Get new jobs by email
- Requisition Id : 1649209Suggested
- ...multidisciplinary collaboration. Role Description This is a full-time on-site role for an Assistant Professor of Computer Science, based in the Kolkata metropolitan area. The Assistant Professor will engage in teaching undergraduate and postgraduate courses, curriculum...SuggestedFull timeFlexible hours
- ...system availability Your Profile: · Completed IT education (e.g., technical college, apprenticeship, university of applied sciences) or equivalent professional experience · Solid knowledge of Windows Server operating systems and Active Directory ·...SuggestedFull timeApprenticeshipHybrid workImmediate startRemote jobShift work
- Interested Candidates can be apply Last Date-15/01/2023Suggested
- ...Experience: 6 Months – 1.5 Years Employment Type: Full-Time Qualifications and Certifications: Bachelor's degree in Computer Science / Information Technology / Cybersecurity (preferred) Relevant certifications (preferred but not mandatory): CEH (Certified Ethical...SuggestedFull time
Rs 3 - 7 lakhs p.a.
We are seeking a highly skilled Cybersecurity Consultant with expertise in Information Protection, specifically in the area of Data Discovery. This is a 6-month contract role focused on designing and operationalizing Data Discovery processes. The ideal candidate will possess...SuggestedContract work- Join Our Dynamic Team as an Assistant Professor in Physiotherapy at Brainware University! Are you a passionate physiotherapy professional looking to make a significant impact on the future of healthcare Brainware University is seeking a dedicated and knowledgeable Assistant...Suggested
Rs 3.5 - 7 lakhs p.a.
...tool- and industry-agnostic. Education & Soft Skills: A Bachelor's degree or college diploma in information security, computer science, engineering, or a related field. Excellent oral and written communication skills are essential. The willingness to be generous...SuggestedWorldwideRs 3 - 7 lakhs p.a.
Assess Zscaler SSL Inspection: Evaluate the current state of SSL inspection using Zscaler. Identify strengths and weaknesses in the existing setup. Perform Gap Analysis: Conduct a thorough gap analysis to determine where improvements are needed. Document findings...SuggestedRs 6.5 - 11.5 lakhs p.a.
Responsibilities Candidate should have working experience in the field of File Integrity Monitoring Responsible for security researcher to provide insight and understanding of new and existing information security threats Responsible to participate in recommending ...SuggestedRs 9 - 12.5 lakhs p.a.
We are seeking a highly skilled and proactive Cybersecurity Engineer with 6–8 years of experience in securing enterprise environments. The candidate will be responsible for implementing and maintaining cybersecurity solutions, detecting vulnerabilities, monitoring threats...SuggestedRs 3 - 6 lakhs p.a.
Must have 6+ years of SAP Security and/or GRC support and implementation experience Hands-on experience on SAP Security and Authorizations for ECC, S4HANA, BW4HANA, Fiori, BOBJ and SAP GRC AC 10.1 & 12 administration, configuration / integration. Experience in newer SAP...Suggested- Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – ...Suggested
- At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. EY Cyber Security – Technology Consulting...SuggestedFull timeWork at officeWorldwide
- Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – ...SuggestedRemote job
- Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – ...
- Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – ...Shift work
- Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – ...
Rs 200 per day
1. Interested candidates who fulfill the above requirements may send their neatly typed application on plain paper as per the following format with the self- attested copies of certificate of proof of age, qualifications, caste, experience etc. and two copies of recent passport...For contractors- Candidates are advised to submit all relevant copies (Mark sheets & Certificates) in support of their Academic/Technical/ Professional qualifications and experience. 11. The Institute does not undertake any responsibility for sending or replying to the candidates not selected...Permanent employmentContract workFor contractors
- Job Title : Information Security Consultant (ISO 27001 / GRC)Description :We are looking for a skilled and detail-oriented Information Security Consultant with strong experience in ISO 27001:2022 implementation, IT audits, and GRC activities, especially within the BFSI (Banking...
- Application in the prescribed form is to be downloaded from our website from 01/4/2022 to 22/4/2022 (up to 4.00 pm). The application form, duly filled in, is to be submitted either in person at the Establishment Section of the university at the above address on all working...For contractors
- ...on SAP security and GRC controls. The essential requirements of the job include Bachelor's or Master's degree in Computer Science, Information Technology, or related field. Minimum 8 years of experience in SAP Security and GRC, including hands-on implementation...
Rs 3 - 13.5 lakhs p.a.
...to streamline compliance processes. What Youll Need to be Successful ~ Bachelors degree in information technology, Computer Science, or equivalent experience ~3+ years of work experience in IT Audit, IT Security, or IT Risk Management ~3+ years of work experience...Rs 3 - 12 lakhs p.a.
...compliance assessments as needed. What Youll Need to be Successful ~ Bachelor s degree in Information Technology, Computer Science, or equivalent experience. ~5+ years of experience in IT Audit, IT Security, or IT Risk Management. ~ Proven experience conducting...Rs 3 - 8.5 lakhs p.a.
...findings. Required Skills and Qualifications: Education : Bachelor s degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent work experience). Experience : 2+ years of experience in cybersecurity, with a focus on incident...Rs 3 - 8 lakhs p.a.
We are hiring a Security Analyst to work on our growing IT Security team This position will primarily monitor our computer networks and IT assets for security issues; install, operate, and maintain security software; and resolve, report, and document any security issues ...Rs 2.5 - 6 lakhs p.a.
Key Responsibilities: Lead the implementation and configuration of AVDF on all financial databases. Design and architect the AVDF solution for various databases supporting applications like EBS, Webcenter, ORMB, DWH, etc. Implement database security solutions in OCI...- Assistant Professor In Computer Science & Engineering (CSE) Start Date Starts Immediately CTC (ANNUAL) Competitive salary Competitive salary...Immediate start
Rs 4 - 20 lakhs p.a.
Role & Responsibilities: Provide 24x7 support for data security and encryption services in production systems. Manage Key Management Systems (KMS) and Tokenization platforms (Thales, Fortanix, Protegrity). Perform encryption key lifecycle operations generation, rotation...
