Average salary: Rs5,184,065 /yearly
More statsGet new jobs by email
Search Results: 381 vacancies
- ...Thales people architect identity management and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange...SuggestedFull timeLocal areaRemote jobHybrid work
- ...Job Title: DevSecOps + Security Analyst Experience -5–7 years Office Hour- 10pm- 7am IST Location- Work from home Male candidate... ...like Ansible, Packer, Terraform, and Docker. · Implement and manage Infrastructure-as-Code (IaC) securely using Terraform, CloudFormation...SuggestedWork at officeWork from homeHybrid work
- ...JobType: full-time We are seeking a highly skilled TCMS OT Security Consultant with 5+ years of experience in industrial... ...enterprise networks, and third-party systems. OT Firewall Policy Management: Define, implement, and monitor robust OT firewall policies aligned...SuggestedFull timeRemote jobWeekday work
- ...As the most widely used Linux distribution, Ubuntu underpins the security of the entire internet. The role of Security Engineering Manager directly impacts the safety and security of millions of users worldwide. Join a team of security experts dedicated to protecting the open...SuggestedLocal areaWorldwide
- ...eCommerce platforms using Optimizely Configured Commerce (InsiteCommerce).- Define scalable, secure, and maintainable architectures aligned with business goals.- Collaborate with product managers, business analysts, UX/UI designers, and development teams to gather business and...SuggestedContract work
- ...the daily operations of sellers, including daily metrics monitoring, triggering on field support to sellers and audits, stake holder management, within and outside of Amazon, rolling out of new processes, and running central control centres. The job requires someone who has a...SuggestedRemote jobShift workWeekend work
- Sr Info Security Analyst - Remote Find more than your next job. Find your community. We’re northern Michigan’s largest healthcare... ..., and maintenance of security controls. Leverages project management techniques for successful changes. Uses effective communication...SuggestedFull timeRemote job
- ...Opportunity Netrix Global team is looking for an experienced Senior Security Engineer to join our growing security team. In this role, you'... ...penetration testing, vulnerability scanning, and vulnerability management processes. ~ Working knowledge of Linux systems and syslog...SuggestedRemote jobFull timeCasual workShift workNight shiftRotating shift
- JOB DESCRIPTION :Seeking a Production Control Security Analyst that has strong technical knowledge IBM Security Verify Access, IBM Security Verify Governance Identity Manager and IBM Mainframe ZOS RACF products to provide development and support to Mazda companies, affiliates...Suggested
- We are looking for a skilled and driven Red Team Security Analyst to join our cybersecurity team. The ideal candidate will have hands-on experience in conducting offensive security assessments, simulating real-world attacks, identifying vulnerabilities, and working closely with...Suggested
- ...on capturing business requirements and ensuring flawless execution of digital campaigns on property & off property. We are seeking a Manager, Ad Operations rolling up to Synchrony, India, Hyderabad to lead efforts in ensuring delivery of marketing operational excellence, supporting...Suggested
- ...seeking an energetic, multi-tasking, and process focused Sales Security Analyst to support our nationwide sales team. The Sales Security... ...Security & Compliance teams to obtain up to date content/responses Managing and updating security response content and associated security...SuggestedRemote jobFull timeContract work
- ...resolve ad-serving errors, tracking discrepancies, and technical challenges, partnering with internal teams as needed. Campaign Management Support: Provide hands-on support for creative trafficking, campaign setup, and ongoing management based on team priorities. Required...SuggestedFull time
- Security Consultant for one of our clients' MNCs.Exp : 7-10 yearsLocation : RemoteJob Type : 6 months contract + ext.Role Overview :As... ...training for technical staff and business users6. Project & Vendor Management :- Plan and coordinate security projects, including scoping,...SuggestedContract work
- ...About the Role: We are seeking a Staff Product Manager with deep expertise in AI, Data Science, and Cybersecurity to lead the development of a transformative Security Data Fabric and Exposure Management Platform (ISPM, ITDR etc). In a world of siloed security tools and scattered...SuggestedRemote jobFull timeHybrid work
- ...Singapore. Mission: The Operations Analyst will act as a proactive driver of Sleek’s FinTech operations, ensuring smooth product management, operational excellence, and continuous improvement of the Sleek Business Account (SBA). By combining strong operational insight...Remote jobWork from homeHome office3 days week
- ...Qualifications & Fit: Excellent Communication : Strong proficiency in English, both written and spoken. Organizational Skills : Ability to manage multiple tasks, deadlines, and team needs efficiently. Time Management : Ability to prioritize tasks effectively, manage multiple...Remote jobHourly pay
- Security Expert ( Equipment And Weapons) Start Date Starts Immediately... ...accessible and persuasive manner. Ability to work independently, manage time efficiently, and meet deadlines. Preferred Qualifications...Remote jobPart timeFor contractorsImmediate startFlexible hours
- ...of controls across various regulatory compliance requirements, managing exceptions to cyber policies, monitoring key performance indicators... ...cybersecurity KPIs and KRIs to track the effectiveness of security measures and identify areas for improvement.- Prepare and present...Full timeRemote job
- ...methodologies and application concepts within the modern cyber security organization.- Direct experience in the consumption, processing,... ...experience related to :1) Threat Intelligence analysis and experience managing and implementing the threat intelligence lifecycle2) Common...