Search Results: 1,370 vacancies
...initiatives to 60 plus global offices. Digital IT has six key pillars – Collaboration Technology; Functional Technology; Digital Technology; Security & Architecture; Infrastructure & Services, Digital Success to support business and to take lead on digital transformation initiatives...
...Security Professional
Job Req ID: 28172
Posting Date: 8 May 2024
Function: Customer Service
Unit: Business
Location:
25A DLF City Phase-III,, Gurugram, India
Salary: competitive
Recruiter: Amirah Sajad
Hiring Manager: Sugeet Khurana
Career Grade:...
...build a more equitable, inclusive world for our employees, our customers and our communities.
The Role
Are you passionate about security architecture and driven to protect against the latest threats? We are seeking a Security Architect who will join our team and take...
Rs 11 - 16 lakhs p.a.
...of the RED team activity.
Ø Perform Cover, overt and specialized Red Team assessment.
Ø Keep one self updated on the latest IT Security news, exploits, hacks.
Ø Prepare Threat Intelligence reports for newly discovered threat agents, exploits, attacks.
Ø Conduct vulnerability...
votre rôle
Excellent troubleshooting skills on Data Center technologies.
* Manage Customer Service support & Improvement Program in order to increase customer satisfaction.
* Working knowledge on Incident and change management
* Ability to drive the projects end...
...We are seeking a seasoned Senior Security Expert with a strong focus on cybersecurity compliance and management. The ideal candidate will have over 5 years of experience in the field of cybersecurity, with a proven track record of managing complex security systems. The candidate...
...infrastructure, including on-premises, containerized, and cloud environments. You will play a critical role in ensuring the continuous security posture of our organization, proactively mitigating risks, and driving continuous improvement initiatives within the vulnerability...
...As part of your role, you will develop and implement comprehensive SAP security strategies aligned with industry standards and company policies. You will oversee user access, roles, and permissions within SAP systems & underlying databases, ensuring proper segregation of duties...
...more equitable, inclusive world for our employees, our customers and our communities.
The Role
Do you have a passion for driving security agenda for your client Are you a master of Cyber Security domain and eager to make an impact on our customers We're seeking a...
Remote job
...build a more equitable, inclusive world for our employees, our customers and our communities.
The Role
Are you passionate about security architecture and driven to protect against the latest threats? We are seeking a Security Architect who will join our team and take...
...Security Product Engineer
ADIDAS
Purpose:
The selection, design, justification, implementation and operation of controls and management strategies to maintain the security, confidentiality, integrity, availability, accountability and relevant compliance...
JOB SUMMARY:Data Security specialist with experience in data security technologies such as Classification, DLP, DRM along with exposure to implementation of data privacy and security frameworks. A continuous learner who is self-driven, team player and zeal to bring security...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
JOB SUMMARY:Experienced Information Security specialist with hands-on experience on designing security architecture and implementing multiple information security technologies. A continuous learner who is self-driven, team player and zeal to bring security transformation by...
...Skills : SIEM security operations using Microsoft sentinel-2 State : Haryana
City : [GURGAON]
Experience (Years) : 3 (Min) - 6 (Max)
Description
Responsibilities & Duties Key responsibilities and duties include:
Identifying, monitoring, and responding to...
...Greetings from Netsach - A Cyber Security Company.
We are looking for a candidate who is able to configure Routing, vLAN, Network ACL, Wireless Ent Auth (802.11x), AD NPS, AD-DS, GPO, DNS, Cert Authority, DHCP, Firewall policies, IDS/IPS policies, App/web Content policies...
...initiatives to 60 plus global offices. Digital IT has six key pillars – Collaboration Technology; Functional Technology; Digital Technology; Security & Architecture; Infrastructure & Services, Digital Success to support business and to take lead on digital transformation initiatives...
...systems assets and to protect systems from intentional or inadvertent access or destruction.
Hands-on experience in Information Security Management System implementation and audit inline to ISO 27001 standard.
Provide oversight on Information Security Management...
- Provide tactical support to the APAC security operations command centre
- Manage Enterprise level access control and video management platforms across APAC
- Provide project management support to APAC regional real estates and related security system projects
- Oversee...
...technology execution.
Key Responsibilities :
● Establish, implement and monitor a strategic, comprehensive enterprise information
security and IT risk management program
● Work directly with the business units to facilitate risk assessment and risk management...