Average salary: Rs600,000 /yearly
More statsSearch Results: 18 vacancies
...institution (Required)
• 5 years of technical writing experience (Must)
Email: ****@*****.***
Payment Security Consultant
1. Cyber Security Consulting: Function as a Cyber Security Consultant, providing expert guidance to clients on payment security...
...Management: Build account plans based on customer business objectives and future plans aiding clients in planning their information security strategies. Serve as the lead point of contact for all customer account management matters and develop trusted advisor relationships...
...institution (Required)
• 5 years of technical writing experience (Must)
Email: ****@*****.***
Payment Security Consultant
1. Cyber Security Consulting: Function as a Cyber Security Consultant, providing expert guidance to clients on payment security...
...International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the security operations of the Security
Qualifications
Ideally with a professional...
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function of
organization. The... ...Operations:
• Lead vulnerability risk assessments.
• Implement cyber security frameworks, including NIST 800-53, ISO 27002.
• Provide...
...institution (Required)
• 5 years of technical writing experience (Must)
Email: ****@*****.***
Payment Security Consultant
1. Cyber Security Consulting: Function as a Cyber Security Consultant, providing expert guidance to clients on payment security...
...recommendations for remediation.
Collaborate with clients to communicate fin33dings and suggest practical security enhancements.
Stay uptodate with the latest cyber security trends threats tools and techniques.
Participate in internal training programs and pursue...
...highly skilled Senior Penetration Tester to lead our penetration testing team. The ideal candidate will have a deep understanding of cyber security principles and a proven track record of identifying and mitigating vulnerabilities. This role involves conducting sophisticated...
...· Collaborate with software engineers to integrate DevOps best practices into the development lifecycle.
· Implement and maintain security best practices for infrastructure and application environments.
· Stay current with industry trends and emerging technologies in DevOps...
...Expertise in developing modules and extending Magento’s core modules.
● Troubleshooting integration issues.
● Knowledgeable in fraud security and performance analysis of the Magento
Application.
● Capable of developing and implementing tailor-made Magento templates.
●...
...insurance package to safeguard your wellbeing and that of your family.
# Retirement Benefits: Participate in retirement savings plans to secure your financial future.
# Training and Development: Receive ongoing training and development opportunities to enhance your skills...
...support team. This role involves comprehensive desktop support, managing Windows Server environments, deploying and managing Sophos security products, and handling various networking tasks.
Key Responsibilities:
• Install, configure, test, maintain, monitor, and troubleshoot...
...immigration process, from course and university selection to visa categories and interviews. We go beyond advisory, offering support in securing lodging, global landing, and post-landing assistance. Representing over 50 countries, 1000+ premier institutions, and 100,000+...
...guidance in course and university selection, visa categories, and interviews. We go beyond advisory, providing comprehensive support in securing lodging, global landing, and post-landing assistance. With certifications from British Council, Brit Qualis, ISO 9001:2015, and UNI...
...server-side logic using Php.
Design and manage database schemas.
Implement APIs to support front-end functionalities.
Ensure data security and integrity in web applications.
Full Stack Responsibilities:
Collaborate with cross-functional teams to define, design, and ship...
...support team. This role involves comprehensive desktop support, managing Windows Server environments, deploying and managing Sophos security products, and handling various networking tasks.
Key Responsibilities:
• Install, configure, test, maintain, monitor, and troubleshoot...
...Expertise in developing modules and extending Magento’s core modules
4. Troubleshooting integration issues
5. Knowledgeable in fraud security and performance analysis of the Magento Application
6. Capable of developing and implementing tailor-made Magento templates
7....
...server-side logic using Php.
Design and manage database schemas.
Implement APIs to support front-end functionalities.
Ensure data security and integrity in web applications.
Full Stack Responsibilities:
Collaborate with cross-functional teams to define, design, and ship...