience worked with Vcenter
- Candidate must have experience with AWS computing who can migrate NSX-V on-prem DFW to NSX-T such as AWS and other physical, cloud environments
- Candidate must have very communications skills to handle calls and bridge meetings.
- Candidate must have very good understanding of rule-base management of utilization for performance improvements.
- Candidate must be able to coordinate with various teams and stakeholders while performing the activities.
- Candidate must have knowledge of ITIL process Change management, Problem Management and Incident management.
- Good understanding of network data flow and OSI/TCP IP model.
- Prepare and present security design and architectural review reports to system owners, business units, and other