Search by job, company or skills

lowe's india

Engineer, Information Security

Save
new job description bg glownew job description bg glownew job description bg svg
  • Posted 23 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Innovate in Bengaluru

This position is based at our on-site office in Bengaluru. Lowe's offers an ultramodern work environment, complete with cutting-edge technology, collaborative workspaces, an on-site gym and clinic, and other perks to enhance your work experience. 

About Lowe's

Lowe's is a FORTUNE® 100 home improvement company serving approximately 16 million customer transactions a week in the United States. With total fiscal year 2024 sales of more than $83 billion, Lowe's operates over 1,700 home improvement stores and employs approximately 300,000 associates. Based in Mooresville, N.C., Lowe's supports the communities it serves through programs focused on creating safe, affordable housing, improving community spaces, helping to develop the next generation of skilled trade experts and providing disaster relief to communities in need. For more information, visit Lowes.com.

Lowe's India, the Global Capability Center of Lowe's Companies Inc., is a hub for driving our technology, business, analytics, and shared services strategy. Based in Bengaluru with over 4,500 associates, it powers innovations across omnichannel retail, AI/ML, enterprise architecture, supply chain, and customer experience. From supporting and launching homegrown solutions to fostering innovation through its Catalyze platform, Lowe's India plays a pivotal role in transforming home improvement retail while upholding strong commitment to social impact and sustainability. For more information, visit Lowes India

Job Summary

The primary purpose of this role is to support the design, implementation and ongoing operations of information security tools and services. This includes translating business and technical requirements into robust enterprise security software solutions that ensure information assets are adequately protected with acceptable levels of control. This also includes monitoring, testing, and evaluating security assessments of systems and taking steps to help design and implement remediation solutions.

Must have knowledge of security practices and tools related to identity and access management along with enterprise digital certificate management systems. This role helps establish and maintain programs that enable the business to operate efficiently and remain in compliance with regulatory and industry best practices.

Roles & Responsibilities

Core Responsibilities

Develop and maintain automation scripts using Python and other scripting languages (Shell/Bash/PowerShell).

Support the design, enhancement, and maintenance of CI/CD pipelines using Jenkins.

Implement automation aligned with cloud security, IAM, and identity governance best practices.

Collaborate with Cloud, DevOps, and Security teams to integrate automation into cloud workflows.

Troubleshoot script failures, pipeline issues, and cloud automation inconsistencies.

Maintain documentation for automation processes, pipelines, governance workflows, and cloud integrations.

Contribute to expanding automation and identity governance coverage across environments.

Experience in Git and Terraform.

Candidates holding the Google Professional Cloud Security Engineer certification will be preferred.

Designs, builds, and maintains advanced cybersecurity platforms utilizing scripting methodologies and occasional custom code development to ensure robust and resilient security infrastructure

Supports the implementation and maintenance of assigned information security solutions to ensure successful deployment and operation; develops and documents detailed standards (e.g., guidelines, processes, procedures)

Assists the Information Security team in monitoring security systems, reviewing logs, and managing information security systems

Participates in regular security vulnerability assessments

Collaborates with other technology teams including Engineering to design and implement remediation solutions

Provides assistance during information security incidents as part of an Incident Response Team

Remains aware of technological trends and developments in the area of information security

Solves difficult technical problems; solutions are testable, maintainable, and efficient

Provides support in the event of escalated security issues for enterprise systems; helps diagnose, troubleshoot, and resolve issues

Supports the implementation of hardware and software changes into environments to ensure security requirements are met

Completes basic custom enhancements of applications using secure coding techniques to reduce the threat of remote or local vulnerabilities

Evaluates entire applications (Container, Infrastructure, host platform) to identify potential threats and vulnerabilities

Years Of Experience

2 Years Experience in technology system support, software development or a related field

1 Year Experience with information security applications and systems

Education Qualification & Certifications

Required Minimum Qualifications

Bachelor's degree Computer Science, CIS, Engineering, Cybersecurity, or related field or equivalent years of experience in lieu of education requirement, if applicable (OR) Master's degree Computer Science, CIS, Business Administration, or related field

Preferred Qualifications

2 Years Experience analyzing the output of industry standard cybersecurity tools and identifying remediations to reduce risk and exposure of applications

1 Year Experience working on project(s) involving the implementation of solutions applying development life cycles (SDLC)

2 Years IT experience developing and implementing business systems within an organization

2 Years Experience working with defect or incident tracking software

2 Years Experience with technical documentation in a software development environment

2 Years Experience working with an IT Infrastructure Library (ITIL) framework

2 Years Experience leading teams, with or without direct reports

Experience with Cloud technologies

Relevant information security certifications (e.g., CISSP, CISM, CEH, PCI ISA, CRISC, CISA, OSCP, GPen)

Preferred Certifications

Microsoft Certified: Identity and Access Administrator Associate (SC-300)

Microsoft Azure Fundamentals (AZ-900)

GCP associate cloud Engineer

Oracle Cloud Infrastructure 2024 Certified Foundations Associate certification

Lowe's is an equal opportunity employer and administers all personnel practices without regard to race, color, religious creed, sex, gender, age, ancestry, national origin, mental or physical disability or medical condition, sexual orientation, gender identity or expression, marital status, military or veteran status, genetic information, or any other category protected under federal, state, or local law.

Starting rate of pay may vary based on factors including, but not limited to, position offered, location, education, training, and/or experience. For information regarding our benefit programs and eligibility, please visit https://talent.lowes.com/us/en/benefits.

More Info

Job Type:
Industry:
Employment Type:

About Company

Job ID: 147313579

Similar Jobs

Bengaluru, India

Skills:

saml 2.0 JavaPythonOauthJsonRest ApisLdapOIDCRadiant Logic RadiantOne

Bengaluru, India

Skills:

snowflake BigQueryCloud InfrastructureGcpTerraformShell scriptingDatabricksSplunkAzureKubernetesPythonAWSPalo Alto XSOARAI toolsSOARSIEM AdministrationElasticMicrosoft Sentinel

Bengaluru, India

Skills:

NetworkingEndpoint SecurityCryptographyThreat IdentificationCloud AuthenticationIncident Response Protocols and Toolsdirectory servicesAccess ManagementBusiness ContinuityRisk ManagementMonitoring

Bengaluru, India

Skills:

Pci Dsscloud securityDevSecOpssecure coding principlescryptography best practicessecure development practicesauthentication and authorizationcredential managementencryption at rest and in transit

Bengaluru, India

Skills:

security consulting Application SecurityNetworkingEndpoint SecurityCryptographyIncident Responsecloud securityDigital ForensicsVulnerability Managementsecurity analyticsrisk managementthreat identificationdirectory servicescloud authenticationaccess managementbusiness continuitycomputer security incident response