Average salary: Rs658,749 /yearly
More statsSearch Results: 7,785 vacancies
Rs 32000 - Rs 38000 per month
Hotel Tip Top International Wakad, Pune Looking for position Duty Manager Industry: Hospitality Experience: Experience candidate can also apply. Location: Pune (Maharashtra, India) Salary: Rs. 32K - 38K per pm. Walk In Interview Time: 11 am to 6 pm Please send your CV by email...
...Supply Chain Operations and HR Operations and more.
Job Description
Role Purpose: Work closely with the global IT Security Compliance Manager to ensure that business meets security and compliance requirements. Work with Global Office IT Domains for Objective evidence...
...world’s most sophisticated clients using leading technology and exceptional service.
Summary :
Responsible for managing an Information Data Security Operations and Support group. The Information Security Operations and Support function includes the Data Security...
...CACI ltd seek an experienced Junior Technical Project Manager with a strong emphasis on DC Network Infrastructure & Network Security project delivery.
You must have a proven history of working in network and network security environments and preferably be CCNA/CCNP qualified...
...Digital Transformation space, is seeking a highly skilled and experienced individual to join our team as a Sr. Lead Information Security Manager (EKM). At Dew Software, we are committed to partnering with Fortune 500 companies to drive their digital success and deliver exceptional...
Rs 30 - 40 lakhs p.a.
...Job Description:
• Designated Information Security Head for the Organization
• Ensuring strategic alignment of information security... ...prevention strategy design and sustenance
• Privileged Access Management Compliance
• Overseeing various information security and...
...of DR setup and recovery procedures
Should be Independently managing and resolving the technical issues escalated and complex issues... ...mechanisms for proactive performance and risk assessment through the security solution and disseminate feedback to other internal security...
Secures premises and personnel by patrolling property, monitoring surveillance equipment, and access points. Investigates security breaches... ...cooperative and professional relationships with employees, managers in other
departments, representatives from organizations, and...
...Hi Candidate ,
Tech M is hiring for security Consultant .
• Proficient in Incident Management and Response • Experience in security device management and SIEM (Splunk). Splunk Certification is preferred. • In-depth knowledge of security concepts such as cyber-attacks...
...Job Description
Project Role : Security Architect
Project Role Description : Define the cloud security framework and architecture... ...of the cloud security controls and transition to cloud security-managed operations.
Must have skills : SailPoint IdentityNow
Good...
...DevOps team, you will be responsible for leading and implementing security practices throughout the software development and deployment... ...security best practices.
Monitoring and Alerting:
Implement and manage security monitoring and alerting systems.
Respond to and...
...We're looking for a Security Analyst
This role is Office Based
Security Analyst, IT Security and Compliance
Job Brief:
We... ...scans on both on-premise and cloud-based assets
~ Experience in managing SIEM (Security Information and Event Management) solutions like...
...career journey with us.
In one sentence
The Information Security Analyst will lead the efforts to secure the Amdocs ecosystem by... ...software products/ conducting risk and threat analysis/ analyzing and managing a secure solution in the domain of infrastructure/ application...
...this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information... ...around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...2.
Process Adherence
Adherence to SLA’s (90-95%), response time and resolution time TAT
UAM - User Access Management
...deployed on AWS- 4+ years of technical experience in Incident Management for AWS Cloud solutions- 1+ years of experience with AWS Incident... ...expert or stakeholder, has previously supported information security audits in any of the following frameworks or regulations : PCI...
...About Position
We are seeking an experienced Security – Oracle IDM to join our Security Practice team. The successful candidate must... ...8 years
Job Type : FTE
What You'll Do
Identity Management suite deployment and configuration experience.
Have designed...
...~3 years of experience in Information Governance Compliance or Security & Technology
~ Demonstrated experience in IT Governance Risk and... ...presentation, speaking and written communication skills to manage communication with a diverse group of stakeholders at all organization...
...Responsibilities:
Monitor cloud networks and systems for security issues.
Investigate security breaches and other cybersecurity... ...Proxies, SIEM logging/monitoring and IDS/IPS.
Configuration management using Salt and Terraform.
SSL/TLS and other encryption standards...
...Privileged Access Management (PAM) ? Sr. Lead
Summary
This position is responsible for managing the activities of the Privileged Access... ....
? Assist with the management of PAM-related audit or other security findings.
Qualifications:
The requirements listed are...