Search Results: 214 vacancies
...become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
Perimeter Security Specialist.
Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...Job Description
Prime Function:
Supervise, instruct and coordinate the activities of Security Associates.
Monitor and arrange shift activities according to schedule requirements and team availability.
Ensure all personnel are present & have assumed their duties...
...lead the IT/IS team in building our cybersecurity portfolio and services.
Take ownership of working continuously to improve G10X security posture.
Take ownership for the operations aspect of customer-facing services.
At G10X, help build competencies in cybersecurity...
...rate in finding flourishing careers and financial independence.
Role Description
This is a full-time on-site role for a Cyber Security Instructor located in Kochi. The Cyber Security Instructor will be responsible for delivering high-quality training and education in...
...Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position...
...Business Development Manager" in the subject line of your email.
Email: ****@*****.***
Cyber Security Specialist
We are looking for a Cyber Security Specialist to join our team to work closely with the stakeholders to
ensure that...
...Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the security operations of the Security team
Qualifications
Ideally with a...
...designs for complex changes to mitigate risks and provide guidance on
technical approach
Email: ****@*****.***
3D Secure - Project Support Analyst
3D Secure (Mastercard ID Check/Verified by Visa) is being implemented by almost all card
programmes...
...build an exceptional experience for yourself, and a better working world for all.
TEM Senior –DevSecOps
As part of our Cyber Security team, you will build and manage a secure cloud/on-prem platform while ensuring seamless development, build and deployment...
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function of
organization. The role involves overseeing various aspects of security, disaster recovery, security finance management, documentation, compliance, and program...
...Required- Bachelor's degree in Commerce
Email: ****@*****.***
Virtual Chief Information Security Officer (vCISO)
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function...
...Required- Bachelor's degree in Commerce
Email: ****@*****.***
Virtual Chief Information Security Officer (vCISO)
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function...
...Required- Bachelor's degree in Commerce
Email: ****@*****.***
Virtual Chief Information Security Officer (vCISO)
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function...
...knives, and equipment. Check and ensure the correctness of the temperature of appliances and food.
Follow all company and safety and security policies and procedures; report maintenance needs, accidents, injuries, and unsafe work conditions to manager; complete safety...
...all payment methods. Count bank at end of shift, complete designated cashier reports, resolve any discrepancies, drop off receipts, and secure bank. Secure liquors, beers, wines, coolers, cabinets, and storage areas. Complete closing duties.
Follow all company and safety...
...appearance are clean and professional; maintain confidentiality of proprietary information; protect company assets; protect the privacy and security of guests and coworkers. Welcome and acknowledge all guests according to company standards; anticipate and address guests’ service...
...software
• Good working knowledge of programming languages
• Outstanding written and verbal communication skills
• Bachelor’s degree in computer science, Software Engineering, or related field
• Knowledge in Cyber Security Domain
• Automation hands on experience is a plus.
...training, scheduling, evaluating, counseling, disciplining, and motivating and coaching employees. Follow all company and safety and security policies and procedures; report maintenance problems, safety hazards, accidents, or injuries; and complete safety training and certifications...