Search Results: 2,884 vacancies
...Vulnerability assessment tools like Nexpose, Nessus & vulnerability response (ServiceNow)
information system security vulnerability scanning to discover and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information...
...Analyst will also be responsible for communicating vulnerability information to relevant stakeholders and tracking remediation progress.... ...organization's systems and networks
Evaluate, rate, and perform risk assessments on assets
Prioritizing vulnerabilities discovered...
Rs 40 lakh p.a.
...Job Description:
Information Security Manager
Job Summary & Core Requirements
• Minimum 5 years' experience in IT Governance and... ...network security
• A practical knowledge and understanding of Risks Assessment
• Mitigation controls, maintenance of IT Risk Register...
...solutions.
Proactively identify and address potential project risks and issues.
Establish and maintain effective project management... ...technology initiatives and make adjustments as needed.
Stay informed of industry trends and best practices in technology.
Qualifications...
...The Market Risk (MR) department is a specialized unit in Finance Operations (FO) that operates in Chennai, Bangalore, and Manila centers... ...Trading Risk Management) systems, using queries to retrieve information from archived databases. The changes based on anticipated growth...
...About the role: As a ‘Risk Management SME – Information Security & Privacy’, you will be an individual contributor and hold primary responsibility of managing the information security and privacy risks for the organisation. You will:
· Understand the current setup, interview...
...develop solutions to the most urgent global challenges. For more information, visit
ITS Vice Presidency Context:
Information and... ...globally; and resilience, by equipping the Bank Group to provide risk-based cybersecurity and robust data protection for a global network...
Job Description :Role : ServiceNow Governance, Risk, and Compliance (GRC) This role is to manage Development work assigned to help with... ....- facilitates compliance with regulatory requirements and information security policies.- Develops and reports on information security...
...development cooperative owned by 189 member countries. As the largest development bank in the world, the World Bank provides loans, guarantees, risk management products, and advisory services to middle-income and creditworthy low-income countries, and coordinates responses to...
• Experience as a Full Stack or MERN Stack Trainer/Developer
• Looking for a training expert who can take up the offline class.
• Expert in teaching and coding/application development.
• Full-time developers may also apply for a part-time opportunity.
• The candidate must be...
...customers, partners, society, and our employees.
Maersk Governance, Risk and Control (GRC) ensures an effective and efficient risk based... ...or parental leave, veteran status, gender identity, genetic information, or any other characteristic protected by applicable law. We...
Rs 10 lakh p.a.
...compliance to the extant regulatory / statutory instructions on information/ cyber security. You will be responsible for enforcing the policies... ...Audits, Information Security Reviews etc…
Provide strategic risk guidance and consultation for IT Projects, including security...
...Job Description:
Participate in initiatives to identify potential threats, vulnerabilities, and risks to the organization's assets, systems, and data.
Develop and maintain risk registers, heat maps, threat and vulnerability reports, and other risk management documentation...
...Job Purpose:
To review and assess risk management policies and protocols; make recommendations and and improvements in risk management solutions such as policies, business continuity plans, or recovery measures.
You will be an integral part of the organizations risk strategy...
...communities we operate in.
About Business line/Function:
The RISK ORM perimeter includes all operational risks for business... ...within the scope of RISK ORM including fraud, third-party, and Information and Communication Technology (ICT) risk management.
§ Define...
...Experience in defining process, template, checklist and guidelines for risk management based on the best practices and Industry frameworks... ...compliant to vehicle cybersecurity requirements.
Job Family Information Technologies & Systems Renault Group is committed to creating...
Job Summary We have an immediate need for an internal IT support Specialist. The IT Support Specialist will report to the Senior Manager of IT Operations. The primary responsibility of the IT Support Specialist is to handle internal IT support needs in our MX India office ...
JOB DESCRIPTION
Job Title
Information Security Lead
Job Description
#LI-PHILIN
About Philips
Philips India Limited is... ...will provide the vision and leadership necessary to manage the risk to the platform assigned and will ensure business alignment, effective...
...Start
your IT career with us!
Senior
Information Security Engineer
(Open PAN India: Chennai,
Bengaluru, Hyderabad, Indore & Mumbai)
With a global team of 6000+
IT professionals, DHL IT Services connects people and keeps the global
economy running by continuously innovating...
...achieve results – although coaching/mentoring less experienced staff, informal supervisory responsibilities, or overseeing work of other lower... ...and operational challenges.
Job Requirement:
Role involves Risk & Controls framework deployment for the Ocean PO to Pay processes...