Average salary: Rs573,436 /yearly
More stats ...undertakes desktop problem management and resolution - 2nd & 3rd line technical support for site users. Aware about Laptop/Desktop Imaging, Security Patches and upgrades.- Customer Service : works closely with business users with full understanding of business processes, acting...
...and purchasing of all softwares, hardware and other IT supplies as per project requirement.- Designing the network infrastructure and security policies for the company.- To provide major support for engineering software requirements/availability.- Responsible for IT hardware,...
...AWS) services.- He / She should have Good Knowledge on Virtualization (VMWare)- He / She should have CEH Certification performed cyber security testing.- Exposure to Test and Requirement Management Tools such as JIRA, Xray would be an advantage.- Certified ISTQB Software...
...Foundation in Component Design, Object Oriented Design , Operating System, System Internals ( File Systems, Sockets, Multi-threading)- Security Design for C++ Components- Solid Hands-on Win32 and Linux APIs; Nice to have hands-on Programming for IOT Device Operating Systems (...
...insurance package to safeguard your wellbeing and that of your family.
# Retirement Benefits: Participate in retirement savings plans to secure your financial future.
# Training and Development: Receive ongoing training and development opportunities to enhance your skills...
...guidance- Troubleshoot and resolve issues related to Kubernetes, CI/CD, and other DevOps tools- Ensure high availability, performance, and security of Kubernetes clusters- Conduct regular performance tuning and capacity planning- Automate tasks using scripting or infrastructure-as...
...PHP programming- Should be able to Build efficient, testable, and reusable PHP modules.- Should know best practices to write clean and secure code.- Should have good experience with at least one relational database like PostgreSQL, MySQL OR MariaDB.- Should be comfortable...
...Enterprise Data Product Portfolio, you will be working with key customers to deliver timely and accurate data ingestion pipelines in a secure manner- You are expected to provide guidance on proper integration design ensuring that our architectural guidelines are met, and the...
...data infrastructure that can adequately handle the needs of a rapidly growing data driven organization.- Coordinate data access and security to enable data scientists and analysts to easily access to data whenever they need too.- Experiencing developing scalable Big Data applications...
...interfacing to embedded hardware using SPI, Ethernet, USB, and I2C.- Experience with initial board bring-up with work experience in U-Boot, Secure boot - (at least in one)- Deep knowledge of VPN and security applications in Linux systems.- Expert in C/C++ and have professional...
...integrity issues, performance issues, blocking and deadlocking issues, replication issues, log shipping issues, connectivity issues, security issues etc.- Experience in Performance Tuning, Query Optimization, monitoring and troubleshooting tools.- Strong knowledge of how indexes...
...technology/delivery partners, leadership team; communicate and collaborate within and across teams (middleware, DevOps, Platform, Analytics, Security etc)- Define roadmap for team s Digital Transformation journey and help the team complete that in an efficient manner.Required Skills...
...communication skills needed to work with stakeholders- Working knowledge of several architectural approaches, caching, data storage, and security.- Proficient understanding of code versioning tools, such as Git- Familiarity with CI/CD practices- Collaborative attitude, ability...
Profile : ORACLE DBAJob Description :- Technical Skills Oracle 11g 12c 19c expertise - Strong SQL knowledge- Database User and Security administration and management Managing schema objects such as tables indexes and views- Tablespace Management Perform backup and recovery Database...
...delivery of solutions.- Collaborate with Functional Designers and Developers in order to find best solutions.- Produce detailed functional and technical specifications.- Assist in producing solutions with threat assessments and associated security awareness. (ref:hirist.tech)
...third party services for the project.- Review and Manage code branches and deployments.- Write Maintain technical documentation.- Create security and data protection settingsAbout You :- 1+ years of Proven experience as a Full Stack Developer or similar role.- Degree in computer...
...across the group for all package service items
- Driving operations such as Bio Medical, OPD Services, Lab Services, House-keeping, Security, Food & Beverages, Marketing & other departments
- Coordinate with Assistant Medical Superintendent and taking necessary steps for...
...N
Relocation?
N
Position Type
Non-Management POSITION SUMMARY
Check figures, postings, and documents for accuracy. Organize, secure, and maintain all files, records, cash and cash equivalents in accordance with policies and procedures. Record, store, access, and/or...