Average salary: Rs1,081,151 /yearly
More statsGet new jobs by email
- Role : Cyber Security, Encryption Job Title : Cyber Security, Encryption Location : Mysore, Pune Total Yrs. of Experience : 7+ YearsDuration : Contract To Hire (C2H) Notice Period : Immediate Joiners to 30 DaysJob Description : 1. Participate in the effort to develop and maintain...SuggestedContract workImmediate start
- ...Job Description We are looking for a highly motivated, creative IoT Security Consultant with experience in embedded domain and driver development, along with security fundamentals to join Security Software team. As someone who is hard-working and passionate about their work...SuggestedFull time
- ...performance improvements.- Collaborate with application developers to integrate SQL databases with applications.- Ensure data integrity and security in SQL databases.- Monitor and troubleshoot database performance issues.- Perform database backups and recovery as needed.- Writing T...Suggested
- ...tuning after upgrade/ migration.- Highly skilled at database design, installations, Migration, backup and recovery procedures, access security and database integrity, physical data storage design and data storage management- Ability to manage database backup, recovery, and...SuggestedFull time
- ...:- Develop and implement cloud computing strategies for businesses.- Manage cloud resources to ensure scalability, reliability, and security.- Collaborate with IT teams for cloud migration and deployment.- Stay updated on advancements in cloud technologies and solutions.- Design...SuggestedFull timePart timeTraineeship
- ...Server, PostgreSQL, MySQL)- Exposure to cloud services (e.g., AWS, GCP, Azure)- Experience working in the mortgage lending, asset backed securities, loans, and/or financial technology sector- Familiarity with data pipelines or integration of third-party APIs (ref:hirist.tech)Suggested
- ...efficient data flow and interaction between front-end and back-end systems.- Optimize applications for scalability, performance, and security by adhering to industry best practices.- Work collaboratively with designers, developers, and quality assurance teams to deliver user...Suggested
- ...Web Components, JavaScript, JavaScript based frameworks like React/Angular, and Ul Frameworks- Strong knowledge of Application, data security and finance related compliance standards- Strong knowledge of microservices, Function as a Service, RESTful API development- Enterprise...Suggested
- ...Identification of the applications dependencies, source, and target database incompatibilities. - Analyze the non-functional requirements (security, HA, RTO/RPO, storage, compute, network, performance bench, etc.). - Prepare the effort estimates, WBS, staffing plan, RACI, RAID etc...Suggested
- ...Experience with containerization (e.g., Docker, Kubernetes).- Exposure to cloud platforms (AWS, Azure, or GCP).- Knowledge of REST API security and authentication protocols (OAuth2, JWT).Education : Bachelor's degree in Computer Science, Engineering, or related field (or...Suggested
- ...Proficiency in analytics and Data Tools, such as Python, R, SQL, Tableau, Power BI is desirable ● Regulatory Compliance: Knowledge of data security and privacy regulations is needed Qualifications ● Bachelor's degree in a relevant field (e.g., Business, Computer Science...SuggestedFull time
- ...contracts Discover profitable suppliers and initiate business and organization partnerships Negotiate with external vendors to secure advantageous terms Approve the ordering of necessary goods and services in consultation with management Finalize purchase details...Suggested
- ...be the technical POC and champion for its scale, stability, and long-term performance. Design, develop, and maintain scalable and secure backend systems/ applications. Write clean, maintainable, and efficient code that adheres to industry best practices. Drive design...SuggestedLong term contract
- ...operations across 300 locations in India. For more details: About the Role: ~ The role is responsible to identify, source and secure both long term and short-term pest control & prevention business opportunities. The incumbent shall be primarily responsible for the...SuggestedFull timeTemporary workLong term contract
- ...requirements to develop HW & SW solutions, based on a Service Oriented Architecture (SOA). Design EE System requirements considering Cyber Security and Functional Safety requirements. Develop a culture of collaboration, diversity and inclusion. Minimum Qualifications: ~1...SuggestedFull time
- ...Negotiations: Prepare and deliver compelling sales presentations to potential clients. Lead negotiations and contract discussions to secure new business and maintain existing customer relationships. Ensure that contracts and agreements meet the company's requirements and align...Contract work
- ...retail inventory. # Assisting customers whenever necessary. # Organizing employee schedule. # Ensuring that health, safety, and security rules are followed. # Ensuring a consistent standard of customer service. # Motivating employees and ensuring a focus on the...
- ...products, and transport necessary bar supplies. Wash and sanitize soiled glassware and remove dirty wares from tables and bar tops. Secure alcohol and bar equipment at the end of the shift. Cash Handling & Reporting: Process all forms of payment accurately. Count...Shift work
- ...objectives. Customize CRM modules, dashboards, and reports to meet business requirements. Configure user roles, permissions, and security settings. Integration and Data Management : Integrate the CRM with other business systems (ERP, marketing automation, customer...
- ...triggers, and batch processing. ~ Experience working with Salesforce APIs (REST/SOAP) and integrations. ~ Familiarity with Salesforce security model , including profiles, roles, sharing settings, and permission sets. Preferred Technical and Professional Experience...
- ...data infrastructure that can adequately handle the needs of a rapidly growing data driven organization. Coordinate data access and security to enable data scientists and analysts to easily access to data whenever they need too Required education Bachelor's Degree...
- ...processes for performance and reliability. Database Management: Manage and maintain databases, ensuring high availability and security. Troubleshoot database-related issues and optimize performance. Collaboration: Work closely with data analysts, data scientists...Shift work
- ...team goals. Set an example for safety, cleanliness, and professionalism. Safety & Compliance: Follow all company safety and security protocols. Report maintenance issues, accidents, and unsafe work conditions promptly. Complete required safety training and certifications...
- ...contain all required employment paperwork, proper performance management, and compensation documentation, and are properly maintained and secured for the required length of time. Ensure compliance with procedures for accessing, reviewing, and auditing employee files, and...Work at officeLocal area
- ...troubleshoot local area networks (LAN), wide area networks (WAN), and VPN connections. Manage firewalls, routers, and switches to ensure secure and stable network connectivity. Monitor network traffic and address connectivity issues promptly. 3. User Support: Provide...Local area
- ...all aspects of travel arrangements, including flights, trains, transportation, and accommodations. Negotiation and Cost Optimization: Securing the best rates and travel deals from vendors. Communication and Coordination: Keeping travelers informed about their travel plans,...
- ...AD, DNS, Log Analytic Workspace, ARO (Azure Red Openshift) Orchestration & Containerization Docker, Kubernetes, RedHat OpenShift Security Management - Firewall Mgmt, FortiGate firewall Preferred technical and professional experience Monitoring through Cloud Native...Permanent employment
- ...experience SSL Administration like certificate renewal and monitoring Experience in queue manager configuration and load balancing, security management (OAM), performance and tuning Experience with MQ in AIX, Red Hat Linux (RHEL) and Windows servers Experience in...Hybrid work
- ...the trip for the customer Regularly update a database containing client details and their travel information Ensure this data is secured and handled appropriately Reach the sales and revenue targets Stay up to date on destinations and the properties What to...
- ...adequate insurance coverage Identify, process and refer GL customers who can be potentially given Individual loans either unsecured /secured Share customer insights/product related feedback with the ACRM Customer Ensure customers and Family members are educated...