Average salary: Rs1,039,721 /yearly
More statsGet new jobs by email
- ...Job Title: Security Supervisor Location: Pan India Department: Security Reports To: Security Manager / Facility Manager... ...when required. Requirements: Proven experience as a security officer or supervisor. Knowledge of surveillance systems and security...Suggested
- ...You will be responsible for providing an excellent and consistent level of service to your customers. As the Security Supervisor , you'll assist in the efficient running of the security function. Qualifications Ideally, you'll have a professional diploma or certificate...Suggested
- ...configuration Implementation / Architectural / deployment and integration exposure using Azure Entra Demonstrated experience with Office 365 security sign-on and multi-factor authentication Provide assistance to support team (If required) in operations, maintenance and...SuggestedWork at office
- ...residence to travelers across the globe. Nearby to corporate offices- JP Morgan, Accenture, Honeywell, Deloitte and many more along Sarjapur... ...: Monitor surveillance cameras, alarm systems, and other security equipment to detect suspicious activity. Conduct regular...SuggestedFull timeFor contractorsImmediate startWorldwide
- ...Responsible for engineering and proper functioning of the Global Security tooling estate. Security Orchestration and Automation for the Infosys Quartz Security Operations team and Global security tooling landscape to empower Security operational teams to improve their response...Suggested
- ~ Experience in Cloud Security or IoT security. ~ Strong in Cloud Security or AWS cloud. ~ Experience in VAPT skills. ~ Conduct Penetration testing for thin & thick client-based applications. ~ Manual security assessments of web applications on thick & thin clients....Suggested
- ...Job description : Experience in SAP Security and with at list one end to end implementation in security and knowledge on Rulesets, Violations... ...and help resolve the SODSOX issues and good hand in MS Office Good at documenting the procedures and presenting the same for...Suggested
- ...Security Requirements Understanding and Test Preparation: Work closely with stakeholders to understand security requirements for various applications and systems, especially in the retail domain . Develop and prepare test scripts to perform security assessments...Suggested
- ...Well versed with Security skills (Checkpoint & Fortigate ) Knowledge on Routing and Switching to perform end to end route check In depth knowledge on implementing VPN solutions on Checkpoint firewalls Extensive troubleshooting experience on VPN related issues on Firewalls...Suggested
- ...About the Role: Clifyx Technology is seeking a highly skilled and dedicated SAP Security Professional to join our dynamic team. In this critical role, you'll be responsible for safeguarding the confidentiality, integrity, and availability of data within our SAP landscape....Suggested
- ...The role of an Information Security Officer (ISO) is that of a role holder aligned to a portfolio of applications (Application ISO). The ISO is responsible for the operational aspects of ensuring compliance with the Information Security Principles. The ISO is the primary contact...Suggested
- ...networks and stored physically and electronically. Information security risk and threat landscape are dynamic and requirements for security... ...requirements. The role of the DWS Information Security Officer (ISO) is aligned to the DWS COO divisional unit and will report...Suggested
- ...As a SOC Analyst at RingCentral, your primary responsibilities are to implement a comprehensive security monitoring, incident response and threat intelligence program for RingCentral s global cloud service, corporate and development environments. You will also be collaboratively...Suggested
- ...Job Description: SOC Security Analyst (L2) will be responsible for responsible for day-to-day security threat monitoring and analysis. You will manage security incidents and review security alerts. You will work on known or suspected security threats. You will also work on...SuggestedShift work
- ...Skills: Cybersecurity Strategy, Design, Incident Response, Security Operations, Risk Management, Cloud Security, Threat Intelligence, Head Of Security RMOTE About The Role The Head of Security will be responsible for developing, implementing, and overseeing comprehensive...Suggested
- ...growth has landed Smarsh in the annual Inc. 5000 list of fastest-growing American companies since 2008. About The Team The Lead Security Operations Analyst - plays a critical role in the Security Operations Center (SOC) by handling escalated incidents from the analysts....
- ...s contractors and supply chain vendors. Support the successful delivery of HSSE regulatory responsibilities and best practices to secure regulatory compliance, including management of change related to new and revised legislation. Support the successful management of...For contractorsLocal area
- ...data safe and businesses resilient. The company's unique AI-powered platform combines best-in-class data protection, exceptional data security, advanced data intelligence, and lightning-fast recovery across any workload or cloud at the lowest TCO. For over 25 years, more than...Fixed term contract
- ...Your role and responsibilities Information and Data are some of the most important organizational assets in today's businesses. As a Security Consultant, you will be a key advisor for IBM's clients, analysing business requirements to design and implement the best security...Long term contractHybrid work
- ...Expertise in data privacy laws Comprehensive understanding of technologies (solid background in IT, data analysis, data management, data security, data protection tools and techniques). Ability to assess and implement new technologies that enhance the organization's data...Full time
- The Security Testing Operations Analyst is a crucial role for the vulnerability management and offensive testing activities across the group to which protects the business from sophisticated cyber threats! The role holder will work with our 3rd party vendors to plan and facilitate...
- ~5+ years of experience in Network Security , including Palo Alto, CISCO, ISE, etc. ~ Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles. ~ Hands-on experience with common networking services and protocols (TCP/IP...
- ...Key Responsibilities: SDL Policy Adherence: Ensure firmware development aligns with Fluke's Security Development Lifecycle (SDL), embedding security best practices from the start Cross-Functional Security Collaboration: Partner with global development teams to embed...
- ...Role & responsibilities About the Role: Uber's Security Response and Investigations (SRI) team is the cybersecurity incident response body at Uber. SRI responds to security incidents and mitigates security threats across the company. The SRI team is made of three teams:...Shift workSundaySaturday
- ...We are seeking an experienced SOC Analyst to join our Security Operations team. This role demands an individual with a strong technical background in incident analysis, SIEM administration, and rule fine-tuning. The ideal candidate will have experience working with diverse...
- ...threat detection and incident response. Key Responsibilities: Monitor SIEM alerts and perform triage. Investigate and escalate security incidents. Conduct threat intelligence analysis. Assist in disaster recovery planning Skills Required: Experience with...
- ...monitor, and report on platform and service metrics. Support team s workload on Fresh Service tickets, which cover a wide range of Security domains and customer requirements for information. Partner with security and privacy stakeholders to help improve Security Trust...
- Incident Response Security Analyst The Company: Varonis (Nasdaq: VRNS) is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes...WorldwideHybrid work
- ...Incident Documentation : Review security incidents and vulnerabilities, documenting all findings clearly and accurately. Ensure that findings are categorized, prioritized, and assigned appropriate severity levels. Security Reporting : Prepare detailed reports on security...
- ...Identify, diagnose, and solve malware related issues as they arise, troubleshoot, and address them by implementing required adjustments to security solutions. Windows OS administration knowledge. Basic knowledge in configuring and troubleshooting various routers, switches,...