Average salary: Rs590,000 /yearly
More statsSearch Results: 3,218 vacancies
...and end to end information on workflow.
~ Experience in configuration, integration and troubleshooting CyberArk Privileged Account Security (PAS) Infrastructure.
~(Enterprise Password Vault, Password Vault Web Access, Central Policy Manager, Privileged Session Manager, Application...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...coordination & audit assistance
# Liaise with stakeholders in relation to cyber security issues and provide future recommendations
# Maintain...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...coordination & audit assistance
# Liaise with stakeholders in relation to cyber security issues and provide future recommendations
# Maintain...
...experience- CISSP, CISM, CISA certification desired- Develop and implement IT security strategy, policies, and procedures to protect the organization's IT infrastructure, networks, applications, and data from cyber threats- Lead a team of cybersecurity professionals, including...
...Role Purpose
The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...ambitions.
Independently or as a member of team; design and develop cybersecurity assessment plan and assess cybersecurity reports for security related issues. Responsible for ensuring all aspects of cybersecurity are covered and satisfied.
-Documents product cybersecurity...
...Responsibilities:
Monitor cloud networks and systems for security issues.
Investigate security breaches and other cybersecurity incidents... ...implementations.
End Point Detection and Response tools and management.
Information/Cyber security certifications are a plus...
...? Hold an experience in generating different type of reports, consulting with concerned teams, for PAM Audit Requirements
? Should be... ....
? Assist with the management of PAM-related audit or other security findings.
Qualifications:
The requirements listed are representative...
...Role/Title Infra - Cyber Analyst
Primary Skills/expertise
Cyber Security
Preferred skills/expertise
Role & Responsibilities
Identify threats and vulnerabilities in systems and software architecture and resolve causes of security threats as well as prepare...
...they love. With Xplor Pay, we help businesses get paid quickly and securely – without hidden fees. We built the tech ourselves, and our... ...Guidance to junior team members on TTPs and novel approaches
Assist Cyber Threat Response with incident investigations and aid in technical...
...Product group of MNC that provides services in
learning and Assessment space.
About the Role
Designation : Cyber Security Engineer
Responsibility of / Expectations from the Role
Identify security measures to improve incident response...
...Band – G2
Experience: 8 to 12 Years
Must have skills: Devops, Big Data / Analytics (eg. Elastic Stack, Hadoop)
Good to have: Cyber Security, SIEM
The main accountabilities of the role are:
1. Platform Configuration, Development and Optimisation – accountable for...
...management on performance of the delivery
What you will need to have:
A Bachelors degree with 17+ years of experience in Cyber Security domain.
Must be able develop project plan and track the plan using MS Project and must have experience in Agile methodology and...
...first. Through this position, the ideal candidate would use their cyber experience to support, develop, establish and maintain hardware/... ...requirements within the Boston Scientific Quality System for Cyber Security Risk Assessment and relevant processes, including Threat Modeling...
...cybersecurity competency.- Responsible for TARA, CAL derivation, Attack tree creation and Vulnerability Analysis.- Responsible for cyber security requirements analysis, reviews, requirements traceability, change requests, and documentation.- Responsible for creating and...
...Azure, M365 and Cybersecurity Presales experience- Deep understanding of Cloud infrastructure, M365, Automation, network & end user security, cloud security, managed security services, security operations center, compliance & risk management.- Participate in pre-sales activities...
...fintech, we’d like to ask you: Are you FIS?
About the team:
IT Security Analyst will be member of FIS Security Governance Team. Security... ...of working on network security / information security / Cyber Security
~ Knowledge of Firewalls, Encryption and Security Tools...
...Hi Candidate ,
Tech M is hiring for security Consultant .
• Proficient in Incident Management and Response • Experience in security device... ...preferred. • In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident...
...:
Define/understand the scope, objectives, and targets of the SecuRED program every year
Responsible for delivery to the SecuRED Programme... ...of data such as Key Risk Indicators (KRIs) across various Cyber Security technologies and processes;
Develop briefing collateral...
...Dew Software, a trusted leader in the Digital Transformation space, is seeking a skilled Cyber Security Splunk Engineer to join their dynamic team. With a commitment to innovative solutions, Dew Software collaborates with Fortune 500 companies to help them achieve their strategic...