...****@*****.***
SOC L2 (Work from office)
Cyber Security Analyst who provides dedicated eyes on monitoring and analysis... ...· In-depth understanding of security threats (preferably OWASP Top 10 vulnerabilities), threat attack methods and the current threat...
...****@*****.***
SOC L2 (Work from office)
Cyber Security Analyst who provides dedicated eyes on monitoring and analysis... ...· In-depth understanding of security threats (preferably OWASP Top 10 vulnerabilities), threat attack methods and the current threat...
As a Virtual Chief Information Security Officer (vCISO), you will lead and manage the security operations function of
organization. The role involves overseeing various aspects of security, disaster recovery, security finance management, documentation, compliance, and program...
...****@*****.***
SOC L2 (Work from office)
Cyber Security Analyst who provides dedicated eyes on monitoring and analysis... ...· In-depth understanding of security threats (preferably OWASP Top 10 vulnerabilities), threat attack methods and the current threat...
...help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
Security Technology – Cross Function Security Technology– Support Engineer
EY Technology
Technology has always been at the heart of what...
...Django
- Creating code utilizing Python, Django, HTML and CSS.
- Working directly with the product team to bring our product to the top.
- Experience in creating microservices-based applications
- Deploying Web applications to Linux environments
- Troubleshooting bugs...
...International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Team Leader - Security is responsible to assist in the smooth operations of the security operations of the Security
Qualifications
Ideally with a professional...
...Django
- Creating code utilizing Python, Django, HTML and CSS.
- Working directly with the product team to bring our product to the top.
- Experience in creating microservices-based applications
- Deploying Web applications to Linux environments
- Troubleshooting bugs...
...become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
Perimeter Security Specialist.
Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and...
...rate in finding flourishing careers and financial independence.
Role Description
This is a full-time on-site role for a Cyber Security Instructor located in Kochi. The Cyber Security Instructor will be responsible for delivering high-quality training and education in...
...Security Operation Center - Manager
Cochin (India) | immediately
Grow and shape a secure future together with us!
To reinforce and lead our Global Security Operations Centre we are hiring people like you as pathfinder to the team and technology who can takes responsibility...
...world for all.
TEM Senior –DevSecOps
As part of our Cyber Security team, you will build and manage a secure cloud/on-prem platform... ...audiences including executives.
Strong knowledge of OWASP Top 10 web and the ability to effectively communicate methodologies and...
...support team. This role involves comprehensive desktop support, managing Windows Server environments, deploying and managing Sophos security products, and handling various networking tasks.
Key Responsibilities:
• Install, configure, test, maintain, monitor, and troubleshoot...
...Django
- Creating code utilizing Python, Django, HTML and CSS.
- Working directly with the product team to bring our product to the top.
- Experience in creating microservices-based applications
- Deploying Web applications to Linux environments
- Troubleshooting bugs...
...SME/ Security Architect – Palo Alto
Grow and shape a secure future together with us!
mispa Technologies is an innovative IT security services and solution provider with head office in Langenfeld (Rhineland), Germany and Dev & Operations Center in Cochin (India) registered...
...your technology stack.
• Basic understanding of front-end technologies, such as HTML5, and CSS3
• Understanding accessibility and security compliance Depending on the specific project.
• User authentication and authorization between multiple systems, servers, and environments...
...Management: Build account plans based on customer business objectives and future plans aiding clients in planning their information security strategies. Serve as the lead point of contact for all customer account management matters and develop trusted advisor relationships...
...Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
Rs 1 - 5 lakhs p.a.
Dear Candidates,
We are looking for fresher as well as experienced canidates for the position of Medical Representative
Qualification : B.Pharma & B.S.C if fresher (Experience any graducate can do)
Location : South Area
Salary: Negotiable
Position : Medical...
...support team. This role involves comprehensive desktop support, managing Windows Server environments, deploying and managing Sophos security products, and handling various networking tasks.
Key Responsibilities:
• Install, configure, test, maintain, monitor, and troubleshoot...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...responsible for building and managing a team of developers involved in various tasks; a coordinator discussing with clients to provide and secure deadlines and allocate activities within his/her team a technical expert in his/her field, able to address complex tasks and support...
...Design, develop and deploy new feature components.
• Candidate should be an expert In API creation/integration.
• Understanding of best security practices
• Experience in Release Management & Configuration Management (GIT)
• Ability to lead agile software development project...
...values the contributions of each employee. Our ability to attract top talent is a testament to our commitment to fostering a sense of... ...and best practices for ensuring system stability, performance, and security.
Roles and Responsibilities:
Design, implement, and maintain...
...organizational, and time management skills.
Experience leading and developing top-performing teams.
A history of leading and supporting successful... ...candidate will be responsible for ensuring the efficient and secure operation of our computer systems and network infrastructure. They...
...technologies including HTML5, JavaScript, and CSS3. Ultimately, a top-level PHP Developer can design and build efficient PHP modules... ...agile and waterfall methodologies
Understanding accessibility and security compliance
Strong Problem-solving skills and critical mindset....
...technologies like No-SQL, Caching solutions, performance optimization,
security, Infrastructure handling (like AWS), Queues, web sockets, Single... ...has been recognized for the 12th time in a row as one of the Top 100 ‘Best Companies to Work For’ by the Great Place to Work®...
...impacts of performance-based designs, accessibility standards and security compliance in
development.
• Good understanding and working... ...Information-- Considers the quality of architecture and code as top priority over volume of code.
- Participate in the full product...
...impacts of performance-based designs, accessibility standards and security compliance in
development.
• Good understanding and working... ...Information-- Considers the quality of architecture and code as top priority over volume of code.
- Participate in the full product...
...Postman or JMeter or SOAPUI.
• Good understanding of Web application security
• Strong analytical and problem-solving skills, with the ability... ...benefits of tech collaborations with outsourced partners, using top-notch tools for alignment and performance.
•Streamline the...