Rs 40 lakh p.a.
...Job Description:
Information Security Manager
Job Summary & Core Requirements
• Minimum 5 years' experience in IT Governance and Cyber Security as HOD (mandatory)
• Vendor industry experience (mandatory)
• Hands on and ability to implement security technical solutions...
...Position Requirements
Candidate with 15+ year of experience in working in operations/managed services.
Strong technical experience on Firewall, Palo Alto, Cloud Security, and Data center
Carrying out deployment, maintenance, monitoring, and management tasks
Demonstrable...
...with Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Security Manager is responsible to develop, implement, monitor and evaluate the hotel’s safety and security procedures, including fire safety, employee...
...experience, able to work with Sales teams to generate opportunities for Security Product offerings.
Design, Presents, demonstrates the... ...relating to: data loss prevention, security incident and event management, identity and access management, role-based management, strong...
...an environment where everyone feels they can belong and their contribution matters.
Want to be a part of our team?
The Security Managed Services Engineer (L2) is responsible for providing a managed service to clients to ensure that their Security Infrastructures and...
...Job Details
Role : Manager - SOC
Work Location : Chennai
Work Type : Work from Office
Qualification : Undergraduate is... ...experience in Managing SOC team
Developing, maintaining and updating security policies and procedures
Directing incident response and in...
...Top 100 Best Companies to Work for, Novac Technology Solutions Private Limited
Novac is currently hiring for Information Security Risk Manager
NOVAC is a company built on determination, tenacity, and an indomitable entrepreneurial spirit. We have retained these qualities...
Salary : 12 - 24 LPAJob Description : Vulnerability management Engineer : - Emphasis on the importance of being able to assess the risk of... ...mgmt life cycle. - Responsible for the Application Security and Vulnerability Management Product (SAST, DAST, Dependency Scans...
...Responsibilities:
Generate leads through Direct sourcing for the Secured Business Loans / LAP.
Achieve assigned business targets and... ...ground to ensure steady inflow.
Report to the Area Business Manager and manage all customer acquisition for the territory assigned....
...Job Details
Role : Manager - SOC (Audits /Assessments)
Work Location : Chennai
Work Type : Work from Office
Qualification... ...Roles & Responsibilities:
Point of Contact for all Client Security Questionnaires and RFP/RFI responses
· Create and maintain Security...
Requirements : - 4+ years of IT and relevant security experience.- Must have one cyber security certification.- Experience/understanding of Vulnerability Management. Distribute Vulnerability reports to relevant stakeholders and track them for closure.- Experience/understanding...
...strong background in cybersecurity. In this role, you will be responsible for implementing, configuring, and managing Rapid7 products to enhance our organization's security posture.Responsibilities : - Implement and configure Rapid7 products, including InsightVM, InsightIDR,...
...vulnerability response (ServiceNow)
Perform information system security vulnerability scanning to discover and analyze vulnerabilities... ...documentation that defines the Threat & Vulnerability Management Program, Policy and Procedures
Participated in the calls to...
...Job Description
Project Role : Security Architect
Project Role Description : Define the cloud security framework and architecture... ...of the cloud security controls and transition to cloud security-managed operations.
Must have skills : Infrastructure Security...
...cyber attack and this is proven through a steady uprise in the security incidents and data breaches year on year. We at Freshworks are committed... ...security by working with Developers, Product Owners, Program Managers, and Security Engineers. As part of the security engineering...
...Job Description
Project Role : Security Delivery Lead
Project Role Description : Leads the implementation and delivery of Security... ...tools, training, assets).
Must have skills : Okta Identity Management
Good to have skills : Identity and Access Management (IAM)...
...Province: Chennai
City: Guindy, Chennai
Summary
Application Security applies the understanding of a broad range of technologies and... ...security reporting, including coordinating vulnerability management, penetration testing, and compliance initiatives
~Maintain and...
...Function:
PI IT
Reports to:
(Direct)
Head of Department/Manager
Grade:
(if applicable)
(Functional)
Number of Direct... ...Directorship / Registration:
NA
Position Purpose
A security champion is a developer or security enthusiast inside the development...
...Province: Chennai
City: Guindy, Chennai
Summary
Information Security - OT Security applies the understanding of a broad range of... ...to identify new and alternative approaches to implementing and managing operations technology security activities. Provide security consultation...
...serves over 3,700 customers across more than 50 countries, through a secure, cloud- enabledglobal delivery model.We are 18,000 employees... ...Office and IT
~ Demonstrated facilitation and project management skills
~ Ability to adapt to changing requirements Attention to...
...colleagues and for the planet.
Hospitality is a work of heart ,
Join us and become a Heartist ®.
Job Description
Security Officer
Guardian and Protector. You ensure the safety and wellbeing of your fellow employees, guests and visitors. You are...
...An Amazing Career Opportunity for Information Security Analyst Location: Chennai, India (Hybrid)
Job ID: 23003
Profile Summary... ...and organizational skills. This position typically reports to the Manager of Information Security.
Who are we?
HID powers the trusted...
...We are hiring for Security Architect PFB the job description
Location: Chennai (WFO)
Experience 10
Notice Period 0 to 1... ...developers infrastructure engineers network specialists and project managers to integrate security measures seamlessly into the development...
...Excellent knowledge and prior experience supporting network security technologies such as Proxies, NG Firewalls, SSL/IPSec, VPNs, SSO... ...Security, Firewalls, access and perimeter control, vulnerability management and intrusion detection.
Ability to understand and troubleshoot...
...Security Analyst – On Site Chennai
Why We Need You – The Mission & Our Vision
Veryon is a leading software and technology company... ...security posture.
Take on tool dashboard, alert, and active management of security tooling stack, such as Crowdstrike, Avanan, JIRA, and...
...Security Specialist – Vulnerability Management Experience – 7 to 12 Years
Notice Period - Immediate to 20 Days
Location – Chennai (Hybrid) WFO
Roles & Responsibilities:
Experience working with Vulnerability assessment tools like Nexpose, Nessus & vulnerability...
...We are seeking a skilled Identity Management Developer with a strong understanding of Identity Management tools, Active Directory, and Password Management concepts. The ideal candidate should have extensive experience in development and customization activities, particularly...
...A Security Executive keeps constant vigilance of activity on and around the hotel property and reports, with documentation, incidents with the intent of improving the safety and security of Guests, Team Members, and others.
What will I be doing?
As a Security Executive...
...years
Location : Chennai/Coimbatore/Bangalore/Hyderabad
Candidate Requirement:
~ Expert in Troubleshooting, configuring & managing Active Directory DS 2019, DFS (DFSR and DFSN), AD FS & AD CS
~ Sound knowledge and troubleshooting experience in managing large...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...2.
Process Adherence
Adherence to SLA’s (90-95%), response time and resolution time TAT
PKI - Certificate Management