Average salary: Rs1,788,888 /yearly
More stats ...Job Description
Project Role : Security Architect
Project Role Description : Define the cloud security framework and architecture... ...is required
Educational Qualification : Bachelor or college degree in related field or equivalent work experience
Project...
...Position Overview
Job Title: Technical Information Security Officer
Location: Pune, India
Role description:
The TISO acts... ...Qualifications
Bachelor of Science degree from an accredited college or university with a concentration in Computer Science or Software...
...an SME ensuring adherence to RCA process
Maintain and improve mechanisms for proactive performance and risk assessment through the security solution and disseminate feedback to other internal security team
Adhere to all policies and procedures
Service Improvement...
...Hi Candidate ,
Tech M is hiring for security Consultant .
• Proficient in Incident Management and Response • Experience in security device management and SIEM (Splunk). Splunk Certification is preferred. • In-depth knowledge of security concepts such as cyber-attacks...
...DevSecOps Engineer to join our dynamic team. As a key member of our DevOps team, you will be responsible for leading and implementing security practices throughout the software development and deployment lifecycle. The ideal candidate will possess a strong background in...
...We're looking for a Security Analyst
This role is Office Based
Security Analyst, IT Security and Compliance
Job Brief:
We are seeking an experienced Security Analyst to join our IT Security and Compliance team. The ideal candidate will have a cyber security...
...particularly interested in applicants with expertise in the following areas:
Finance: Behavioural Finance, Technical Analysis, Fixed Income Securities, Financial Risk Management; Derivatives, Mergers and Acquisitions, Taxation, International Finance, and Economics(Microeconomics,...
...workplace built by the kind of people that Amdocs employs.
Make your career journey with us.
In one sentence
The Information Security Analyst will lead the efforts to secure the Amdocs ecosystem by guiding and monitoring the different IT/ Product/ Business teams to...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...About Position
We are seeking an experienced Security – Oracle IDM to join our Security Practice team. The successful candidate must be customer-facing and security-centric, have good communication skills and thorough security knowledge with outstanding presentation skills...
...Product group of MNC that provides services in
learning and Assessment space.
About the Role
Designation : Cyber Security Engineer
Responsibility of / Expectations from the Role
Identify security measures to improve incident response...
...in Cybersecurity, Information Technology, Finance, or related field.
~3 years of experience in Information Governance Compliance or Security & Technology
~ Demonstrated experience in IT Governance Risk and Compliance (GRC) including financial governance compliance
~...
...Summary :
Responsible for managing an Information Data Security Operations and Support group. The Information Security Operations... ...preferred, but not required.
Experience Required :
A College or University degree and/or relevant proven work experience in the...
...Worldpay’s path to being the largest and most-loved payments company in the world.
About the team
Monitor and maintain physical security of facilities and offices through use of automated security systems and employee identification card system
What you will do:
•...
...Job Title - Senior Security Analyst Job Location - Baner, Pune
About Company
Our client is a pioneering Identity SecOps provider that arms identity and cybersecurity teams with end-to-end, real-time identity security posture management and threat detection. They are...
...performance
Recommends and deploys structural changes to the operating environment in collaboration with Infrastructure, information security and vendor teams
Releases public area documentation and manages key information such as build and release procedures, dependencies...
...Responsibilities:
Monitor cloud networks and systems for security issues.
Investigate security breaches and other cybersecurity incidents.
Document security breaches and assess the damage they cause.
Work with the Cloud Operations team to perform tests and uncover...
...to help drive adoption and understanding of PAM across the enterprise.
? Assist with the management of PAM-related audit or other security findings.
Qualifications:
The requirements listed are representative of the knowledge, skill, and/or ability required:
? Extensive...
...Job Description
~ Security guard requment argent hiring SIS security against which of all ready
Job Requirement
Experience
Fresher
Internship
No
Skills
Frisking, CCTV Monitoring, Handling Fire Extinguisher, In / Out entry on register, In / Out...
...management on performance of the delivery
What you will need to have:
A Bachelors degree with 17+ years of experience in Cyber Security domain.
Must be able develop project plan and track the plan using MS Project and must have experience in Agile methodology and...
...time only on F5 day to day operations such as
· F5 load balancer related tasks like Virtual server creation, SSL profile attachment, Security profile attachment, Vulnerability fixing on VS weightage= 15%
· F5 irule code writing to protect the websites from attack and for...
Summary :We are seeking a seasoned Security Architect with a passion for building secure and resilient cloud and OT environments. You will leverage your extensive experience in security best practices, cloud technologies, and regulatory compliance to design, implement, and manage...
Are you interested in automating the build and deployment process of the application with ensuring the application security? If yes, then Payatu is the place for you. We are always in search of passionate people to expand our renowned Bandit family at Payatu. In the quest for...
...correct tools / systems towards execution of successful pen-test- Conduct pen-test on variety of Automotive systems / ECUs- Perform security assessment of different hardware modules and identify vulnerabilities- Handle multiple hardware & software tools, required for testing...
..., Entrepreneurship and Innovation, and FamilyBusiness Management.
Finance: Behavioural Finance, Technical Analysis, Fixed Income Securities, Financial Risk Management; Derivatives, Mergers and Acquisitions, Taxation, International Finance, and Economics(Microeconomics, Macroeconomics...
...Job Purpose
IT Security lead is responsible for ensuring the integrity, and availability of the organization's information assets by implementing and maintaining robust security measures and practices. IT Security personnel is responsible for protecting the organization'...
Rs 15 - 25 lakhs p.a.
# Help define consistent Secure Software Development Lifecycle practices
# Ensure end-to-end security of Enterprise apps
# Improve secure coding practices, application security requirements, automation, training, and metrics
# Integrate threat modeling practices into the...
...Description
Introduction
Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security...
*Strong expertise in designing solutions using Okta toolset, enabling single sign on services for both cloud and on prem applications
*1-3 years of Experience working with F5 tools with specific experience protecting application using F5 Access Policy Manager (APM) module ...
...Description
What We Do
Managing cyber risk, together – Today the modern enterprise is an Enterprise of Things. We are on a mission to secure the Enterprise of Things with active defense by identifying, segmenting, and enforcing compliance of every connected thing in a real-...