WE ARE
HIRING
JOIN OUR IT TEAM
RECRUITMENT PROCESS OF IT OFFICERS (SCALE I)
Federal Bank, one of the top private sector Banks in the country is excited to announce opportunities for
freshers and experienced individuals to join our IT Team.
We are on the lookout for dynamic individuals who are eager to build a rewarding career in Banking and
contribute to our vision of being the Most Admired Bank. Interested candidates are advised to apply
online through the ‘Careers’ page of Bank’s website (www.federalbank.co.in/career) after carefully
going through the eligibility criteria and instructions detailed in this notification.
1
1 IMPORTANT DATES
Date of Notification 19.02.2025
Last Date of Application 26.02.2025
2 ROLES IDENTIFIED
The recruitment process will focus on filling the following roles in the IT Domain of the Bank.
AI-IS Architect Android Developer Application Architect Business Analyst (IT)
Data Scientist-AI/
Cloud Architect Cloud Developer DevOps Engineer
ML Engineer
Information
iOS Developer IT GRC Analyst Java Developer
Security Engineer
Network Engineer
L1/L2/L3 and Oracle SQL & Power Platform
.NET Developer PostgreSQL Developer Developer
Network Operations
Project Delivery Project RPA UiPath
RPA Developer
Manager Manager-Banking IT Admin Expert
System Administrator
SOC Analyst - Incident SOC Analyst - Threat - Cloud/OS/Application/ System Analyst
Management Hunting VMware/NAC/ (DPDP)
AD & Exchange
System Analyst (IT) Testing Engineer WSO2 Kafka Developer
Detailed job descriptions of the above-mentioned roles are provided in the Annexure. Candidates are expected to
review the Annexure thoroughly to understand the specific requirements for each role.
2
3 WHO CAN APPLY (AS ON 01.02.2025)
Freshers Category
1. Minimum Educational Qualification - M.Tech / M.E / M.Sc (CS or IT) / MCA from a University incorporated by
an Act of the Central or State legislature in India or other Educational Institutions established by an Act of
Parliament or declared to be Deemed as a University under Section 3 of UGC Act, 1956, or possess an
equivalent qualification recognized by the Ministry of HRD, Government of India or approved by AICTE.
2. Academic Performance - Minimum aggregate of 60% throughout in Class X, Class XII, Graduation and
Post-Graduation.
3. Age - Candidates shall not exceed 27 years (should be born on or after 01.02.1998).
4. Nationality - Candidates shall be citizens of India.
Experienced Category
1. Post Qualification Work Experience – Minimum 1 year of post qualification work experience in IT domain.
2. Minimum Educational Qualification – B.Tech / B.E from a University incorporated by an Act of the Central or
State legislature in India or other Educational Institutions established by an Act of Parliament or declared to
be Deemed as a University under Section 3 of UGC Act, 1956, or possess an equivalent qualification
recognized by the Ministry of HRD, Government of India or approved by AICTE.
3. Academic Performance - Minimum aggregate of 50% throughout in Class X, Class XII and Graduation.
4. Age - Candidates shall not exceed 30 years (should be born on or after 01.02.1995).
5. Nationality - Candidates shall be citizens of India.
Candidates should submit only one application based on their qualification and experience.
Note:
3.1 Equivalence Certificate from a Competent Authority in India shall be submitted for qualifications obtained
from Foreign Educational Institutions/Universities.
3.2 The aggregate percentage obtained by a candidate would be ascertained based on the practice followed by
the Board / University / Institution. In case of candidates awarded with Grades / CGPA or any other metrics
system, percentage should be arrived based on the equivalence certified by the Board / University /
Institution.
3.3 The minimum aggregate percentage prescribed for any of the examinations is not allowed to be
rounded off.
3.4 Bank reserves the right to raise / modify the minimum eligibility standard/ other norms etc. to restrict the
number of candidates to be included in the selection process.
4 COST TO COMPANY
The cost to company per annum would be a minimum of ₹12.54 Lakh and maximum of ₹16.64 Lakh depending
upon the place of posting and other factors.
3
5 LOCATION
Candidates who are selected shall be initially posted to various roles of IT domain of the Bank at Bangalore,
Ernakulam or Mumbai locations and are liable to be redeployed to any of the Branches / Offices of the Bank across
India depending upon the administrative requirements.
6 PERIOD ON PROBATION
Candidates selected in Freshers category will be on probation for a period of 2 years and those candidates selected
in Experienced category will be on probation for a period of 1 year.
7 SELECTION ROUNDS
7.1 Selection rounds for the recruitment process will be Application Shortlisting & Personal Interview or any
other mode of selection as decided by the Bank.
7.2 Every selection round will be an elimination stage.
7.3 Bank reserves the right to shortlist only the requisite number of candidates in the selection rounds based on
the administrative requirements.
7.4 Personal Interview will be conducted across various interview centers in offline mode unless otherwise
decided by the Bank. The mode of the selection process will be depending upon the prevailing situations /
number of candidates / discretion of the Bank.
7.5 Marks / Ratings secured by the candidates during any of the selection rounds will be confidential and the
same will not be disclosed at any point of time.
7.6 Decision of the Bank with respect to the qualifying criteria in each selection round will be final and binding on
the candidates and the same will not be disclosed to anyone, including the candidates, at any point of time.
8 VENUES FOR PERSONAL INTERVIEW
Bank proposes to conduct the Personal Interview rounds at the following centers:
Bangalore Chennai Delhi Ernakulam Kolkata Mumbai
Bank reserves the right to add / delete / modify the Interview centers and to allot the candidate any of the
centers other than the one opted.
4
9 HOW TO APPLY
Eligible candidates are advised to apply online between 19.02.2025 and 26.02.2025 (both days inclusive) after
carefully going through the relevant instructions.
To submit applications online, visit the Bank’s website www.federalbank.co.in, follow the link ‘Careers’, and click
on the link ‘Recruitment Process of IT Officers (Scale I)’. Read the notification, eligibility criteria and the
instructions carefully. Now click on applicable ‘Apply Now’ button. Applicants will be redirected to the
registration portal and the following steps shall be taken to complete the registration process.
9.1 Enter your valid mobile number, E-mail ID and set your Password. The Password should contain minimum
8 characters with at least 1 digit, 1 alphabet and 1 special character. This will be your registered mobile
number, E-mail ID and password throughout the process. Click the ‘Send OTP’ button and you will receive
OTPs in your mobile & E-mail. Enter both OTPs in the screen and click ‘Verify’ button.
9.2 Enter your Personal, Academic, Experience (if any) and other details as required. Candidates shall fill all the
fields in the registration portal correctly.
9.3 Preferred Role 1, 2 & 3 shall be selected based on your experience and preference in the identified roles.
The Bank reserves the right to consider the candidates for any other role deemed suitable other than the
given preferred roles based on the administrative requirements.
9.4 Modify details, if required, and click on 'I Agree' in declaration tab only after verifying the details entered
by you. Candidates are advised to carefully verify the details filled in the registration portal themselves
as no change will be possible / entertained after clicking the 'I Agree' button.
9.5 Candidates can proceed to upload their Photo & Signature as per the required specifications. Refer the
guidelines for scanning and uploading of Photograph and Signature for more details.
9.6 Candidates applying under Experienced category must upload their latest resume in PDF format
(file size should be less than 2 MB) to complete the registration process.
9.7 Personal Data Form (as per the details entered in the registration portal) will be sent to the registered
E-mail id of the candidate for information / reference.
9.8 Upon completion of the registration formalities, please promptly verify the status of your application by
checking the automated E-mail sent to your registered E-mail address.
10 GENERAL INSTRUCTIONS
10.1 Candidates should ensure that they are eligible to participate in the selection process as per the eligibility
criteria stipulated by the Bank. If at any stage it is found that a candidate is ineligible, his/her candidature
is liable to be cancelled at any stage, without notice and/ or compensation.
10.2 Candidates applying for the selection process should not have any criminal record.
10.3 Bank takes no responsibility for any delay in online registration or communications.
10.4 No vendor, agency or individual has been authorized to charge any fees for the selection process.
5
10.5 The Bank reserves the right to close the application window at any time before the cut-off date, i.e.,
26.02.2025, based on the volume of applications received, if the required threshold is met. Therefore,
candidates are advised to submit their applications at the earliest opportunity to participate in the
selection process.
10.6 Federal Bank reserves the right to make any changes to the selection process at their discretion.
10.7 Request for change of date or time for any selection stage/s are not entertained.
10.8 Candidates are advised not to change their facial appearance from that on the Photograph submitted to the
Bank till the selection process is complete.
10.9 For those selection stages which are conducted offline, candidates have to bear the expenses to attend the
stages at the stipulated date and time.
10.10 Candidates are invariably required to produce the supporting documents/ certificates in proof of their
eligibility (Age, Educational Qualification, Work Experience, Nationality etc.). Candidates not producing the
required documents within the stipulated timeline will be eliminated from the selection process without
any notice and/ or compensation.
10.11 Candidates who fail to appear in any of the selection round or get disconnected during selection round
owing to technical or other reasons whatsoever, will not be permitted to revisit the same. Also, the request
for a rescheduled timing for that particular round or selection process as a whole will not be considered.
10.12 Bank has the right to reject any application/ candidature during the Application Shortlisting round and
Personal Interview or at any stage without assigning any reason and the decision of the Bank shall be final.
10.13 Decisions of the bank in all matters regarding eligibility of the candidates, the stage at which such scrutiny
of eligibility is to be undertaken, the documents to be produced at various stages of the selection process
and any other matters relating to the selection process will be final and binding on the candidates.
No correspondence or personal enquiries will be entertained by the bank in this regard.
10.14 Recording or sharing the content / details of any selection rounds of the recruitment process privately or
on social media handles is strictly prohibited. Any candidate engaged in such activities will be disqualified
and the candidate will be debarred from participating in future recruitment processes of the Bank.
10.15 If a candidate is found guilty of any unfair means at any stage, he/she will be disqualified from the
selection process. In case any such instances are detected at any stage of the recruitment process, even
after appointment, employment of such candidates are liable to be terminated
10.16 Onboarding of the shortlisted candidates will be subject to his / her being declared medically fit by the
Bank’s Medical Officer, satisfactory report about his / her character and antecedents by the Police
Authorities, Credit History including CIBIL / Experian scores and status, satisfactory references from
respectable referees, verification of certificates and completion of all other formalities to the complete
satisfaction of the Bank.
10.17 Any canvassing by or on behalf of the candidates or to bring political or other influence with regard to their
selection shall be considered as DISQUALIFICATION.
10.18 For any clarifications, candidates may reach us through careers@federalbank.co.in
6
ANNEXURE
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• AI Security Architecture Design: Design
and implement secure AI systems and
infrastructure that align with
organizational security standards,
policies, and business objectives. • Expertise in AI technologies, machine
learning, and data science, with a strong
• Risk Assessment & Management: understanding of model development,
Responsible for designing Conduct security assessments and deployment, and monitoring.
and implementing security threat modeling for AI systems and data
frameworks and strategies used in machine learning and AI • Proficiency in cybersecurity principles,
that protect artificial applications. tools, and techniques, with specific
intelligence (AI) systems and experience in securing AI systems,
their underlying information • Security of AI Data & Models: Ensure the models, and data pipelines.
systems. This role blends security and privacy of AI training data,
expertise in both AI particularly when handling sensitive or • Experience with security protocols and
AI - IS technologies and information personally identifiable information (PII). encryption technologies to protect AI
Architect security to ensure the safe data and models (e.g., TLS, AES
deployment, operation, and • Model Integrity & Protection: Develop encryption, secure access controls).
scalability of AI models and strategies to protect AI models from
applications. The being compromised or tampered with, • Familiarity with adversarial AI
AI-Information Security such as defending against adversarial techniques and how to defend against
Architect ensures that AI machine learning attacks. common AI-related vulnerabilities, such
solutions are secure, as model poisoning, data leakage, and
resilient to attacks, and • Compliance & Governance: Ensure AI evasion attacks.
compliant with relevant and machine learning systems comply
data protection and privacy with relevant data protection • Knowledge of cloud security practices,
regulations. regulations (e.g., GDPR, CCPA, HIPAA) especially in securing AI solutions
and industry standards. deployed in cloud environments (e.g.,
AWS, Azure, Google Cloud).
• Incident Detection & Response:
Establish systems for monitoring AI
systems and applications for suspicious
activities, potential attacks, or data
breaches.
• App Development: Design, develop,
test, and maintain Android applications
using Java, Kotlin, and Android SDK.
• UI/UX Implementation: Collaborate • Experience with Jetpack libraries (e.g.,
with designers to implement intuitive, LiveData, ViewModel, Room,
Responsible for building
responsive, and aesthetically pleasing Navigation).
and maintaining Android
user interfaces that align with Android's
applications, proficient in
design principles. • Familiarity with MVVM architecture and
Java and Kotlin, and
possess a passion for dependency injection libraries like
• App Performance: Optimize app Dagger or Hilt.
delivering seamless,
performance, ensuring smooth UI/UX,
Android high-quality user
efficient memory use, and fast load • Experience with Android-specific tools
Developer experiences on mobile
times on various devices. like Firebase, Crashlytics, or Analytics.
devices. Responsible for
developing new features,
• API Integration: Integrate third-party • Familiarity with unit testing and UI
enhancing app
APIs and services, ensuring seamless testing frameworks for Android.
performance, and ensuring
data exchange between the app and
apps are built to scale and
back-end systems. • Knowledge of Android NDK (Native
perform on a wide range of
Android devices. Development Kit) for building
• Bug Fixing & Maintenance: Identify and performance-critical components.
fix bugs, address issues reported by
users, and maintain apps through
regular updates and enhancements.
7
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• Architectural Design & Strategy: Lead
the design and architecture of scalable,
high-performance, and secure • Proficiency in application architecture
applications. patterns such as MVC, microservices,
layered architecture, and event-driven
Responsible for defining
•Technology Evaluation & Selection: Stay architecture.
application architecture,
up to date with the latest industry
creating a blueprint for
trends, technologies, and frameworks. • Strong experience in various
development, ensuring
programming languages such as Java,
scalability, security, and
• Collaboration & Communication: C#, Python, JavaScript, or others.
performance, and
Application Collaborate with business analysts,
collaborating with
product managers, and developers to • Hands-on experience with databases
Architect cross-functional teams
define application requirements and (SQL, NoSQL), API development, and
to implement solutions
translate business needs into technical web services.
that meet business
solutions.
requirements. This role
• Familiarity with containerization
requires a combination of
• System Integration & Scalability: Design technologies (Docker, Kubernetes).
technical expertise,
solutions that integrate with existing
leadership, and strategic
systems, third-party services, and APIs. • Experience with front-end frameworks
thinking.
(e.g., React, Angular) and back-end
• Performance & Security: Ensure that technologies (e.g., Spring, Node.js).
the architecture is optimized for
performance, with a focus on response
times, throughput, and resource
utilization.
• Requirement Gathering: Collaborate
with business stakeholders to identify,
understand, and document business • Ability to translate complex business
needs and goals. requirements into technical solutions.
• Business Process Analysis: Analyze • Proficiency in business analysis tools
current business processes, workflows, (e.g., Microsoft Visio, Jira, Balsamiq,
Responsible for understanding and systems to identify inefficiencies etc.).
the business requirements, and improvement opportunities.
analyzing processes, and • Understanding of software
translating these needs into • Solution Design: Work with IT and development methodologies (e.g.,
Business technical solutions. The role Agile, Waterfall).
Analyst (IT) development teams to translate
involves working closely business requirements into technical
with stakeholders, including specifications and system designs. • Knowledge of IT systems, databases,
business leaders and and enterprise resource planning (ERP)
technical teams, to ensure • Change Management: Support the solutions.
IT projects deliver value and business in adopting new systems,
meet business objectives. tools, or processes. • Strong interpersonal and stakeholder
management skills.
• Documentation and Reporting: Maintain
up-to-date documentation on •Attention to detail and ability to manage
requirements, workflows, and process multiple tasks simultaneously.
changes.
8
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• Cloud Architecture Design: Develop and
design cloud architecture frameworks
and strategies to meet business
requirements, ensuring scalability,
performance, and security.
Responsible for designing, • Implementation and Management:
implementing, and Oversee the deployment and
managing cloud management of cloud infrastructure
infrastructure and and services, including compute,
• Experience with containerization and
solutions that align with storage, networking, and databases.
orchestration technologies (e.g.,
business goals and Docker, Kubernetes).
technology strategies. • Cost Management and Optimization:
Required to work closely Develop and implement cost
Cloud • Knowledge of hybrid cloud and
with cross-functional management strategies to optimize
Architect multi-cloud environments.
teams to ensure that cloud expenditures and ensure cost
cloud architectures are efficiency.
• Experience with big data and analytics
secure, scalable, and services in the cloud.
efficient, and that they • Collaboration and Leadership:
meet the organization's Collaborate with development,
needs for performance, operations, and business teams to
reliability, and gather requirements, provide technical
cost-effectiveness. guidance, and ensure successful project
delivery.
• Continuous Improvement: Stay up to
date with the latest cloud technologies,
industry trends, and best practices to
continuously improve cloud architecture
and processes.
• Strong experience in cloud platforms
(AWS, Azure, Google Cloud) and their
core services (compute, storage,
databases, networking).
• Cloud Architecture & Solution Design:
Design, develop, and implement • Proficiency in cloud-native
cloud-based solutions tailored to meet technologies, including serverless
business needs and technical computing, containers,
Responsible for designing, requirements. microservices, and Kubernetes.
developing, and deploying
applications on cloud • Application Development & Integration: • Expertise in programming languages
platforms such as AWS, Develop cloud-native applications, such as Python, Java, Node.js or Go
Azure, or Google Cloud. utilizing cloud services and technologies for cloud application development.
Should be skilled in such as AWS Lambda, Azure Functions,
Cloud cloud-based architectures Kubernetes, and cloud databases. • Deep understanding of API design,
Developer and work closely with RESTful services, and integration
development, operations, • DevOps and CI/CD Pipelines: Work with techniques.
and infrastructure teams DevOps teams to create and optimize
to build scalable, secure, CI/CD pipelines to automate the • Familiarity with databases (SQL and
and efficient cloud development, testing, and deployment NoSQL) and distributed systems
applications. of cloud applications. architecture in the cloud.
• Cloud Security and Compliance: • Experience with Infrastructure as
Implement security best practices in Code (IaC) tools like Terraform,
cloud-based applications and services, CloudFormation, or similar.
including identity and access
management (IAM), encryption, and • Knowledge of CI/CD tools (Jenkins,
secure APIs. GitLab CI, Azure DevOps) and
automation frameworks.
9
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• Model Development and Deployment:
Design, develop, and deploy machine
learning models and AI algorithms to
address specific business problems.
Responsible for designing, • Data Handling and Analysis: Collect,
developing, and preprocess, and analyse large datasets
implementing machine from various sources to derive insights
learning models and and build predictive models. • Experience with deep learning
artificial intelligence architectures (e.g., CNNs, RNNs,
Data solutions that drive • Algorithm Selection and Optimization: Transformers) and NLP techniques.
Scientist - business value. Required Evaluate and select appropriate
AI/ML to work closely with data algorithms and techniques for different • Knowledge of data engineering and big
Engineer scientists, software use cases. data technologies (e.g., Hadoop, Spark).
engineers, and business
stakeholders to create • Collaboration and Integration: Work • Experience with version control
innovative solutions that closely with cross-functional teams, systems (e.g., Git) and agile
solve complex problems including data scientists, software development methodologies.
and enhance developers, and business analysts, to
decision-making processes. understand requirements and integrate
AI/ML solutions into existing systems
and workflows.
• Research and Innovation: Stay up to
date with the latest advancements in AI
and machine learning research and
technologies.
• Automation of Infrastructure and
Deployment: Implement and maintain
automated pipelines (CI/CD) to
streamline the building, testing, and
deployment of software.
• Collaboration with Development and
Operations Teams: Work closely with
software developers and system
Responsible to automate administrators to ensure seamless code • Previous experience in software
and streamline the integration and deployment processes. development or IT operations.
processes involved in the
software development • Infrastructure Management: Manage • Proven experience in building and
DevOps
lifecycle, ensuring that cloud infrastructure and services (e.g., maintaining automated deployment
Engineer
code can be deployed AWS, Azure, Google Cloud) to ensure pipelines.
efficiently and securely availability, scalability, and security of
while maintaining system applications. • Familiarity with version control
reliability. systems (e.g., Git).
• Security Best Practices: Implement
security best practices for applications
and infrastructure (e.g., encryption,
secure access, identity management).
• Containerization and Orchestration:
Work with container technologies like
Docker and container orchestration
platforms like Kubernetes to manage,
scale, and deploy applications.
10
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• Firewall Management: Configure,
manage, and optimize enterprise
firewall solutions (e.g., Cisco ASA, Palo
Alto, Fortinet).
• Web Application Firewall (WAF)
Management: Implement, manage, and
maintain Web Application Firewalls
(e.g., F5, AWS WAF, Imperva).
• Intrusion Detection and Prevention
Systems (IDS/IPS): Deploy, configure,
and manage IDS/IPS solutions (e.g.,
Snort, Suricata, Cisco Firepower). • Proficient in firewall administration
(Cisco, Palo Alto, Fortinet, Juniper,
• Vulnerability Management & Security etc.).
Monitoring: Conduct regular
vulnerability assessments using tools • Hands-on experience with Web
Responsible for designing, like Nessus, Qualys, or OpenVAS to Application Firewalls (WAF) such as
implementing, and identify potential risks in the network, AWS WAF, F5, or Imperva.
maintaining the systems, and applications.
organization’s information • Familiarity with IDS/IPS solutions and
security infrastructure. • Network Security Architecture: Assist in signature-based intrusion detection.
You will work with a variety designing and implementing secure
of security devices, network architectures and security • Experience with vulnerability
including firewalls, web controls. assessment and management tools
application firewalls (e.g., Nessus, Qualys).
(WAF), intrusion detection Recommend best practices for
systems (IDS), intrusion securing network devices, systems, • Knowledge of network protocols and
Information and cloud environments. traffic analysis (TCP/IP, DNS,
prevention systems (IPS),
Security HTTP/HTTPS, SSL/TLS).
and other security
Engineer
solutions to protect our
network, systems, and Work closely with the IT infrastructure • Certifications (Preferred):
applications from security and network teams to ensure proper
threats. The ideal segmentation, encryption, and Certified Information Systems
candidate will have secure communication protocols. Security Professional (CISSP)
hands-on experience in
deploying, configuring, and • Security Incident Response: Certified Ethical Hacker (CEH)
troubleshooting security
devices and tools to Respond to and investigate security Cisco Certified Network Associate
ensure robust protection incidents, ensuring proper logging, (CCNA) Security or equivalent.
of our IT assets. analysis, and reporting.
Perform root cause analysis and Palo Alto Networks Certified
develop strategies for incident Network Security Engineer (PCNSE).
containment, eradication, and
recovery.
Collaborate with the incident
response team to develop and
update security incident response
plans.
• Security Policies & Compliance:
Ensure that security controls are in
place to comply with industry
regulations and standards (e.g.,
GDPR, PCI-DSS, HIPAA).
Contribute to the development and
implementation of information
security policies, procedures, and
best practices.
11
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• App Development: Design, develop,
test, and maintain iOS applications for
iPhone and iPad.
• Code Optimization: Write clean,
maintainable, and efficient code
following best practices and design
patterns like MVC, MVVM, etc.
Background in iOS • Experience with Swift UI, Combine, and
development, proficiency • UI/UX Implementation: Collaborate
with UI/UX designers to implement other modern iOS development
in Swift and Objective-C, frameworks.
and a passion for creating custom interfaces and ensure the app’s
exceptional mobile design is both functional and visually
appealing. • Knowledge of backend technologies
applications. Required to such as RESTful APIs, JSON, or cloud
iOS work closely with services.
• Performance Tuning: Optimize app
Developer designers and other performance to ensure smooth and fast
developers to create operation. • Familiarity with TestFlight, Cocoa Pods,
high-quality, user-friendly and other tools for iOS development.
apps that run on Apple's • Bug Fixing: Identify, troubleshoot, and
mobile platform. resolve bugs and issues to maintain app • Knowledge of Core Data, Core Graphics,
quality. or Core Animation for advanced app
functionality.
• App Store Submission: Prepare apps for
submission to the App Store, including
managing app versions, ensuring
proper compliance with App Store
guidelines, and handling updates.
• Conduct information security risk
• IT GRC Analyst (Level 1) assessments and assess adequacy of
is responsible for controls by executing audit program
conducting IT risk steps.
assessments and • Experience in IT Security/ Information
submitting compliance • Review policies and procedures
according to regulatory requirements Security mainly in handling IT risk
information to various assessment, compliance related
regulatory bodies and and Conduct security and privacy gap
adhering to their assessments and produce executive aspects.
directives. management reports on current
practices. Work with external auditors • Good understanding of regulatory
IT GRC on audits and compliance.
Analyst • The GRC Analyst (Level guidelines and information security
2) is responsible for environment.
conducting risk • Working experience on IT and Risk
assessments and controls testing and reporting,
submitting compliance Coordinate, collate and validate • Security certifications such as CEH,
documents based on artefacts related to Audit queries. ISACA CSX – P/ CRISC.
regulatory
communications and • Background of infrastructure services is
directions. preferred along with basic knowledge of
network OS, DB is required.
• Design, develop, and maintain
Java-based applications and services.
• Experience with cloud platforms (e.g.,
• Write clean, efficient, and AWS, Azure) and containerization
Responsible for well-documented code, adhering to technologies (e.g., Docker, Kubernetes).
designing, developing, best practices and coding standards.
and maintaining • Familiarity with build tools (e.g.,
Java high-performance • Perform code reviews, identify and Maven, Gradle) and continuous
Developer applications. Required resolve performance bottlenecks, bugs,
integration/continuous deployment
and other issues in the codebase.
to work closely with (CI/CD) pipelines.
cross-functional teams • Participate in the design and • Knowledge of security best practices
to deliver robust, architecture of new features and and design patterns.
scalable, and efficient systems.
solutions. • Experience with other programming
• Stay up to date with emerging languages (e.g., Python, JavaScript) is a
technologies and industry trends and plus.
evaluate their potential application to
our projects.
12
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• Software Development: Design,
Responsible for designing, develop, and maintain scalable and
developing, and high-performance applications using • Experience with cloud platforms (e.g.,
maintaining robust .NET technologies, including ASP.NET, Microsoft Azure, AWS) and
software solutions using .NET Core, and C#. containerization technologies (e.g.,
.NET technologies. Docker, Kubernetes).
Required to work closely • System Design and Architecture:
.NET Participate in the design and • Knowledge of microservices
with other developers, architecture and RESTful APIs.
Developer architecture of software solutions,
architects, and
stakeholders to deliver ensuring they are scalable, secure, and • Familiarity with CI/CD pipelines and
high-quality applications maintainable. automation tools (e.g., Jenkins, Azure
that meet business • Code Review and Mentoring: Conduct DevOps).
requirements and industry code reviews to ensure code quality,
standards. security and adherence to best
practices.
• L1: Basic knowledge of networking
• Level 1 (L1) Support:
concepts (TCP/IP, DNS, DHCP, VPN,
Wi-Fi).
Initial Troubleshooting
Monitoring & Reporting • L2: Advanced knowledge of routing
Hardware/Software Installation (OSPF, BGP, EIGRP), switching
(VLANs, STP), VPN, and firewalls.
• Level 2 (L2) Support: • L3: Expertise in advanced network
Responsible for resolving
troubleshooting, design, and
Network network-related issues Advanced Troubleshooting
performance optimization.
Engineer - across various levels, Network Configuration & Knowledge of advanced network
L1/L2/L3 ensuring the seamless Maintenance protocols and security configurations
and performance of network Troubleshooting Network (MPLS, QoS, VPNs, etc.).
Network systems, and collaborating
Connectivity
Operations with cross-functional • Familiarity with network monitoring
teams to implement and Vendor Coordination
and management tools (SolarWinds,
support network solutions. Nagios, PRTG, etc.).
• Level 3 (L3) Support:
• Experience with network hardware,
Expert-Level Troubleshooting including routers, switches, firewalls,
Network Design & Optimization and load balancers (Cisco, Juniper,
Security & Compliance Arista, etc.).
Network Upgrades & Projects • Knowledge of network security and
Incident Management & Root compliance best practices.
Cause Analysis
• Database Development: Develop and
maintain complex SQL queries, stored
procedures, triggers, and views in both
Responsible for designing, Oracle SQL and PostgreSQL
developing, and optimizing environments.
database solutions using • Strong proficiency in Oracle SQL and
Oracle SQL and PostgreSQL • Database Design & Architecture: PostgreSQL.
databases. This role Collaborate with cross-functional
• Experience with database
involves writing complex teams to design database schemas,
management tools like Oracle SQL
queries, managing ensuring data integrity, normalization,
Developer, pgAdmin, and others.
database structures, and and scalability.
Oracle SQL & ensuring high performance,
• Knowledge of database design
PostgreSQL scalability, and security of • Data Migration & Integration: Lead data
principles, normalization, and data
Developer database systems. migration projects between Oracle and
integrity practices.
Required to collaborate PostgreSQL environments.
closely with application • Experience with ETL tools and data
• Performance Tuning: Analyze and
developers, system migration between different
optimize SQL queries, indexing
architects, and data database systems.
strategies, and execution plans to
analysts to build and improve database performance. • Familiarity with version control tools
maintain efficient database like Git.
solutions that meet • Database Maintenance: Ensure
business requirements. database backup and recovery
strategies are implemented and
followed.
13
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• Application Development: Design and
develop custom applications using
Power Apps (Canvas Apps and
Model-Driven Apps) to meet business
requirements.
• Workflow Automation: Design and • Strong experience with Power Apps,
implement automated workflows using Power Automate, Power BI, and Power
Power Automate to optimize business Virtual Agents.
Responsible for designing, processes, reducing manual tasks and
• Proficiency in DAX (for Power BI) and
developing, and improving efficiency.
Power Query for data transformations
maintaining applications
• Business Intelligence and Reporting: and data modeling.
using Microsoft's Power
Platform, which includes Develop interactive Power BI reports
• Experience integrating Power Platform
Power Apps, Power and dashboards that enable
with SharePoint, Dynamics 365, SQL
Automate, Power BI, and data-driven decision-making by
Power Server, and other third-party APIs.
Power Virtual Agents. providing insights from various data
Platform sources. • Knowledge of Azure services, Power
Should create low-code
Developer Platform connectors, and custom
solutions to automate • Chatbot Development: Develop
workflows, develop custom connectors to extend app functionality.
intelligent chatbots using Power Virtual
applications, and analyse Agents to automate customer service • Familiarity with Common Data Service
business data to improve and internal processes. (Dataverse) for managing and storing
decision-making data used by business applications.
processes. • Integration and Customization:
Integrate Power Platform applications • Experience with REST APIs and web
with external data sources such as SQL services for integration purposes.
databases, SharePoint, Azure,
Dynamics 365, and third-party
applications via connectors, APIs, and
web services.
• Security and Governance: Implement
data security and compliance practices
for Power Apps, Power Automate,
Power BI, and Power Virtual Agents.
• Project Planning & Coordination:
Develop detailed project plans,
including timelines, milestones, and
resource allocation.
• Client Interaction: Act as the main point • Strong project management and
of contact between the client and the organizational skills.
Responsible for leading and project team • Excellent communication and
.
managing IT projects from • Risk & Issue Management: Identify interpersonal skills.
initiation to completion. potential risks early in the project and
This role requires effective • Proficiency in project management
develop mitigation strategies. tools (e.g., Jira, Trello, Microsoft
Project coordination, resource
management, and • Quality Assurance: Ensure that the Project).
Delivery
Manager communication to ensure project meets predefined quality • Ability to manage multiple projects
the delivery of projects standards and deliverables are in line simultaneously.
meets client expectations with client expectations.
and adheres to established • PMP (Project Management
timelines, budgets, and • Budget & Timeline Management: Track Professional) or similar certification
quality standards. project budgets, ensuring resources are preferred.
efficiently used and costs remain within
the allocated budget.
• Project Handover: Ensure the smooth
handover of the project to the client or
operations team upon successful
completion.
14
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• Project Planning and Execution:
Develop detailed project plans,
including scope, objectives,
deliverables, timelines, and resources
required.
• Stakeholder Management: Engage with
key stakeholders, including senior
management, business users, and IT
Responsible for overseeing teams, to gather requirements, set • Experience with digital banking
the planning, execution, expectations, and provide regular initiatives and fintech solutions.
and delivery of IT projects updates.
• Knowledge of regulatory and
tailored to the banking
• Resource and Budget Management: compliance standards specific to the
Project industry. You will manage
Allocate and manage resources banking industry.
Manager – project timelines,
effectively to ensure project milestones
Banking IT resources, and stakeholder • Familiarity with ITIL (Information
are achieved.
communications to ensure Technology Infrastructure Library)
that projects meet their • Risk Management: Identify, assess, and practices.
objectives and are mitigate project risks and issues to
delivered on time and • Certifications like PMP.
minimize impact on project delivery.
within budget.
• Quality Assurance: Ensure that all
project deliverables meet the required
quality standards and comply with
banking regulations and IT best
practices.
• Team Leadership: Lead and motivate
project teams, fostering a collaborative
and productive working environment.
• Strong experience in developing RPA
solutions using UiPath Studio.
• RPA Solution Design & Development: • Hands-on knowledge of UiPath
Design, develop, and deploy RPA robots Orchestrator for managing and
Responsible to design, monitoring robots.
using the UiPath Studio tool, following
develop, and implement
best practices and guidelines. • Proficiency in programming
bots that automate
repetitive business • Business Process Analysis: Collaborate languages like VB.NET, C#, or Python
processes and tasks. with business stakeholders and for custom activities and scripting.
RPA
Developer Expected to work closely process owners to identify automation • Experience in working with various
with business analysts, opportunities by analyzing existing UiPath components like UiPath
IT teams, and manual processes. Robots, Orchestrator, Orchestrator
stakeholders to ensure APIs, and ReFramework.
the successful • UiPath Orchestrator Configuration:
deployment and Configure and manage bots on UiPath • Familiarity with data sources such as
maintenance of RPA Orchestrator, including monitoring, SQL, Excel, and APIs to integrate with
solutions. scheduling, and managing robot automation workflows.
deployments.
• Knowledge of UI automation
techniques, working with web and
desktop applications, and handling
dynamic elements.
15
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• Install, configure, and maintain UiPath
Responsible for managing Orchestrator, Robots, and Studio across
and maintaining the UiPath development, testing, and production • Extensive experience with UiPath
automation platform, environments. Orchestrator, Studio, and Robots.
ensuring that all RPA • Hands-on experience in configuring,
robots and workflows run • Manage Orchestrator environments,
including setting up, monitoring, and managing, and optimizing UiPath
smoothly and efficiently. Orchestrator and related tools.
Required to oversee the ensuring efficient performance of
queues, assets, logs, and schedules. • Familiarity with database
UiPath Orchestrator,
handle deployment tasks, management (SQL Server,
• Perform regular system updates,
monitor bot performance, PostgreSQL) for managing
RPA UiPath patches, and upgrades to keep the
and ensure the security Orchestrator back-end.
Admin platform up to date with the latest
and compliance of RPA
Expert features and security updates. • Strong understanding of networking,
processes. Required to
firewalls, and communication
have close collaboration • Set up security policies for robots,
protocols to ensure proper
with RPA developers and ensuring that robots have the necessary
access to perform tasks while complying communication between robots and
business stakeholders to
with security standards. Orchestrator.
ensure optimal system
performance, troubleshooting, • Experience with virtualization
• Troubleshoot and resolve issues related
and resolving any issues that technologies (VMware, Citrix) and
to Orchestrator, robot execution, or
arise within the UiPath managing robot deployment in virtual
communication between robots and
environment. environments.
Orchestrator.
• Implement backup and disaster recovery
plans for critical UiPath components,
ensuring business continuity in case of
failures or system crashes.
• Level 1:
24/7 monitoring of security alerts
• The SOC Level 1 Analyst and events to identify and respond to
serves as the primary potential threats. Perform initial
triage of security alerts, determining • Level 1:
defense in identifying
and responding to the severity of the threat and whether Experience in IT Security or SOC
security incidents. This it requires remediation/further with hands-on experience in SIEM
role entails monitoring actions. tools or other security monitoring
security alerts, detecting Open and manage security incident solutions and familiarity with
potential threats, tickets in the incident tracking incident response processes.
escalating incidents to system, ensuring that all relevant
higher-level analysts, Security certifications such as CEH,
details are logged for further CompTIA Security+, EC-Council CSA,
SOC Analyst - and contributing to the investigation.
organization's overall ISACA CSX-P or similar.
Incident
Management security posture Follow predefined playbooks to take • Level 2:
initial containment actions where
• The SOC Level 2 Analyst appropriate (e.g., isolating infected Experience in IT Security with
should have expertise in systems, blocking IP addresses) in the experience in SOC with experience
cybersecurity, threat event of a confirmed or suspected in SIEM platforms and familiarity
detection, and incident security incident. with Network Security & Endpoint
response. The L2 Security tools
Analyst is tasked with Review logs and data from different
investigating and sources (e.g., network devices, servers, Security certifications such as
analysing security endpoints) to identify unusual or CISM, CRISC, CompTIA CySA+,
events, offering suspicious activity. EC-Council CSA, and security
comprehensive analysis, product certification such as SIEM,
Continuous monitoring of Health & XDR etc is preferred.
and responding to
Wellness of the Security tools and
security incidents to
components.
reduce potential risks to
the organization. • Level 2:
Investigate and analyse security
events, identifying the nature and
scope of potential threats or incidents.
Review and correlate data from a
variety of security tools to identify
advanced threats and anomalies.
16
Role Role Overview Key Responsibilities Preferred Skills/Attributes
Perform in-depth root cause analysis
to understand the origin and
impactof security incidents and
recommend corrective actions to
improve defenses.
Generate detailed incident reports,
documenting findings, evidence,
impact, and response actions taken
during the investigation process.
Escalate incidents to concerned
teams with well-documented
findings and recommendations for
containment, mitigation, and
remediation. Collaborate with
internal teams, including network,
security, IT, and system
administrators, to coordinate
incident response and remediation
efforts.
Assist in refining and improving SOC
processes, workflows, and playbooks
to enhance the overall efficiency of
security operations. Periodic review
of monitoring use cases & identify
new alert requirement based on
industry best practices & changes in
the environment.
• Conduct proactive threat hunting
activities and analyse packets to
identify potential security threats,
vulnerabilities, and anomalous
behaviours within the network,
discovering attacker’s presence (if
present).
• Analyse and investigate security
incidents and network traffic, to
identify malicious activity, indicators of
compromise (IOCs), and tactics,
techniques, and procedures (TTPs)
The Threat Hunting used by attackers. • Experience in IT Security
Professional must • Experience in SOC an experience with
• Develop and maintain threat-hunting
have a comprehensive playbooks, workflows, and tools to SIEM platforms and familiarity with
understanding of cyber improve detection capabilities. Network Security & Endpoint Security
threats, vulnerabilities, tools
and current attack • Collaborate with the incident response
SOC Analyst - team to assist in mitigating and
methodologies. This role • Security certifications such as
Threat Hunting responding to discovered threats and
entails proactively EC-Council CIRP, EC-Council Certified
with external agencies to collect the
identifying, detecting, Threat Intelligence Analyst (CTIA),
intelligence on the emerging threats
and mitigating potential and implement necessary controls. GIAC Certified Incident Handler
threats within our (GCIH), GIAC Certified Intrusion
network infrastructure • Provide detailed analysis and threat
to prevent significant intelligence reports, highlighting
damage. actionable insights for management
and technical teams.
• Conduct the first level of forensic
analysis in required cases and support
expert agencies in required cases for
intensive analysis. Analyse digital
evidence to identify root causes,
indicators of compromise (IOCs), and
attack vectors. Develop forensic and
malware analysis capabilities in
support of ongoing incident response
activities.
17
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• Cloud Infrastructure Management:
Manage and maintain cloud
environments (e.g., AWS, Azure, Google
Cloud), ensuring performance,
availability, and security of services.
• Operating System Administration:
Administer and maintain Linux and
Windows-based servers, ensuring they
are up-to-date and fully functional.
• Application Support: Support and
maintain various business-critical
applications, ensuring proper
Responsible for managing installation, configuration, and • Proficiency in administering virtual
and supporting the performance. environments using VMware (vSphere,
organization’s cloud ESXi).
• VMware Infrastructure: Administer
infrastructure, operating
VMware vSphere environments, • Experience with Cloud environments
systems, applications, and
including managing virtual machines, (AWS, Azure, Google Cloud) for hosting
various IT services. The role
storage, networking, and clusters. and managing applications.
System will focus on managing
Administrator VMware environments, • Network Access Control (NAC): • Strong understanding of network
- Cloud/OS/ Network Access Control Implement and maintain Network security, access control systems, and
Application/ (NAC), Active Directory Access Control systems to enforce network monitoring tools.
VMware/NAC (AD), Exchange servers, security policies, monitor access, and
/AD & and overall system manage device compliance. • Deep knowledge of Active Directory
Exchange performance across a management, Group Policy, and LDAP
range of environments. • Active Directory (AD) Management: configurations.
This position requires a Administer Active Directory (AD)
environments, managing user • Experience managing Microsoft
proactive individual who
accounts, groups, security policies, and Exchange environments (on-premises
can optimize system
organizational units. or hybrid solutions).
functionality, ensure
uptime, and troubleshoot • Microsoft Exchange Administration: • Knowledge of backup technologies,
and resolve complex issues Administer and support Microsoft disaster recovery, and data replication.
Exchange environments, including the
management of mailboxes, distribution
lists, and email security.
• System Monitoring & Performance
Optimization: Implement monitoring
tools to track system performance,
security, and uptime for servers,
applications, and network
infrastructure.
• Backup & Recovery: Develop and
implement backup and recovery
strategies for all critical systems and
data.
• Requirements Gathering & Analysis:
Responsible for analyzing, Work closely with stakeholders to
gather business, functional, and • Strong understanding of data
designing, and
technical requirements while ensuring protection laws and compliance
implementing systems
compliance with data protection and frameworks, such as GDPR, CCPA,
while ensuring that data
privacy laws. HIPAA, and other industry-specific
protection and privacy
regulations.
regulations are adhered to • System Design & Development: Design
System throughout the system • Knowledge of system analysis
systems and applications that meet
Analyst lifecycle. The System techniques and methodologies such
business needs while ensuring the
(DPDP) Analyst works closely with as UML, data flow diagrams, and
highest standards of data protection,
IT teams, data protection security, and privacy. process modeling.
officers, legal, and other
stakeholders to design and • Data Protection Compliance: Ensure • Familiarity with security standards
maintain secure systems that system designs comply with such as ISO 27001, NIST, and other
that protect sensitive data. industry-standard data protection data security frameworks.
regulations and internal data
governance policies.
18
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• Collaboration & Stakeholder
Management: Collaborate with Data • Understanding of data privacy
Protection Officers (DPOs), legal teams, technologies (e.g., encryption, data
and security experts to align system masking, anonymization, and
architecture and processes with pseudonymization).
compliance standards.
• Experience with data governance
• Testing & Implementation: Conduct tools, DPIA tools, and privacy impact
system testing to validate that data assessments.
protection controls and privacy
features are working as intended and
meet legal requirements.
• System Analysis: Analyze existing
systems, workflows, and processes to
identify inefficiencies and improvement
opportunities.
• Familiarity with software development
• System Design: Design and life cycle (SDLC) methodologies, such as
Responsible for analyzing, recommend system improvements, Agile or Waterfall.
designing, and improving enhancements, and solutions that
• Experience with system modeling tools
information systems and meet business objectives.
(e.g., UML, ERD, Visio).
software solutions.
• Requirements Gathering: Collaborate
Required to work closely • Proficiency in various programming
System with business stakeholders to define
with business languages or scripting (e.g., SQL,
Analyst (IT) functional, non-functional, and
stakeholders, developers, Python, Java).
technical requirements for new
and IT teams to ensure that
systems or enhancements. • Knowledge of IT infrastructure,
technology solutions are
databases, and enterprise systems.
functional, scalable, and • Solution Development &
aligned with organizational Implementation: Work with • Certification in systems analysis,
needs. development teams to design and software development, or related fields
implement system changes or new (e.g., Certified Systems Analyst, TOGAF)
applications. is a plus.
• System Support & Maintenance:
Provide ongoing support for existing
systems and applications.
• Develop and execute comprehensive
test plans and test cases based on
project requirements and specifications.
• Design and implement automated test
scripts using industry-standard tools
and frameworks. • Experience with API testing and tools
Responsible for leading (e.g., Postman, SoapUI).
and executing testing • Perform functional, regression,
activities to ensure the integration, performance, and user • Knowledge of scripting languages (e.g.,
quality and reliability of our acceptance testing (UAT) to ensure Python, JavaScript) for test automation.
software products. software quality. • Understanding of software
Testing Required to work closely
Engineer • Identify, document, and track defects, development lifecycles and version
with developers, product control systems (e.g., Git).
managers, and other and work with development teams to
stakeholders to identify resolve issues in a timely manner • Experience in a leadership or mentoring
test requirements, create • Collaborate with cross-functional role within a testing team.
test plans, and oversee the teams to understand project
testing process. requirements, design specifications,
and acceptance criteria.
• Continuously evaluate and improve
testing processes, tools, and
methodologies to enhance test
coverage.
19
Role Role Overview Key Responsibilities Preferred Skills/Attributes
• System Design & Integration: Design
• Strong experience with Apache Kafka
and develop real-time data streaming
(Kafka Streams, Kafka Connect, Kafka
solutions using Apache Kafka and
Producer/Consumer).
WSO2 technologies (e.g., WSO2 API
Manager, WSO2 Enterprise Integrator, • Proficient in WSO2 products,
WSO2 Identity Server). particularly WSO2 API Manager,
WSO2 Enterprise Integrator, and
• Kafka Development & Management:
Responsible for integrating WSO2 Identity Server.
Develop Kafka producers and
and developing data
consumers to integrate different • Experience with data streaming
streaming and messaging
systems with WSO2-based technologies and event-driven
solutions using WSO2
middleware. architectures.
middleware technologies
and Apache Kafka. This role • API Management & Integration: • Knowledge of microservices
WSO2 Kafka
focuses on designing, Integrate Kafka messaging with WSO2 architecture and how Kafka can be
Developer
implementing, and API Manager to expose and manage used for communication in
maintaining systems that APIs efficiently across multiple microservices environments.
use Kafka for platforms.
message-driven • Familiarity with data serialization
architectures, combined • Real-Time Data Streaming & formats (e.g., JSON, Avro, Protobuf) for
with WSO2's API Event-Driven Architecture: Implement efficient Kafka message transmission.
management, integration, event-driven architecture (EDA) using
Apache Kafka to enable real-time event • Hands-on experience with
and security products.
processing and messaging across containerization (e.g., Docker,
various systems. Kubernetes) and deployment of Kafka
and WSO2 in cloud or on-prem
• Data Transformation & Routing: environments.
Implement data transformation and
routing logic using WSO2 Enterprise • Knowledge of RESTful APIs, OAuth,
Integrator and integrate them with JWT, and other security mechanisms
Kafka to ensure data is processed and for integrating secure Kafka-based
delivered in the required format. solutions.
20