Search Results: 199 vacancies
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...Job Description
Prime Function:
Supervise, instruct and coordinate the activities of Security Associates.
Monitor and arrange shift activities according to schedule requirements and team availability.
Ensure all personnel are present & have assumed their duties...
...lead the IT/IS team in building our cybersecurity portfolio and services.
Take ownership of working continuously to improve G10X security posture.
Take ownership for the operations aspect of customer-facing services.
At G10X, help build competencies in cybersecurity...
...Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position...
...Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the security operations of the Security team
Qualifications
Ideally with a...
...designs for complex changes to mitigate risks and provide guidance on
technical approach
Email: ****@*****.***
3D Secure - Project Support Analyst
3D Secure (Mastercard ID Check/Verified by Visa) is being implemented by almost all card
programmes...
...build an exceptional experience for yourself, and a better working world for all.
TEM Senior –DevSecOps
As part of our Cyber Security team, you will build and manage a secure cloud/on-prem platform while ensuring seamless development, build and deployment...
Rs 7 - 15 lakhs p.a.
...This role with report to Information security management Associate Head - Solutions and architecture
Ability to learn, understand and work with team to gain insight into security solutions and architecture functions
Should have good understanding of network, OS and security...
Rs 7 - 15 lakhs p.a.
...Vertical - Information Security Management
Job Purpose -
Ability to learn, understand and work with team to gain insight into SOC and cyber forensic functions
Functional Responsibility
1.Perform Level1 SOC monitoring
2. Timely escalation of incident...
...all payment methods. Count bank at end of shift, complete designated cashier reports, resolve any discrepancies, drop off receipts, and secure bank. Secure liquors, beers, wines, coolers, cabinets, and storage areas. Complete closing duties.
Follow all company and safety...
...evaluating, counseling, disciplining, and motivating and coaching employees; serve as a role model. Follow all company and safety and security policies and procedures; report maintenance needs, accidents, injuries, and unsafe work conditions to manager; complete safety...
...knives, and equipment. Check and ensure the correctness of the temperature of appliances and food.
Follow all company and safety and security policies and procedures; report maintenance needs, accidents, injuries, and unsafe work conditions to manager; complete safety...
...maintaining the company's database systems. You will also lead a team of developers, oversee the database architecture, and ensure the security and performance of the database infrastructure.
Qualifications
1. Strong hands-on experience in writing complex SQL queries,...
...findings, including risk levels and recommended remediation steps.
Collaborate with IT and development teams to address and resolve security issues.
Stay updated on the latest security trends, vulnerabilities, and attack vectors.
Assist in developing and implementing...
...Provides support during the transition to production.
Works closely with Technical Product Manager, infrastructure, information security, and operations to implement/build solutions as part of end-to-end projects. Supports the project during the transition phase.
Analytical...
...role model and first point of contact of the Guarantee of Fair Treatment/Open Door Policy process. Follow all company and safety and security policies and procedures; report accidents, injuries, and unsafe work conditions to manager; and complete safety training and certifications...
...Within our Cloud Platforms Solution Line, we apply an agile approach to provide true on-demand cloud platforms. We implement and operate secure cloud and hybrid global infrastructures using automation techniques for our clients business critical application landscapel...
...all payment methods. Count bank at end of shift, complete designated cashier reports, resolve any discrepancies, drop off receipts, and secure bank. Secure liquors, beers, wines, coolers, cabinets, and storage areas. Complete closing duties.
Follow all company and safety...
...each guest according to their requirements. Enter Marriott Rewards information. Ensure rates match market codes, document exceptions. Secure payment prior to issuing room key, verify/adjust billing. Compile and review daily reports/logs/contingency lists. Complete cashier and...