Search Results: 22 vacancies
...entrance is easily accessible to cars and taxis at all times.
Conduct briefing for concierge and Front Office Assistants.
Log security incidents and accidents in accordance with hotel requirement
Communicates with FOM all information likely to be interest to them...
...atmosphere of high individual morale.
Responsible for usage of all departmental master keys and all other keys to ensure safety and security for guests and hotel property
Ensure that standards of cleanliness in assigned guest rooms are achieved and maintained on a...
...end technologies, such as JavaScript, HTML5, and CSS3.- Knowledge of object oriented PHP programming.- Understanding accessibility and security compliance.- Strong knowledge of the common PHP or web server exploits and their solutions.- Understanding fundamental design...
...operation of all IT systems, networks, servers, and services- The IT Infrastructure Manager will play a key role in ensuring the stability, security, and efficiency of our IT environment- Reviews appropriateness of technologies used for system components and recommends...
...Responsibilities :- Network & System administrator for maintaining internal server architecture and cloud servers.- Defining network security and backup policies.- Linux and Windows server admin- Installing and configuring software, hardware and networks- Monitoring system performance...
...Enterprise Data Product Portfolio, you will be working with key customers to deliver timely and accurate data ingestion pipelines in a secure manner- You are expected to provide guidance on proper integration design ensuring that our architectural guidelines are met, and the...
...Assist our influencer marketing team in building a core network of influencers
Reach out to influencers and representatives to secure social posts on behalf of our brands
Requirements
Proficiency in Microsoft Excel
Strong communication
Impeccable discipline...
...interfacing to embedded hardware using SPI, Ethernet, USB, and I2C.- Experience with initial board bring-up with work experience in U-Boot, Secure boot - (at least in one)- Deep knowledge of VPN and security applications in Linux systems.- Expert in C/C++ and have professional...
...models for development are current and comply with common standards. - Design solution based on non-functional requirements such as security, maintainability- Identifying risk, issues, dependencies, and planning mitigation action with the PM at project level- Environment configuration...
...technical architecture and understand the product development roadmap.- Analyze & optimize user metrics, system performance and database security.- Work with Ycenters leadership team to conduct user research and design UX/UI.- Maintain third-party API integrations & help...
...utilization of resources.
Write code/queries to clean data of errors inaccuracies and invalid entries.
Create dependable accurate and secure RESTFul APIs for various consumers.
Suggest design and implement solutions for Data Engineering tasks.
Must have Skills Sets...
...facilitate automation- Idea on publishing to Apigee and Azure and GCP basics- Hands-on experience with Spring Cloud, Config server, Spring security and batch, Lombok, oAuth2- Experience working in IDEs like Eclipse, IntelliJ, VSCode- Knowledge on SOLID Principles and JAVA Design...
...Complete understanding of Clustering with Failover and load balancing technology.- Well capable to work with ILO with HP and DELL & Securing resources with Shared folder and NTFS permissions.- Firmware/BIOS upgrades on DELL servers, Downloading the bundle package from dell...
...Package / Cocoa Pods Private libraries for handling app functionality using native and third-party frameworks.- Making sure IOS Mobile App secure by performing Veracode/Checkmarx scan and providing the solutions to avoid any vulnerability attack.- Fine tuning app performance by...
...leadership team to identify, design, and implement the appropriate reporting user experience or the clients, ensuring, adherence to security standards as well as usability and scalability best practices- Formulate framework and mechanisms to ensure smooth data integration and...
...Bull India by using fake appointment letters and/or interview letters in return for money, at times terming such money as a ‘refundable security deposit’.
Please be informed and cautioned that Red Bull India does not have any association with such individual/s and never...
Rs 15 - 20 lakhs p.a.
...behavior, Conversion of competition dealer, Growth at a dealer counter.
• Making Monthly plan: Territory wise, Dealer wise planning, Security Deposit planning, New dealer appointment plans, Predefined Journey Planning for Territory Leaders.
• Understanding of policies,...
...new innovations and the use of digital technologies.
Your day to day responsibilities will include:
• To identify, source and secure both long term and short-term pest control & prevention business opportunities.
• To develop new business opportunities within current...
...calls handled
6. Data Capturing, beneficiaries details with 100 % accuracy
7. Adherence to Average Call Handling Time i.e
8. Must secure
75 % in periodic test of Soft Skills,
9. Must attend training minimum of 48 hours per year.
10. If all possibilities of...
...solutions (client service delivery experience on Azure), including storage, role-based access control, networking, virtual machines, and security compliance.- Experience in designing enterprise data model.- Experience dealing with modern complex privacy and security requirements...