Search Results: 107 vacancies
...interest to clients.
Crafting business proposals and contracts to draw in more revenue from clients.
Negotiating with clients to secure the most attractive prices.
Equipping staff with the technical and social skills needed to enhance sales.
Reviewing clients'...
...Overview
We are seeking a highly skilled and experienced Cyber Security Specialist to join our team at our client place based at... ...Qualifications and Skills :-
Bachelor's degree in Computer Science, Information Security, or a related field
Minimum of 4-6 years of...
...Monitor security alerts and events in real-time using security information and event
management (SIEM) tools.
- Analyse network traffic, log data, and other security-related events for potential indicators
of compromise.
- Detect and respond to security incidents...
...performance, resource utilization, and system logs to identify and address performance bottlenecks or issues.
Implement and maintain server security measures, including firewall configurations, intrusion detection systems, and regular security patches and updates
Conduct regular...
...attitude.
Ability to maintain confidentiality and handle sensitive information.
Proactive and capable of working independently with minimal... ....
Follow company procedures and guidelines to ensure the security and confidentiality of information.
Perform other related...
...and coworking operators, negotiate agreements, and ensure that we secure high-quality properties that align with our clients' business... ...deals that fulfill client objectives.
Market Analysis:
Stay informed about the Lucknow real estate market trends, pricing, and...
...all Non Performing Asset(NPA) cases with respect to exposure, security, status of existing operation, any other issues and devise recovery... ...suits/CMM applications, vetting of plaints/replies, furnishing information, formulation of our view to be presented at the hearing etc....
...are carefully considered and your details will be stored on our secure Application Management System. This is used throughout Johnson Matthey... ...your privacy and is committed to protecting your personal information. For more information about how your personal data is used please...
...Cloud database services, Database backup and recovery, Database Security, NoSQL databases, Server Automation, Airflow, Database modeling... ...This Role Requires:
Bachelor's degree in Computer Science, Information Technology, or a related field.
Minimum 4 years of experience...
Remote job
...are carefully considered and your details will be stored on our secure Application Management System. This is used throughout Johnson Matthey... ...your privacy and is committed to protecting your personal information. For more information about how your personal data is used please...
...are carefully considered and your details will be stored on our secure Application Management System. This is used throughout Johnson Matthey... ...your privacy and is committed to protecting your personal information. For more information about how your personal data is used please...
...communication skills in English
Active listener, summarizes information and demonstrates curiosity to seek knowledge
Strong analytical... ..., with benefits built on our core categories of health, security, finance and life.We offer you:
Competitive compensation...
...are carefully considered and your details will be stored on our secure Application Management System. This is used throughout Johnson Matthey... ...your privacy and is committed to protecting your personal information. For more information about how your personal data is used please...
...contracts and agreements, especially in international sales.
Staying informed about changes in laws related to the hospitality industry is... ...Skills: Effective negotiation skills are necessary to secure contracts and partnerships.
Qualifications:
A Bachelor's degree...
...are carefully considered and your details will be stored on our secure Application Management System. This is used throughout Johnson Matthey... ...your privacy and is committed to protecting your personal information. For more information about how your personal data is used please...
...Certification and AS9100 requirements.
Benefits and Additional Information We offer excellent career development opportunities,... ...candidate assessment, references provided, attainment of either a security clearance or police verification, medical assessment, and right...
...you will collaborate with engineering and business stakeholders to build, optimize, maintain, and secure the full data vertical including tracking instrumentation, information architecture, ETL pipelines, and tooling that provide key analytics insights for business-critical...
...architectural solutions that align with business objectives
Ensure the security, scalability, and reliability of enterprise applications and... ...Requirements
Bachelor's degree in Computer Science, Information Technology, or a related field
Proven experience as an Enterprise...
...Managing the entire sales cycle from finding a potential client to securing a deal
Unearthing new sales opportunities through networking... ...A business acumen
Enthusiastic and passionate
If you need any information kindly call to the HR SHREYA SHARMA:-(***) ***-****...
...to architect end-to-end solutions aimed at catering to a diverse Information Technology and Operational Technology landscape.
Ensure that... ...and performance requirements defined for the project and is also 'secure by design.'
Guide and support the IT and InfoSec teams...