Average salary: Rs577,617 /yearly
More statsGet new jobs by email
- ...The Manager - IT Infrastructure is responsible for overseeing and managing the organization's information technology infrastructure, ensuring its stability, reliability, and security- This role involves leading a team of IT professionals and collaborating with other...SuggestedContract workOngoing contract
- ...We are actively seeking a highly skilled and proactive Security Lead to join our client's team through Acme Services . This pivotal... ...environment. Qualifications Bachelor's degree in Computer Science, Information Security, or a related field. Proven experience in a lead...SuggestedLong term contract
- ...industry trends and competitor activities to inform strategic planning. Negotiate contracts and agreements with clients to secure profitable deals. Skills and Qualifications... .... ~ Proficient in using CRM software and MS Office Suite for reporting and analysis....Suggested
- ...telecommunications.- Ensure optimal performance, reliability, and security of IT systems.- Manage IT budget and procurement processes.2.... ...data security measures to protect sensitive guest and hotel information.- Conduct regular security audits and risk assessments.- Ensure...Suggested
- ...towards preparing test datasets, writing and execution of the test cases incorporating aspects of localization, internationalization, security, integration testing, contract testing and migration/upgrades.- Develops quality software (code, test scenarios and cases etc.,)...SuggestedContract work
- Role :As a Senior BIM / 5D Development Team Lead, you will be pivotal in shaping the future of our RIB 4.0 platform. You will lead a talented team of developers, driving the creation of innovative software components and solutions. Your expertise in BIM and 5D technologies will...Suggested
- ...optimization etc- Experienced in infrastructure cost assessment and monitoring and provide cost effective solutions- Knowledge of cloud security controls including tenant isolation, encryption at rest, encryption in transit, key management, vulnerability assessments,...Suggested