Search Results: 507 vacancies
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function of
organization. The role involves overseeing various aspects of security, disaster recovery, security finance management, documentation, compliance, and program...
...-date vendor records, including contact information, payment terms, and other relevant data.... ...valuementor.com
Virtual Chief Information Security Officer (vCISO)
As a Virtual Chief... ...Certified: Security Operations Analyst Associate (any 1 will do)
· Desirable: SIEM product...
...Function:
Supervise, instruct and coordinate the activities of Security Associates.
Monitor and arrange shift activities according to... ...by the Security Associate.
Serve as a principal source of information on rules and procedures governing security and parking operations...
...SalaryINR Per month
Notice Period Immediate Joiners preferred
Role Description
This is a fulltime onsite role for an Information Technology Recruiter. The Information Technology Recruiter will be responsible for fulllife cycle recruiting IT recruitment...
...Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position...
...lead the IT/IS team in building our cybersecurity portfolio and services.
Take ownership of working continuously to improve G10X security posture.
Take ownership for the operations aspect of customer-facing services.
At G10X, help build competencies in cybersecurity...
...Security Operation Center - Manager
Cochin (India) | immediately
Grow and shape a secure future together with us!
To reinforce... ...steps to improve SOC Services.
Develop and/or review Information security standards, policies, and procedures. Review IT Sec architecture...
...design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop... ...and risk analyses
# Identify risks associated with business processes, operations,
#...
...specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by... ...Completing all tactical security operations tasks associated with this engagement.
# Analyses all the...
...Role Description
This is a full-time on-site role for a Cyber Security Instructor located in Kochi. The Cyber Security Instructor will... ...Application Security, Cybersecurity, Network Security, and Information Security skills
Experience in malware analysis
Strong knowledge...
...International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the security operations of the Security
Qualifications
Ideally with a professional...
...ensure uniform and personal appearance are clean and professional; maintain confidentiality of proprietary information; protect company assets; protect the privacy and security of guests and coworkers. Welcome and acknowledge all guests according to company standards; anticipate...
...Housekeeping paperwork.
Follow all company and safety and security policies and procedures; report any maintenance problems, safety... ...and professional; maintain confidentiality of proprietary information; protect company assets. Welcome and acknowledge all guests according...
...clean-as-you-go procedures.
Follow all company and safety and security policies and procedures; report accidents, injuries, and unsafe... ...and professional, maintain confidentiality of proprietary information, and protect company assets. Welcome and acknowledge all guests...
...-date vendor records, including contact information, payment terms, and other relevant data.... ...valuementor.com
Virtual Chief Information Security Officer (vCISO)
As a Virtual Chief... ...Certified: Security Operations Analyst Associate (any 1 will do)
· Desirable: SIEM product...
...outs, room assignments, and room change/late check-out requests. Secure payment; activate/reissue room keys. Ensure rates match market... ...credit card authorization reports. Supply guests with directions and information. Answer, record, and process all guest calls, requests,...
...Ability to perform well both within a geographically disparate team and autonomously
-Strong understanding of and adherence to Information Security requirements
-Experienced in MS Office
-A methodical approach with keen attention to detail
Email: ****@*****.***...
...clean-as-you-go procedures.
Follow all company and safety and security policies and procedures; report accidents, injuries, and unsafe... ...and professional, maintain confidentiality of proprietary information, and protect company assets. Welcome and acknowledge all guests...
...SME/ Security Architect – Palo Alto
Grow and shape a secure future together with us!
mispa Technologies is an innovative IT security services and solution provider with head office in Langenfeld (Rhineland), Germany and Dev & Operations Center in Cochin (India) registered...
...Follow all company and safety and security policies and procedures; report accidents... ...maintain confidentiality of proprietary information, and protect company assets. Welcome and... ...locations around the world. JW believes our associates come first. Because if you’re happy, our...