Average salary: Rs1,717,500 /yearly
More stats ...Position objective: This position is responsible for supporting the Ethics and POSH program at PhonePe Group. The position reports to the Ethics and POSH Lead and rolls down to overall Compliance Org. of PhonePe Group, with a responsibility to support in the execution and...
~Street-smart, meticuluous, trustworthy and honest
~Good at doing systematic analysis
~Good with Microsoft Powerpoint
~Good with Microsoft Excel (Piovt Tables, Formulas, Macros)
~Exteremely adpt and finding and serching information in internet
~Find learn and implement ...
...of concerns; collect all relevant evidence; make and report on investigation findings; document all investigative steps in the firm's ethics case management system and an Executive Summary; and when claims are substantiated, facilitate and lead the discipline committee process...
...priorities (and prioritize work tasks accordingly), proactively anticipate needs, and drive improvements, while promoting a strong code of ethics and integrity within a company's operations. You will be a team player, willing to learn new skills and assist where needed, and...
Position Overview:
We are searching for a highly skilled Graphic Designer who possesses a deep understanding of UI/UX principles to play a key role in elevating our digital marketing efforts. The ideal candidate will collaborate closely with our multidisciplinary team to...
Job Description
Knowledge and Skills Requirements
Ability to learn and understand the firm and data protection polices as well as familiarity with other risk management initiatives
Ability to manage tasks and activities in a timely manner and be responsible for specific...
About KPMG in India
KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant...
...and donation management software. We're proud of what we do, and our product reflects it!
The Role
Donorbox is seeking a Growth Hacker Generalist (Conversion Optimization Specialist) with a strong background in conversion optimization, specifically for landing pages and...
About KPMG in India
KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant...
...VAPT methodologies and tools, including vulnerability scanning and ethical hacking techniques.
•Experience in implementing and managing Web... ...Certified Administrator, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) are a plus....
...Assessment and Penetration Testing activities
Working on internal security tooling (Golang, Bash, Python)
Engaging with the ethical hacker community, and conveying feedback to the dev team
Qualifications - We don't care for degrees :)
Strong foundation in web security...
...Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent4) Extensive experience in security technologies such as: Security information and event management (SIEM), IDS...
...role, preferably in the financial services or cryptocurrency industry
Good communication skills
CompTIA Security+, Certified Ethical Hacker (CEH), or other relevant certifications would be a plus
Strong communication skills
Able to work independently
Strong...
...the ability to effectively communicate technical findings to non-technical stakeholders.- Relevant certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or GIAC Web Application Penetration Tester (GWAPT) are preferred but not...
...regulations, as applicable
Must hold at least one industry cybersecurity certification CompTIA Cybersecurity Analyst CySA+, Certified Ethical Hacker, CISSP, SC-500, MS-500, AZ-500 certifications preferred
Experience with security monitoring EDR/XDR toolsets such as , Carbon...
...of secure coding practices, cryptographic protocols, and authentication mechanisms.
Relevant certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Mobile Security Certified Professional (MSCP) are a plus.
Excellent...
...Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP), or Certified Ethical Hacker (CEH), are preferred, as is exposure to GRC frameworks including (but not limited to) ISO27001; NIST, CIS benchmarks & Cyber...
...management processes (e.g., methods for assessing and mitigating risk)
~ Ethical hacking principles and techniques; penetration testing principles... ...programming.
~ Preferred certifications:
~ Certified Ethical Hacker (CEH)
~ Certified Penetration Tester (CPT)
~ Certified Expert...
...you are curious; in approach, resilient. You understand that work ethic is critical, and uncovering powerful, deeper insights are a by... ...many may consider unresolvable.
You have the mind of a growth hacker, an entrepreneurial flair, and a passion for utilizing data and technology...
...Preparing disaster recovery plans / tabletop exercise / PEN Test / weekly monthly metric reports.
CompTIA Security+, Certified Ethical Hacker (C|EH), CSAor equivalent are highly desirable.
Qualification:
Bachelor s degree (or equivalent experience) in Computer Science...
...Education qualification: Bachelor's degree in Information Technology, Computer Science and/or related areas
~ CISM/ CISSP/ Certified Ethical Hacker/ CompTIA CySA+ Certification & knowledge - Must Have
~ ITIL V3/4 Foundation/ Expert certification & knowledge – good to have
~...
...relevant network, security and infrastructure technologies
Good to have certifications
· CISSP / CISA / CISM
· Certified Ethical Hacker
· SANS Certification
· Other General End point Security OEM Certifications - FireEye, Symantec, McAfee
Preferred...
...concepts to both technical and non-technical stakeholders.
Certifications (Preferred): Relevant certifications such as Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM) would be...
...Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent.
~ Able to work shifts on a rotating basis for 24/7 support of clients.
~ Experience in security...
...collaborate with development teams, Devops team and security teams
Experience with Incident Response, Security Audits, Monitoring and Analysis
Nice to Have:
~ Relevant security certifications (e.g., CISSP, Certified Ethical Hacker, CompTIA Security+) are a plus....
...experience
5+ years expert experience executing penetration testing/ethical hacking against IoT, embedded systems, cloud-based technologies,... ...common application security vulnerabilities. The Web Application Hacker s Handbook is a great resource to be familiar with.
Possess...
...certification such as:
CREST Registered Penetration Tester (CRT)
Offensive Security Certified Professional (OSCP)
Certified Ethical Hacker (CEH) Certification
GIAC Certified Penetration Tester (GPEN)
Company certification schemes from major vendors and equipment...
...generate revenue goals. Develop impactful discussion on Admission.
Responsible for generating revenue in Ed Tech space.
Revenue Growth Hacker
Skills
Excellent spoken Communication Skills and interpersonal skills.
Competent with CRM and Microsoft Office.
Strong...
...scripts in Python or other script to automate all security requirement. At least one recognized security certification:- Certified Ethical Hacker (CEH)- CompTIA Security+- Certified Information System Security Professional (CISSP)- Certified Information Security Manager (CISM...
...Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent
~ Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code...