Average salary: Rs763,750 /yearly
More stats ...Title: Data Security Consultant
Location: Remote
Duration: 12 Months
Job Description:
Project Schedule:
Anticipated Project Start Date: July 1 2024.
Anticipated End Date: June 30 2025.
Sample Tasks:
Assist with evaluation of architecture...
...POSITION
Application Security Engineer
LOCATION
Remote
DURATION
6 Month C2H
CLIENT
PACIFIC LIFE INSURANCE COMPANY
INTERVIEW TYPE
Video
VISA RESTRICTIONS
Only GC or Citizens
REQUIRED...
...Location: TX
Duration: 6 Months
Job Description:
Security Engineer. Technical skill set Must have hands on experience with Cisco ASA FXOS Palo Alto firewalls and Panorama. Full understanding of Palo Alto Firewall concepts like Security Zones Security...
...Job Title: NG911 IT Security Analyst
Location: Remote MondayFriday 35 hours/week (not including mandatory unpaid meal break after 6 hours of work)
Duration: 12 Months
Hours: 35 Hours/Week
Years of Experience: 12 Yrs.
Job Description Justification...
...company operates through two divisions Retail Banking and Services and Corporate and Institutional Banking
Position: Information Security Engineer III Daily
Location: Montreal QC H3A 2A6
Duration: 12 Months
Job Type: Contract
Work Type: Onsite...
...NAVA Software solutions is looking for a Network Security Engineer
Details:
Network Security Engineer
Location: NYC Onsite
Duration: 12 months
Need strong Fortinet / Fortigate experience
Job Description
Provide support for all...
...solutions with Automation CI/CD Data Pipelines.
Ability to understand data landscape and draw architectures.
Ensure solutions are secured scalable resilient and bring agility into product development
Ability to measure and monitor data coverage using KPIs/OKRs...
...engineers.
Provides continuous improvement ideas to reduce expenses and/or improve efficiency.
Applies recommended information security standards when developing code and seeks to validate.
Assesses the technical viability of new and emerging products and...
...am; OR Thurs Sun 11:00am 9:00pm; or as needed for escalations; includes weekends & holidays
Role Responsibilities:
Perform security monitoring and analysis leveraging SIEM and security tools
Conduct technical analysis and correlation of operating system database...
...of techniques such as Continuous Integration Continuous Delivery Test Driven Development Cloud Development application resiliency and security
Proficiency in one or more general purpose programming languages
Working proficiency in a portion of software engineering...
...and legal regulations regarding copyright laws, advertising practices, and client's corporate brand compliances and zero compromise on security and confidentiality.
Problem-Solving & Adaptability: Ability to work in a high-pressure environment, problem-solve to meet...
...design tools and vendors.
Develops and ensures adherence to corporate standards affecting enterprise hardware software networks and security.
Maintains a thorough knowledge of Matsons business and continually expands on this knowledge.
Identifies and implements...
...typically supporting complex IT systems.
Support and Maintenance for Finance SBS server infrastructure to include updates upgrades and security.
Backup to senior level server administrator. Technical Environment: VMWare vSphere Server 2019 (Server and SQL) Redhat 7/8...
...Develop deploy and support Cloud infrastructure as code artifacts or modules
Design and lead the implementation of highly scalable and secure cloud infrastructure solutions for AWS utilizing Terraform and Python.
Participate on an agile team to deliver AWS Account and...
...the world. Our client is the largest private broadband company in America providing advanced digital video Internet telephone and home security and automation services over its own nationwide IP network. The client is committed to creating meaningful moments of human...
...include business continuity/disaster recovery backup and restoration repartitioning zerooutage upgrades etc).
Implement and enforce security practices for enterprise messaging platforms
Provide Operational support for platform issues to application development teams...
...Atlas usage.
Key responsibilities
Manage and optimize MongoDB Atlas clusters and configurations
Implement and maintain database security and compliance
Monitor database performance and troubleshoot issues
Collaborate with development and infrastructure teams to...
...Event Mesh
PO B2B
ABAP skills with interface development experience.
Collaborating with technology teams Process teams Security and Basis team for the MDG Implementation efforts.
Creating/Updating MDG tech specs design documents understanding global MDG...
...line of business and technology colleagues
Strong interpersonal communication skills
Applies and prepares to ensure proper security standards for code development.
Creates technical documentation specifications and project artifacts for developing code
Identifies...
...members.
IT Associate: Highly skilled, tech-savvy individuals who keep our computer systems, networks, and software up-to-date and secure to ensure smooth daily operations of the team to serve our customers. Individuals who are problem solvers and thrive on finding...
...Such as Apache Apache Tomcat Database server file system server configuration of AJP connector email server MQ server.
9. Implement security measures including SSL certificates firewalls access controls and vulnerability assessments to protect web servers and applications....
...true capability to design out process flow and build it from beginning to end.
~5 years of experience working with NIST and ISO security standards and frameworks.
~ Active Directory and Azure Active Directory Microsoft Okta
~ Windows Linux/Unix server...
...staff, determining business requirements for IT systems, managing the design and implementation of IT infrastructure, and eliminating security risks. A large part of their daily responsibilities includes directing the work of other IT staff such as IT Consultants, System...
...compare the business impact of relevant technical implementation options
The Employee is required to follow the firms Information Security Policies (ISP and ISMP) at all times
Microsoft Business Solutions Overview
Your longterm future is every bit as important to...
...distribute)
Perform fulfillment functions such as assembly packaging shipping and tracking of kitted materials
Follow mailroom security procedures
Barcode tracking or face scanning incoming mail and packages
Perform logging transmission receipt and timely...
...resource utilization particularly for advanced applications projects to achieve costefficiency.
Implement and maintain robust security measures to safeguard client data and information specializing in advanced applications security practices.
your...
...requirements.
Advise on exercises like gap analyses or cost/benefit/risk analyses.
Ensure data models adhere to design and security standards.
Perform data profiling and analysis to ensure the quality of the data models.
Collaborate with functional and technical...
...EC2 Instance Management:
Build deploy configure and monitor EC2 instances to ensure optimal performance scalability and security.
Collaborate with crossfunctional teams to troubleshoot and resolve any EC2related issues.
Implement best practices for EC2...
...applications migration to cloud.
Responsibilities:
Design implement and manage cloud architectures focusing on network and security across AWS Azure OCI and GCP clouds.
Have a comprehensive understanding of network technologies and concepts that includes routing...
...overall integration planning design and implementation of enterprisewide networks including both voice and data networks as well as security systems.
Isolate coordinate and resolve performance problems utilizing a variety of hardware and software diagnostic/testing tools...