Average salary: Rs731,672 /yearly
More statsSearch Results: 2,927 vacancies
...Job Description
Title ATCI-LSS Job Description - Information Security – Levels 10, 11, 12 & 13
Job Description
Job Title: Information Security Analyst
Career Level: Level 10, 11, 12 & 13
Required Relevant skill Experience:
For CL 12 - 0 to 2 years...
...time only on F5 day to day operations such as
· F5 load balancer related tasks like Virtual server creation, SSL profile attachment, Security profile attachment, Vulnerability fixing on VS weightage= 15%
· F5 irule code writing to protect the websites from attack and for...
...Job Description
Project Role : Security Architect
Project Role Description : Define the cloud security framework and architecture... ...and understanding of SQL, Apache Tomcat, Core Java and associated APIs Technical Experience :
a Development, Support and Maintenance...
...IT investments, and optimize end to end business processes and associated information integration technologies. Through these efforts, IT... ...Responsibilities:
Physically install and connect firewalls and other security appliances.
Install the latest vendor-approved stable...
...this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information... ...security vulnerability and risk analyses
# Identify risks associated with business processes, operations,
#
information security...
...operating systems, network interfaces, storage systems, servers, and associated hardware
Verifies and approves plans for upgrading of... ...environment in collaboration with Infrastructure, information security and vendor teams
Releases public area documentation and manages...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...vulnerabilities
# Completing all tactical security operations tasks associated with this engagement.
# Analyses all the attacks and come up...
...clients a Top Tier 1 IT Services Company is looking to hire for a Security Operations Center (SOC) Shift Supervisor role.Role : Security... ...the ability to monitor cameras and alarms, dispatch associated calls via telephone, operate access control technology, and provide...
Secures premises and personnel by patrolling property, monitoring surveillance equipment, and access points. Investigates security breaches, incidents, and other alarming behavior. Completes reports by recording observations, information, occurrences, and surveillance activities...
...Job Purpose
IT Security lead is responsible for ensuring the integrity, and availability of the organization's information assets by... ...Third-Party Risk Management
Assess and manage security risks associated with third-party vendors and service providers.
Provide...
...fostering global leaders poised for success.
Job Purpose
The Head of Security will be responsible of Universitys Campus in formulating... ...to understand the security norms to be adhered to during their association with University.
• Guide the employees/visitors/students to...
...Hi Candidate ,
Tech M is hiring for security Consultant .
• Proficient in Incident Management and Response • Experience in security device management and SIEM (Splunk). Splunk Certification is preferred. • In-depth knowledge of security concepts such as cyber-attacks...
...Description
Introduction
Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security...
...DevSecOps Engineer to join our dynamic team. As a key member of our DevOps team, you will be responsible for leading and implementing security practices throughout the software development and deployment lifecycle. The ideal candidate will possess a strong background in...
...workplace built by the kind of people that Amdocs employs.
Make your career journey with us.
In one sentence
The Information Security Analyst will lead the efforts to secure the Amdocs ecosystem by guiding and monitoring the different IT/ Product/ Business teams to...
...Position Overview
Job Title: Technical Information Security Officer
Location: Pune, India
Role description:
The TISO acts... ...is typically assigned a set of application software assets and associated databases (IT aspects only), Infrastructure software assets, IT...
...Staff4Me is currently hiring an experienced IT Security Manager to join our team. As an IT Security Manager, you will be responsible for establishing and maintaining the overall security posture of the company's information systems. You will develop and implement security strategies...
...About Position
Data Security, Data Privacy & GRC Specialist
Job Location: Pune/ Noida/ Bengaluru/ Hyderabad
Job Reference... ...in Database protection and hands on knowledge in one or more of associated technologies
~ Working knowledge of designing privacy enhancements...
...and end to end information on workflow.
~ Experience in configuration, integration and troubleshooting CyberArk Privileged Account Security (PAS) Infrastructure.
~(Enterprise Password Vault, Password Vault Web Access, Central Policy Manager, Privileged Session Manager, Application...
...Responsibilities:
Monitor cloud networks and systems for security issues.
Investigate security breaches and other cybersecurity incidents.
Document security breaches and assess the damage they cause.
Work with the Cloud Operations team to perform tests and uncover...