Search Results: 765 vacancies
...yourself, and a better working world for all.
Perimeter Security Specialist.
Today’s world is fueled by vast amounts of information... ..., globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global...
...purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture
# Understand security...
...Function:
Supervise, instruct and coordinate the activities of Security Associates.
Monitor and arrange shift activities according to... ...the team is trained on all safety provisions.
Motivate and develop the team to ensure smooth functioning of the department and promote...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...Role Description
This is a full-time on-site role for a Cyber Security Instructor located in Kochi. The Cyber Security Instructor will... ...domains. This includes teaching and mentoring students, developing curriculum, creating assessments, and staying up-to-date with the...
...lead the IT/IS team in building our cybersecurity portfolio and services.
Take ownership of working continuously to improve G10X security posture.
Take ownership for the operations aspect of customer-facing services.
At G10X, help build competencies in cybersecurity...
...concrete design implications.
Email: ****@*****.***
Frontend Developer
We are looking for a talented and experienced Frontend... ...Email: ****@*****.***
Cyber Security Specialist
We are looking for a Cyber Security Specialist to...
...Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position...
...Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the security operations of the Security team
Qualifications
Ideally with a...
...for all.
TEM Senior –DevSecOps
As part of our Cyber Security team, you will build and manage a secure cloud/on-prem platform... ...guidelines. You will work closely with DevOps, Architects and Developers and QA to build highly reliable and secure products. You shall...
...us:
Techversant is seeking a talented and experienced Magento Developer to join our dynamic team who can work closely with cross-functional... ...and templates.
~Optimize website performance, scalability, and security.
~Troubleshoot and debug Magento issues.
~Stay up-to-date with...
...Description
This is a full-time on-site role for a Lead Database Developer at Muthoot fincorp located in Kochi. As a Lead Database... ...of developers, oversee the database architecture, and ensure the security and performance of the database infrastructure.
Qualifications...
...Requirements:We are seeking a talented and experienced Magento Front End Developer to join our team. The ideal candidate will have a deep... ...websites, ensuring they are up-to-date with the latest features and security updates.- Work closely with other developers, designers, and...
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function of
organization. The... ...Recovery processes and procedures.
Disaster Recovery:
• Develop and implement Disaster Recovery and Business Continuity Plan policies...
...like Angular, React, JavaScript, or TypeScript
Demonstrable understanding of infrastructure and application security management, in the context of developing and operating large-scale multi-tenant systems
Other Requirements:
The ideal candidate would be a self...
...Email: ****@*****.***
Virtual Chief Information Security Officer (vCISO)
As a Virtual Chief Information Security Officer... ...Disaster Recovery processes and procedures.
Disaster Recovery:
• Develop and implement Disaster Recovery and Business Continuity Plan policies...
...Kochi
Description:
We are looking for a skilled Software Developer with a strong background in backend development to design, develop... ...third-party integrations.
• Ensure code quality, performance, and security through rigorous testing and code reviews.
Education...
...specialize in software solutions, system integration, and consulting services for developing, implementing, testing, and maintaining Toll Systems. Our focus is on creating scalable and secure toll back office systems and integration services with optimal IT infrastructure architecture...
...Job Summary: We are seeking an experienced React Native Developer with a proven track record in mobile app development to join our dynamic... ...meet high standards of usability, accessibility, and security.
Collaborate with the QA team to conduct thorough testing and...
...design and development of integration solutions Experience in API Security, API Key Validation, Protection against- Content-based Attacks,... ...life cycle management MustRoles and Responsibilites :1. Design, develop, and implement APIs using the Apigee Edge platform.2....