Average salary: Rs360,000 /yearly
More statsSearch Results: 60 vacancies
...directory
Working knowledge of Windows and Unix
In depth knowledge of server support administration
Should have worked in IT security for at least 4 years
Good communication skills
Optional
Mailbox Monitoring and resolving of Customer issues
Looking for...
Job Description:
Responsibilities
Application onboarding/integration with delimited, JDBC, Active Directory connectors.
Defining rules, access controls, user policies, provisioning plans, custom connectors.
SailPoint Application integration.
Scheduling and configuring...
Job Description:
Job Purpose
Identity Access Management User Administration.
Responsibilities
Primary role of IT Security Analyst II performing application administration and Active Directory. User provisioning and De-provisioning. User life-cycle management...
...learn by doing and apply their newly acquired knowledge in a practical context.
Role Description
This is a contract role for a Cyber Security Instructor. The Cyber Security Instructor will be responsible for delivering high-quality instruction to students, preparing and...
SEO Analyst :
We are looking for an SEO Analyst to join our Marketing team (remote option available). He/She will be responsible for optimizing the company’s website and will work towards improving rankings, on-page optimization, off-page optimization, and technical SEO guidance...
Role : Senior IT Data Analyst Job Description :- Communicate with stakeholders at all stages of the project cycle to understand requirements... ..., role-based access control, networking, virtual machines, and security compliance.- Experience in designing enterprise data model.-...
This opportunity is with Top product organisation for Duckcreek Business Analyst.Job description :The DC QA Engineer is responsible for ensuring the quality of system configurations against product requirements by evaluating system behavior, running test cases, and conducting...
...Network infrastructure support, maintenance, and management. Enforcement of architectural standards to equipment.
Remediation of security vulnerabilities. Network infrastructure administration and support throughout the hardware lifecycle to
include installation, patching...
...unique needs of each client and is trusted by top companies around the
globe.
We are seeking a detailoriented Market Research Analyst to conduct surveys and analyse
customer preferences and statistical data. Your role will involve providing valuable insights to...
...have chosen Dautom as their trusted partner for their upcoming projects.
Job Title: Technical Support Executive (L1 & L1.5 on Security Analyst)
Job Description:
Experience : Fresher Education : B.Sc Comp Science, BCA Graduates (2023 Pass out only).
Location...
...Optimization, Data Source Integration, Data Catalog Management, Security and Access Control, Integration with Applications and Ecosystems... ...performance by consulting with architects, solution managers, and analysts to understand business technical needs and deliver solutions....
...impactavailability
# Analyze client requirements and convert requirements to feasibledesign
# Collaborate with functional teams or systems analysts who carryout the detailed investigation into software requirements
# Conferring with project managers to obtain information...
...data governance policies and procedures.Collaboration and Communication:- Collaborate with cross-functional teams, including business analysts, lenders, and underwriters, to understand data requirements and provide analytical support.- Communicate complex data analysis...
...necessary documentation as per the process requirements- Coordinate with external teams of clients, development professionals, quality analysts, technical architects, etc.- Should have good written and verbal communication skills.- Support the entire life-cycle of the...
...have).- Proficient in usage of any Test Management tool like MF ALM, Jira, QTest (a must).- Proficient in coordinating with Business analyst, ABAB team, Functional analyst.- Expertise in understating core SAP functional business process flow.- Expertise in designing End to...
...inventory management, stock control, and ordering processes.
~Ensure compliance with company policies and procedures, maintaining a safe and secure work environment.
~Monitor and analyze sales data, identifying trends and opportunities for improvement.
~Prepare reports and manage...
...years of hands on exp in mule DW and java, knowledge on mule architecture along with XML, SOAP, WSDL, XSLT, REST services, knowledge on security, login, policy management3. Enhancement of existing services when required, Implementation experience with Mule API management4....
...supervise the receipt dispatching and storage of goods. Warehouse managers manage warehouse staff vehicles and other equipment and oversee security sanitation and administrative functions.
meeting with clients virtually or during sales visits. demonstrating and presenting...
...the logistical aspects of the local programmes in collaboration with colleagues, including scouting for and interfacing with venues, securing equipment and supplies, and organising social events for participants
Provide support in the planning and execution of our partner...
...end technologies, such as JavaScript, HTML5, and CSS3.- Knowledge of object oriented PHP programming.- Understanding accessibility and security compliance.- Strong knowledge of the common PHP or web server exploits and their solutions.- Understanding fundamental design...