Average salary: Rs689,061 /yearly
More statsWe are seeking a highly skilled and experienced Senior Security Architect to join our team. The ideal candidate will have a proven track record in designing robust security requirements, conducting threat modeling, and crafting comprehensive security policies for the Software...
...We are a Californian Company in need of **OPERATIONS ENGINEER - DEVOPS**
**Experience:** 4+ years
**Qualification: **BE, MCA, B.TECH, M.Sc. IT
**Job description:**
The ideal candidate loves being the person who interfaces between the dev team and the Operations team,...
Tools & fixture procurement and validation
Line balancing, cycle time study
Continuous improvement,
Assembly line development
Data analysis and problem solving
OEE
Rs 13000 - Rs 15000 per month
...Job Title: Assembly Line Operator
Location: Chennai, India
Salary: ₹13,000 - ₹15,000 per month
Job Overview: We are seeking a diligent and efficient Assembly Line Operator to join our manufacturing team in Chennai. The ideal candidate will be responsible for...
...ELIGIBILITY
Master Degree/Honours Degree in any subject securing at least 60% marks (minimum 45%
according to CBSE Norms) from... ...extracurricular activities, personnel management and other facility operations. Thus, will be guardian of the School, Mentor to the Teachers and...
...sales and revenue.
Plan & initiate action plan to approach and secure new business for the organization.
Any matter which may... ...Management
Establish and maintain seamless co-ordination & co-operation with all departments of Novotel Pune.
To ensure maximum cooperation...
...Prime Function:
Plan & initiate action plan to approach and secure new business for the organization
To determine effective and... ...Management
Establish and maintain seamless co-ordination & co-operation with all departments of ibis Chennai Sipcot.
To ensure maximum...
...passion for information technology and be an expert in Hybrid IT operations. The ideal candidate will have a solid background in... ...new technology deployments.
Recommend, implement, and monitor security auditing and alerting solutions.
Monitor cloud and on-premise...
...Top-performing interns may be offered guidance and support to secure placements with reputable companies.
By participating... ...engineering disciplines like data science, marketing, HR, finance, and operations. With over 100,000 applicants and more than 3,000 remote interns...
...evaluate potential risks in systems in relation to data integrity, security and disaster recovery and other non-functional requirements.... ...of industries including life sciences, food, and chemicals. We operate throughout the world with a culture shaped by innovation and international...
Rs 2.5 - 3.09 lakhs p.a.
...oversee sales volumes are achieved according to budget.
2. Operate as the lead point of contact for any and all matters specific to... ...with new customers and/or applications until business is secured to ensure growth attainment
7. Develop and maintain market...
...Security Specialist - Cyber Security Operations Center
Role Overview:
Cyber Security Operations Analyst will play a significant role in our Cyber Security Operations Center team (CSOC), reviewing and handling oversight to a number of security controls, and providing...
...Union’s leading bank and key player in international banking. It operates in 65 countries and has nearly 185,000 employees, including more... ...the IT production applications for BNL.
BNL Production Security activities are critical and highly visible, serving a population...
...develop applications.
Proficiency in implementing and maintaining security measures.
Excellent time management skills and the ability... ...and Microsoft SQL 2012 & above for efficient database operations.
Work on the front-end using CSS, JavaScript, and Liquid templates...
...all aspects of our server infrastructure, including software, and operating systems.
Monitor server performance, troubleshoot issues, and... ...optimal uptime and performance across all servers.
Implement security measures to protect our servers from cyber threats and...
Requirements : - 4+ years of IT and relevant security experience.- Must have one cyber security certification.- Experience/understanding of Vulnerability Management. Distribute Vulnerability reports to relevant stakeholders and track them for closure.- Experience/understanding...
...world.
Job Description Summary
Responsible for implementing, operating and supporting multi-tenant, scalable network solutions. This... ...Monitor and optimize network performance and assure network security in a high availability environment.
Troubleshoot, diagnose and...
...Hibernate, Struts. They are also proficient in databases, implementing security measures and optimizing application performance.... ...overall direction. Describe the work culture, benefits, hours of operation, and any other pertinent information that you feel is vital and...
...system design/ testing communication and support/ monitoring and operation of online systems/ project management, etc.
Qualifications... ...Familiar with operating systems, computer networks, information security, and capable of using common data structures and algorithms to solve...
...schedule based on a variety of different shift patterns within the operating hours of 6 am and 11 pm Sunday to Monday. You may be required to... ...invent, simplify and build.
Protecting your privacy and the security of your data is a longstanding top priority for Amazon. Please...
...Headquartered in San Mateo, California , Freshworks has a global team operating from 13 global locations to serve more than 65,000 companies --... ...cyber attack and this is proven through a steady uprise in the security incidents and data breaches year on year. We at Freshworks are...
...A Security Executive keeps constant vigilance of activity on and around the hotel property and reports, with documentation, incidents... ...at the highest level of service:
Constant vigilance of hotel operations and premises
Maintain all documents and key systems to legal...
...management.
Collaborate with Privacy Office, Legal, Information Security departments to identify and controls data processing risks.... ...internal or external changes.
Pro-actively analysing existing operations policies, processes, systems, controls, and relevant documents...
...escalation point for L1 team and be the SOC POC to customers. Manage security incidents through all phases of the incident response process... ...shift based on the shift roster.
Maintain and support the operational integrity of SOC toolsets
Educational Qualifications:...
...Security Specialist – Vulnerability Management Experience – 7 to 12 Years
Notice Period - Immediate to 20 Days
Location – Chennai... ...and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system components...
...Position Requirements
Candidate with 15+ year of experience in working in operations/managed services.
Strong technical experience on Firewall, Palo Alto, Cloud Security, and Data center
Carrying out deployment, maintenance, monitoring, and management tasks
Demonstrable...
...Administer Snowflake accounts in your organization. - Administer network policies and monitor session activity. - Experience with Snowflake security, managing roles and permissions. - Knowledge and working experience in Snowflake, Snow-pipe, SnowSQL, Replication, data-sharing, data...
...to acquire new skills & remain updated
~ Ability to quickly analyze & diagnose technical problems
~ Working knowledge on Windows Operating systems
~ L3 level experience on Windows Operating systems
~ Work with Local & Global Teams
~ Ability to contribute to Problem...
...globe. Exela partners with customers to improve user experience and quality through operational efficiency. Exela serves over 3,700 customers across more than 50 countries, through a secure, cloud-enabled global delivery model. We are 18,000 employees strong across the Americas...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...patterns and vulnerabilities
# Completing all tactical security operations tasks associated with this engagement.
# Analyses all the attacks...