Average salary: Rs518,098 /yearly
More statsSearch Results: 4,947 vacancies
...Sales teams to generate opportunities for Security Product offerings.
Design, Presents,... ...technology road map, and annual goals for the Cyber Security Practice. Build a distinguished... ...prevention, security incident and event management, identity and access management, role-...
...SecOps position works closely with the Application Analyst and Security Analyst teams to setup, configure, implement, and maintain the... ...vulnerabilities.
Evaluate and report on risk to various teams and management
Implement, review, and provide guidance on access controls...
...We are seeking a skilled Identity Management Developer with a strong understanding of Identity Management tools, Active Directory, and Password Management concepts. The ideal candidate should have extensive experience in development and customization activities, particularly...
...Job Details
Role : Manager - SOC (Audits /Assessments)
Work Location : Chennai
Work Type : Work from Office
Qualification... ...Roles & Responsibilities:
Point of Contact for all Client Security Questionnaires and RFP/RFI responses
· Create and maintain Security...
...years
Location : Chennai/Coimbatore/Bangalore/Hyderabad
Candidate Requirement:
~ Expert in Troubleshooting, configuring & managing Active Directory DS 2019, DFS (DFSR and DFSN), AD FS & AD CS
~ Sound knowledge and troubleshooting experience in managing large...
...Application Penetration Tester) is mandatoryJob Description :Requirement Criteria:- Graduation in EC or CS or IT or Information Security or Cyber Security or MCA.- Working experience as a Penetration Testing Expert for 5 year(s)- Hands on experience with security testing frameworks...
...Service Operations stakeholders on legacy Plant products, Plant Cyber Security and electrical models (GCC and BoP).
We maintain... ..., intrusion detection, malware detection, and identity/access management
CISSP or CISSM certification is considered a significant...
...and Cybersecurity Presales experience- Deep understanding of Cloud infrastructure, M365, Automation, network & end user security, cloud security, managed security services, security operations center, compliance & risk management.- Participate in pre-sales activities including...
...serves over 3,700 customers across more than 50 countries, through a secure, cloud- enabledglobal delivery model.We are 18,000 employees... ...Office and IT
~ Demonstrated facilitation and project management skills
~ Ability to adapt to changing requirements Attention to...
...from Candidates with good communication skills.
Faculty Position in Computer Science Department
Job Title: Professor
(a) For Cyber Security Program
No of Vacancy: 3
Qualification: B Tech, M Tech, Ph.D. (CSE/IT) from a reputed college/ institute with good research/...
Rs 40 lakh p.a.
...Job Description:
Information Security Manager
Job Summary & Core Requirements
• Minimum 5 years' experience in IT Governance and Cyber Security as HOD (mandatory)
• Vendor industry experience (mandatory)
• Hands on and ability to implement security technical solutions...
...level proficiency in Windows, Mac, or Linux.
Network and Endpoint Security background is a must.
Excellent customer-facing abilities and... ...compliance in DKIM, O365 EOP, ATP, AIP, Azure AD, CAS Alerts Management, Proof Point Email Security, FireEye ETP, TrendMicro, DLP,...
...Candidates with good communication skills.
Faculty Position in Computer Science Department
Job Title: Associate Professor
(a) For Cyber Security Program
No of Vacancy: 3
Qualification: B Tech, M Tech, Ph.D. (CSE/IT) from a reputed college/ institute with good research/...
...Position Requirements
Candidate with 15+ year of experience in working in operations/managed services.
Strong technical experience on Firewall, Palo Alto, Cloud Security, and Data center
Carrying out deployment, maintenance, monitoring, and management tasks
Demonstrable...
Requirements : - 4+ years of IT and relevant security experience.- Must have one cyber security certification.- Experience/understanding of Vulnerability Management. Distribute Vulnerability reports to relevant stakeholders and track them for closure.- Experience/understanding...
...or individual are constantly under the threat of cyber attack and this is proven through a steady uprise in the security incidents and data breaches year on year. We at... ...working with Developers, Product Owners, Program Managers, and Security Engineers. As part of the security...
...with Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Security Manager is responsible to develop, implement, monitor and evaluate the hotel’s safety and security procedures, including fire safety, employee...
...ServiceNow)
Perform information system security vulnerability scanning to discover and analyze... ...that defines the Threat & Vulnerability Management Program, Policy and Procedures... ...Research, evaluate, and assess emerging cyber security threats, incidents, and vulnerabilities...
...Top 100 Best Companies to Work for, Novac Technology Solutions Private Limited
Novac is currently hiring for Information Security Risk Manager
NOVAC is a company built on determination, tenacity, and an indomitable entrepreneurial spirit. We have retained these qualities...
...Job Description
Company RNTBCI PL Job Description Cyber Threat Intelligence Analyst
As a Cyber Threat Intelligence Analyst,... ...will collaborate with various teams to enhance the Renault Group security posture and proactively identify potential threats.
Key Responsibilities...