Search Results: 15 vacancies
...Maintain and update plans, drawing, section, maps, and village sheet.
Conducting field visits of Mining and Land Leases for ensuring security of leases.
Ensuring positioning of different demarcation/pillars for different category of lands.
Preparation of various...
...technologies, such as JavaScript, HTML5, and CSS3,Jquery,AJAX.- Knowledge of object oriented PHP programming- Understanding accessibility and security compliance- Strong knowledge of the common PHP or web server exploits and their solutions- Understanding fundamental design...
...and purchasing of all softwares, hardware and other IT supplies as per project requirement.- Designing the network infrastructure and security policies for the company.- To provide major support for engineering software requirements/availability.- Responsible for IT hardware,...
...environments- Working knowledge of office automation products and computer peripherals, like printers and scanners- Knowledge of network security practices and anti-virus programs- Addressing user tickets for issues regarding hardware, software, and networking- Maintaining a log...
...models for development are current and comply with common standards. - Design solution based on non-functional requirements such as security, maintainability- Identifying risk, issues, dependencies, and planning mitigation action with the PM at project level- Environment configuration...
...This will be a place where you will innovate to overcome current technology, you will bring in solutions which solve resiliency, scale, security , compliance for our global customers across various Azure Geographies- This position offers a unique opportunity to have a direct...
...optimization etc- Experienced in infrastructure cost assessment and monitoring and provide cost effective solutions- Knowledge of cloud security controls including tenant isolation, encryption at rest, encryption in transit, key management, vulnerability assessments,...
Rs 12000 - Rs 15000 per month
...Designation: Coordinator/ Back office Executive/ Operations Executive Experience: Min 6 months -2 years of secured & unsecured loans operation experience is mandatory
Gender Preference: Female or Male
Qualification: Any Graduate/Postgraduate/ CA
Salary: Best in Industry...
...technical architecture and understand the product development roadmap.- Analyze & optimize user metrics, system performance and database security.- Work with Ycenters leadership team to conduct user research and design UX/UI.- Maintain third-party API integrations & help...
...facilitate automation- Idea on publishing to Apigee and Azure and GCP basics- Hands-on experience with Spring Cloud, Config server, Spring security and batch, Lombok, oAuth2- Experience working in IDEs like Eclipse, IntelliJ, VSCode- Knowledge on SOLID Principles and JAVA Design...
...Complete understanding of Clustering with Failover and load balancing technology.- Well capable to work with ILO with HP and DELL & Securing resources with Shared folder and NTFS permissions.- Firmware/BIOS upgrades on DELL servers, Downloading the bundle package from dell...
...attractively.
# Cash Handling:
Handle cash transactions and provide accurate change.
Process credit card payments and maintain a secure cash register.
# Cleanliness:
Keep the bar area clean and organized.
Wash glassware and utensils.
Dispose of waste and...
...guidance- Troubleshoot and resolve issues related to Kubernetes, CI/CD, and other DevOps tools- Ensure high availability, performance, and security of Kubernetes clusters- Conduct regular performance tuning and capacity planning- Automate tasks using scripting or infrastructure-as...
...Scripting, PowerShell scripting and other command-line interfaces preferred.- Good understanding and experience in Active Directory security hardening concepts including tiered security, administrative forests, or just-in-time access- Strong problem-solving skills, able to...
Rs 20 - 30 lakhs p.a.
...organizations business plan and vision.
Establishes, communicates, and implements operations-related policies, practices, standards, and security measures to ensure effective and consistent support and execution.
Reviews and approves cost-control reports, cost estimates, and...