Average salary: Rs3,028,153 /yearly
More statsGet new jobs by email
Search Results: 2,909 vacancies
- ...software products that help corporations, government agencies, and other organizations reach... ...Software is looking for a dynamic Information Developer to join our vibrant, global content... ...another technical discipline Information Security: Information security is everyone's...SuggestedFull time
- ...transforming the Govtech industry by bringing governments and their constituents together. We are... ...residents, while disseminating critical information, Granicus brings governments closer to... ...at least 2 years in a lead role. Security and Privacy Requirements Responsible...SuggestedLocal areaRemote job
- ...audit, and monitoring tools at both the government and enterprise levels.The Principal Analyst... ...keeping the team up to date.- Perform security monitoring and incident response... ...escalate, and assist in the remediation of information security incidents.- Prioritize multiple...SuggestedWork at officeRemote jobWork from home
- ...transforming the Govtech industry by bringing governments and their constituents together. We are... ...residents, while disseminating critical information, Granicus brings governments closer to... ..., or content recommendations. Security and Privacy Requirements Responsible...SuggestedLocal areaRemote jobNight shift
- ...SUMMARY OF POSITION AND OBJECTIVES: The Information Security Consultant/Architect plays a pivotal role in safeguarding the technological infrastructure and assets of Eurofins through meticulous evaluation, integration, and enhancement of security measures, evaluation of intricate...SuggestedWork at office
- ...Responsibilities: Security Infrastructure Management: Administer and maintain our IT security infrastructure, including firewalls,... ...programs to educate employees about best practices for maintaining information security and preventing social engineering attacks...Suggested
- ...be designing and implementing Zero Trust Security Model to improve BT's security posture. You... ...and sizes, from big household names and government departments, right through to sole... ...if required, so please do not hesitate to inform us. DON'T MEET EVERY SINGLE REQUIREMENT...SuggestedFull time
- ...Threat Vulnerability Bachelor's Degree in Computer Science, Information Systems, Business Administration or other related field Certification... ...be required for specific functions 6-9 years of information security experience Experience with gathering functional requirements...SuggestedWork at office
- ...advice and guidance to engineering teams on applying relevant security policies and standards; and how to adopt security controls defined... ...AND EXPERIENCE WE ARE LOOKING FOR ~ Bachelor s degree in Information/Cyber Security, Computer Science or Software Engineering ~3 years...SuggestedLocal area
- ...solutions and services to Fortune 500, privately held and government-like entities. The Data Scientist will be... .... Ensure adherence to data privacy and security guidelines when handling sensitive information. Skills and attributes for success ~ A self-...SuggestedFlexible hours
- ...committed to data quality, integrity, and security, using data to promote decision-making,... ...value through strategic planning, governance, transformation, and talent management.... ...disability needs. Visit our FAQs for more information about requesting an accommodation. About...SuggestedWork at office
- ...prominent corporate, institutional and government clients under the J.P. Morgan and Chase... ...disability needs. Visit our FAQs for more information about requesting an accommodation. About... ...provider of payment, fraud and data security for companies, capable of authorizing transactions...Suggested
- ...Cybersecurity Architect to lead the design, implementation, and governance of our enterprise security architecture. The ideal candidate will have a strong... ...and Qualifications: 10–16 years of experience in information security, with a minimum of 5 years in a cybersecurity...SuggestedFull timeWeekday work
- ...prominent corporate, institutional and government clients under the J.P. Morgan and Chase... ...disability needs. Visit our FAQs for more information about requesting an accommodation. About... ...provider of payment, fraud and data security for companies, capable of authorizing transactions...Suggested
- ...The role of an Information Security Officer (ISO) is that of a role holder aligned to a portfolio of applications (Application ISO). The ISO is responsible for the operational aspects of ensuring compliance with the Information Security Principles. The ISO is the primary contact...Suggested
- ...Recording data processing activities # Governance mechanism # Privacy organization #... ...IT, data analysis, data management, data security, data protection tools and techniques).... ...ethical decisions based on the available information, data and criteria; manage stress, emotions...Full time
- ...Responsibilities Responsible for reviewing maintaining, and updating security policies, procedures, and standards/baselines. Support all... ...Drive security compliance monitoring. Risk assessment for information security and cyber risks Adoption of global frameworks such...
- The IT Security Specialist will be responsible for supporting the security and privacy aspects... ...Contributes to the development of the information security requirements of vendor and... ...in Cyber Security, Risk Management and Governance Risk and Compliance. ~ Strong experience...Contract workHybrid workShift work
- ...vulnerability assessments across systems Develop ISMS policy, risk indicators, and awareness programs Key Deliverables: Robust information security controls and monitoring in place Updated ISMS and compliance with RBI/industry regulations Timely closure of VAPT and...
- ...Role Responsibilities: Lead day-to-day information security operations and incident response Maintain ISMS policies and regulatory compliance documentation Conduct periodic VAPT exercises and ensure timely closure of findings Collaborate with CISO, IT, Risk, and...