Search Results: 817 vacancies
...Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection... ...updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats...
...line with Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Security Manager is responsible to develop, implement, monitor and evaluate the hotel’s safety and security procedures, including fire safety,...
...Infrastructure Services (P) Ltd seeking a knowledgeable and dynamic Cyber Security Trainer to join our team. The ideal candidate will possess a... ...• Relevant Certifications
• Bachelor’s degree in computer science, Information Technology, Electronics & Communications, Cyber...
...central to doing business, and therefore everyone in EY Information Security has an important role to play. Join a global team of almost 900... ...Directory (AD) environment, hybrid cloud deployment, mobile computing, policy driven security, SSO, identity lifecycle management, and...
...Responsibilities:
# Cyber Security Consulting: Function as a Cyber Security Consultant providing expert guidance to clients on payment... ...Technical Knowledge: Understanding of infrastructure management cloud computing network administration systems/OS administration database...
...prohibited items using X-Ray units and/ or physical search procedures
Screen passengers using HHMD & pat down search
Subject additional security search for selectee passengers
Exercise access control to the aircraft as per security norms
Undertake pre-flight checks of...
...We are currently seeking a highly qualified Senior Manager Cyber Security with extensive experience in information security consulting and... ...as expertise in providing advisory services related to National Computer Emergency Response Team (CERT) operations. The successful...
...The Principal Security Analyst works in the KnowBe4 Threat Research Lab, and is responsible for deploying and configuring various security products and solutions such as endpoint, email, web and network protection. Responsibilities:
Deploy, configure, maintain various cybersecurity...
...Summary
You will be responsible to provide an excellent and consistent level of service to your customers. The Security Officer is responsible to assist in the efficient running of the security function.
Qualifications
Ideally with a professional diploma or certificate...
...to keep an organization the size of ours working efficiently and securely. We have more than 390,000 people in more than 160 countries,... ...verbal.
Ideally, you’ll also have
Bachelor's degree in computer related field or equivalent work experience.
Information Technology...
...Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the security operations of the Security team
Qualifications
Ideally with a...
...Senior Security Data Scientist
Data Science Cochin, Kakkanad Role Purpose and Key Accountabilities:
The primary role of a Senior Security Data Scientist at Prevalent AI involves analyzing significantly large volumes of security telemetry data collected from various...
...newly discovered threat agents, exploits, attacks.ÂConduct configuration reviews for OS , DB, Firewall, routers, Switches and other security devices/components.
Desired Candidate Profile
Â
Minimum Exp Required - 2 to 5 years
Preferred candidates from Kerala & Tamil...
Rs 50000 per month
...team. The ideal candidate will have a deep understanding of cyber security principles and a proven track record of identifying and... ...Requirements
• Bachelor's or Master's degree in Information Security, Computer Science, or a related field.
• Professional security certifications...
...Designation: Computational Biologist
Full Time Opportunity
Location: Full Time
Job Description:
- Experience in computational biology and bioinformatics related areas is a must.
- MS/PhD in Bioinformatics, Biostatistics, Mathematics, Computer Science, Computational...
...opportunity:
In this role, you will contribute to a highly strategic and exciting Data Solutions team within Core Business Services as a Security and Access Manager.
Your key responsibilities
The role of the Security and Access Manager includes:
Understanding...
Job Description : We are seeking a highly motivated AI/ML Team Lead to lead our team of machine learning and computer vision engineers for video analytics project. The ideal candidate will have a strong background in developing and deploying machine learning models, and a proven...
Rs 50000 per month
...team. The ideal candidate will have a deep understanding of cyber security principles and a proven track record of identifying and... ...Requirements
• Bachelor's or Master's degree in Information Security, Computer Science, or a related field.
• Professional security certifications...