Search Results: 275 vacancies
...rate in finding flourishing careers and financial independence.
Role Description
This is a full-time on-site role for a Cyber Security Instructor located in Kochi. The Cyber Security Instructor will be responsible for delivering high-quality training and education in...
...become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
EY-Enterprise Risk –Business Consulting –Senior
As part of our Business Consulting, you will be supporting the Enterprise Risk Team in client...
...for yourself, and a better working world for all.
Perimeter Security Specialist.
Today’s world is fueled by vast amounts of... ...and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and...
...of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information... ...business strategies and conducting system security vulnerability and risk analyses
# Identify risks associated with business processes,...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...unacceptable access to data or systems
# Conduct security assessments, risk analysis and root cause analysis of security incidents
# Handling...
...Job Summary: Soffit Infrastructure Services (P) Ltd seeking a knowledgeable and dynamic Cyber Security Trainer to join our team. The ideal candidate will possess a deep understanding of cyber security principles, tools, and techniques, coupled with excellent communication...
Rs 50000 per month
...team. The ideal candidate will have a deep understanding of cyber security principles and a proven track record of identifying and... ...breaches and intrusions, and implement necessary measures to mitigate risks.
9. Document cybersecurity procedures, configurations, and incident...
...Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the security operations of the Security team
Qualifications
Ideally with a...
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function of
organization. The... ...Responsibilities:
Security Operations:
• Lead vulnerability risk assessments.
• Implement cyber security frameworks, including NIST...
Rs 50000 per month
...team. The ideal candidate will have a deep understanding of cyber security principles and a proven track record of identifying and... ...breaches and intrusions, and implement necessary measures to mitigate risks.
9. Document cybersecurity procedures, configurations, and incident...
...been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently and securely. We have more than 390,000 people in more than 160 countries, all of whom rely on secure technology to be able to do their job every...
Manage branch operations t o achieve targeted sales turnover of the assigned branch.
Skills Required : Assistant Manager, Branch Manager, Deputy Manager, Branch Head, Quality Analyst, Equity Dealer, Team leader, Team Handling,
Education/Qualification : Any degree
...
...maintaining our network infrastructure, with a focus on ensuring the security, reliability, and efficiency of our systems.
Responsibilities... ...security audits and assessments to identify vulnerabilities and risks.
Implement security best practices to protect against cyber...
...evaluate metrics to measure the performance of the SOC team.
the security reports periodically to the IT security team and management.... ...IBM Spectrum Protect Backup Manager
NBAD
Qradar Vulnerability Manager & Qradar Risk Manager and other relevant Qradar Apps....
...experience for yourself, and a better working world for all.
Cyber Security Manager
OT/IOT Security
EY is seeking a passionate Cyber OT (... ...of ICS/SCADA environments
Capable of Evaluating the cyber risks to SCADA, DCS, Smart Grids, DMS, and ECS systems architectures...
...management, preferably in a higher education setting.
Demonstrated knowledge of best practices in international education, including risk management, cross-cultural communication, and student support services.
Strong interpersonal skills with the ability to build...
...produce consistent results, provide effective control and reductionof risk – Expert
Systems Thinking – Understanding of the Wipro system(... ...to SLA/ timelines
Multiple cases of red time
Zero customer escalation
Client appreciation emails
2.
Cloud Security
...frontend and backend
functionalities
• Implement efficient and secure Axios API requests and responses
• Troubleshoot and debug issues... ...plans.
•Track project progress, identify and mitigate risks, and resolve issues to ensure on-time delivery of project
milestones...
...impacts of performance-based designs, accessibility standards and security compliance
in Web development
• Proficiency when it comes to... ...MVC/ Angular8+)
Roles & Responsibilities:
• Coding for high-risk/high-complexity areas or establishing patterns for other developers...
...IT project management, basic knowledge of IT infrastructure and security, and proficiency in project management tools. They should possess... ...is maintained appropriately for each project.
• Assess project risks and issues and provide solutions where applicable.
• Ensure stakeholder...