Search Results: 239 vacancies
...Function:
Supervise, instruct and coordinate the activities of Security Associates.
Monitor and arrange shift activities according to schedule requirements and team availability.
Ensure all personnel are present & have assumed their duties. Continuously monitor & oversee...
...become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
Perimeter Security Specialist.
Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...lead the IT/IS team in building our cybersecurity portfolio and services.
Take ownership of working continuously to improve G10X security posture.
Take ownership for the operations aspect of customer-facing services.
At G10X, help build competencies in cybersecurity...
...rate in finding flourishing careers and financial independence.
Role Description
This is a full-time on-site role for a Cyber Security Instructor located in Kochi. The Cyber Security Instructor will be responsible for delivering high-quality training and education in...
...Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position...
...Business Development Manager" in the subject line of your email.
Email: ****@*****.***
Cyber Security Specialist
We are looking for a Cyber Security Specialist to join our team to work closely with the stakeholders to
ensure that...
...Email: ****@*****.***
Virtual Chief Information Security Officer (vCISO)
As a Virtual Chief Information Security Officer... ...implement departmental budget.
• Mentor, Coach & Develop the HR personnel.
• Identifies staffing and recruiting needs; develops and executes...
...Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the security operations of the Security team
Qualifications
Ideally with a...
...Email: ****@*****.***
Virtual Chief Information Security Officer (vCISO)
As a Virtual Chief Information Security Officer... ...implement departmental budget.
• Mentor, Coach & Develop the HR personnel.
• Identifies staffing and recruiting needs; develops and executes...
...build an exceptional experience for yourself, and a better working world for all.
TEM Senior –DevSecOps
As part of our Cyber Security team, you will build and manage a secure cloud/on-prem platform while ensuring seamless development, build and deployment...
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function of
organization. The role involves overseeing various aspects of security, disaster recovery, security finance management, documentation, compliance, and program...
...Email: ****@*****.***
Virtual Chief Information Security Officer (vCISO)
As a Virtual Chief Information Security Officer... ...implement departmental budget.
• Mentor, Coach & Develop the HR personnel.
• Identifies staffing and recruiting needs; develops and executes...
...forthright manner.
Performs duties common to all no-supervisory personnel and other duties as may be assigned.
To be cost conscious and... ...to the Executive Chef’s attention.
Fire, Life, Health and Security:
~ Familiarize yourself with emergency and evacuation procedures...
...the EY GDS team
You can expect to work with high level client personnel to address compliance, financial, and operational risks, cyber... ...technology control audits, information technology control engagements, security audits and security engagements
Skills and attributes for...
...resolve issues in a professional manner
Ensure compliance with security and safety regulations
Baggage Handler:Load and unload... ...with seat assignments
Communicate with flight crew and ground personnel
Handle boarding announcements and address passenger...
...complete I-9 employment verification forms. Create new employee personnel file. Design and update the display and content of employee communication... ...as required by law.
Follow all company and safety and security policies and procedures, report accidents, injuries, and unsafe...
...for infrastructure, IT maintenance, AV , cloud services, cyber security and strategic IT consulting to drive business success.
Click the... ...remotely.
Direct unresolved issues to the next level of support personnel.
Provide accurate information on IT products or services....
...forms. Answer phone calls and record messages. Create new employee personnel file. Assist walk-in candidates with application procedures.... ...relations within the division or property. Maintain confidentiality and security of employee and property records, files, and information. Ensure...