Average salary: Rs3,750,000 /yearly
More statsSearch Results: 210 vacancies
- ...effective security controls and processes. Oversee third-party risk assessments, ensuring vendors comply with security policies. Data Protection & Privacy Compliance: Implement and oversee compliance with DPDP (Digital Personal Data Protection Act, India) and GDPR...Suggested
- ...the principles, intent, ways, rationales, approaches, ideas and solutions proposed, deliberated and adopted in creating / enacting data protection regimes # Comprehend privacy legislative ideas, intent, articles, sections and expectations set by them and their relevance to...SuggestedFull time
- The FTSE Russell Data Governance team is dedicated to the meticulous application of the LSEG... ...Investments (SI) Data Governance Officer, reporting to the Data Governance Director... ...pregnancy or disability, or any other basis protected under applicable law. Conforming with applicable...Suggested
- ...will play a key role in the implementation and adoption of the data governance framework which will modernize Amgens data ecosystem,... ...management, data quality, master data management, data stewardship, data protection, etc. In depth experience with data products development life...Suggested
- ...Data Privacy Specialist Omnicom Global Solutions About Omnicom Global Solutions Omnicom Global Solutions is an integral part... ...opportunity for an Data Privacy Specialist. This role is dedicated to protecting data and operational integrity across the Omnicom global...Suggested
- ...Looking for candidate who could join our Risk Team to assist in Data Privacy with their knowledge and experience. JOB ROLE The Data... ...will assist in implementing, maintaining, and monitoring data protection and privacy initiatives across the organization. This role involves...Suggested
- Job Description We are seeking an experienced Network and Security Administrator to join our IT Support team at Maheshwaram. This role has been created to address the increased number of systems and firewalls at our location, ensuring effective monitoring and management of...Suggested
- ...Security Policy Development: Develop, implement, and enforce IT security policies, standards, and procedures to protect against unauthorized access, data breaches, and other security threats Access Control: Manage user access permissions and privileges, ensuring that...Suggested
- Required Skills Technology | Cisco R and S Network Administrator - Level 2 Support Technology | Nexus Switch Administrator - Level 2 Support Technology | Checkpoint Firewall Administrator - Level 2 Support Technology | Cisco WLAN Administrator - Level 2 Support ...SuggestedShift work
- ...secure, available, reliable, and resilient. We take Cybersecurity seriously. We're not just invested; we're committed. We're not just protecting data; we're empowering. Kyndryl is committed to making the world safer, not only by investing in state-of-the-art services and...Suggested
- ...technology and procedures. Run diagnostics on any changes to data to verify any undetected breaches. Develop custom systems for... ...infrastructure. Keep current with new intrusion methods and develop protection plans. They have an in-depth understanding of vulnerabilities,...Suggested
- ...Breach Detection & Diagnostics: Run diagnostics on any changes to data to verify any undetected breaches and continuously monitor for... ...to secure the network infrastructure. Threat Intelligence & Protection: Keep current with new intrusion methods and develop proactive...Suggested
- Requirements Elicitation, Understanding, Analysis, & Management Understand the project'Vision and requirements, and contribute to the creation of the supplemental requirements, building the low-level technical specifications for a particular platform and/or service solution...Suggested
- Required Skills & Qualifications: ~ Bachelor's degree in Computer Science, IT, Cybersecurity, or related field ~2+ years of experience in cybersecurity or information security ~ Proficiency in tools like SIEM (Splunk, QRadar, etc ), IDS/IPS, and antivirus systems ~ ...Suggested
- Conduct Penetration testing for thin & thick client-based applications. Manual security assessments of web applications on thick & thin clients. Conduct application security on Manual & Automated assessments. Perform Web Application and API Security Testing Perform...Suggested
- Mandatory Skills-- Cybersecurity, Cloud, CyberArk, Infrastructure, Onboarding, SaaS, Cyber Security, LDAP, Linux, Windows, Configuration, Error Messages, Patching, Safes. Job Descriptions-- About the Role: We are seeking a Cyber Security Senior Analyst with 3+ years...
- ...Policy and Architecture Advisory is part of GSC Security Support Office pilar, combining the Security Policy and Architecture Advisory,... ...environment utilizing directory services; ~ designing/managing/protecting complex network environments; ~ design and/or management of...Work at office
- Key Responsibilities : CyberArk Architecture & Implementation : Design and implement CyberArk architecture , ensuring security and scalability across the organization. Lead the integration and development efforts for CyberArk and ensure the effective on-boarding...
- Roles and Responsibilities: Review and approve security deliverables: information system security questionnaires, architecture design documents, security checklist. Perform Risk analysis and identify/propose mitigation plan Make arbitrations evaluating and documenting...
- ...including capability development (People, Processes, Technology, Data). Ability to perform Controls Assurance / Attestation and... ...network security, cloud security, application security and endpoint protection. Deep knowledge of security risks, data privacy laws, and...Hybrid work