Average salary: Rs1,258,562 /yearly
More statsGet new jobs by email
- ...environment with an almost complete dependence on information, which is processed and transmitted by... ...and electronically. Information security risk and threat landscape are dynamic and... ...The role of the DWS Information Security Officer (ISO) is aligned to the DWS COO divisional...Suggested
- ...The Senior Information Security Officer is responsible for supporting the implementation and operation of the organisation's Information Security Management System (ISMS) within their region. This role will drive security risk management, policy compliance, audits (internal...SuggestedContract work
- ...Managing Director Position is based in Head Office at Okhla, Delhi Job Overview The... ...He will be responsible for leading all Information Technology related activities to support... ...and vendors. Supervision of IT team, Security, Network, Infrastructure Support Team, supporting...SuggestedFull timeContract workWork at office
- .... Analyze and interpret results from penetration tests to provide actionable recommendations. Collaborate with development and security teams to remediate vulnerabilities found during testing. Prepare detailed reports and presentations for stakeholders, summarizing...Suggested
- ...goals and objectives. Architecture Design o Design scalable, secure, robust and efficient IT infrastructure architecture strategies... ...Big4preferred Bachelor's degree in Computer Science, Information Technology, or a related field. A Master's degree or relevant professional...SuggestedHybrid work
- Job Overview :The Chief Information Security Officer (CISO) is responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected.The CISO will work closely with senior management,...Suggested
- Required Skills and Experience: Strong understanding of hacking techniques and tools. Experience with penetration testing frameworks and tools (Metasploit, Kali Linux). Strong scripting skills (Python, PowerShell). Knowledge of network protocols and system administration...Suggested
- ...remediation. Collaborate with development and IT teams to ensure security best practices are implemented during the software development... ...Security Certified Professional), or CISSP (Certified Information Systems Security Professional). ~ Excellent analytical and problem...Suggested
- ...identifying and exploiting vulnerabilities in applications and networks. You will play a crucial role in enhancing our security posture and protecting sensitive information. Responsibilities Conduct penetration testing on various applications, networks, and systems to...Suggested
- ...manage the initial engineering team (in-house and/or outsourced) Work closely with the founding team to translate vision into scalable, secure, and delightful software Integrate AI modules and data engines that power key user workflows (synergy mapping, GTM suggestions,...Suggested
- ...are seeking a strategic and technically skilled Chief Technology Officer (CTO) to lead our technology strategy and development within the... ...architecture, and ensure that our digital products are scalable, secure, and aligned with business goals. You will play a critical role in...Suggested
- Required Skills and Experience: Proven leadership experience in IT, with a strong track record of delivering results. Deep understanding of IT infrastructure, cybersecurity, and emerging technologies. Strong analytical and problem-solving skills. Excellent communication...Suggested
- Position:– Enterprise Sales Manager IT Infrastructure Company :- Orbit Techsol – Experience :- 10+yrs Location: Delhi Budget range : 15-20 lacs 80:20 Keyword: Enterprise sale, OeM connections Company Description We are seeking a seasoned and strategic ...SuggestedFull time
- IT head - MNC Travel Technology Company Job Summary: To Manage a team of 8 to 10 members End to End IT operations management IT infrastructure project management Network security and Contact Centre OperationsSuggested
- ...achieving great things in the world are equally as important to us. Meet Our Team: We are the Global SOC team, part of Global Information Security at Hitachi Digital. Our mission is to protect the company's and its customers' vital information systems and data while...SuggestedFull timeFlexible hours
- ...few direct instructions • Performs cyber security assessments which includes vulnerability... ...etc. • Understands basic business and information technology management processes. • Demonstrates... ...Professional is required to work from office Your role as Manager We expect...Work at office
- ...Key Responsibilities: Security Assessments: Conduct security assessments, including vulnerability assessments, penetration testing, and risk assessments. Security Consulting: Provide expert security advice and guidance to clients. Incident Response: Assist clients...
- ...Security Policies and Procedures: Assist in the development and implementation of information security policies, standards, and procedures. Educate employees on information security best practices and enforce compliance with policies. Security Awareness and...
- ...infrastructure by monitoring, detecting, analyzing, and responding to security threats. You will work in a fast-paced environment, handling... ...'s or Master's degree in Cybersecurity, Computer Science, Information Technology , or related fields. Industry certifications like...
- ...: ~ Bachelor's degree in Computer Science, IT, Cybersecurity, or related field ~2+ years of experience in cybersecurity or information security ~ Proficiency in tools like SIEM (Splunk, QRadar, etc ), IDS/IPS, and antivirus systems ~ Strong knowledge of firewalls, VPNs...
- ...matters We build, maintain, develop, and improve centralized security management, monitoring and reporting platforms for BT Security SOCs... ...business requirements into technical requirements to inform judicious product decisions and architectures. Has a broad knowledge...Full time
- ...Data Discovery processes to the relevant teams. Required Skills and Qualifications Minimum 10 years of proven experience in Data Security and Data Discovery. Strong background in designing and operationalizing Data Discovery processes. Excellent analytical skills...
- ...requirements. Collaborate with senior leadership to define security goals, risk appetite, and security architecture. Technology... ...Education: ~ Bachelor's or Master's degree in Cybersecurity, Information Technology, or a related field. ~ Relevant certifications such...
- ...Act as the primary point of contact for customer communications during the change management lifecycle, ensuring all stakeholders are informed and aligned. Support the execution of complex network infrastructure projects (Optical Transport, IP Networking, Fixed Access) by...Contract work
- ...potential impact of threats and vulnerabilities on the organization s security posture. Incident Response: Respond to security incidents by... ...Reporting: Create comprehensive threat intelligence reports to inform decision-makers and security teams. Staying Updated: Stay...
- ...optimizing the organization's use of the AWS cloud platform, ensuring secure and efficient cloud infrastructure, networking, and operations.... ...across both cloud and on-premise environments. · Stay informed on relevant regulations (e.g., GDPR, HIPAA) and ensure compliance...Flexible hours
- ...Windows servers and workstations, ensuring optimal performance and security. VMWare Knowledge: Oversee the virtualization environment,... ...Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. Minimum of 5 years of experience...Shift work
- ...Advising the Aujas sales units on the positioning of our Cyber Security portfolio the identification of relevant stakeholders within our clients organisation Content development of customer-specific cyber security roadmaps or business planning together with sales and client...
- ...mitigations for cloud-based applications and systems hosted on GCP. Collaborate with architects, engineers, and product teams to design secure, resilient systems by incorporating threat modeling early in the design phase. Conduct threat assessments for new and existing GCP...
- ...Job description Offensive Security Engineer (Ransomware Penetration Testing) Job Description: Offensive Security Engineer (Ransomware Penetration Testing) Responsibilities Execute complex Red Team engagement as a penetration tester, simulating real-world ransomware...