Average salary: Rs350,000 /yearly
More statsSearch Results: 24 vacancies
...colleagues and for the planet.
Hospitality is a work of heart ,
Join us and become a Heartist ®.
Job Description
Security Executive
Guardian and Protector. You ensure the safety and wellbeing of your fellow employees, guests and visitors. You are...
...Job Description We are looking for a highly motivated, creative IoT Security Consultant with experience in embedded domain and driver development, along with security fundamentals to join Security Software team. As someone who is hard-working and passionate about their work...
...primarily responsible to drive and develop a strong variable agency model in the geography
The role will be responsible for delivering the top-line revenue numbers through the variable agency model
Will be responsible for achieving renewal targets for the Channel...
...dataPlay a technical SME/lead role for architectural assessment, strategy, and roadmap projects.Significant Experience working with the following tools- Data Modeling tools- Top tier data analysis and profiling tools- Very strong sql query language skills (ref:hirist.tech)
...Recruitment, Licensing and Activation of IRDA Agents
Maintaining Relationship with Existing Agents
Responsible for Top and Bottom Line
Graduate Degree or Diploma
At Liberty Mutual, our purpose is to help people embrace today and confidently pursue tomorrow....
...department’s objectives and policies.
Identify optimal, cost effective use of the resources and educate the team on the same.
Ensure to secure used and unused revenue related documents such as Guest checks, Guest Folios, Official receipts, Captain Orders, Paid-out Vouchers,...
...support.
Call 25 retailers daily, including standalone supermarkets and large retailers.
Effectively present and close deals to secure product orders.
Manage and track assigned sales territory to ensure product availability. Secure prime shelf placement within the biscuit...
...technical specifications and solutions.- Implement and maintain cloud-based solutions on AWS or GCP, ensuring scalability, reliability, and security.- Integrate microservices with various databases, including MSSQL, PostgreSQL, or Oracle, to store and retrieve data efficiently.-...
...knowledge of various telecom protocols and nodes in infrastructure.- Vulnerability closures. Implement various hardening procedures for security prospective.- Application Support, Deployment of Release, patches & fixes on Platform.- Configuration and troubleshooting of Linux...
...Stay updated with AI-driven testing trends and tools similar to Cypress for modern web application testing.- Ensure compliance with security testing tools and code quality analysis using tools like SonarQube.- Review and improve automation processes with AI-driven tools similar...
...development/deployment activities and design, build, and maintain cloud environments focusing on uptime, access, control, and network security using automation and configuration management tools.
Required Technical and Professional Expertise
Java 8 and above,...
...# Prepare and deliver customized proposals and quotes based on client requirements.
# Negotiate pricing, terms, and contracts to secure profitable deals for both the client and the company.
# Collaborate with internal teams such as product development, customer service...
...entrance is easily accessible to cars and taxis at all times.
Conduct briefing for concierge and Front Office Assistants.
Log security incidents and accidents in accordance with hotel requirement
Communicates with FOM all information likely to be interest to them...
...Mysore) (Karnataka, India) About The Department: Research focus is one of the main strengths of the department in the areas such as Computer Vision, Data Analytics, IoT, Cloud Computing, Network Security. Send the detailed CV by email within 7 days. Ph.: (***) ***-**** Website:...
...preparing, and presenting statistical information for both internal and external use.- Ensure database optimization, integrity, consistency, security, and privacy.- Providing support, guidance and collaborating with Application Developers to implement database design, and review...
...requirements to develop HW & SW solutions, based on a Service Oriented Architecture (SOA).
Design EE System requirements considering Cyber Security and Functional Safety requirements.
Develop a culture of collaboration, diversity and inclusion.
Minimum Qualifications:
~1...
...systems such as Git or SVN.
Knowledge of software quality assurance best practices and techniques.
Familiarity with performance and security testing concepts is a plus.
Certifications in software testing or automation is a plus.
Experience with software development in...
Rs 16 - 20 lakhs p.a.
...behavior, Conversion of competition dealer, Growth at a dealer
counter.
Making Monthly plan: Territory wise, Dealer wise planning, Security Deposit planning, New dealer appointment
plans, Predefined Journey Planning for Territory Leaders.
Understanding of policies,...
...Mysore) (Karnataka, India) About The Department: Research focus is one of the main strengths of the department in the areas such as Computer Vision, Data Analytics, IoT, Cloud Computing, Network Security. Send the detailed CV by email within 7 days. Ph.: (***) ***-**** Website:...
...Provisional and Original Degree)
Pointers to note:
Please do not carry laptops/cameras to the venue as these will not be allowed due to security restrictions.
Original Government ID card is must for Security Clearance
If interested, please share your resume with below...