Average salary: Rs672,882 /yearly
More statsSearch Results: 154 vacancies
Secures premises and personnel by patrolling property monitoring surveillance equipment and access points. Investigates security breaches incidents and other alarming behavior. Controls traffic by directing drivers. Completes reports by recording observations information occurrences...
...learn by doing and apply their newly acquired knowledge in a practical context.
Role Description
This is a contract role for a Cyber Security Instructor. The Cyber Security Instructor will be responsible for delivering high-quality instruction to students, preparing and...
Job Description:
Job Purpose
Identity Access Management User Administration.
Responsibilities
Primary role of IT Security Analyst II performing application administration and Active Directory. User provisioning and De-provisioning. User life-cycle management, performing...
...directory
Working knowledge of Windows and Unix
In depth knowledge of server support administration
Should have worked in IT security for at least 4 years
Good communication skills
Optional
Mailbox Monitoring and resolving of Customer issues
Looking for...
Job Description:
Responsibilities
Application onboarding/integration with delimited, JDBC, Active Directory connectors.
Defining rules, access controls, user policies, provisioning plans, custom connectors.
SailPoint Application integration.
Scheduling and configuring...
...opportunities and build up territory. - Shortlist and qualify potential companies and the right people to reach out for pitching our solutions. - Develop email communication and messages to reach out to prospects via professional media channels. - Develop genuine connections...
...data management, data quality, data lineage, data glossary, data classification and data security.- Work closely with data stewards, data owners, and IT teams to align technical solutions with governance objectives.- Develop and implement data quality frameworks and standards...
Rs 2.75 - 4 lakhs p.a.
...Provide assistance to advisors in lead generation, prospecting and business development. - Ensure that advisors provide right financial solutions to customers as per need analysis and they adhere to required business processes and norms. - Achieve the business target each month...
...Company
Established on 20th December 2007, Nexus Technoware Solution (P) Limited NTSPL is being assessed for CMMI Level 3 and we follow... ...on applications as well as enables investigative efforts into security incidents.
Strong experience designing and working with n-tier...
...that specializes in best-in-class Software Development, Web Apps Development, Website design, Web Hosting, Corporate Email ID solutions, Web Security, Dedicated Server Leasing, Search Engine Optimization, Biometric Solutions & Mobile Messaging & Voice Solution .
We...
...problems and architectural challenges.- Integration of data storage solutions.- Strong knowledge of PHP web frameworks.- Understanding the... ...object oriented PHP programming.- Understanding accessibility and security compliance.- Strong knowledge of the common PHP or web server...
...for designing, developing, and maintaining our PHP-based software solutions- Maintaining high code quality and component architecture-... ...quality of APIs and GUIs- Strengthen environment, data & application security- Realize a path to Continuous Delivery- Strong working knowledge...
...internal server architecture and cloud servers.- Defining network security and backup policies.- Linux and Windows server admin- Installing... ...compliance issues. Suggest, develop, design and implement solutions with a focus on automation reliability.- Prepare and submit capital...
...sources, including Teradata, Oracle-based DW, Hadoop, and Cloud DW solutions.
• Create and maintain ETL processes to ensure data accuracy... ...performance.
• Implement best practices for data governance, security, and compliance.
• Monitor and optimize data storage and retrieval...
...in the education industry. We specialize in providing staffing solutions to schools, colleges, and ed-tech companies. Our extensive network... ...students in the sports institute.
Ensuring the safety and security of the students at all times.
Maintaining discipline and enforcing...
...and unstructured data sources while adhering to governance and security standards.
Implement robust auditing mechanisms and exception... ...designing and implementing cost-effective cloud infrastructure solutions.
Experienced in developing and deploying cloud-native applications...
...priorities.- Identify bottlenecks and bugs, and recommend system solutions by comparing advantages and disadvantages of custom development-... ...CI/CD, Human-Centered design, code management including reuse, secure computing- Strong bias towards automating any process that repeats...
...to gather and assess business requirements, develop and present solution alternatives, produce design and migration strategy documents, provide... ....- Good understanding and experience in Active Directory security hardening concepts including tiered security, administrative forests...
...Design and architect : Craft robust and scalable infrastructure solutions using AWS services like EC2, VPCs, S3, and RDS.
Deployment... ...Functions to build event-driven, cost-efficient applications.
Security : Implement robust security measures like IAM roles, VPC security...
...business stakeholders to translate business needs into effective data solutions.
Manage a team of data modelers, providing mentorship,... ...fostering a culture of data modeling excellence.
Oversee the secure migration of data across systems, prioritizing data integrity within...