Get new jobs by email
- ...Patch Management, Active Directory, Group Policies, End- Point Security. Maintaining day to day IT operation. IT Asset & Inventory... ...management, information analysis and of computer hardware/software systems. Expertise in data center management and data governance....Suggested
- ...experienced professional to join our Pune, India office as a Senior Security Operations Analyst with a strong background in Security... ...management and scanning best practices such as CVE database and the CVS System. Ability to analyze cyber threats to develop actionable...SuggestedWork at officeShift work
- ...Key Deliverables: Conduct regular foot and vehicle patrols to secure premises and deter threats Monitor CCTV and alarm systems to detect and respond to incidents Enforce site access control and maintain logs of personnel, vehicles, and materials Prepare and submit...Suggested
- ...Key Deliverables: Ensure round-the-clock security of premises through patrolling and surveillance Enforce access control protocols... ...supervisors Role Responsibilities: Operate and monitor security systems including CCTV and alarms Follow all company policies, safety...Suggested
- ...BVG India Ltd. is looking for Security Guard to join our dynamic team and embark on a rewarding career journey. A Security Guard is responsible... ...Conduct routine checks of the facilities. Inspect security systems and equipment. Investigate incidents and write reports....Suggested
- ...Incident Documentation : Review security incidents and vulnerabilities, documenting all findings clearly and accurately. Ensure that findings... .... Tracking and Follow-up : Maintain a clear and organized system for tracking open findings, vulnerabilities, and remediation...Suggested
- ...We are hiring a Security Analyst to work on our growing IT Security team This position will primarily monitor our computer networks and... ...the configuration of our centralized log and alert management systems Stay current on IT security trends and news Assist with the...Suggested
- ...: Collaborate with software development teams to integrate security practices throughout the Software Development Life Cycle (SDLC).... ...such as static and dynamic analysis tools, intrusion detection systems, and vulnerability scanners. Stay updated with the latest security...Suggested
- ...penetration tests on cloud-based and on-premises infra to identify security weaknesses and loopholes. Perform Red teaming / Adversary... ...demonstrate vulnerabilities and assess the potential impact on systems. Execute social engineering attacks, such as phishing or vishing...Suggested
- ...Summary of This Role Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, firmware and software . Ensures that IS security architecture/designs, plans, controls, processes...Suggested
- ...world's largest companies to monitor and manage their mainframe systems. The modernization of mainframe is the beating heart of our product... ...development, the quality of the code and the applications' security, while reducing operational costs and risks. We acquired several...SuggestedHybrid work
- ...while valuing your unique contributions. We are seeking a Senior SAP Security Professional with strong expertise in secure ABAP programming to ensure the security and integrity of our enterprise SAP systems. In this role, you will work closely with business stakeholders, SAP...Suggested
- ...is seeking a Workday Consultant certified/experienced in Workday Security. In this role you will work with customers during all phases of... ...will require the employee to regularly: Understand the Workday system and be able to communicate its functionality to others,...SuggestedTemporary workWork at officeImmediate startRemote jobHome office
- ...You Play Implemente and administer Splunk, Splunk Enterprise Security in both on-prem and cloud Develop content including dashboards... ...Including network operations or engineering or system administration on Unix, Linux, MAC(Message Authentication Code),...Suggested
- ...the world! Join our advanced cybersecurity team as a Senior Security Analyst , where your expertise will be instrumental in strengthening... ...remediation efforts, providing strategic guidance to IT and system administration teams. Cloud Security Posture Management (CSPM...Suggested
- ...Needs to be specialized in at least one/two of different areas: ~ Secure Architecture & Design, Threat & Risk Analysis, Secure Project... ...considering security topics such as IDS, patch management, Anti-Virus systems ~ As part of project integration: ~ Defines, supervises, and...
- ...Required Skills and Experience: Excellent comprehension of application security, system security, and network security. Experience with security tools and technologies. Strong scripting skills (Python, PowerShell). Knowledge of security frameworks and standards...
- ...workstations for users, Office 365 o Configure servers and networking devices (e.g., firewalls, routers, switches). o Ensure system security by installing and configuring firewalls (FortiGate) and antivirus software (Kaspersky Endpoint Security). o Perform regular...Work at office
- ...Supports the effectiveness of security-related operations. Provides programming support and assists in project planning for an operational... .... Reviews and analyzes data and information for business systems security. Assists in ensuring that security concerns are addressed...
- ...actively seeking a highly experienced and technically proficient Security L3 Engineer to join our client's team through Acme Services .... ...'s infrastructure. Key Responsibilities Advanced Security System Management : Lead the configuration, maintenance, and troubleshooting...
- ...BVG India Ltd. is looking for Security Manager to join our dynamic team and embark on a rewarding career journey. Security Strategy:... ...authorized personnel have access to restricted areas. Security Systems: Oversee security systems, including surveillance cameras,...For contractors
- ...for the assigned piece(s) for the comments received from team. Development & Support Build the code of high-priority and complex systems according to the functional specifications, detailed design, maintainability, and coding and efficiency standards. Use code...
- ...disruptions of the future. We are looking forward to hire SAP Security Professionals in the following areas : Job Description SAP... ...solutions including SAP Transportable and Non-Transportable systems, legacy systems and other third-party applications Update and...Flexible hours
- ...worldwide . You will play a critical role in designing, implementing, and maintaining secure, scalable, and resilient network environments that support both corporate and customer-facing systems. Key Responsibilities: ~ Design, deploy, and manage secure and high-performance...Work at officeWorldwideHybrid work
- ...Security Risk and Compliance Expert will be instrumental in shaping the global Information Security Management System (ISMS) within our Group Security team. This role involves engaging with various Business Groups and Corporate Functions to identify and manage information...
- ...Developer, DevSecOps team member is expected to have a thorough understanding of complex IT systems, embedded devices, applications, cloud systems and stay up to date with the latest security standards, systems, and authentication protocols, as well as best practices and...Work at office
- ...About the job This global leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design,... ...and evolution of Canonical security practices, techniques, tools, systems and policies. The team is the primary owner of strategy and practices...
- ...Experience: 6-10 years of relevant experience in system security, embedded systems, and vulnerability assessments. Key Skills: Firmware Analysis Tools: ~ Expertise in using firmware analysis tools such as Ghidra, Binwalk, and Radare2 for static and dynamic analysis...
- ...teams and subject matter experts to create engaging and informative security awareness material or program. Support the annual refresh of... ...training and collaboration tools (e.g., Learning Management Systems (LMS), Microsoft Office Suite, Adobe Creative Suite, Trello, Security...
- ...and optimize different SIEM solutions. The ideal candidate will be responsible for system administration, log integration, troubleshooting, Deployment, Implementation and maintaining security posture for the organization. Key Responsibilities SIEM Administration: ~ Install...