Average salary: Rs1,662,217 /yearly
More statsSearch Results: 2,613 vacancies
...value for our clients through the assessment and recruitment of top-level management resources. We provide utmost discretion and believe... ..., CISM, CISA certification desired- Develop and implement IT security strategy, policies, and procedures to protect the organization's...
...Requisition:
What you will do
The future is being built today, and Johnson Controls is making that future more productive, more secure and more sustainable. We are harnessing the power of cloud, data analytics, the Internet of Things, and user design thinking to deliver...
...DevOps team, you will be responsible for leading and implementing security practices throughout the software development and deployment... ...principles, best practices, and common vulnerabilities (e.g., OWASP Top 10).
Hands-on experience with security tools and technologies...
...are seeking a talented and experienced Data Governance and Data Security Specialist to join our team. In this role, you will be responsible... ...governance workflows.
Experience in implementing data security on top of datalake using AWS Lake Formation or any similar tool data...
...by making transactions safe, simple, smart and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions... ...appraisal process for department employees and helps identify top technical talent
· Successful track record in building upon...
...providing services to leading IT services, Manufacturing, Captives, and BFS companies.
One of our clients a Top Tier 1 IT Services Company is looking to hire for a Security Operations Center (SOC) Shift Supervisor role.
Role: Security Operations Center (SOC)
Location-...
...Data / Analytics (eg. Elastic Stack, Hadoop)
Good to have: Cyber Security, SIEM
The main accountabilities of the role are:
1.... ...for four years running. We have been also highlighted among the Top 5 Best Workplaces for Diversity, Equity, and Inclusion, Top 10 Best...
...We're looking for a Security Analyst
This role is Hybrid
Security Analyst, IT Security and Compliance Job Brief: We are seeking an
experienced Security Analyst to join our IT Security and Compliance team. The
ideal candidate will have a cyber security mindset, encompassing...
...people and animals everywhere. Apply today!
What you will be doing
POSITION SUMMARY:
Under general direction of the SAP Security Director and Technical Leads, the SAP Security Specialist will provide their expertise and analysis for Cencora’s ERP (SAP) platforms...
...Job Description
Security Officer
To ensure a safe environment for the hotel staff and guests and protect the assets of the hotel.
KEY ROLES & RESPONSIBILITIES
To establish chain of command and responsibility, the Security Officer shall be held directly responsible...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...they love. With Xplor Pay, we help businesses get paid quickly and securely – without hidden fees. We built the tech ourselves, and our... ...touch as soon as we can. Please include the word "moonshot" at the top of your message to the Hiring Manager so that we know you took the...
...7:30 am to IST 04:30 pm
What you will do
• Provide Tier 2 and Tier 3 support for incidents related to Core Network & Network Security
• Proactively involved in service improvement and problem management
• Be part of project resource involved in design and project...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...Role and Responsibilities
Do you have an eye for technical details and quality? Are you interested in keeping business transactions secure from prying eyes and attackers? Do you like intricate problems and the mathematics, and complex steps behind solving them?
IBM Java...
...Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...Job Title - Senior Security Analyst Job Location - Baner, Pune
About Company
Our client is a pioneering Identity SecOps provider that arms identity and cybersecurity teams with end-to-end, real-time identity security posture management and threat detection. They are...
Secures premises and personnel by patrolling property, monitoring surveillance equipment, and access points. Investigates security breaches, incidents, and other alarming behavior. Completes reports by recording observations, information, occurrences, and surveillance activities...
...project services in a cost efficient manner to Corning worldwide. Responsibilities:
Physically install and connect firewalls and other security appliances.
Install the latest vendor-approved stable firmware on appliances.
Monitor firewalls for up/down or issues, document...
...modeling.- 4 - 8 years of experience with SCA, SAST, DAST application security tools- Deep technical knowledge and experience identifying,... ...and remediating application vulnerabilities including the OWASP Top 10- Experience working with a variety of development tools, languages...