...have.
Maintain accurate and up-to-date records of all prospect interactions and activities in the CRM system.
Collaborate with internal teams to ensure smooth onboarding and transition of new clients.
Requirements:
Strong communication skills, both written and...
...and eager to gain practical experience in social media marketing, we encourage you to apply for the position of Social Media Marketing Intern at FyerX.
Benefits
Verified Certificate of Completion of Internship.
Learn to work in a team and increase your leadership...
As an Inside Sales Executive, you will handle B2B SaaS pre-sales on behalf of our clients. You will contact key decision makers in the IT industry based on our clients wish lists and help in bridging the gap between the solution the client is building and the problem that ...
...projects, with a focus on innovative solutions in infrastructure security for large campuses. With a consultative approach, we assist our... ...email campaigns, and networking events.
- Collaborate with internal teams to develop marketing materials, including brochures, presentations...
...experienced IT Operations Lead with a proven track record in overseeing internal IT server management, backup solutions, storage infrastructure,... ...infrastructure to ensure optimal performance, reliability, and security.
o Manage server configurations, updates, and...
...protection methods.
Work closely with clients to assess their IT security posture, identify weaknesses and vulnerabilities in relation to... ...the PCI program.
Conduct training sessions for clients and internal teams on PCI DSS and other cybersecurity standards and...
Job Title : Infrastructure Security Engineer.Hiring for Job in a Reputed Organization (Leading Product Based Company). Here is a Gateway... ...secure large-scale enterprise IT environments and solutions for internal and outward-facing applications.- Ability to participate in the...
...Fime enables its clients to create and launch trusted and secure solutions with consulting and testing services in payments, smart mobility... ...them with opportunities to accept new challenges both through internal promotion and international mobility.
At Fime, we are...
...Services (AWS) for the Cloud Computing courses, EC Council for Cyber Security courses, and many more. Our company has been mentioned by Hon.... ..., as needed
Collaborate with faculty, staff and other internal teams to help achieve organization-wide goals and contribute to...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...Maintain an information security risk register and assist with internal and external audits relating to information security
# Assist...
...and Global 500 brands.
We are seeking for a dynamic Network Security Engineer to join our passionate team and the details are as... ...over 33,000 clients. Headquartered in Atlanta, GA and with an internationally distributed workforce spanning 19 countries with about 5,500 employees...
...Description
We are seeking a dedicated and experienced Sr Security Analyst to bolster our Security Operations and Incident Response... ...professional to define security-related processes and procedures.Engage in internal and third-party audits of the company’s information security...
...products across multiple brands and we are looking for a System Security Engineer to join our IT team.
Broadway Gaming is looking for... ...for all security solutions being implemented in the company by internal and external teams. Proven understanding of security technologies...
...together with us.
YOUR ROLE:
• Create and Implement via Terraform security concepts and architectures in various cloud environments (GCP,... ...and risk analyses of cloud infrastructures and work with internal teams to ensure optimal security solutions,
• Identify cloud security...
...Job Title- Head of Application Security
Job Description:
We are seeking a highly skilled and motivated Application Security Leader... ...application security topics and provide guidance and support to internal teams.
8.Security Tooling and Automation :
~ Evaluate, deploy...
...problems? If so, lets talk.
Your Role and Responsibilities
IBM Security Architects come from many far-ranging disciplines; from... ...written and verbal communication, explaining vulnerabilities, writing internal guidance documents, coordinating with other teams.
~10 years’...
...Technology, and Ministry of Electronics and Information Technology.
Additionally, NSRCEL has partners with corporates like ICICI Securities, Maruti Suzuki, Capgemini among others to support entrepreneurs in focussed sectors like Mobility, Fintech, Healthcare and Social Entrepreneurship...
...Responsibilities and Accountability: Develop and manage information security & privacy related concept of the business unit Support the... ...programs Responsible for audits and other privacy compliance checks – internal and external Responsible for all the operational activities of...
Job Title : Data Security Specialist- .Experience Required : - 4+ years of experience in Data Security.Job Description : We are seeking a... ...Labeling to maintain compliance with regulatory requirements and internal policies.- Monitor and analyze data security incidents,...
...stakeholders understand and are aware of the Technology and Cyber security risks (TCS), and associated TCS Risk within emerging... ...effectively, building strong relationships and influence senior internal and external stakeholders.- Comprehensive knowledge of the external...
...Job Description
Project Role : Security Architect
Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition...
...Job Description
POSITION TITLE (ENGLISH): Information Security Analyst (L1 SOC)
REPORTING TO: Manager
REPORTING LOCATION:... ...incident information.
Analysis of phishing emails reported by internal end users.
Escalation of incidents to be handled to L2 SOC team...
...Identity and access management Controls to manage authentication for internal and external users.
• Detecting and Predictive controls... ...Assisting with new integrations and introduction of additional security controls to enhance IAM posture
• Assisting with driving projects...
...Job Description
As the Information Security Manager, you will be responsible for developing, implementing, and managing the organization's information security program. You will work closely with internal stakeholders to identify security risks, establish policies and procedures...
...Mobileum is a leading provider of Telecom analytics solutions for roaming, core network, security, risk management, domestic and international connectivity testing, and customer intelligence. More than 1,000 customers rely on its Active Intelligence platform, which provides...
...increase the protection of our customers.
Job Responsibility IT Security Working with the IT/IS teams to implement the requirements... ...actions with the Product Managers and IT Teams identified through internal governance activities (Security Risk Assessments, Security...
Summary :We are seeking a seasoned Security Architect with a passion for building secure and resilient cloud and OT environments. You will... ...and customer requirements.Responsibilities :- Consult with internal stakeholders to understand business goals, customer needs, and regulatory...
...timely manner and drive global standardization efforts across the firm.
What you will do?
Lead system integrations for both internal facing and external facing systems/applications with SailPoint IdentityIQ and IdentityNow.
Development and configuration experience...
...Job Description
Why Join Us?
As the world’s leading vendor of Cyber Security, facing the most sophisticated threats and attacks, we’ve assembled a global team of the most driven, creative and innovative people. At Check Point, our employees are redefining the security...
...Location: Bangalore & Mumbai Experience: 6 to 12 Years
Skill: Automotive, embedded security,
Public Key Cryptography Standards (PKCS), cryptographic hash functions like SHA, Public Key Infrastructure (PKI), Key management, securing attack surfaces, defining and assessing...