Average salary: Rs482,500 /yearly
More statsSearch Results: 8 vacancies
...care for the world, dare to challenge the status quo! #BELIMITLESS"
Job Description
Plan & initiate action plan to approach and secure new business for the organization
To determine effective and productive sales programs
Relationship building with all the...
.... - Experience solving concurrency issues.- Backup/Restore of Production data to lower environments, including data scrubbing. - SQL Security: managing SQL Logins and AD groups across the AG.- Knowledge of managing column-level encryption across PROD, STAG and QA environments...
...care for the world, dare to challenge the status quo! #BELIMITLESS"
Job Description
Plan & initiate action plan to approach and secure new business for the organization
To determine effective and productive sales programs
Relationship building with all the...
..., and networks- Monitor and maintain the performance of IT systems- Provide technical support and training to end-users- Ensure data security and backup- Collaborate with IT team members and stakeholders- Lead the planning, execution, and evaluation of RFPs (Request for Proposals...
...change management policies to ensure awareness, approval and success of changes made to the network infrastructure- Select and implement security tools, policies, and procedures in conjunction with the company s guidelines- Establish the networking environment by designing...
...business opportunities within the assigned cluster of key accounts, cross-selling financial products and services offered by Chola Securities, and expanding the client base through proactive sales efforts. 3. Serving as the primary point of contact for key accounts, managing...
...Kafka, and Streaming is a must.- Architect, build and maintain scalable data pipelines and access patterns related to permissions and security.- Research, evaluate and utilize new technologies/tools/frameworks centered around high-volume data processing.- Work with the...
...knowledgebase and SOP documentations for the processes.
Ensure all the critical/non-critical devices are covered with the relevant Security compliance norm as per WNS security guidelines.
Ensure all the asset inventory is up-to-date as per WNS Asset policy.
To update...