Get new jobs by email
- Requisition Id: 1693098Suggested
- ...throughout your career to help you on the path to becoming your best professional self. The opportunity : Associate Consultant-National-Forensics-ASU - Forensics - Investigations & Compliance - Pune National : National comprises of sector agnostic teams working across...SuggestedFull timeImmediate start
- Introduction A career in IBM Consulting is built on long-term client relationships and close collaboration worldwide. You'll work with leading companies across industries, helping them shape their hybrid cloud and AI journeys. With support from our strategic partners, robust...SuggestedLong term contractHybrid workWorldwideShift work
- ...Critical Skills To Possess Education ~ Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or related field ~(or equivalent practical training or certifications). Technical Skills (Foundational Exposure/Knowledge) Basic understanding...Suggested
- ...as the primary technical responder for escalations from our CrowdStrike MDR service. Perform hands-on remediation, containment, and forensic investigation within the GCP environment. Resilience & DRP Execution: Build and maintain the automation scripts used for Disaster...SuggestedRemote jobWorldwideShift work
- ...and Professor in Engineering & Technology Cluster. We are seeking experts in the following domains: Computing & IT: Computer Science, Information Technology, AI & Data Science. Core Engineering: Civil, Mechanical, Aerospace, Electronics, Electrical....Suggested
- ...Analytics. Administrative Services: Public Administration, Policy Studies, and Competitive Exam Coaching. Humanities & Social Sciences: English Literature/Communication, Psychology (Clinical/Industrial), Sanskrit & Vedic Sciences. Professional Studies: Law (Constitutional...Suggested
- .... Educational Qualifications: E./B.Tech/M.Tech Computer Science/MCA/MCS from a reputed institution. Certifications in Computer... ...VirusTotal, Shodan, etc. Understanding of security controls, forensics, kill chain analysis, risk assessment and security metrics....SuggestedWork at office
- ...CISM, CompTIA Security+ or other relevant certifications in the field Education: ~ Bachelor's or master's degree in computer science, Information Security, or a related field. How we'll support you Training and development to help you excel in your career...SuggestedFlexible hours
- Immediate joiners only!! Project Delivery • Analyse process/program specifications & translate specifications to program codes, conforming to program guidelines and programming best practices • Make changes to configurable items, which include hardware, software, documentation...SuggestedImmediate start
Rs 6 - 10 lakhs p.a.
...investigations into complex security incidents, leveraging advanced forensics techniques (memory, disk, network, malware). Lead incident... ...2+ years in a leadership role. Bachelor s degree in computer science, Information Security, or a related field. Strong leadership...SuggestedLocal areaShift work- Job Summary A Cyber Security Identity and Access Management (IAM) Analyst is responsible for ensuring the secure and efficient management of digital identities within an organization. The role involves the creation of automated workflows in identity governance, auditing ...SuggestedWork at office
- Work Level : Individual Core : Responsible, Execution Leadership : Responsive, Decisive Role : Industry Type : Electronic Components/ Semiconductors Function : Cyber Security Key Skills : Cyber Security Education : Graduate Note: This is a requirement...SuggestedFull time
- Job Title: Cybersecurity Analyst / Security Operations Analyst Experience: 4-8 years Summary: Detail-oriented and proactive Cybersecurity Analyst with strong expertise in Vulnerability Management , Incident Response , and Security Automation . Experienced with...Suggested
- About Us RedCompass Labs enables good payments and helps stop the bad. We are experts in ISO20022-based payments, instant payments, cross-border payments, payments interoperability and financial crime. We use the latest Applied AI, micro-services technology and deep payment...SuggestedFull timeWork at officeWork from homeWorldwide
- ...Stay updated with regulatory changes and cybersecurity best practices. You Have ● Bachelor's degree in Engineering / Computer Science / IT / Cybersecurity or related field. ●3-5 years of experience in IT audit, compliance, cybersecurity, or governance. ● Understanding...Work at office
- Join us as a Cyber Security Analyst in Barclays, responsible for supporting the successful delivery of Location Strategy projects to plan, budget, agreed quality and governance standards. You'll spearhead the evolution of our digital landscape, driving innovation and excellence...Immediate start
- ...Solid State Physics: Expertise in Mechanics, Electromagnetism, Thermodynamics, Optics, Semiconductors, Nanotechnology, and Material Science. Quantum & Applied Physics: Proficiency in Quantum Mechanics, Information Theory, Quantum Computing, Electronics, Robotics Physics...Long term contract
- ...control recertification etc.) Information Security ('IS') Operations (which may for example include, cyber threat operations cyber forensics, protection against data leakage etc.) IS Technology (which may include IS architecture, IS engineering, cryptographic services...Work at officeFlexible hours
- About Symbiosis Skill and Professional University (SSPU): Symbiosis Skill and Professional University (SSPU) is a premier educational institution committed to bridging the skill gap in the country by offering industry-aligned education. As a part of the esteemed Symbiosis ...Internship
- We deliver the world's most complex projects. Work as part of a collaborative and inclusive team. Enjoy a varied & challenging role. Building on our past. Ready for the future Worley is a global professional services company of energy, chemicals and resources experts...Full timeLocal area
- Job Title: Associate Professor - Clinical Psychology Location: Pune Reporting To: Program Director Job Purpose Entry-level faculty role involving teaching, research, and academic service primarily within the program or department. Key Responsibilities Academic...
- Title: Associate Professor- Academic Incharge Location: Hinjawdi Pune Job Overview: We are looking for an experienced and dynamic Associate Professor- Academic Incharge to lead our academic initiatives while also contributing to teaching and research. The ideal ...
Rs 3 - 15 lakhs p.a.
What you will deliver Support development of and implement platform security standards, co-design schemas, ensure quality at the source of infrastructure build and configuration, and find opportunities to automate manual secure processes wherever possible. Work with business...Rs 18 - Rs 23 per hour
...breach readiness exercises for incident management. Facilitate forensics analysis to determine the source of the threat. Document lessons... ...Qualifications: Bachelor's Degree in Business, Computer Science or in a STEM major (Science, Technology, Engineering, or Math...Full timeImmediate startDay shiftAfternoon shiftRs 12 - 18.5 lakhs p.a.
Design and implement SAP authorization concepts , including single, composite, and derived roles. Secure custom SAP transactions and maintain SU24 authorization entries . Implement and maintain Segregation of Duties (SoD) controls and SAP access governance policies...Rs 7.87 - 13 lakhs p.a.
YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation. At YASH, we're a cluster of the brightest...Flexible hours- ...OWASP API Security Top 10, NIST, GDPR, HIPAA, and PCI‑DSS. The Essentials - You Will Have: ~ Bachelor's degree in computer science, Engineering, or equivalent practical experience. ~8-10+ years of experience in IAM, API Security, or Application Security, with...Hybrid workWork at officeLocal areaMonday to Thursday
Rs 5 - 9.5 lakhs p.a.
Key Responsibilities SAP Authorization & Security Design and maintain SAP roles (Single, Composite, Derived) and secure custom transactions. Maintain SU24 entries and ensure compliance with SOX and IT general controls. Implement SAP security across modules and Basis...Rs 3.5 - 7 lakhs p.a.
...tool- and industry-agnostic. Education & Soft Skills: A Bachelor's degree or college diploma in information security, computer science, engineering, or a related field. Excellent oral and written communication skills are essential. The willingness to be generous...Worldwide
