...accordance with company security policies and best practices in cloud security.
Identifying, analyzing, and resolving infrastructure vulnerabilities and application deployment issues.
Regularly reviewing existing systems and making recommendations for improvements.
Interacting...
...Company- Orbit technosol -
Position :- Windows Administrator—AD/DNS/End Point Security ( Trend Micro)
Qualification— B.Tech./ B.E./ MCA/ BCA/ BSc-IT.
Relevant Exp— 3-4 Yrs.
Total Exp— 7-8 Yrs.
Salary- 8-9 Lacs
Joining – Immediate or 30-45 Days.
Location...
CONTACT - Ms. Tanima - (***) ***-****, ****@*****.*** Job Description:
JOB PROFILE:
Achievement of Sales Plan.
Sales Cycle management (Pre-sales, Sales and Post Sales)
Appointment of Chanel Partners in non -represented areas
Key...
Rs 5 - 8 lakhs p.a.
...Communications, Managerial Skills especially Planning , Negotiation skills, Leadership, Decision Making.
• Good knowledge of Fenestration and Windows system.
• Ability to read & understand the Technical drawings/ civil structural drawings.
• Ability to gather and analyze data...
...Product Portfolio ' includes the following main Product areas -
Windows OS: Manages and maintains all aspects of the current Windows... ...responding to urgent security threats to BCG (e.g. Zero-Day Vulnerabilities) and help drive remediation within required Service Level...
...Coordination of local office asset maintenance
Risk management and vulnerability controls with respect to assets, accounts & access management,... ...independently resolving issues related to (but not limited to) Windows, MacOS, Office Suite, Browser, and Network connectivity....
...with EAII’s IT policy.
Be the local subject matter expert on Windows operating systems, AWS/Azure, Microsoft Office and/or Office 36... ...by Evidence Action Global IT team.
Conduct regular vulnerability scans in accordance with Evidence Action’s cybersecurity policy...
...partners, OPSWAT is a pioneer and leader in data sanitization, vulnerability detection, multi-scanning, device compliance, and cloud access... ...technical discipline, or equivalent experience.
Strong knowledge of Windows and Windows server.
Basic knowledge of Linux, with an...
...Secondary Skills
Excellent working knowledge in mitigating the vulnerabilities Highly motivated individual contributor
Ability to be a... ...ability to work well oncross functional projects
Knowledge on Windows Server Or Unix Or Linux
ITIL Certification
Dell Proven...
...will include:
Auditing IT Systems: Conducting thorough audits of IT systems, processes, and controls to identify weaknesses, vulnerabilities, and areas for improvement.
Risk Assessment: Assessing the risk associated with IT systems and identifying potential threats to...
...Maturity Model (SAMM), or Building Security in Maturity Model (BSIMM).
Core Accountabilities
Perform penetration testing and vulnerability scanning on network/infrastructure, web and mobile applications along with configuration review on network appliances and servers...
...architects to resolve defects within SLAs
Regular analysis of application events and logs generated in all the subsystems to identify vulnerabilities and taking necessary action, in accordance with the results of the log analysis
Participation in client reviews and present...
...ABOUT THE ORGANISATION TARA is an NGO protecting and empering vulnerable children and their families in Delhi.
See :
JOB MISSION : Running the overall operations of TARA Boys
JOB SCOPE : TARA Boys is a residential home for 20 children from 6 to 18yo.
JOB...
...policies, procedures, and controls to safeguard IT infrastructure assets and data against unauthorized access, cyber threats, and vulnerabilities
Ensure compliance with regulatory requirements, industry standards, and internal security guidelines
Conduct security...
...training and consulting Standards for products like IT Infrastructure Implementation, Security Implementations, Security Audits, Vulnerability Assessments, and Penetration Testing. Craw Security focuses on delivering Best industry Certifications from top vendors and testing...
...for recovery, recovery requirements, and recovery time objective(s).
Conduct risk assessments to identify potential threats and vulnerabilities to recovery capabilities and recommend risk mitigation strategies.
Working with regional business teams to conduct business...
...confidentiality of our data. Responsibilities :
Security Analysis: Perform security assessments of applications to identify vulnerabilities. Use automated tools and manual techniques to execute the assessments.
Security Testing : Carry out regular security testing,...
...Assurance Maturity Model (SAMM), Or Building Security In Maturity Model (BSIMM). Core Accountabilities
Perform penetration testing and vulnerability scanning on network/infrastructure, web and mobile applications along with configuration review on network appliances and servers...
...different conditions.
performance testing tools to simulate high-traffic or data-intensive scenarios.
Security Testing:
vulnerabilities in software and ensuring compliance with security standards.
penetration testing and risk assessments.
Quality Assurance Metrics...
...water quality, impact on sanitation & health resulting in huge socioeconomic impacts. These will be felt primarily by the most poor and vulnerable population. There is an urgent need to work towards climate resilience with a focus on water, at scale.Arghyam's approach for...
...encryption, and related security features
Experience with security areas such as access control, runtime defence, anti-malware, and vulnerability management
Excellent communication and presentation skills, with the ability to engage both technical and non-technical...
...Suite + Security (EMS), Other endpoint security solutions and comprehensive threat protection technologies.
Advanced knowledge of the Windows OS, MECM, Intune, Azure, and endpoint architecture
Ability to identify and implement automation opportunities to increase...
...impact and effectiveness on the Android platform.- Perform comprehensive security analysis on test patches to validate against known vulnerabilities and malware.Data Integrity Assurance :- Implement measures to ensure the data integrity of the Android platform on Smart Devices....
...application bugs errors and other technical issues.
Security: Implement security best practices to protect websites from common vulnerabilities such as SQL injection and crosssite scripting (XSS).
Collaboration: Work closely with designers marketing and other team...
...Manager - Vulnerability Management - COR028360
Genpact (NYSE: G) is a global professional services and solutions firm delivering outcomes that shape the future. Our 125,000+ people across 30+ countries are driven by our innate curiosity, entrepreneurial agility, and desire...
...direction.
Responsibilities
Create and maintain user accounts for corporate networks and applications.
Configure and maintain Windows and Linux servers in physical and virtualized environments.
Setup and maintain server backup routines using VEEAM backup solution....
...possesses rich technical exposure on skills like Virtualization mainly VMware & Citrix xen, Operating system like Red hat Linux, Solaris & Windows Familiar with Cisco Compute Servers, Replication Technologies, DC & DR infra structure Management with DC & DR evoke and revoke along...
...considerations: Implement security best practices, such as input validation, data sanitization, and protection against common web vulnerabilities (e.g., XSS, CSRF).
Stay updated with industry trends: Keep up-to-date with the latest PHP frameworks, libraries, tools, and...
...and penetration from outside sources.
Setup OSSEC Server ( host-based intrusion detection system (HIDS))
Setup OpenVAS (Open Vulnerability Assessment System)
· Having knowledge about DB2 backup and restoration.
· Setup & maintenance of Apache servers (on Amazon Linux...
...qualification relevant experience.
Proficiency in desktop applications and Oracle or SAP financial systems
Must have worked extensively on Windows OS and has very good hands on experience in MS Excel and MSWord
Experience And Personality
Should have rich experience of...