Search Results: 9 vacancies
...care for the world, dare to challenge the status quo! #BELIMITLESS"
Job Description
Plan & initiate action plan to approach and secure new business for the organization
To determine effective and productive sales programs
Relationship building with all the...
.... - Experience solving concurrency issues.- Backup/Restore of Production data to lower environments, including data scrubbing. - SQL Security: managing SQL Logins and AD groups across the AG.- Knowledge of managing column-level encryption across PROD, STAG and QA environments...
...care for the world, dare to challenge the status quo! #BELIMITLESS"
Job Description
Plan & initiate action plan to approach and secure new business for the organization
To determine effective and productive sales programs
Relationship building with all the...
..., and networks- Monitor and maintain the performance of IT systems- Provide technical support and training to end-users- Ensure data security and backup- Collaborate with IT team members and stakeholders- Lead the planning, execution, and evaluation of RFPs (Request for Proposals...
...integrations and web services (SOAP, REST).
Deep knowledge in cloud infrastructure, DevOps (CI/CD), Ansible, Linux, networking & security.
VMware product & APIs exposure would be a plus. Understanding of virtual IT production data center, experience with AWS, Azure,...
...improve our clients efficiency, strengthen partnerships, increase profitability, and improve business processes with quality and value in a secure environment.
Designation: Technical Document Writer
Locations: Visakhapatnam
Qualification: B.Tech/BE in Mechanical...
...change management policies to ensure awareness, approval and success of changes made to the network infrastructure- Select and implement security tools, policies, and procedures in conjunction with the company s guidelines- Establish the networking environment by designing...
...Kafka, and Streaming is a must.- Architect, build and maintain scalable data pipelines and access patterns related to permissions and security.- Research, evaluate and utilize new technologies/tools/frameworks centered around high-volume data processing.- Work with the...
...knowledgebase and SOP documentations for the processes.
Ensure all the critical/non-critical devices are covered with the relevant Security compliance norm as per WNS security guidelines.
Ensure all the asset inventory is up-to-date as per WNS Asset policy.
To update...