...and data analytics to support data-driven proposal creation.
8. Research Expertise:
• Be an expert researcher, gathering and... ...****@*****.***
SOC L2 (Work from office)
Cyber Security Analyst who provides dedicated eyes on monitoring and analysis capability...
...and data analytics to support data-driven proposal creation.
8. Research Expertise:
• Be an expert researcher, gathering and... ...****@*****.***
SOC L2 (Work from office)
Cyber Security Analyst who provides dedicated eyes on monitoring and analysis capability...
...and data analytics to support data-driven proposal creation.
8. Research Expertise:
• Be an expert researcher, gathering and... ...****@*****.***
SOC L2 (Work from office)
Cyber Security Analyst who provides dedicated eyes on monitoring and analysis capability...
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function of
organization. The role involves overseeing various aspects of security, disaster recovery, security finance management, documentation, compliance, and program...
...and data analytics to support data-driven proposal creation.
8. Research Expertise:
• Be an expert researcher, gathering and... ...****@*****.***
SOC L2 (Work from office)
Cyber Security Analyst who provides dedicated eyes on monitoring and analysis capability...
.... Receive and examine design requirements for each project.
2. Research various design techniques to provide accurate designs for requested... ...customising Strapi CMS to meet our project's needs, creating secure and scalable APIs, and integrating Strapi with other services and...
...help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
Security Technology – Cross Function Security Technology– Support Engineer
EY Technology
Technology has always been at the heart of what...
...configuration, optimization, and troubleshooting to ensure reliable and secure real-time communication.
Designing, implementing, and... ...Email: ****@*****.***
Marketing Research Intern
Job Title: Marketing Research Intern
Duration: 3 Months...
...International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the security operations of the Security
Qualifications
Ideally with a professional...
...become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
Perimeter Security Specialist.
Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and...
...rate in finding flourishing careers and financial independence.
Role Description
This is a full-time on-site role for a Cyber Security Instructor located in Kochi. The Cyber Security Instructor will be responsible for delivering high-quality training and education in...
...Security Operation Center - Manager
Cochin (India) | immediately
Grow and shape a secure future together with us!
To reinforce and lead our Global Security Operations Centre we are hiring people like you as pathfinder to the team and technology who can takes responsibility...
Career Opportunities:
Hiring Market Research Interns!
We are seeking dynamic and detail-oriented Market Research Interns for an exciting opportunity with a leading MNC client. This paid internship is perfect for those looking to gain hands-on experience in the corporate...
...user flows, wireframes, mockups, and prototypes that lead to intuitive user experiences.
Facilitate the client’s product vision by researching conceiving, sketching, prototyping, and user-testing experiences for digital products.
Design and deliver wireframes, user stories...
...support team. This role involves comprehensive desktop support, managing Windows Server environments, deploying and managing Sophos security products, and handling various networking tasks.
Key Responsibilities:
• Install, configure, test, maintain, monitor, and troubleshoot...
...About The Job Role
As a Content Research Intern you will play a pivotal role in supporting our content creation efforts. Youll delve deep into various topics conduct thorough research and gather valuable insights to empower our content team. This role offers a unique opportunity...
...SME/ Security Architect – Palo Alto
Grow and shape a secure future together with us!
mispa Technologies is an innovative IT security services and solution provider with head office in Langenfeld (Rhineland), Germany and Dev & Operations Center in Cochin (India) registered...
...– the Summary for Urban Policymakers and GCF-supported Summary for Financial Decision Makers.
The climate change and migration research specialist will be part of an interdisciplinary team of researchers working on climate change and migration, and responsible for anchoring...
...your technology stack.
• Basic understanding of front-end technologies, such as HTML5, and CSS3
• Understanding accessibility and security compliance Depending on the specific project.
• User authentication and authorization between multiple systems, servers, and environments...
...Management: Build account plans based on customer business objectives and future plans aiding clients in planning their information security strategies. Serve as the lead point of contact for all customer account management matters and develop trusted advisor relationships...
...Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...support team. This role involves comprehensive desktop support, managing Windows Server environments, deploying and managing Sophos security products, and handling various networking tasks.
Key Responsibilities:
• Install, configure, test, maintain, monitor, and troubleshoot...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...build an exceptional experience for yourself, and a better working world for all.
TEM Senior –DevSecOps
As part of our Cyber Security team, you will build and manage a secure cloud/on-prem platform while ensuring seamless development, build and deployment...
...analysis team to collect and interpret data.
- Assist in the development and documentation of business requirements.
- Conduct market research and analyze trends to provide actionable insights.
- Participate in the design and implementation of business solutions.
- Help in...
...responsible for building and managing a team of developers involved in various tasks; a coordinator discussing with clients to provide and secure deadlines and allocate activities within his/her team a technical expert in his/her field, able to address complex tasks and support...
...Design, develop and deploy new feature components.
• Candidate should be an expert In API creation/integration.
• Understanding of best security practices
• Experience in Release Management & Configuration Management (GIT)
• Ability to lead agile software development project...
...globally and bridge the gap between legal communities while building a community of aspiring law students and professionals
Student Research Fellow
We are seeking passionate and motivated students to join our team as Student Research Fellows. As a Student Research Fellow...
...Troubleshooting integration issues.
● Knowledgeable in fraud security and performance analysis of the Magento
Application.
● Capable... ...● Ability to work in an agile work environment.
● Ability to research, install and configure various Magento extensions
Key...
...within our established client base and managing consistent growth by securing new accounts
Identify short-term and long-term scheduling,... ...performance metrics and tracking tools to provide market research, forecasts, competitive analyses, campaign results, and consumer...