Average salary: Rs360,000 /yearly
More statsJob Description:
Job Purpose
Identity Access Management User Administration.
Responsibilities
Primary role of IT Security Analyst II performing application administration and Active Directory. User provisioning and De-provisioning. User life-cycle management, performing...
...directory
Working knowledge of Windows and Unix
In depth knowledge of server support administration
Should have worked in IT security for at least 4 years
Good communication skills
Optional
Mailbox Monitoring and resolving of Customer issues
Looking for...
Job Description:
Responsibilities
Application onboarding/integration with delimited, JDBC, Active Directory connectors.
Defining rules, access controls, user policies, provisioning plans, custom connectors.
SailPoint Application integration.
Scheduling and configuring...
...Secures premises and personnel by patrolling property, monitoring surveillance equipment, and access points. Investigates security breaches, incidents, and other alarming behavior. Controls traffic by directing drivers. Completes reports by recording observations, information...
...learn by doing and apply their newly acquired knowledge in a practical context.
Role Description
This is a contract role for a Cyber Security Instructor. The Cyber Security Instructor will be responsible for delivering high-quality instruction to students, preparing and...
...Network infrastructure support, maintenance, and management. Enforcement of architectural standards to equipment.
Remediation of security vulnerabilities. Network infrastructure administration and support throughout the hardware lifecycle to
include installation, patching...
CSM Tech is looking for qualified candidates having relevant knowledge to resource management, data acquisition, talent pool management.
Experience: 1-2 Years
Qualification: MBA/PGDM
Job Profile:
Responsible for Data acquisition, storage, administration, and maintenance...
SEO Analyst :
We are looking for an SEO Analyst to join our Marketing team (remote option available). He/She will be responsible for optimizing the company’s website and will work towards improving rankings, on-page optimization, off-page optimization, and technical SEO guidance...
Role : Senior IT Data Analyst Job Description :- Communicate with stakeholders at all stages of the project cycle to understand requirements... ..., role-based access control, networking, virtual machines, and security compliance.- Experience in designing enterprise data model.-...
This opportunity is with Top product organisation for Duckcreek Business Analyst.Job description :The DC QA Engineer is responsible for ensuring the quality of system configurations against product requirements by evaluating system behavior, running test cases, and conducting...
...unique needs of each client and is trusted by top companies around the
globe.
We are seeking a detailoriented Market Research Analyst to conduct surveys and analyse
customer preferences and statistical data. Your role will involve providing valuable insights to...
...have chosen Dautom as their trusted partner for their upcoming projects.
Job Title: Technical Support Executive (L1 & L1.5 on Security Analyst)
Job Description:
Experience : Fresher Education : B.Sc Comp Science BCA Graduates (2023 Pass out only).
Location :...
...OCAC Tower Bhubaneswar, India and committed to providing flawless, secured, and transparent technological services to our clients.... ...candidate profile**
- Proven work experience as a Social Media Analyst, Social Media Strategist, Social Media Executive, or a similar position...
...Optimization, Data Source Integration, Data Catalog Management, Security and Access Control, Integration with Applications and Ecosystems... ...performance by consulting with architects, solution managers, and analysts to understand business technical needs and deliver solutions....
...Develop OData services to expose SAP data for consumption by external applications.- Collaborate with functional consultants, business analysts, and other stakeholders to gather requirements and design solutions.- Perform unit testing, integration testing, and support user...
...data governance policies and procedures.Collaboration and Communication:- Collaborate with cross-functional teams, including business analysts, lenders, and underwriters, to understand data requirements and provide analytical support.- Communicate complex data analysis...
...necessary documentation as per the process requirements- Coordinate with external teams of clients, development professionals, quality analysts, technical architects, etc.- Should have good written and verbal communication skills.- Support the entire life-cycle of the...
...inventory management, stock control, and ordering processes.
~Ensure compliance with company policies and procedures, maintaining a safe and secure work environment.
~Monitor and analyze sales data, identifying trends and opportunities for improvement.
~Prepare reports and manage...
...designing, implementing, and maintaining our backup and recovery infrastructure. Your expertise will be instrumental in ensuring the security, efficiency, and reliability of our data protection strategies. To perform SME/L3 level of Backup platform management, configuration,...
Rs 6 - 15 lakhs p.a.
...2. Ensure physical verification of shortage or excess.
23. Safeguards store operations and contents by establishing and monitoring security procedures and protocols.
24. Continuously monitors and adjusts inventory of material and components to minimize slow moving & dead...
Rs 4 - 7.2 lakhs p.a.
...sure that the customer leaves the boutique with a pleasant smile.
He is responsible for managing the assets of the boutique. The security and safety of the boutique is his responsibility.
He along with his subordinates are responsible for planning for promotional activities...
...years of hands on exp in mule DW and java, knowledge on mule architecture along with XML, SOAP, WSDL, XSLT, REST services, knowledge on security, login, policy management3. Enhancement of existing services when required, Implementation experience with Mule API management4....
...components, collaborating with cross-functional teams to define and deliver high-quality software solutions, and ensuring the performance, security, and availability of the applications.
Qualifications
Strong proficiency in Node.js, JavaScript, and related frameworks (such...
...accurate and regular updates through scrum management. We are based at OCAC Tower Bhubaneswar, India and committed to providing flawless, secured, and transparent technological services to our clients.
Inflexi also has joined the AI revolution and Business Document Analysis...
...accurate and regular updates through scrum management. We are based at OCAC Tower Bhubaneswar, India and committed to providing flawless, secured, and transparent technological services to our clients.
Inflexi also has joined the AI revolution and Business Document Analysis...
...accurate and regular updates through scrum management. We are based at OCAC Tower Bhubaneswar, India and committed to providing flawless, secured, and transparent technological services to our clients.
Inflexi also has joined the AI revolution and Business Document Analysis...
Rs 3 - 3.5 lakhs p.a.
...for all travel needs, whether it's for leisure, education, employment, or relocation. From arranging flight tickets to booking hotels, securing travel insurance, crafting visa itineraries, and handling apostille/attestation, translation, and notary services, we covered...
...Serverless : Leverage serverless technologies like Lambda and Step Functions to build event-driven, cost-efficient applications.
Security : Implement robust security measures like IAM roles, VPC security groups, and encryption at rest and in transit. Configure CloudTrail...
...development of complex reports - General knowledge and design of at least 2-3 Workday functional areas- Good understanding of Workday security- Use of at least 1 third party integration framework is preferred but not required- Good written & oral communication skills & strong...
...end technologies, such as JavaScript, HTML5, and CSS3.- Knowledge of object oriented PHP programming.- Understanding accessibility and security compliance.- Strong knowledge of the common PHP or web server exploits and their solutions.- Understanding fundamental design...