...Experience in writing Unit test case using Jasmine/Karma or Jest
Total Experience 6+ years
Relevant Experience 6+ years
Work Location... ...of performance-based designs, accessibility standards and security compliance in
development.
• Good understanding and working knowledge...
...Experience in writing Unit test case using Jasmine/Karma or Jest
Total Experience 6+ years
Relevant Experience 6+ years
Work Location... ...of performance-based designs, accessibility standards and security compliance in
development.
• Good understanding and working knowledge...
...configuration, optimization, and troubleshooting to ensure reliable and secure real-time communication.
Designing, implementing, and... ...Preferred)
Experience:
Business development: 3 year (Required)
total work: 3 year (Preferred)Please share your resumes to ****@*****.***...
...Experience in writing Unit test case using Jasmine/Karma or Jest
Total Experience 6+ years
Relevant Experience 6+ years
Work Location... ...of performance-based designs, accessibility standards and security compliance in
development.
• Good understanding and working knowledge...
...Developing and planning various sales activities.
Gathering and analyzing all the sales-related data.
Maintaining an accurate record of total closed sale deals.
Preparing regular sales reports and presenting them to the higher management.
Recommending sales improvement...
...PHP, MySQL, and Laravel framework
Good understanding of HTML5, CSS3, JavaScript, jQuery.
Minimum 2 years of experience in Laravel
Total 4-6 years of experience in programming
Email: ****@*****.***
Technical Manager
We are looking for a Technical Manager to lead...
...experience for yourself, and a better working world for all.
Security Technology – Cross Function Security Technology– Support Engineer... ...for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career...
...17/05/2024
Job Types: Full-time, Walk-In
Salary: hourly rate
Schedule:
Day shift
Education:
Bachelor's (Preferred)
Experience:total work: 4 years (Required)
UI/UX: 4 years (Required)
HTML5: 3 years (Required)
Figma: 4 years (Required)...
...become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
Perimeter Security Specialist.
Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and...
...rate in finding flourishing careers and financial independence.
Role Description
This is a full-time on-site role for a Cyber Security Instructor located in Kochi. The Cyber Security Instructor will be responsible for delivering high-quality training and education in...
...Security Operation Center - Manager
Cochin (India) | immediately
Grow and shape a secure future together with us!
To reinforce and lead our Global Security Operations Centre we are hiring people like you as pathfinder to the team and technology who can takes responsibility...
...sharing best practices and Angular expertise.
- Architect and implement complex features and user interfaces.
- Prioritize performance, security, and scalability in all development projects.
- Stay up-to-date with Angular trends, best practices, and emerging technologies.
-...
...effectively communicate their features and benefits.
• Research, learn, implement, and adapt changes in self-service terminals, high-security modules, payment cards, digital wallets, etc., to benefit customers.
• Actively engage in lead generation, prospecting, and closing...
...development lifecycle, including requirements analysis, design, coding, testing, deployment, and support.
• Design and implement scalable, secure, and maintainable code following best practices and coding standards.
• Collaborate with other developers, designers, and...
...and maintenance.
Server/Network Backup Systems
Operating systems / applications / devices Licensing, activations and patches and security updates
Active Directory, DNS, DHCP Management
Auditing
CCNA/MCSE/MCITP certifications are added advantages.
PowerShell and scripting...
...SME/ Security Architect – Palo Alto
Grow and shape a secure future together with us!
mispa Technologies is an innovative IT security services and solution provider with head office in Langenfeld (Rhineland), Germany and Dev & Operations Center in Cochin (India) registered...
...sharing best practices and Angular expertise.
- Architect and implement complex features and user interfaces.
- Prioritize performance, security, and scalability in all development projects.
- Stay up-to-date with Angular trends, best practices, and emerging technologies.
-...
...sharing best practices and Angular expertise.
- Architect and implement complex features and user interfaces.
- Prioritize performance, security, and scalability in all development projects.
- Stay up-to-date with Angular trends, best practices, and emerging technologies.
-...
...and test-driven development (TDD).
Architecture and System Design
Expertise in designing and implementing scalable, maintainable, and secure software architectures.
Experience with large and complex system designs, including microservices architecture, distributed systems,...
...conduct code reviews.
Translate business requirements into technical solutions.
Implement code optimization, performance tuning, and security measures.
Promote Agile methodologies within the team.
Participate in the full software development lifecycle....
...Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...along with an ability to
collaborate.
• Ability to understand the impacts of performance-based designs, accessibility standards and security compliance
in Web development
• Proficiency when it comes to code versioning tools like GIT.
• Experience in designing and...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...deployment workflows.
Rules and Controls Implementation:
• Establish and enforce rules and controls within Azure DevOps to maintain security, compliance, and governance standards.
• Implement access controls, security policies, and monitoring mechanisms.
Architecture and...
...processes.
• Experienced in working with software systems hosted on public cloud platforms such as Azure and AWS.
• Understanding of cloud security principles and best practices to ensure secure cloud deployments.
• Familiarity with a wide range of AWS services, including EC2, S3...
...and maintenance.
Server/Network Backup Systems
Operating systems / applications / devices Licensing, activations and patches and security updates
Active Directory, DNS, DHCP Management
Auditing
CCNA/MCSE/MCITP certifications are added advantages.
PowerShell and scripting...
...****@*****.***
SOC L2 (Work from office)
Cyber Security Analyst who provides dedicated eyes on monitoring and analysis... ...Experience in intelligence enrichment (E.g. Passive DNS, WHOIS, Virus Total)
• Experience or knowledge of relevant regulations governing...
...Email: ****@*****.***
DevOps Engineer
Experience
-Manage the deployment lifecycle to ensure the delivery of highly secure solutions that are optimized for performance and built to scale.
-Critical thinking mindset, a strong sense of accountability for...
...new innovations and the use of digital technologies.
Your day to day responsibilities will include:
• To identify, source and secure both long term and short-term pest control & prevention business opportunities.
• To develop new business opportunities within current...
...platforms and devices
Performing thorough testing and debugging of Next.js applications to ensure optimal functionality, reliability, and security
Developing and maintaining technical documentation, including design documents, user guides, and API specifications, to effectively...