Average salary: Rs1,000,000 /yearly
More stats ...leading industry compliance regulations for security and privacy. Additionally, the team also... ...organization and is in charge of information security. This individual will help to maintain... ..., threat monitoring, vulnerability management, endpoint protection, tracking deliverables...
...Information Security Specialist
Position Overview
Job Title- Information Security Specialist... ...Access Recertification Solutions Team managing the Application, Infrasturcture and Unstructured... .... Process covers both periodic and events triggered based recertification cycles....
...Job Purpose
IT Security lead is responsible for ensuring the integrity, and availability of the organization's information assets by implementing and maintaining robust security measures... ...relevant regulations and frameworks.
Manage budget for IT security related...
...recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, firmware... ...log data, interpreting data in support of security event management process from various data feeds and triages on a wide variety...
...Make your career journey with us.
In one sentence
The Information Security Analyst will lead the efforts to secure the Amdocs ecosystem... ...products/ conducting risk and threat analysis/ analyzing and managing a secure solution in the domain of infrastructure/ application...
Job Vacancies in Security Architect with Security Information and Event Management for pune location
Rs 5 - 15 lakhs p.a.
...Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements... ...and performance goals.
Must have Skills : Security Information and Event Management,No Technology Specialty
Job Requirements : 6 years of...
...in the Digital Transformation space, is seeking a highly skilled and experienced individual to join our team as a Sr. Lead Information Security Manager (EKM). At Dew Software, we are committed to partnering with Fortune 500 companies to drive their digital success and deliver...
...Information Security Specialist
Position Overview
Job Title - Information Security Specialist, AVP
Location - Pune, India
Role... ...within a short time.
Familiarity with Vulnerability Management and Cyber Risk Management
Education and Certifications...
Job Title
Information Security Engineer
Diversity & Inclusion
We are an Equal Opportunity Employer and seek to hire the best candidate regardless of age, beliefs, disability, ethnicity, gender or sexual orientation.
...Information Security Analyst
Position Overview
Job Title - Information Security Analyst, AS
Location - Pune, India
Role Description... ...appropriate policies and standards for information security management.
CSO division, Business Information Security and...
...Job Title- Information Security Specialist Location- Pune, India
Role Description
You will be part of a Chief Information Security team... ...onboarding user and infrastructure applications to central solutions, managing entire access life cycle of business users which includes...
...Qualifications:
Graduate Degree in computer science, information technology, or similar field
Certification in security domain like CISSP, CISM etc is a plus.
Cloud... ...on designing infra solutions, administering, and managing server and cloud infra is an advantage....
...As an Information Security Officer, you are responsible for maintaining information security in the organization by developing policies, security... ..., approval, communication, maintenance including version management, enforcement, and control of PSPG (policies, standards,...
Job Description
Must have 7-15 yrs of work experience
Must have worked with Consulting or Big-4 companies in past
Candidate should be Compliance Certified – ISO 270001
Must be Lead Implementor & Auditor
...Job Title
Information Security Lead
Job Description
Job Title - Information Security Lead... ...the vision and leadership necessary to manage the risk to the platform assigned and will... ...security requirements and follow-up compliance events for IT services
Ensure operational...
...Responsibilities
Develop, implement, and manage security policies, procedures, framework and... ...overlook other measures required in the event of a security breach
Direct and coordinate... ...a 24X7 environment
Certification in Information security such as CEH, CISSP, ISO 27001...
...Fields, Custom Objects, Views, Workflows, Security Role templates, Calculations, Profiles,... ...Risk Frameworks, Third Party Risk Management and Audits.
~ Customer focus (ability... ...Maintains the effectiveness of enterprise-wide information security strategy including related...
...Description
Job Title : Information Security Consultant (GRC)
Grade : Senior Consultant
Location : Pune, Maharashtra
Company:... ...Designing, developing implementing information security management system initiatives such as security governance and strategy...
JOB DESCRIPTION
Job Title
Information Security Lead
Job Description
In this role, you have the opportunity to
Information Security... ...Lead will provide the vision and leadership necessary to manage the risk to the platform assigned and will ensure business...
...Description
Job Description
Senior Engineer, Cyber - Information security - Network security
REFID229592
NielsenIQ is working toward... ...action is desirable
Demonstrated experience with change management in enterprise production environments
Knowledge of scripting...
...Job Description
Job Number 24064242
Job Category Event Management
Location JW Marriott Hotel Pune, Senapati Bapat Road, Pune, Maharashtra, India VIEW ON MAP
Schedule Full-Time
Located Remotely? N
Relocation? N
Position Type Management
JOB SUMMARY...
...Title: Manager, Pune SAS Cloud Application Operations
Level: Manager, IT – SAS Cloud/... ...Azure Cloud – COMPUTE, STORAGE, NETWORK, SECURITY
~ Scripting (Bash, Perl, Python, PowerShell... ...make an impact.
Additional Information:
SAS is an equal opportunity...
...technology. We are one of the world's top asset management and banking firms that manages trillions... ...Ensures integration end state protects information resources against unauthorized use,... ...the SailPoint platform.
Promote security policies, standards, and best practices...
Rs 30 - 40 lakhs p.a.
...Job Description:
• Designated Information Security Head for the Organization
• Ensuring strategic alignment of information security in support... ...strategy design and sustenance
• Privileged Access Management Compliance
• Overseeing various information security and regulatory...
...Fields, Custom Objects, Views, Workflows, Security Role templates, Calculations, Profiles,... ...Risk Frameworks, Third Party Risk Management and Audits.
~ Customer focus (ability... ...project planning for an operational area in information security. Assists in daily oversight of...
...Title: Digital Events Manager
Essential Skills:
Extensive experience in planning and managing digital events and webinars.
Proficiency with digital event platforms (e.g., Zoom, WebEx, Hopin).
Strong understanding of SMS marketing and its applications in event promotion...
...Company Description
Planhook Mediacorp Hinjewadi phase1
Role Description
This is a full-time on-site role for an Event Manager located in Pune. The Event Manager will be responsible for planning and executing events, managing event logistics, coordinating with vendors...
...utilize the entitles support resources.
Project/Implementation management: Deploy new IT solutions. Ensure timelines are met from the... ...technology operations (e.g., AWS Cloud, Network (MPLS & SD WAN), Security & Infrastructure, Google Workspace,internal network on critical...
...We are seeking an Information Security Compliance Analyst to join our organization and take lead in
performing information security activities conducting risk assessments compliance management
including internal and external audits.
If you are highly motivated detail...
...offer our customers as well as the existing security infrastructure we have in place today;... ...foundation and understanding of sound information security fundamentals;
Experience with... ...technologies, eg, SIEM, vulnerability management, WAF, HIDS/NIDS, FIM, EDR, firewalls/security...