Search Results: 1,215 vacancies
...Infrastructure Services (P) Ltd seeking a knowledgeable and dynamic Cyber Security Trainer to join our team. The ideal candidate will possess a... ...• Relevant Certifications
• Bachelor’s degree in computer science, Information Technology, Electronics & Communications, Cyber...
...Technologies line One Identity or similar IAM tools.
Qualifications:
# Graduate Degree in computer science, information technology, or similar field
# Certification in security domain like CISSP, CISM etc is a plus.
# Cloud certifications and knowledge in Azure, AWS...
...Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
(Urgent opening for 10th, 12th
any under Graduation/Graduated)
Dear Candidate,
Requirement available in Computer Operator / Data Entry
Qualification 10th/ 12th / Any Graduation / Any Diploma
Fresher's are most welcome
Job Location All India
Salary 15k to...
...all.
We are seeking a motivated self-driven Senior Network Security Leader to oversee our global IT network operations, engineering,... ...qualify for the role you must have
Bachelor’s degree in computer science, Information Systems, or a related field.
Master's degree...
(Urgent opening for 10th, 12th
any under Graduation/Graduated)
Dear Candidate,
Requirement available in Computer Operator / Back Office
Qualification 10th/ 12th / Any Graduation / Any Diploma
Fresher's are most welcome
Job Location All India
Salary 25k to...
...Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection... ...updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats...
...improve training materials and delivery methods based on feedback and industry developments.
Requirements
Bachelors degree in Computer Science Engineering or related field (or equivalent experience).
Minimum 3 years of experience working in DevOps roles with handson...
Wide experience in teaching assigned courses to undergraduates and graduates
Profound knowledge of student assessment process
Deep knowledge of instructional methodologies
Ability to develop online courses
Ability to assist in college administration duties
Ability...
Provides glassware by ordering, receiving, and inventorying glassware.
Keeps laboratory supplies ready by inventorying stock; placing orders; verifying receipt.
Keeps equipment operating by following operating instructions; troubleshooting breakdowns; maintaining supplies...
....Tech/M.Tech/MCA/PG [Mandatory]
Experience: 8-12 years [Cyber Security]
Location: Kerala, Trivandrum[WFO] Permanent opportunity
Required... ...Skills (Technical Competency):
· Bachelor's degree in Computer Science, Information Security, or a related field.
Vulnerability...
Main responsibilities
Organize and implement an instructional program
Identify, choose and implement different teaching methods for all students with various educational backgrounds
Transfer to students theoretical information, practical skills, methods and techniques...
...line with Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Security Manager is responsible to develop, implement, monitor and evaluate the hotel’s safety and security procedures, including fire safety,...
...Digital, you will be part of a dynamic team with ample opportunities to grow and make a difference.
Position Description
Information Security risk assessments help review system/application/vendor architecture and controls from a perspective of cyber security risks and help...
...Cybersecurity / SOC Lead
The role is part of our ASOC team, tasked to deliver Managed Security Services (MSS) and Security Advisory Services. It is great opportunity to put your experiences in building a world class SOC service center. We are looking for experienced cyber...
...Summary
You will be responsible to provide an excellent and consistent level of service to your customers. The Security Officer is responsible to assist in the efficient running of the security function.
Qualifications
Ideally with a professional diploma or certificate...
...Responsibilities:
# Cyber Security Consulting: Function as a Cyber Security Consultant providing expert guidance to clients on payment... ...Technical Knowledge: Understanding of infrastructure management cloud computing network administration systems/OS administration database...
...central to doing business, and therefore everyone in EY Information Security has an important role to play. Join a global team of almost 900... ...Directory (AD) environment, hybrid cloud deployment, mobile computing, policy driven security, SSO, identity lifecycle management, and...
...prohibited items using X-Ray units and/ or physical search procedures
Screen passengers using HHMD & pat down search
Subject additional security search for selectee passengers
Exercise access control to the aircraft as per security norms
Undertake pre-flight checks of...