Average salary: Rs347,220 /yearly
More statsGet new jobs by email
- ...GCP).- Solid understanding of SOX ITGC testing processes.- Familiarity with financial services audit to Have :- Understanding of network security and data privacy frameworks.- Knowledge of tools for audit automation and cloud complianceResponsibilities :- Conduct information...Suggested
- Cyber Butler - Network Engineer Start Date Starts Immediately CTC (ANNUAL) Competitive salary Competitive salary Experience...SuggestedImmediate start
- ...Support for Hotel Staff for Team Internet Wi-Fi assistance for Events/Conferences. First point of contact for Troubleshooting WiFi network related Incidents. Escort Field/Jio engineers during incident/Project Work. Ensure Periodic Wi-Fi Audits for Guest Rooms....SuggestedContract work
- ...solutions, including virtual machines, cloud services, and virtual network configuration. ~Implement, administer and support highly... ...Federation Services, and Web Application Proxy configurations. ~Apply security best practices in solution design and implementation. ~Oversee...SuggestedCasual workWork at officeFlexible hours
- Description : EVOCS is seeking a SharePoint Security Architect (Contract) to lead a 3-month engagement focused on discovery and future state recommendations for a large enterprise SharePoint Online environment.This role is heavily assessment-driven : you will map the tenant,...SuggestedContract workWork at office
- ...time to time.10. Provide Inputs/Evidence for Database Review, Security Review and closure of database related audit and security points... .../tools, etc.23. Strong exposure in Oracle RAC, ASM and Storage/Networking.24. Strong knowledge of Linux/Unix Internals, Systems/Application...Suggested
- ...support levels when required.- Maintain documentation of issues, resolutions, and support activities.- Ensure adherence to IT policies, security standards, and SLA commitments.Required Skills & Qualifications:- Strong knowledge of desktop support (L1/L2).- Good understanding of...Suggested
- ...you get excited about, we bring people together to make phenomenal work. That's what makes us Rightpoint! Job Title: Information Security and Compliance Analyst Location: India Introduction Reporting to the IT Security and Compliance lead, the person in this role...SuggestedCasual workWork at officeRemote jobFlexible hours
- ...controls. Configure and manage AI Gateways (e.g. Cloudflare AI Gateway or equivalent) to handle routing caching rate limiting and security for agentic AI API calls ensuring efficient interactions with external tools and LLMs. Manage and optimize Cloud Infrastructure...SuggestedFull timeTemporary workFlexible hours
- ...Ansible, CloudFormation, Azure ARM/Bicep.- Solid understanding of networking, DNS, load balancing, VPNs, and firewalls.- Experience in... ...scaling, HA, DR, and fault-tolerant architectures.- Knowledge of secure frameworks, compliance standards, and best practices.- Excellent...SuggestedWork at office
- ...Streams Tasks Time Travel Data Sharing). Knowledge of Power BI or other visualization tools. Understanding of data governance and security best practices in Azure and Snowflake. Certifications such as DP-203: Data Engineering on Microsoft Azure or Snowflake SnowPro...SuggestedFull time
- ...with a proven track record of leading DevOps teams, implementing secure frameworks, and managing complex auto-scaling environments.This... ...Ansible, CloudFormation, Azure ARM/Bicep.- Solid understanding of networking, DNS, load balancing, VPNs, and firewalls.- Experience in...SuggestedWork at office
- ...Ansible, CloudFormation, Azure ARM/Bicep.- Solid understanding of networking, DNS, load balancing, VPNs, and firewalls.- Experience in... ...scaling, HA, DR, and fault-tolerant architectures.- Knowledge of secure frameworks, compliance standards, and best practices.- Excellent...SuggestedWork at office
- ...architecture are followed. They will lead the development of data modeling standards and collaborate with governance teams to ensure data security and compliance. Over time, they will establish the organizations data architecture strategy, influencing governance frameworks and...Suggested