Application & Infrastructure Security Consultant

Apply
Apply

Share

successfully icon

Successfully

The vacancy has been successfully added to favorites

location icon

Hyderabad, IN, India

specialization icon

Application Security

lob icon

BCM Industry

date icon

01/05/2026

Req. VR-122608

Apply
Project description

The Application & Infrastructure Security Consultant is an embedded security partner within Enterprise Solutions (ES) product engineering teams. The role is responsible for continuously assessing and improving the security posture of the ES technology estate - spanning application code, CI/CD pipelines, cloud infrastructure (primarily AWS), multi-tenant platform components, and AI/agentic system integrations.

This is a hands-on, engineering-facing role. The consultant works alongside development teams day to day, identifying vulnerabilities and security risks early in the delivery lifecycle, translating findings into actionable remediation guidance, and directly implementing security improvements through code changes and infrastructure updates where appropriate.

The role exists to shift security left - to the point where it is a natural part of how ES engineering teams design, build, and operate - rather than a gate or an afterthought. Success is measured by the sustained reduction of exploitable risk across ES platforms, the maturity of security practices within engineering teams, and the quality of security controls in production systems.

Responsibilities
bullet icon

Embedded Security Assessment

bullet icon

Partner closely with application development teams, participating in sprint planning, design reviews, and code reviews to identify and mitigate security risks early in the delivery lifecycle.

bullet icon

Assess application security posture across all phases of delivery including architecture, source code, dependencies, APIs, authentication and authorisation mechanisms, data handling practices, and runtime behaviour.

bullet icon

Conduct threat modelling for new features, architectural changes, AI/agentic system integrations, and multi-tenant platform components, communicating identified risks in terms meaningful to both engineering and business stakeholders.

bullet icon

Evaluate CI/CD pipeline security including configurations, secrets management, artifact integrity, dependency supply-chain risks, and access controls.

bullet icon

Review cloud infrastructure (AWS) configurations to identify security gaps across identity and access management, network design, data protection, workload hardening, logging, and monitoring.

bullet icon

Assess multi-tenant boundary controls to identify cross-tenant data access paths, context confusion, and shared-resource leakage risks.

bullet icon

Assess AI and agentic system components including prompt injection risks, tool-call trust boundaries, agent privilege scope, MCP/orchestration layer exposures, and model output handling. Apply OWASP Top 10 for LLMs and emerging adversarial AI guidance.

bullet icon

Evaluate secrets management posture across repositories, CI/CD pipelines, environment configurations, serverless functions, and managed secrets services.

bullet icon

Perform security-focused code reviews, identifying OWASP Top 10 vulnerabilities as well as language and framework-specific security issues.

bullet icon

Remediation Guidance & Implementation

bullet icon

Produce clear, prioritised remediation recommendations with sufficient technical detail to enable development teams to remediate issues independently.

bullet icon

Directly implement security fixes where appropriate, including code changes, infrastructure-as-code (IaC) updates, CI/CD pipeline hardening, and cloud configuration corrections.

bullet icon

Provide hands-on support to developers through pairing, targeted guidance, and practical code examples.

bullet icon

Validate the effectiveness of remediations through retesting and evidence collection.

bullet icon

Track, manage, and report remediation progress against documented security findings, including framing of residual risk and regulatory exposure where relevant.

bullet icon

Application Security

bullet icon

Assess authentication and authorisation implementations including OAuth 2.0/OIDC, JWT, RBAC/ABAC, session management, and service-to-service authentication patterns.

bullet icon

Review API security controls including input validation, rate limiting, schema enforcement, error handling, and gateway policies. Assess both REST and GraphQL surfaces.

bullet icon

Evaluate data protection practices including encryption in transit and at rest, PII and financial data handling, tokenisation, secrets management, and data minimisation.

bullet icon

Identify insecure design patterns and recommend secure alternatives aligned with OWASP and industry best practices.

bullet icon

Assess data layer security including database access controls, ORM injection paths, and data-tier privilege abuse patterns relevant to financial data environments.

bullet icon

AI & Agentic System Security

bullet icon

Assess the security of AI-integrated and agentic workflows, including prompt injection vulnerabilities, indirect prompt injection via tool outputs or retrieved data, and jailbreak risks.

bullet icon

Evaluate tool-call trust boundaries and agent authorisation scope, identifying paths to privilege escalation or unintended action execution within agentic pipelines.

bullet icon

Review MCP server configurations, orchestration layer access controls, and inter-agent communication patterns for authentication gaps and abuse paths.

bullet icon

Assess model output handling in downstream systems, identifying injection risks where model-generated content is rendered, executed, or passed to other services without adequate sanitisation.

bullet icon

Apply OWASP Top 10 for LLMs and emerging adversarial AI security guidance as a structured assessment framework, and contribute to its evolution based on findings in production systems.

bullet icon

Work with engineering and product teams to establish security patterns and guardrails for AI/agentic system design that are proportionate and operable in a regulated environment.

bullet icon

CI/CD & DevSecOps

bullet icon

Assess existing CI/CD pipelines for security gaps and provide recommendations for process, tooling, and configuration improvements.

bullet icon

Support the integration of automated security testing including SAST, SCA, secrets scanning, container image scanning, IaC policy enforcement, and DAST where applicable.

bullet icon

Provide secure coding guidance and developer enablement resources to support a shift-left security culture within ES engineering.

bullet icon

Cloud Infrastructure Security (AWS)

bullet icon

Review and remediate AWS security controls across identity and access management (IAM roles and policies, permission boundaries, cross-account access, SSO/federation), network security (VPC architecture, segmentation, egress controls, security groups, WAF/Shield), data protection (KMS, encryption, backup strategies), and workload security (containers, serverless, hardened images, patch management).

bullet icon

Identify cloud misconfigurations using AWS-native services and third-party tooling, and implement or guide corrective actions.

bullet icon

Assess multi-tenant infrastructure configurations to validate that tenant isolation controls are correctly implemented and operationally maintained.

bullet icon

Risk Communication & Documentation

bullet icon

Produce high-quality assessment reports containing clear findings, risk ratings, and actionable remediation steps, framed in terms of business impact and regulatory exposure (SOC 2, MiFID II, DORA) as appropriate.

bullet icon

Maintain security findings registers and track remediation status through to closure.

bullet icon

Contribute to security runbooks, architectural patterns, and team-facing guidance documentation.

bullet icon

Participate in post-incident reviews, penetration test remediation, and vulnerability management processes.

Skills

Must have

bullet icon

Technical Expertise

bullet icon

5+ years of experience in application security, cloud security, or a combined security and software engineering role, with demonstrated ability to assess and remediate security risks across the full technology stack.

bullet icon

Hands-on experience identifying and addressing OWASP Top 10 vulnerabilities and common cloud misconfiguration risks in production systems.

bullet icon

Practical experience assessing AI and agentic system security, including prompt injection, tool-call abuse, and orchestration layer vulnerabilities. Familiarity with OWASP Top 10 for LLMs.

bullet icon

Experience assessing multi-tenant system security, including tenant isolation controls, context confusion vulnerabilities, and shared-resource leakage.

bullet icon

Experience assessing secrets management posture across repositories, CI/CD pipelines, and cloud environments.

bullet icon

Proficiency in at least one programming language (Python, Java, JavaScript/TypeScript, Go, or C#) sufficient to review, modify, and implement code changes.

bullet icon

Working knowledge of AWS security services and core controls including IAM, KMS, VPC, Security Groups, CloudTrail, and GuardDuty.

bullet icon

Solid understanding of CI/CD platforms (e.g. GitHub Actions, Azure DevOps) and pipeline security principles.

bullet icon

Familiarity with infrastructure-as-code tools such as Terraform, CloudFormation, or AWS CDK.

bullet icon

Strong written and verbal communication skills, with the ability to clearly articulate risk, regulatory exposure, and remediation strategies to engineering teams and senior stakeholders.

bullet icon

Proven ability to work collaboratively within and alongside development teams in a fast-moving delivery environment.

bullet icon

Preferred Qualifications

bullet icon

Technical Depth

bullet icon

Experience with container security (Docker, Kubernetes/EKS) including image scanning, pod security standards, network policies, and RBAC.

bullet icon

Familiarity with secrets management solutions such as AWS Secrets Manager and HashiCorp Vault, and experience assessing their configuration and usage patterns.

bullet icon

Hands-on experience with security testing and scanning tools including SAST (e.g. Fortify, SonarQube), SCA (e.g. Mend, Dependabot), DAST (e.g. WebInspect, OWASP ZAP), and cloud security posture management tooling.

bullet icon

Experience conducting threat modelling using STRIDE or similar methodologies, including for AI/agentic system components.

bullet icon

Knowledge of API gateway and service mesh security patterns including mTLS and fine-grained authorisation.

bullet icon

Familiarity with secure SDLC frameworks and how to operationalise them within engineering delivery teams.

bullet icon

Domain & Regulatory Context

bullet icon

Experience working in regulated financial services environments, with familiarity with SOC 2, MiFID II, DORA, or equivalent compliance obligations and how they shape security control requirements and risk framing.

bullet icon

Understanding of financial data sensitivity, data residency requirements, and the operational context of multi-tenant platforms handling private markets, lending, or securities data.

bullet icon

Professional Attributes

bullet icon

Pragmatic and outcome-focused; prioritises controls that are durable and operable over theoretical completeness.

bullet icon

Strong communicator who can adjust depth and framing for engineers, product managers, and risk stakeholders.

bullet icon

Collaborative and constructive; builds trust with development teams rather than operating as a gate or adversary.

bullet icon

Proactive in staying current with the evolving application and AI security threat landscape.

Nice to have

bullet icon

Certifications (Valued but Not Required)

bullet icon

Relevant certifications may include, but are not limited to:

bullet icon

Application Security:

bullet icon

GIAC GWEB, GIAC GWAPT, Offensive Security OSWE, eWPTX

bullet icon

Cloud Security (AWS):

bullet icon

AWS Certified Security

bullet icon

Specialty, AWS Certified Solutions Architect

bullet icon

Broad Security:

bullet icon

(ISC)² CISSP, (ISC)² CCSP, CompTIA Security+, GIAC GPEN

bullet icon

Penetration Testing:

bullet icon

Offensive Security OSCP, eJPT, PNPT

Other
seniority icon

Languages

English: C1 Advanced

seniority icon

Seniority

Lead

Hyderabad, IN, India

Req. VR-122608

Application Security

BCM Industry

01/05/2026

Req. VR-122608

Apply for Application & Infrastructure Security Consultant in Hyderabad, IN

*Indicates a required field

Under the terms of your specific consent or to perform our obligations under a contract with you, as applicable, we, Luxoft Holding Inc. will manually and electronically process your personal data, specifically your first name, last name, phone number, e-mail address and other data you provide us through this form.


Within this context, we process personal data only for the specific purpose(s) indicated in the individual consent language or other notices provided below.


We will – insofar as reasonably necessary for the purpose you have agreed to and within the scope of applicable laws – transfer your personal data to other entities within the Luxoft Group and to the group of third party recipients listed in our Privacy Notice. Such Recipients can be located outside the European Union (EU) and/or the European Economic Area (EEA) (“Third Countries”). The Third Countries concerned, e.g. the USA, may not have the level of data protection that you enjoy e.g. under the GDPR. This can result in disadvantages such as an impeded enforcement of data subjects’ rights, a lack of control over further processing and access by state authorities. You may only have limited legal remedies against this. Insofar our transfer of your personal data to recipients in Third Countries is not covered by an adequacy decision of the EU Commission, we achieve an adequate level of data protection as further detailed out in our Privacy Notice.


With your consent, we personalise marketing communications to you by way of carrying out marketing research analysis, analysing the surfing-behaviour of our website visitors and to adjust it to their detected tendencies, as well as to plan more efficient future marketing activities. This personalised marketing does not include any automated decision-making activities.


Further information on how we process personal data in general is available in our Privacy Notice. You may withdraw any given consent at any time. The withdrawal of your consent(s) will not affect the lawfulness of processing before its withdrawal. For any request in this context, please e-mail us at: DPO@luxoft.com.


Before uploading CV or any other information to this website, to learn more about your obligations and restrictions arising from the use of this website, please read our Terms of Use.