...all.
We are seeking a motivated self-driven Senior Network Security Leader to oversee our global IT network operations, engineering,... ...qualify for the role you must have
Bachelor’s degree in computer science, Information Systems, or a related field.
Master's degree...
...and build an exceptional experience for yourself, and a better working world for all.
CMS-TDR Senior
As part of our EY-cyber security team, who shall work as Senior analyst who will assist clients in detecting and responding to security incidents with support of...
...and build an exceptional experience for yourself, and a better working world for all.
CMS-TDR Senior
As part of our EY-cyber security team, who shall work as SME for Defender XDR security solutions in CMS TDR team
The opportunity
We’re looking for Senior...
...It’s an exciting time to be at Infoblox. Named a Top 25 Cyber Security Company by The Software Report and one of Inc. magazine’s Best Workplaces... ...in these areas is highly desired
~Bachelor’s Degree required (Computer Science, Computer Engineering, IT preferred)
What success...
...Infrastructure Management Knowledge – Networking, Sever Management, End User Computing, Voice & VoIP, etc
Mastery of project management methodology,... ...in accordance with original agreement
Manage Infrastructure Security Vulnerabilities which consists of GVM scans, TLS protocol...
...onshore and client personnel.
Identification and testing of SAP IT security and IT risk (e.g., data systems, network and applications)... ...) for key domains such as access management, change management, computer operations, SDLC (System Development Life Cycle)
Experience in...
...for yourself, and a better working world for all.
EY-Cyber Security-CMS TDR – Incident Management Lead
We are seeking a highly... ...attributes for success
Bachelor’s degree in information security, Computer Science, or a related field; master’s degree preferred.
A...
...technologies in the field of infrastructure automation and cloud computing.- Look for opportunities to improve performance, reliability and... ...Delivery (Gitlab CI, Jenkins, Nexus etc.).- Infrastructure Security Principles.- Networking.Good-to-Have :- Experience as a DevOps working...
...technologies and trends in Java development, microservices, and cloud computing.- Providing technical guidance and mentorship to junior... ...methodologies is a plus.Preferred Qualifications :- Knowledge of security best practices in microservices architecture.- Certification in...
...Assurance Analyst – Associate
EY Technology:
Global Information Security (Info Sec) – Our mission is to protect and enable the Firm to... ...the role you must have:
Bachelor level or higher degree in computer science or related discipline such as engineering or an equivalent...
...domains, including but not limited to Cybersecurity Governance, OT Security, Security Architecture, VAPT, Managed Security Services, IAM, Cloud Security etc.
Qualifications:
~ Bachelor's degree in Computer Science, Information Systems, or related field. MBA is preferred...
...innovation and improvement.Requirements :- Bachelor's degree in Computer Science, Information Technology, or a related field.- Minimum of... ...Strong understanding of ERP Cloud architecture, data model, and security concepts.- Experience with cloud technologies and platforms (e.g...
...fit:
~3+ years experience in DevOps with good fundamentals in Computer Science, Good Scripting skills
~ Expertise in at least one cloud... ...systems such as Ansible, Chef or Puppet
~ Knowledge on Security and Networking Concepts
~ Basic knowledge on DBMS
If you...
...Redshift or Google BigQuery.
Expertise in DB migration tasks.
Security and Compliance:
Ensuring security best practices using tools... ...and integrating emerging technologies, such as serverless computing and GraphQL.
In this technical role, your expertise in these...
...requirements and liaising with other EY Services offerings such as Security Operations Center (SOC), Vulnerability Management (VM), Threat... ...have:
Bachelor’s degree (preferred in Information Systems, Computer Science, or a related discipline).
Strong analytical and critical...
...provide true on-demand cloud platforms. We implement and operate secure cloud and hybrid global infrastructures using automation... ...Operating systems like RHEL, Centos.
Must have a basic knowledge of computer networks & databases.
Must have a basic understanding of CI/CD...
...enterprise application, Object oriented programing , Design Patterns, Security standards and tools
Should have expertise in PHP, Symfony ,... ..., PostgreSQL and MongoDB.
Should have experience in cloud computing (AWS preferred) and web development.
Should have exposure to...
...problems
To qualify for the role, you must have
Be a computer science graduate or equivalent with 3 to 8 years of industry experience... ...business problems/challenges to technical solutions considering security, performance, scalability etc
Excellent communicator (written...
...techniques and tools
To qualify for the role, you must have
Be a computer science graduate or equivalent with 3 to 7 years of industry... ...business problems/challenges to technical solutions considering security, performance, scalability etc
Excellent communicator (written...
...network support engineer, you’ll be responsible for maintaining the computer hardware, software, accessories, networking and online Windows &... ...Setting up user accounts, permissions and password
Overseeing security of all systems, especially the internet, and installing...
...business problems/challenges to technical solutions considering security, performance, scalability etc. [ 10- 15 years]
Need to understand... ...underlying Azure/AWS/GCP Architectural concepts and distributed computing paradigms
Hands-on programming experience in Apache Spark...
...Attack and Penetration Testing Manager
As part of our Cyber Security team, you shall perform penetration testing which includes internet... ...the role, you must have
Graduates /BE / M Sc (Stats, Maths, Computer Science) / MBA with background in computer science and...
...enterprise industry use cases.
Ensure compliance with data privacy, security, and ethical considerations in AI applications.
Leverage data... ....
Requirements:
Bachelor's or Master's degree in Computer Science, Engineering, or a related field. A Ph.D. is a plus....
...database environments, ensuring their performance, availability, and security.
Install, configure, and upgrade Oracle and MongoDB database... ...scale applications.
Qualifications:
~ Bachelor's degree in Computer Science, Information Technology, or related field.
~3-7 years...
...years of experience who would display the architectural vision and secure complex system designs of Palantir’s engineering and business... ...big data processing and building products on distributed cluster-computing framework.
Construct workflow charts and diagrams and writing...
...Implementing, supporting, and troubleshooting Microsoft Azure solutions, which include major services related to compute, storage, network, and security.
Setting up and maintaining CI/CD pipelines, ensuring smooth deployment processes and top-quality software outputs...
...services using Node.js, Express, and related technologies.
~Implement secure authentication and authorization mechanisms for both frontend... ...database entities.
Preferred Skills:
~Bachelor’s degree in Computer Science, Engineering, or a related field (or equivalent...
...addressing any issues or concerns promptly
~Generate leads and proactively approach potential clients, presenting our value proposition and securing new partnerships
Desired Candidate:
~Graduate with excellent communication skills.
~Good working knowledge and experience of e-...
...Materials Manager in the smooth operation and efficient running of the Store Department while meeting department’s objectives
Qualifications
Basic knowledge in Receiving, Store management & Account preferable.· Basic computer skills particularly in the use of MS Office....
...and other technology professionals in performing information technology control audits, information technology control engagements, security audits and security engagements
Skills and attributes for success
~ Collaborating with other members of the engagement team to...