Average salary: Rs665,624 /yearly
More statsSearch Results: 8,829 vacancies
...application teams using Ping Identity products. - Develop, implement, and manage SSO services,... ...Ping products to design and implement secure, scalable, and reliable identity and... ...access issues. - Familiarity with security protocols and best practices. Professional Experience...
Job Description :We are seeking a seasoned Senior Security Expert with a strong focus on cybersecurity compliance and... ...of ISMS 27001 and PCI-DSS.Responsibilities :- Develop and implement security policies, protocols, and procedures.- Coordinate with third party security...
...a full-time on-site role for a SailPoint Developer located in Gurugram.- The SailPoint Developer... ...with cross-functional teams including security, IT, and business stakeholders to... ...IdentityIQ solutions.- Knowledge of IAM protocols and technologies such as SAML, LDAP, and...
...4-5 yearsRequired Skills :- LTE, 5g, C/C++, Python, Shell script- We need dynamic folks who have a good understanding of LTE/5G RAN protocols Layer 2 with expertise in: eNodeB/gNB multi- functional feature development in RAN areas is a must,- Good knowledge of real time operating...
...Description :As a core member of the Information Security team, you will help shape and deliver... ....2. Incident Response and Monitoring :a. Develop and maintain incident response plans, and... ....- Strong understanding of networking protocols and architecture.- Experience building...
OCI Admin JD Summary : Experience Required 7+ yrs. : - Technical/Functional Skills OCI Admin, Cloud Networking, OCI Security, Cloud IAM- Deploying and managing various OCI resources like Compute instances, Objects storage buckets, load balancers, File storage etc., as per the...
...ISIM Developer(Security Identity Manager)) Gurugram, Haryana, India(Hybrid)
4-8 Years overall exp in ISIM Development , IBM Security Identity Manager developer
Candidate must have experience working on IBM ISIM
Candidate must have worked on application integration or...
...assessments: Identify and assess potential security risks to our systems, networks, and data.... ...with cross-functional teams to develop risk mitigation strategies and ensure proper... ...simultaneously
~ Knowledge of network protocols, operating systems, and cloud computing platforms...
About the Opportunity :We are seeking a motivated L1 NOC Engineer to join our growing team. In this critical role, you will play a key role in monitoring, troubleshooting, and maintaining our transport network, ensuring the reliable and efficient transmission of data. You will...
...embracing change.
As our Application Security Engineer , you will get to work on the... ...Security. We want you to redefine how developers view security, eliminating friction and... ...& NIST, Solid understanding of security protocols, cryptography, authentication, authorization...
...About the Job:
The role of network security professional involves several critical responsibilities... ....
Experience with network security protocols and standards, such as IPsec, SSL/TLS,... ...to assess complex security issues and develop effective solutions.
Strong...
...Greetings from Netsach - A Cyber Security Company.
We are looking for a candidate who is... ...latest security principles, techniques, and protocols.
Relevant experience as security... ...methodologies, to anticipate security breaches.
Develop strategies to handle security incidents...
...Job Title: Cloud Solution Specialist- Security
About Insight:
Founded in 1998 is... ...language
Lightweight Directory Access Protocol (LDAP)
Cloud (Azure, AWS & GCP) IAM... ...Interprets technology and threat drivers and develops practical security roadmaps to deal with...
...administer network elements and devices on the NMS - Configure VLANs, Implement VPN tunnels, if applicable, Configure VLAN Trunking Protocol or Spanning Tree Protocol or both for a manageable switch if applicable
Cisco ACI, Cisco IronPort Proxy WSA, Cisco Nexus, Routing,...
...Company Description SecLogic is a cloud security product company. Our flagship suite, CYBERQ SHIELD provides accurate insight into their... ...skill in analyzing and identifying potential vulnerabilities, developing protection strategies, and conducting research on emerging...
...Job Summary: We are seeking a highly motivated Information Security & Compliance Manager to join our dynamic team at VMock. You will leverage... ...security and compliance posture.
Key Responsibilities:
Develop, implement, and maintain VMock's information security compliance...
...Responsibilities:
Physically install and connect firewalls and other security appliances.
Install the latest vendor-approved stable... ...education.
Strong understanding of TCP/IP, routing protocols, L2/L3 switches Experience with security products firewalls, IPSec...
Rs 17 - 18 lakhs p.a.
...OSPF, BGP, Static, PBR)
Cloud Network technology (Azure & AWS)
Responsibilities :
Advanced level understanding of Network & Security technology.
Network Routing/Switching (Cisco/Arista), Routing (EIGRP, OSPF, BGP, Static, PBR)
Switching (Cisco 3850, 6500, 6800,...
...Collaboration Technology; Functional Technology; Digital Technology; Security & Architecture; Infrastructure & Services, Digital Success to... ...our IT infrastructure, using the latest security architectures, protocols, standards, and tools.
You will work closely with the Digital...
...to SOC manager/Customer for review.
Review advisories and make necessary detection measures.
Provide analysis and trending of security log data from a large number of security devices.
Troubleshooting non-reporting devices fix and maintain device status.
Working...