Job Openings

Total number of job openings - 10
Job TitleLocationLast Date for ApplyingAction
J1092 : Dev Ops Engineer with 4+ yrs experience Hyderabad - CV Heights 15-07-2024 Review
J1063 : TRO Cyber Security Specialist - DB Security Hyderabad - CV Heights 31-07-2024 Review
J1059 : Cybersecurity - Sr. Specialist Hyderabad - CV Heights 09-08-2024 Review
J1029 : Cybersecurity Advisor - NetSec Hyderabad - CV Heights 22-07-2024 Review
J1028 : Cyber Security - Specialist Hyderabad - CV Heights 22-07-2024 Review
J1012 : Senior Manager Training - Revenue Cycle Management Hyderabad - CV Heights 31-08-2024 Review
J0965 : Cyber Security Specialist TRO GRC(ERM) Hyderabad - CV Heights 31-07-2024 Review
J0927 : Cyber Security Specialist TRO Threat Intelligence Hyderabad - Melange Tower 31-07-2024 Review
J0505 : TRO SAPT Cybersecurity Specialist Hyderabad - Melange Tower 31-07-2024 Review
J0491 : Cybersecurity Advisor Hyderabad - Melange Tower 31-07-2024 Review
No Of Rows :1
J1092 : Dev Ops Engineer with 4+ yrs experience
Dev Ops Engineer with minimum 4 yrs exp.
Required Skills:
Docker Image
CI/CD Pipelines

J1063 : TRO Cyber Security Specialist - DB Security
Position: Cyber Security Specialist - DB Security
• Bachelor’s or Master’s degree in any discipline
• Good English Communication Skills (Verbal/Written)
• Demonstrated problem solving, critical thinking and logical structuring skills
• Willingness to work in Night Shifts (US Business Hours)
Experience: • Experience 5 to 7 years
• Good knowledge on Databases and it’s architecture.
• Demonstrated experience with Trellix/McAfee ePO in the areas of DB Sec server installation, policy management and DAM sensor deployment.
• Design and configure DAM custom rules and DVM scans as per the latest threats related to DB Security
• Fine tune DB Sec rules to eliminate the false positives.
• Strong troubleshooting skills on DB Sec technology
• Understanding of key industry and regulatory requirements such as PCI, HIPAA, NIST Cyber Security Framework and SOX etc.
• Liaise with stakeholders and ensure to remediate DB vulnerabilities on-time.
• Experience in training Junior associates and guide them to work on priority activities.
• Flexible to embrace change and quickly adapt to new situations, changes in direction, and altering priorities
• Scripting using Python/PowerShell is added advantage.
• Knowledge on DLP, AD, LDAP and Unix/Linux is a value add.
• Candidates with Information Security Courses/Certifications are preferred.

J1059 : Cybersecurity - Sr. Specialist
The Cybersecurity Specialist is responsible for the Incident Response Activity. This role will help develop innovative and effective procedures for the Security Operations Center to enhance response time, coordination, and incident response operations, and built a world class team of Cyber Security Incident Response. Train staff on security operations concepts, develop incident response management process, write correlations, and integrate intelligence data into monitoring and operations activities

J1029 : Cybersecurity Advisor - NetSec
The Cybersecurity Specialist will work supporting projects focused on security remediation at second level. To utilize technical expertise related to security issues and initiatives in the areas of network security operations, development, and deployment. Investigate and troubleshoot all phases of network security issues which include, but are not limited to Firewalls, IDS, IPS, Proxies, and Routers to ensure the security of networks.

J1028 : Cyber Security - Specialist
Require Cybersecurity Specialist for SOC.
• 9+ years of experience in Security Operations Center and Incident Response (LogRhythm SIEM exp)
• The successful applicant must possess one or more current, applicable professional/technical certifications, such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Security Compliance Specialist (CSCS), Certified Information Privacy Professional (CIPP), Certified Information Systems Security Professional (CISSP), Certified Internal Auditor (CIA), GPEN, GWAPT, SANS GCFA/GCFE/GSEC/GCIA/GCIH/GREM/GNFA, EnCE, CHFI, CEH, ECIH
• Hands-on experience with configurations and management of SIEM tools (Qadar/MS Sentinel/Splunk) including log source integrations, custom parser built, fine tuning and optimizing the correlation rules and use cases recommendations Is MUST.
• Knowledge of Cyber Security management practices, network, and application vulnerability assessments, change control, business continuity planning, data privacy, and risk assessment practices
• Experience with network packets/traffic analysis using tools like Wireshark, tcpdump, Zeek, tshark, SiLK, etc.
• Experience hunting threats using SIEM and other detection platforms
• Proficiency with Windows and *nix OS platforms
• Experience in Incident Investigation and reporting relevant facts.
• Data-driven threat hunting using SIEM and other threat hunting tools
• Recognize successful intrusions and compromises through review and analysis of relevant event detail information.
• Review incidents escalated by Level 1 analysts.
• Launch and track investigations to resolution. Recognize attacks based on their signatures, differentiates false positives from true intrusion attempts.
• Actively investigates the latest in security vulnerabilities, advisories, incidents, and penetration techniques and notifies end users when appropriate.
• Experience with basic static and dynamic/behavioral malware analysis. Advanced static and dynamic analysis experience would be a plus.
• Scripting skills are a plus
• Knowledge of TCP/IP communications and how common protocols (SMTP, HTTP, POP3, IMAP, etc.) and applications work at the network
• Ability to demonstrate analytical expertise, close attention to detail, excellent critical thinking, logic, and solution orientation and to learn and adapt quickly

J1012 : Senior Manager Training - Revenue Cycle Management
The position is responsible for developing, implementing, and overseeing comprehensive training programs for the RCM vertical at PrimEra. Senior Manager - Training ensures that all staff are equipped with the knowledge and skills necessary to optimize revenue cycle processes, enhance productivity, and maintain compliance with industry standards and regulations.
Key Responsibilities:
Design and develop comprehensive training programs, program handbook, and training delivery materials for all levels of RCM staff, including new hires and upskilling programs for existing staff.
Ensure training programs cover all aspects of the revenue cycle, considering Patient, Provide and Payer process lifecycles.
Conduct training sessions using various methods, including in-person workshops, online, e-learning, and one-on-one coaching.
Coordinate with all department managers to schedule training sessions and ensure minimal disruption to daily operations.
Regularly update training materials to reflect changes in industry regulations, technology, and best practices.
Develop assessment tools to measure pre& post training effectiveness and knowledge retention.
Collaborate with department managers to develop training plans based on performance metrics and skill gaps, identify areas where additional training or support is needed.
Ensure all training programs comply with healthcare regulations, including HIPAA, CMS guidelines, and payer-specific requirements.
Stay current with industry trends, regulatory changes, and advancements in RCM technology.
Lead and mentor a team of RCM trainers, foster a culture of continuous improvement and professional development within team.
Coach the trainers on improvement areas, monitor the progress and provide constructive feedback during the OJT phase.
Work closely with other departments, such HR, Compliance and IT, to align training initiatives with organizational goals.
Communicate effectively and prepare various reports on training outcomes and recommend improvements.

Bachelor/Master’s degree with minimum 15 years of experience in revenue cycle management within a healthcare setting.
7-10 years of experience in RCM training
Proven experience in developing and delivering training programs.
Previous management or supervisory experience required.
In-depth knowledge of revenue cycle processes and best practices. Strong knowledge on Hospital Billing terminologies.
Expertise in Contracts Reimbursement methodologies.
Must have experience in transition handling.
Excellent presentation and communication skills.
Strong analytical and problem-solving abilities.
Proficiency with RCM software, e-learning platforms and Microsoft office.
Ability to manage multiple projects and priorities simultaneously.
Excellent time management also flexibility with shift timings.
Relevant certifications such as Certified Revenue Cycle Professional (CRCP) or similar are highly desirable.

J0965 : Cyber Security Specialist TRO GRC(ERM)
Experience, education, skills, licensure, or training required:
The Cybersecurity Specialist must be self-motivated, be a great team player that values results, professional, and is well-rounded technically. Should be able to conduct guide and conduct audit across cybersecurity frame works ISO 27001, CMMC, CMMI, FAIR (factor analysis of information risk). Ability to conduct risk assessments and audits to support the above framework. Work with all areas of business units, IT departments, third parties providing guidance for areas of process improvement surrounding policy, procedures, and standards for above frameworks.
• Interface with team members, departments, and outside associates. Can work directly with all levels of management and other corporate team members in person as needed.
• Work with all levels of user, and management level, while being able to understand business needs and communicate necessary IT Security and compliance requirements and needs.
• Have an extensive knowledge of development of enterprise level policies, standards and procedures and the ability to determine what is needed and communicate it in a professional manner in writing.
• learn to analyze software, networks, and scan data to identify vulnerabilities to support compliance requirements.
• Assist with and implement process improvement to support IT Security, IT and GRC requirements to support Risk and Compliance Audits.
• Oversee, develop, and provide guidance where needed for compliance requirement programs, Risk Assessments, and audits.
• Prior experience defining risk management framework and leading implementation.
• Needs to understand common risk management frameworks and risk assessment approaches.
• Identifies key risks in business units, Sites & actions to mitigates these risks.
• Identifies operational control weaknesses.
• Has rolled out risk management across business units periodically
• Monitored remediation programs, ensuring root causes of operational risk issues
• Review and develop risk policies in accordance
Education: Graduate/postgraduate any discipline. Certification in CISA, Auditor certification in ISO27001, CMMI, CMMC
Experience: Candidate must have 5-6 years’ experience managing enterprise level Security Audit and Compliance and/or Risk Management programs with successful results. This person must communicate well at the management and above, both verbally and in writing, while balancing the business needs and security requirements. Experience working in the “Big-Four Auditing Firms”, or other Risk management preferred.

J0927 : Cyber Security Specialist TRO Threat Intelligence
Experience, education, skills, licensure, or training required:
Threat intelligence
• Key member of the first line of defense threat intelligence team
• Collect, process, and analyze threat information
• Manage the relationship with any external providers of threat intelligence
• Communicate threat intelligence to relevant stakeholders to support evidence-based decision making
• Support the firm’s mission to build client trust and confidence regarding information security generally and threat intelligence specifically
• Stay abreast of industry best practices in relation to threat intelligence
• Knowledge of threat intelligence sources and analysis methodologies preferred
• Knowledge of information security standards (e.g., Cyber Essentials, ISF Standard of Good Practice for Information Security, ISO 27001, NIST Cybersecurity Framework, CIS Top 20 Controls)
• Maintain awareness of the cyber threat landscape and leverage automation to build better detection capabilities
• Analyze and validate the feasibility of exploits and their impact to Prime based on the difficulty of development/exploitation
• Recommend patching priorities and timelines based on proof of concepts (POCs), exploits, and the Nike threat landscape
• Identify, develop, and maintain access to non-standard intel sources
• Bachelor s degree in Information Technology, Information Security/Assurance, Engineering, or related field of study
• Have 6-9years of Cyber Threat Intelligence experience
Experience in and understanding cyber threat modeling (eg, STRIDE) to identify potential threats
• Experience in intelligence frameworks and collaboration platforms (MITRE ATTCK, CAPEC, MISP, Malpedia, STIX)
• Expertise in honeypots/honeynets, canaries, and other active deception tools to identify network attacks
• Intimate knowledge about information security threat intelligence and thrive on the details of threat analysis, what’s possible and what’s not, how to determine what’s relevant
• Excellent written and verbal communication skills required, communicate details in a clear, business relevant manner.
• Experienced in threat validation, incident response
• Working level knowledge of the following: Python, C, C , Assembly language (ASM)
• Comfortable creating YARA rules for hunting purposes
• Has connections within the cyber threat intelligence community, Customer-oriented focus.
• Take pride in being diligent and self-driven, ethics and ability to manage sensitive material are unquestionable

J0505 : TRO SAPT Cybersecurity Specialist
Experience, education, skills, licensure or training required: -->
This individual should have extensive experience across the attack lifecycle and a demonstrated capacity to lead, design, and execute a penetration test against various technologies and stacks. Candidates are expected to scope, prepare and deliver technology-oriented assessments that positively benefit the overall security posture of the organization. This role requires a desire to help drive fixes after testing cycles, both as short-term mitigations and long-term improvements.
• Graduate in Computer Science, Electronics or any relevant field.
• Demonstrable and relevant experience in the areas of Security Assessment and Pen Testing - > 6-9+ years – Must be a hands-on practitioner
• Must have and well versed with Secure Web Application and Network Security Testing. Reasonable working knowledge of Secure Code Review & Architecture and Mobile App Testing. Intermediate Python or any scripting skills will be helpful.
• Well versed with using tools like Checkmarx, Burp Suite, Aircrack, Fortify, IBM App Scanner, Nessus etc.
• References of work done and made available in GitHub (if any) , publications , blogs if any .
• Professional Certifications in the areas of Pen Testing – OSCP , OSWE ,GPEN GXPN , LPT , eCPTX for e.g.
• Independent, quick learner, coachable and willing to go the extra mile.
• Good communication skills backed up by a positive attitude.
• Experience running internal , external pen tests , has knowledge on red teaming , running tabletop exercises
• Conduct penetration tests focused on both the unique systems and technologies used at Prime Healthcare, as well as approved third party software and vendors
• Design, scope, and lead deep security assessments on internal and external facing systems including but not limited to iot systems , wireless systems , infrastructure systems.
• Experience in at least one of PHP/Hack, Python, C/C++, Go , Java or .NET
• Experience translating technical concepts into language that is understood to audiences including software engineers, business and technical leaders
• Experience performing and leading whitebox and blackbox style assessments
• Experience with complex, multi-stage, multi-person pentests for new internal teams or external vendors
• Networking knowledge, including network virtualization technologies and ideally IPv6

J0491 : Cybersecurity Advisor
5-7 yrs direct experience with Tenable Security Center, demonstrated experience with conducting vulnerability assessments for large enterprise healthcare environments, experience with enterprise software fleet management operations using ITIL/ITSM fundamentals & service desk ticketing system, advanced understanding of patch management, advanced understanding of system hardening, capable of understanding recommended security guidance & baselines from OS & application vendors & transforming into security posture audits, ability to create and modify detailed reporting and dashboards for analytics, must be comfortable working with customers regularly and an excellent written & verbal communicator.

No Of Rows :1


By continuing to browse this site, you are consenting to the use of cookies for providing you optimum site performance, best user experience and tracking usage of our website to improve our product & services offerings.

Your device is connected to the internet.
Your device lost its internet connection.