Search Results: 6,690 vacancies
...Hi All,
Hiring on SOC Analyst - Full Time/Permanent – Work from Home
Interested Applicants please share resumes to ****@*****.***
Client: Confidential
Mandatory Skills: AWS Security, Incident Response, KQL queries, Sentinel, Crowdstrike, Akamai, Panoramata...
...managers, global companies, family offices and private clients operating worldwide.
Job Description
As our key Group Network Security Analyst you will develop and operate the following activities:
Research emerging threats and vulnerabilities to aid in the...
...bingo. Pragmatic Play India Pvt. Ltd. is the Indian subsidiary of Pragmatic Play Ltd.
Key Responsibilities
Monitor and investigate security alerts to identify unwanted activity and security incidents.
Respond to suspicious activity reports or other security concerns...
...transformation of information into intelligence, inspiring the world to learn, communicate and advance faster than ever.
JR40499 IP Security Analyst
The Intellectual Property (IP) Protection Analyst is responsible for processes relied upon by the IP Protection program with...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity...
...Job Description:
We are seeking an experienced and highly skilled Cloud Architect with a specialized focus on container security to join our dynamic team. As a Cloud Architect, you will play a crucial role in designing, implementing, and maintaining secure cloud-based containerized...
Job Description:
Job Purpose
Identity Access Management User Administration.
Responsibilities
Primary role of IT Security Analyst II performing application administration and Active Directory. User provisioning and De-provisioning. User life-cycle management...
...This is a pivotal role in the Keyloop Security team and will primarily be responsible for working in a collaborative relationship between... ...plan.
Role Responsibilities :
As the Information Security Analyst, youll need to:
Liaise with internal and customer...
...experience analyzing cyber threats and working with technical and cyber security concepts.
~ Ability to communicate in English fluently.... ...such as malware, spam and account hijacking. A diverse team of Analysts, Policy Specialists, Engineers, and Program Managers, we work to...
...Information Technology Group, Information Technology Group Cyber Security Engineering
General Summary:
This role will be... ...security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information...
...Description :Netenrich boosts the effectiveness of organizations' security and digital operations so they can avoid disruption and manage... ...Hyderabad/Bhimavaram (Work from Office)Job Summary :As a Security Analyst at Netenrich Technologies, you will play a pivotal role in...
.../ Playbooks (KQL Queries)
- SOP Creations / Fine-tuning use cases.
- Incident Triaging
- Log Source Integration
- Understand security incident management and ticket resolution process
- Experience in participating in critical Incident Management Process and Contribute...
Role Description: Software Sr. Developer (Blue Prism) Required Skills: Blue Prism is a mandatory skill would need to have at least 3+ years of experience. Capable of doing multiple roles like Developer/TL/Architect. Blue Prism Certification is the must. Working together and ...
...offices and private clients operating worldwide.
Job Description
Outline of responsibilities
We are hiring an Information Security Analyst to work in our growing IT Security team. You will monitor our digital environment for security issues, respond to security...
...to bring service enhancements Technical documentation authoring and review Preferred Qualifications: Experience supporting resilient security solutions for a large global enterprise Experience with Single Sign On and Multi Factor authentication tools PingFederate, AAD, PingID...
...prospects both manually and via the ClearOPS Answer Management System
Participation in customer or prospect discussions on information security related topics
Development of artifacts in support of ISO 27001 and SOC2 audit fieldwork
Regular monitoring of the MCO Rapid7...
...diverse perspectives. This is who we are at our best. One Company. One Team.
AMD together we advance_
The Sr Information Security Analyst will be responsible for identifying and defining requirements and engineering solutions to solve the existing threats and security...
3+ years experience
The Analyst, Information Security Cryptography will play a key role in safeguarding the organizations
systems, networks, and data. The position is responsible for aiding in the design and build of
Information Security capabilities, participate in...
...years of industry experience
~ Experience in risk management and conducting third-party vendor risk assessments.
~ Knowledge of security frameworks (e.g., ISO 27001, NIST CSF, SOC2) and regulatory requirements (e.g., GDPR, HIPAA).
~ Strong communication and interpersonal...
...partners and stakeholders to align on solutions & implementation to ensure FedEx's compliance with all laws and regulations and increase security posture.
Provide information security metrics visibility to ensure compliance with laws and regulations based on FedEx Data...