...training, scheduling, evaluating, counseling, disciplining, and motivating and coaching employees. Follow all company and safety and security policies and procedures; report accidents, injuries, and unsafe work conditions to manager. Maintain confidentiality of proprietary information...
...About the job We at SEDEMAC are on the look-out for a Lead Executive, Sourcing to join our stellar Supply Chain team.
Job Responsibilities
1. Implements sourcing plans with the goal of assuring specified quality, required delivery times and minimizing the total cost...
...Overview
The Marketing Executive (Female) plays a crucial role in driving the marketing initiatives and contributing to the overall growth and success of the organization. They are responsible for implementing marketing strategies building brand awareness and driving customer...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...Competencies
Effective Communication
Collaborative Working
Execution Excellence
Problem Solving & Analytical Skills
Deliver...
Rs 4.8 lakh p.a.
...Search, evaluation and selection of specialists and managers.
• Executive search projects based on meeting our clients’ specific needs,... ...management on a range of business issues.
Driving sales for security, housekeeping and manpower supply.
Driving contracts/sites of...
...:
A Bachelors degree with 17+ years of experience in Cyber Security domain.
Must be able develop project plan and track the plan... ...model and Experience in managing FTEs and Vendors.
Experience in executing Cloud projects, DevOps, Automation tools.
What would be...
...Hi Candidate ,
Tech M is hiring for security Consultant .
• Proficient in Incident Management and Response • Experience in security device management and SIEM (Splunk). Splunk Certification is preferred. • In-depth knowledge of security concepts such as cyber-attacks...
...of subjected ECU- Recommending & ensuring usage of correct tools / systems towards execution of successful pen-test- Conduct pen-test on variety of Automotive systems / ECUs- Perform security assessment of different hardware modules and identify vulnerabilities- Handle multiple...
...We're looking for a Security Analyst
This role is Office Based
Security Analyst, IT Security and Compliance
Job Brief:
We are seeking an experienced Security Analyst to join our IT Security and Compliance team. The ideal candidate will have a cyber security...
...DevSecOps Engineer to join our dynamic team. As a key member of our DevOps team, you will be responsible for leading and implementing security practices throughout the software development and deployment lifecycle. The ideal candidate will possess a strong background in...
...Job Description
Project Role : Security Architect
Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition...
...Position Overview
Job Title: Technical Information Security Officer
Location: Pune, India
Role description:
The TISO acts... ...ownership for these assets from an IT Security perspective. The TISO executes all tasks that are assigned to this role based on defined and...
...Display ability to perform Engineer on Duty responsibilities, including readings and rounds.
Follow all company and safety and security policies and procedures; report any maintenance problems, safety hazards, accidents, or injuries; complete safety training and certifications...
...Worldpay’s path to being the largest and most-loved payments company in the world.
About the team
Monitor and maintain physical security of facilities and offices through use of automated security systems and employee identification card system
What you will do:
•...
...Cybersecurity Solutions Location: Pune/Mumbai
Type: Fulltime
Must have skills: Cybersecurity, Data Security, VAPT, EDR,SEIM
Job Description:
Develop and execute project plans for the development and enhancement of cybersecurity solutions.
Ensure projects are...
...Key Skills:
Cyber Security
Data Privacy
Governance, Risk Management & Compliance
Technology Risk
Working experience with Cyber Security and data privacy industry standards and controls
PCI DSS, Soc, NIST, ISO, GDPR
Audit (Risk & Compliance based, Standards...
...Primary Skill : Security Testing
Secondary Skill : Security Testing
Other Skills :
Organizational Level 1 : Amdocs Services... ....
What will your job look like?
~ You will oversee and execute test processes, determine the proper prioritization of the testing...
...performance
Recommends and deploys structural changes to the operating environment in collaboration with Infrastructure, information security and vendor teams
Releases public area documentation and manages key information such as build and release procedures, dependencies...
...portfolio.
About the Job
Job Title: Senior Information Security Engineer
Department: Information Technology
Reports To:... ...vulnerabilities based on risk and business impact. Develop and execute patch management programs.
Incident Response: Lead the incident...
...Job Title - Senior Security Analyst Job Location - Baner, Pune
About Company
Our client is a pioneering Identity SecOps provider that arms identity and cybersecurity teams with end-to-end, real-time identity security posture management and threat detection. They are...
...Job Description
~ Security guard requment argent hiring SIS security against which of all ready
Job Requirement
Experience
Fresher
Internship
No
Skills
Frisking, CCTV Monitoring, Handling Fire Extinguisher, In / Out entry on register, In / Out...
...in compliance with leading industry compliance regulations for security and privacy. Additionally, the team also works with technical teams... ...policies and client requirements, including planning for and executing on infrastructure and architecture decisions.
Perform periodic...
Are you interested in automating the build and deployment process of the application with ensuring the application security? If yes, then Payatu is the place for you. We are always in search of passionate people to expand our renowned Bandit family at Payatu. In the quest for...
Summary :We are seeking a seasoned Security Architect with a passion for building secure and resilient cloud and OT environments. You will leverage your extensive experience in security best practices, cloud technologies, and regulatory compliance to design, implement, and manage...
...Description
What We Do
Managing cyber risk, together – Today the modern enterprise is an Enterprise of Things. We are on a mission to secure the Enterprise of Things with active defense by identifying, segmenting, and enforcing compliance of every connected thing in a real-...
...Position Overview
Job Title - Information Security Specialist, AVP
Location - Pune, India
Role Description
Chief Security... ...employees regarding the identification, development, implementation and execution of all processes which serve to reduce information security risk...
...items, turning off lights, etc. Present physical and accurate check to guest and process payment.
Follow all company and safety and security policies and procedures; report accidents, injuries, and unsafe work conditions to manager; and complete safety training and...
...evaluating, counseling, disciplining, and motivating and coaching employees; and serve as a role model. Follow all company and safety and security policies and procedures; report accidents, injuries, and unsafe work conditions to manager; and complete safety training and...
...Job Purpose
IT Security lead is responsible for ensuring the integrity, and availability of the organization's information assets by implementing and maintaining robust security measures and practices. IT Security personnel is responsible for protecting the organization'...
Rs 15 - 25 lakhs p.a.
# Help define consistent Secure Software Development Lifecycle practices
# Ensure end-to-end security of Enterprise apps
# Improve secure coding practices, application security requirements, automation, training, and metrics
# Integrate threat modeling practices into the...