Average salary: Rs1,079,997 /yearly
More statsSearch Results: 989 vacancies
Rs 1 - 4 lakhs p.a.
..., and customized solutions under given timelines.
We are urgently looking for highly skilled and experienced candidates for Prompt Author for our client.
Job Location - Hyderabad
Job Type Full Time
Experience required 0 to 2 years
Job Description:
The...
...About The Role
As a Senior Software Engineer on the Security Development team you will:
Design and implement authentication and authorization services for the IAM platform.
Write and maintain IAM platform documentation.
Build secure-by-default libraries and...
...resources and external contacts for operational processes
6. Influencer: can influence by technical knowledge and skills without authority
7. Accuracy: assist in decision making by providing accurate and requisite data and information
8. Team Player: work as a team member...
...waste management and infection control practices and protocols.
Together with the pharmacy head of department, holds the final authority for quantifying pharmaceutical needs and ordering all medical drugs and consumables within the approved budget and procedures.
Promotes...
...Combine raw information from different sources.
Explore ways to enhance data quality and reliability.
Authentication and Authorization in pipelines.
Key vault and secrets consumption.
Nice to have C#, WEB API
Nice to have Hybrid source connections.
Nice...
...The Regulatory Solutions Consultant position will involve data monitoring, data authoring, content development, maintenance & operations related to regulatory consulting projects. Individuals would get exposure to Clarivate-owned Life sciences databases and external data sources...
...in 24X7 environment and 5 days Educational Qualification : · Preferred Technical Graduate Disclaimer:- 'Neither Concentrix nor any authorized 3rd party who assist with our recruitment process, ever ask candidates for ‘recruitment’, ‘processing’ or any other kind of fees in...
...related to working with unstructured datasets.
Advanced working SQL knowledge and experience working with relational databases, query authoring (SQL) as well as working familiarity with a variety of databases.
Experience building and optimizing ‘big data’ data pipelines,...
...Nice to haves:
Strong understanding of microservices architecture
Set up of Kafka publisher and consumer
Experience with authorization tools like (Okta, Auth0, Ping, Other IDaaS solutions)
AuthN/AuthZ architectures and specifications (knowledge on oauth2/OIDC)...
...team of employees
Willingness to work a flexible schedule
Education: Graduation. Disclaimer:-'Neither Concentrix nor any authorized 3rd party who assist with our recruitment process, ever ask candidates for ‘recruitment’, ‘processing’ or any other kind of fees in...
...strictly complied with.
- Ensures the activities of the school are conducted in accordance with the rules laid down by the local authority, State Education Department and the respective Board of Examination (CBSE).
- Effectively co-ordinate with the Central office for...
...improvements with VBA.
Data based decision with six sigma approach.
Handling the regular reviews from internal/external auditors and authorities
Responsibilities*
Handle coding rules/exceptions volumes
Ensure the format errors are corrected at the Start of Day...
...background and reference checks, controlled substance testing, and behavioral selection survey.
Maintain composure in dealing with authorities, executives, clients, staff, and the public occasionally under conditions of urgency and in pressure situations.
Exposure to...
...and annual accounts
Assessing financial risks and suggesting preventive measures
Ensuring complete compliance with the state authorities
Offering expert financial advice and services
Investigating and rectifying any financial discrepancies
Conducting internal...
...services to all CyberArk applications
Our groups mission is to protect sensitive assets using an access control layer (authentication authorization), cryptography, and secure communication while practicing the highest security standards
Our goal is to build and maintain a...
...Implement on-page optimization strategies to improve search engine rankings
Execute link building campaigns to enhance website authority
Perform SEO analysis and provide recommendations for improvement
Utilize Google Analytics to track and report on website performance...
...guidance to guests and employees
Write detailed incident reports and maintain a log of activities
Coordinate with local authorities if necessary
Complete regular security checks of the property
Follow all company policies and procedures
Ensure the...
...merging, custom calculations, formatting values, dimensions and measures
Experience on SAP Analytics Cloud security concepts, Authorizations, roles, and collaborations.
Understand business requirements through interacting with data analysts and end-users
Knowledge...
...activation and creation of catalogs and groups.
Should have Basic exposure to SAP BTP, Very good experience in using IDEs like Webide/Business
Application Studio
Basic knowledge on Fiori Authorization concepts.
Good to have knowledge on the IDoc/Workflow/Webdynpro.
...status, disability status or any other legally protected characteristic.
Concentrix (including any employee or any affiliates) or any authorized third party (consultants / agencies / vendors) who assist in recruiting activities ever asked for any recruitment, processing or any...