Average salary: Rs1,591,071 /yearly
More stats ...Job Description
Job Number 24086448
Job Category Loss Prevention & Security
Location The Westin Pune Koregaon Park, 36/3-B Koregaon Park Annexe, Pune, Maharashtra, India VIEW ON MAP
Schedule Full-Time
Located Remotely? N
Relocation? N
Position Type...
...Job Number 24086448
Job Category Loss Prevention & Security
Location The Westin Pune Koregaon Park, 36/3-B Koregaon Park Annexe, Pune, Maharashtra, India VIEW ON MAP
Schedule Full-Time
Located Remotely? N
Relocation? N
Position Type Non-Management...
...Responsibilities:
Monitor cloud networks and systems for security issues.
Investigate security breaches and other... ...Implementation of security risk assessments reporting.
Data Loss and Exfiltration prevention tools and implementations.
End Point Detection and Response...
...Enterprise of Things. We are on a mission to secure the Enterprise of Things with active... ...systems hardening and mitigation measures to prevent a reoccurrence.
Maintain a keen understanding... ...), Public Key Infrastructure (PKI), Data Loss Prevention.
~(DLP), Identity and Access...
...About Position
We are seeking a Cloud Infra Security to join our Team. Must have experience working in Cybersecurity DLP, data classification... ...of Data Security including concepts involving Data Loss Prevention (DLP), Encryption/Tokenization, Database Activity Monitoring,...
...the Job
Job Title: Senior Information Security Engineer
Department: Information... ...including firewalls, intrusion detection/prevention systems (IDS/IPS), and Zero Trust Network... ...including spam filtering, anti-phishing, data loss prevention (DLP), and encryption....
...Summary :
Responsible for managing an Information Data Security Operations and Support group. The Information Security Operations... ...knowledge of protection solutions and technologies for Data Loss Prevention (DLP) Experience implementing and managing data loss prevention...
...Job Role: Microsoft 365 Security and Compliance Specialist
Location: Remote
Job Overview:
Were seeking a highly skilled... ...all Microsoft 365 services.
Data Protection:
Develop data loss prevention (DLP) strategies.
Monitor data activities for potential vulnerabilities...
...Job Title - Senior Security Analyst Job Location - Baner, Pune
About Company
Our client is a pioneering Identity SecOps provider... ...SIEM, SOC, and SOAR solutions, XDR/EDR, intrusion detection/prevention systems, and identity and access management (IAM) platforms....
...Fraud Monitoring; Fraud Operations; Fraud Prevention.
What you will bring
AML KYC... ...financial activity
Prevents fraud and losses for Worldpay and its clients
Disseminates... ...committed to protecting the privacy and security of all personal information that we process...
...fostering global leaders poised for success.
Job Purpose
The Head of Security will be responsible of Universitys Campus in formulating... ...norms and ensure timely legal compliances.
• Plan for preventive policies to avoid any malpractices, corruption, fraud etc.
• Train...
...an SME ensuring adherence to RCA process
Maintain and improve mechanisms for proactive performance and risk assessment through the security solution and disseminate feedback to other internal security team
Adhere to all policies and procedures
Service Improvement...
...customer ideas into successful products.
Requirements
Build a Security Hardening strategy for our cloud services and continue to assess... ...respond to security incidents and proactively consider how to prevent the same type of incidents from occurring.
Design and...
...Hi Candidate ,
Tech M is hiring for security Consultant .
• Proficient in Incident Management and Response • Experience in security device management and SIEM (Splunk). Splunk Certification is preferred. • In-depth knowledge of security concepts such as cyber-attacks...
Rs 30 - 40 lakhs p.a.
...Job Description:
• Designated Information Security Head for the Organization
• Ensuring strategic alignment of information security... ..., Risk Assessments and other
ISMS documents
• Data loss prevention strategy design and sustenance
• Privileged Access Management...
...DevSecOps Engineer to join our dynamic team. As a key member of our DevOps team, you will be responsible for leading and implementing security practices throughout the software development and deployment lifecycle. The ideal candidate will possess a strong background in...
...Job Description
Project Role : Security Architect
Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition...
...We're looking for a Security Analyst
This role is Office Based
Security Analyst, IT Security and Compliance
Job Brief:
We are seeking an experienced Security Analyst to join our IT Security and Compliance team. The ideal candidate will have a cyber security...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...About Position
We are seeking an experienced Security – Oracle IDM to join our Security Practice team. The successful candidate must be customer-facing and security-centric, have good communication skills and thorough security knowledge with outstanding presentation skills...
...in Cybersecurity, Information Technology, Finance, or related field.
~3 years of experience in Information Governance Compliance or Security & Technology
~ Demonstrated experience in IT Governance Risk and Compliance (GRC) including financial governance compliance
~...
...Product group of MNC that provides services in
learning and Assessment space.
About the Role
Designation : Cyber Security Engineer
Responsibility of / Expectations from the Role
Identify security measures to improve incident response...
...performance
Recommends and deploys structural changes to the operating environment in collaboration with Infrastructure, information security and vendor teams
Releases public area documentation and manages key information such as build and release procedures, dependencies...
...Worldpay’s path to being the largest and most-loved payments company in the world.
About the team
Monitor and maintain physical security of facilities and offices through use of automated security systems and employee identification card system
What you will do:
•...
...management on performance of the delivery
What you will need to have:
A Bachelors degree with 17+ years of experience in Cyber Security domain.
Must be able develop project plan and track the plan using MS Project and must have experience in Agile methodology and...
...to help drive adoption and understanding of PAM across the enterprise.
? Assist with the management of PAM-related audit or other security findings.
Qualifications:
The requirements listed are representative of the knowledge, skill, and/or ability required:
? Extensive...
...Job Description
~ Security guard requment argent hiring SIS security against which of all ready
Job Requirement
Experience
Fresher
Internship
No
Skills
Frisking, CCTV Monitoring, Handling Fire Extinguisher, In / Out entry on register, In / Out...
Are you interested in automating the build and deployment process of the application with ensuring the application security? If yes, then Payatu is the place for you. We are always in search of passionate people to expand our renowned Bandit family at Payatu. In the quest for...
Summary :We are seeking a seasoned Security Architect with a passion for building secure and resilient cloud and OT environments. You will leverage your extensive experience in security best practices, cloud technologies, and regulatory compliance to design, implement, and manage...
...time only on F5 day to day operations such as
· F5 load balancer related tasks like Virtual server creation, SSL profile attachment, Security profile attachment, Vulnerability fixing on VS weightage= 15%
· F5 irule code writing to protect the websites from attack and for...