Average salary: Rs300,000 /yearly
More stats ...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...The Principal Security Analyst works in the KnowBe4 Threat Research Lab, and is responsible for deploying and configuring various security products and solutions such as endpoint, email, web and network protection. Responsibilities:
Deploy, configure, maintain various cybersecurity...
Need to play the BA role on customer's support central project.
Need to work closely with internal and external SRE + DevOps stakeholders to understand their requirements and expectations.
Need to create use cases and functional specs. These use cases need to be well ...
...newly discovered threat agents, exploits, attacks.ÂConduct configuration reviews for OS , DB, Firewall, routers, Switches and other security devices/components.
Desired Candidate Profile
Â
Minimum Exp Required - 2 to 5 years
Preferred candidates from Kerala & Tamil...
POSITION SUMMARY
Assist in the management of rooms inventory to maximize cluster rooms revenue, as well as maintain accuracy of information and enhance automation efforts in reservation system. Assist in the preparation of competitive analysis and other supporting documents...
...EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
EY – Senior Associate– Experience Management
As part of our EY-Assurance Team, you will be working to ensure effective resource scheduling on...
...Senior Security Data Scientist
Data Science Cochin, Kakkanad Role Purpose and Key Accountabilities:
The primary role of a Senior Security Data Scientist at Prevalent AI involves analyzing significantly large volumes of security telemetry data collected from various...
...Position Overview: We are currently seeking a highly qualified Senior Manager Cyber Security with extensive experience in information security consulting and advisory. The ideal candidate will have a strong background in developing and customizing nationallevel cybersecurity...
...reports to user specifications. The position will ideally have to handle more complex issues and special projects than a junior financial analyst
Your key responsibilities
Generate standard reports (Sales and Pipeline, Global Revenue reports) on a periodic basis and...
...yourself, and a better working world for all.
Title :Business Analyst
Overall Years of Experience :Not above 12 years
Relevant... ...verbal and written communication skills; strong presence in front of senior executives, presentation skills & Workshops
• Professional...
...Location: Kochi Exp Level: 4 - 6 Years
Business Analyst Job Responsibilities:
· Elicits, analyzes, specifies, and validates the business needs of stakeholders, be they, customers or end users.
· Collaborates with project sponsors to determine project scope and...
...EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
Senior Analyst: Valuation, Modeling & Economics
Key Responsibilities:
Develop and review of financial models for purposes including strategic...
Job Number 24061921
Job Category Revenue Management
Location Le Méridien Kochi, Maradu, Kochi, Kerala, India VIEW ON MAP
Schedule Full-Time
Located Remotely? N
Relocation? N
Position Type Non-Management
POSITION SUMMARY
Assist in the management ...
At Fingent, we believe that technology can make a meaningful difference to the lives around us. The lives of those who use it, the lives of those who build it and to society at large. We create and provide software which is beautiful, usable and compelling, to solve complex ...
...experience
4. Could be a Module Lead or Senior Sr. Engineer
5. Should be having a good... ....****@*****.***
Senior Business Analyst
Exp - 4 to 7 years• Working closely with... ...solutions, performance optimization,
security, Infrastructure handling (like AWS), Queues...
Roles & Responsibilities
1. Preliminary study of the enquiry and the basic scope of supply & concept of system
a. Understand clients’ requirements and basis for the system design and selection.
b. Detailed study of relevant documents like Technical specifications, Scope...
...skills in Metadata Management, Reference Data Management.- Intermediate skills in Agile/Program Management, Master Data Management, Data Security, Data.- Sovereignty, Risk Management, Stakeholder Management, Communications & Training.- Foundational knowledge in Tableau, DataIKU,...
...Job Summary: Soffit Infrastructure Services (P) Ltd seeking a knowledgeable and dynamic Cyber Security Trainer to join our team. The ideal candidate will possess a deep understanding of cyber security principles, tools, and techniques, coupled with excellent communication...
...and a better working world for all.
Job Title: Business Analyst, Senior Associate
The opportunity
We are seeking a skilled Business... ...implement data integration solutions, ensuring the accurate and secure flow of data between SAP SuccessFactors and other systems...
...Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...services.
Job Overview
We are seeking a highly skilled Financial Analyst for a leading Business Management Consulting Co in Dubai. As a... ...business decisions.
Prepare presentations and reports for senior management and stakeholders.
Stay updated with industry trends...
Career Opportunities:
Test Automation - Analyst/Senior/Lead
Looking for immediate joiners
Experience: 4+ yrs
Location: Kochi-Hybrid
Shift :2 pm to 11 pm1. 10+ years of experience in Software Testing.
2. 6+ years of solid hands-on automation coding experience, preferably...
...line with Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Security Manager is responsible to develop, implement, monitor and evaluate the hotel’s safety and security procedures, including fire safety,...
...We are looking for Sr. Business Analysts who love building solutions that make the customer's life easy and make digital transformations... ...leadership role with talented developers, designers, testers, and senior management as well as the clients. You will be responsible for...
...Summary
You will be responsible to provide an excellent and consistent level of service to your customers. The Security Officer is responsible to assist in the efficient running of the security function.
Qualifications
Ideally with a professional diploma or certificate...
...prohibited items using X-Ray units and/ or physical search procedures
Screen passengers using HHMD & pat down search
Subject additional security search for selectee passengers
Exercise access control to the aircraft as per security norms
Undertake pre-flight checks of...
...Role:
~ Support Analyst
Experience:
~2-4 Years
Job Description
Work with Front-Line Analysts to troubleshoot complex... ...the info sec team in the roll out and operation of appropriate security controls.
Document SOP, Operations Handbook, troubleshooting...
...meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the... ...Minimum 2 years work experience as Assistant Security Manager, or Senior Security Officer in larger operation. Good practical, operational...
...Job Description
We are looking for a Senior Web Developer for our full-stack creative... ...methodologies
Understanding accessibility and security compliance
Strong Problem-solving skills... ...@2basetechnologies.com
Sr. Business Analyst
Job Description
We are looking for Sr...
...Responsibilities:
# Cyber Security Consulting: Function as a Cyber Security Consultant providing expert guidance to clients on payment security measures.
# Compliance Assessments and Audits: Conduct Information Security Compliance Assessments Audits and Gap Assessments...