Search Results: 472 vacancies
...this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity
# Monitoring and...
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function of
organization. The role... ...policies and procedures.
• Serve as an advisor for Governance, Risk, and Compliance.
• Provide leadership in performing regulatory...
...procedures for processing tasks.
# Meet productivity targets and deadlines consistently.
# Maintain confidentiality and security of sensitive information.
# Adhere to company policies and regulations always.
Requirements
# Bachelors degree or equivalent...
...Role Description
This is a full-time on-site role for a Cyber Security Instructor located in Kochi. The Cyber Security Instructor will... ...Application Security, Cybersecurity, Network Security, and Information Security skills
Experience in malware analysis
Strong knowledge...
...researcher, gathering and incorporating relevant information into proposals.
9. RFP Creation:
•... ...com
SOC L2 (Work from office)
Cyber Security Analyst who provides dedicated eyes on... ...or knowledge of relevant regulations governing cyber intelligence processing and handling...
...build an exceptional experience for yourself, and a better working world for all.
Perimeter Security Specialist.
Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to...
...ways to improve efficiency and spending.
8. Analyze financial information and summarize financial status.
9. Guide junior accountants... ...leadership role.
Thorough understanding of financial application security ensuring that all financial data is secure and complies with...
...Associate in Supply Chain Services / Enablement is to act within Governance, Risk & Compliance (GRC). The successful candidate will play a... ...into a usable format
Excellent PowerPoint skills - complex information must be simplified and presented consistently to standards expected...
...experience for yourself, and a better working world for all.
Security Technology – Cross Function Security Technology– Support... ...technologies and upgrade current ones.
Provide technical oversight of Information Security technologies that fall under the team’s...
...product labeling issues for fulfilling government requirements. Assist management in hiring... ...Follow all company and safety and security policies and procedures; report maintenance... ...maintain confidentiality of proprietary information; protect company assets. Address guests’...
...motivating and coaching employees. Follow all company and safety and security policies and procedures; report any maintenance problems,... ...clean and professional; maintain confidentiality of proprietary information; protect company assets. Speak with others using clear and...
...INR Per month
Notice Period- Immediate Joiners preferred
Role Description
This is a full-time on-site role for an Information Technology Recruiter. The Information Technology Recruiter will be responsible for full-life cycle recruiting, IT recruitment, technical...
...Implementation knowledge on Oracle Identity Governance (OIG) for user provisioning, role... ...ensure functionality, performance, and security. - Troubleshoot issues, perform root cause... ...Bachelor's degree in Computer Science, Information Technology, or related field. - 5 - 10 years...
...Security Operation Center - Manager
Cochin (India) | immediately
Grow and shape a secure future together with us!
To reinforce... ...steps to improve SOC Services.
Develop and/or review Information security standards, policies, and procedures. Review IT Sec architecture...
...service delivery.
· Ensure the account business target achievement on: Order booking, Revenues, Collections, New Account identification and Churn control.
· Business processes: Comply and follow business processes both internal and external in line with government Policies....
...Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...impacts of performance-based designs, accessibility standards and security compliance in
development.
• Good understanding and working... ...add value and improve the testing processes.
Any Additional Information/Specifics
• The candidate should have excellent communication...
...Treatment/Open Door Policy process. Follow all company and safety and security policies and procedures; report accidents, injuries, and unsafe... ...and professional, maintain confidentiality of proprietary information, and protect company assets. Welcome and acknowledge all guests...
...ensure uniform and personal appearance are clean and professional; maintain confidentiality of proprietary information; protect company assets; protect the privacy and security of guests and coworkers. Welcome and acknowledge all guests according to company standards; anticipate...
...researcher, gathering and incorporating relevant information into proposals.
9. RFP Creation:
•... ...com
SOC L2 (Work from office)
Cyber Security Analyst who provides dedicated eyes on... ...or knowledge of relevant regulations governing cyber intelligence processing and handling...