Average salary: Rs1,206,666 /yearly
More statsGet new jobs by email
Search Results: 23 vacancies
- ...Key Deliverables: Supervise end-to-end security operations at a corporate site Ensure strict compliance with safety protocols and access control Maintain incident records, reports, and daily logs Respond to emergencies and coordinate with internal and client teams...Suggested
- ...manage scheduled maintenance.- Network Administration : Monitor and manage the hospitals network infrastructure, ensuring stable and secure connectivity for all departments. Resolve any network issues quickly and efficiently.- Issue Handling : Act as the first point of contact...Suggested
- ...consistency during the migration process- Database Administration : Overseeing database administration tasks, including backup and recovery, security management, user access control, and database maintenance- Security Implementation : Implementing security measures and access...Suggested
- ...and purchasing of all softwares, hardware and other IT supplies as per project requirement.- Designing the network infrastructure and security policies for the company.- To provide major support for engineering software requirements/availability.- Responsible for IT hardware,...SuggestedContract workRemote job
- ...frameworks such as Express or NestJS.- Build engaging user interfaces using Angular (latest versions) andTypeScript/JavaScript.- Ensure API security by implementing OAuth2, JWT, and OpenID Connect, adhering to security best practices.- Utilize object-oriented programming principles...Suggested
- ...data quality issues.- Ensure proper documentation of database architecture, ETL processes, and reporting requirements.- Maintain data security and compliance standards, ensuring data privacy regulations are adhered to.- Implement and maintain database backup, recovery, and...Suggested
- ...optimization etc- Experienced in infrastructure cost assessment and monitoring and provide cost effective solutions- Knowledge of cloud security controls including tenant isolation, encryption at rest, encryption in transit, key management, vulnerability assessments,...Suggested
- ...use AWS here) and automation technologies (e.g., Kubernetes, Jenkins, Chef, etc.) is a plus- Familiarity with the information/cyber security domain is a plusResponsibilities :- Analyze and correlate complex data from multiple sources- Perform exploratory data analysis to gain...Suggested
- ...the job Key Responsibilities: 1. Get trained on the process of scholarship and admission in various countries 2. Help students secure admissions and scholarships for their higher studies abroad 3. Understand student profiles and requirements upon their application...SuggestedImmediate start
- ...environments- Working knowledge of office automation products and computer peripherals, like printers and scanners- Knowledge of network security practices and anti-virus programs- Addressing user tickets for issues regarding hardware, software, and networking- Maintaining a log...SuggestedWork at officeShift workNight shift
- ...models for development are current and comply with common standards. - Design solution based on non-functional requirements such as security, maintainability- Identifying risk, issues, dependencies, and planning mitigation action with the PM at project level- Environment configuration...Suggested
- ...technical architecture and understand the product development roadmap.- Analyze & optimize user metrics, system performance and database security.- Work with Ycenters leadership team to conduct user research and design UX/UI.- Maintain third-party API integrations & help...SuggestedFull timeRemote job
- ....- Collaborate with development teams to understand product requirements and features.- Perform functional, integration, regression, security and performance testing.- Identify, document, and track software defects to closure.- Work closely with developers to debug and troubleshoot...Suggested
- ...facilitate automation- Idea on publishing to Apigee and Azure and GCP basics- Hands-on experience with Spring Cloud, Config server, Spring security and batch, Lombok, oAuth2- Experience working in IDEs like Eclipse, IntelliJ, VSCode- Knowledge on SOLID Principles and JAVA Design...Suggested
- ...commercial experience in enterprise application development.- Experience in designing and developing maintainable, scalable, extensible, and secure systems.- Knowledge of Object-Oriented Programming (OOP) fundamentals and design patterns.- Proficiency in front-end development using...Suggested
- ...All OS updates installed and supported by the vendor Connectivity & Accessories: Stable internet connection Headphones Secure internet location, protected by a strong password For audio-collection projects only: ~ Mobile phone with Android OS #1286...Contract workFreelanceRemote job
- ...Interaction: Address basic customer/client inquiries and provide assistance with forms or procedures, ensuring a positive experience. Security Procedures: Follow established security protocols for visitor access and report any suspicious activities or individuals to...Work at officeLocal areaImmediate start
- ...SALES Achieve monthly sales target by selling technical security devices or ManTech solutions to new customers or existing customers through cross-selling. Build strong ManTech Sales pipeline in the region thereby helping region achieve its ABP ManTech target. Conduct...Contract workLocal areaFlexible hours
- ...timely loan sanction and disbursement within stipulated TAT (Turnaround Time). Manage the physical custody of gold collateral, ensuring secure storage as per established protocols. Customer Service & Relationship Management: Provide exceptional customer service,...
- ...Key Performance Areas (KPAs): · Revenue Growth: Achieve quarterly and annual revenue targets. · New Business Acquisition: Secure a minimum number of new clients or projects within a specified timeframe. · Sales Pipeline Growth: Maintain a healthy sales pipeline...