Search Results: 539 vacancies
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...Email: ****@*****.***
Virtual Chief Information Security Officer (vCISO)
As a Virtual Chief Information Security Officer... ...product management, and customer support to ensure the delivery of high-quality software.
• Prepare and maintain clear and detailed documentation...
Rs 9 lakh p.a.
...lifecycle from concept to production
Should have expertise in CPU based designs (Qualcomm/NXP/Mediatek/Ambarella etc)
Experience on High speed design is must (PCIe, DDR3/4, SATA, HDMI, USB3.0, MIPI etc.)
Should have a good understanding of Thermal performance of the...
...Job Description
Prime Function:
Supervise, instruct and coordinate the activities of Security Associates.
Monitor and arrange shift activities according to schedule requirements and team availability.
Ensure all personnel are present & have assumed their duties...
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function of
organization. The role involves overseeing various aspects of security, disaster recovery, security finance management, documentation, compliance, and program...
...independence.
Role Description
This is a full-time on-site role for a Cyber Security Instructor located in Kochi. The Cyber Security Instructor will be responsible for delivering high-quality training and education in various cyber security domains. This includes teaching...
...sort, and distribute daily mail/deliveries.
• Maintain office security by following safety procedures and controlling access via the... ...with cross-functional teams
• Strong problem-solving abilities
• Highly developed analytical and organizational skills
• Ability to...
...correct entry, mathematical accuracy, and proper codes. Organize, secure, and maintain all files, records, cash and cash equivalents in... ...by Supervisors.
PREFERRED QUALIFICATIONS
Education: High school diploma or G.E.D. equivalent.
Related Work Experience...
...employees as required by law.
Follow all company and safety and security policies and procedures, report accidents, injuries, and unsafe... ...QUALIFICATIONS
Education: High school diploma or G.E.D. equivalent.
Related Work Experience:...
...collaboration with front-end developers. Should be able to design highly responsive web-applications that perfectly meet the needs of the... ...-end developers with server-side logic
• Implementation of security, data protection and integration of data storage solutions
• Writing...
...encouraging juniors where needed and ensuring all coding is to a high
standard.
With excellent knowledge of NodeJS, MySQL and AWS and... ...approach
Email: ****@*****.***
3D Secure - Project Support Analyst
3D Secure (Mastercard ID Check/Verified...
...Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position...
...Specifics:- Experience in Quality assurance and production support.
- Highly effective and thrives in a dynamic environment
- Comfortable... ...of performance-based designs, accessibility standards and security compliance in
development
? Passion for best design and coding...
...lead the IT/IS team in building our cybersecurity portfolio and services.
Take ownership of working continuously to improve G10X security posture.
Take ownership for the operations aspect of customer-facing services.
At G10X, help build competencies in cybersecurity...
...programs which may include product design engineering, information security, code maintainability and reliability.
Manage resource... ...Experience using distributed version control systems: Git/SVN/TFS
High level understanding of service line business processes and application...
...Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...Email: ****@*****.***
Virtual Chief Information Security Officer (vCISO)
As a Virtual Chief Information Security Officer... ...product management, and customer support to ensure the delivery of high-quality software.
• Prepare and maintain clear and detailed documentation...
...Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the security operations of the Security team
Qualifications
Ideally with a...
...Email: ****@*****.***
Virtual Chief Information Security Officer (vCISO)
As a Virtual Chief Information Security Officer... ...product management, and customer support to ensure the delivery of high-quality software.
• Prepare and maintain clear and detailed documentation...
...world for all.
TEM Senior –DevSecOps
As part of our Cyber Security team, you will build and manage a secure cloud/on-prem platform... ...closely with DevOps, Architects and Developers and QA to build highly reliable and secure products. You shall also perform in-depth...