Search Results: 11 vacancies
...Operations, O365 Tenants, Mobile protection technologies, networking concepts & mechanisms, Firewalls, Proxies, EDR, AV/AM, Vulnerability Scanning, IPS/IDS, Scripting in Python or other languages, DNS, Encryption, SIEM, E-Mail technologies including DMARC, DKIM, SMTP, TLS, and...
Rs 2.4 lakh p.a.
...and arrange travel as and when requested.
Perform other clerical reception duties like filing, photocopying, printing, faxing and scanning.
Ideal Profile
You have at least 1 year experience within a Admin Assistant role, ideally within the Professional Services industry...
...Identifies opportunities for creating connections among various devices, databases, software and applications
Performs feasibility scan and assessment to identify potential middleware to be used
Highlights technical, compatibility or performance issues following integration...
...align with business objectives.
• Maintain a risk assessment standard for new systems, including penetration testing or vulnerability scans.
Skill Set:
1. Technical expertise.
2. Business acumen.
3. Communication skills.
4. Leadership capabilities.
If you are a...
...etc.) updated and familiarized with the latest exploits and security trends.
Familiarity with dynamic web application vulnerability scanning tools and services (Acunetix, HP WebInspect, IBM AppScan, BurpSuite, IBM AppScan)
Familiarity with static code analysis tools and...
...from defined accounts and meet NI sales targets and business plan according to Schindler procedures.
Identify sales opportunities by scanning the market, visiting potential customers to know their needs in advance and follow up on potential opportunities with the customers....
...align with business objectives.
• Maintain a risk assessment standard for new systems, including penetration testing or vulnerability scans.
Skill Set:
1. Technical expertise.
2. Business acumen.
3. Communication skills.
4. Leadership capabilities.
If you are a...
...CDC) requirements to ensure proper functionality and timing closure.
# Design for Testability (DFT): Implement DFT features such as scan chains, Built-In Self-Test (BIST) structures, and boundary scan for testability and manufacturing test coverage.
# Documentation: Create...
...security standards and align with business objectives.
• Maintain a risk assessment standard for new systems, including penetration testing or vulnerability scans.
Skill Set:
1. Technical expertise.
2. Business acumen.
3. Communication skills.
4. Leadership capabilities.
...align with business objectives.
• Maintain a risk assessment standard for new systems, including penetration testing or vulnerability scans.
Skill Set:
1. Technical expertise.
2. Business acumen.
3. Communication skills.
4. Leadership capabilities.
If you are a...
...align with business objectives.
• Maintain a risk assessment standard for new systems, including penetration testing or vulnerability scans.
Skill Set:
1. Technical expertise.
2. Business acumen.
3. Communication skills.
4. Leadership capabilities.
If you are a...