Average salary: Rs1,433,333 /yearly
More stats ...Job Title: Human Resource Executive
Location: Gurugram, Haryana
Job Type: Full-time
Responsibilities:
Utilize LinkedIn and other online platforms to search for relevant candidates and resumes.
Review resumes and applications to ensure all necessary information...
...cyberforcehq.com, and securityrating.com. Infosec Ventures believes that executing ideas is what adds value and strives to create billion-dollar... ...themselves , it is pretty much a part of compliance, but cyber security needs 'like'able and 'trust'able personalities to engage in...
...capabilities (core)
•Strong communicator, clear articulator of technical/security concepts to technical and managerial stakeholders;
•Mediate... ...;
•Awareness of the Product/Vendor market with the ability to execute on industry trends and good practices.
Qualification...
...Security Professional
Job Req ID: 28172
Posting Date: 8 May 2024
Function: Customer Service
Unit: Business
Location:
25A... ...firewalls, routers, switching, monitoring) hardware and software.
# Executes engineering efforts to ensue currency and supportability of...
Sainik Security Services Urgent Requirement For New Delhi, Mumbai, Kolkata, Jaipur Location: New Delhi (Delhi, India), Mumbai (Bombay) (Maharashtra... ...) (West Bengal, India), Jaipur (Rajasthan, India) Marketing Executive Field Supervisor Computer Operator Apply to: Ph.: (***) ***-****,...
...our communities.
The Role
Do you have a passion for driving security agenda for your client Are you a master of Cyber Security domain... ...across multi-cloud and hybrid environment, preferably executed one or two cloud migration and cloud security assessment is preferred...
Remote job
Rs 11 - 16 lakhs p.a.
...Red Team assessment.
Ø Keep one self updated on the latest IT Security news, exploits, hacks.
Ø Prepare Threat Intelligence reports... ...weaknesses.
Collaborate with cross-functional teams to plan and execute red team exercises.
Analyse and emulate advanced persistent...
...environments. You will play a critical role in ensuring the continuous security posture of our organization, proactively mitigating risks, and... ...infrastructure, applications, and data.
Support day-to-day execution of security processes in areas related to perimeter and endpoint...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...Competencies
Effective Communication
Collaborative Working
Execution Excellence
Problem Solving & Analytical Skills
Deliver...
...and our communities.
The Role
Are you passionate about security architecture and driven to protect against the latest threats? We... ...Awareness of the Product/Vendor market with the ability to execute on industry trends and good practices.
Key...
...many of the world’s most respected organizations and a leading Executive Search firm, with more than 550 consultants and 63 offices in 36... ...Collaboration Technology; Functional Technology; Digital Technology; Security & Architecture; Infrastructure & Services, Digital Success to...
...The Role
We are seeking a talented and passionate Security Researcher to join our team and develop engaging, informative security/cybersecurity courses like VAPT; Blue Teaming; Red Teaming; Purple Teaming; SOC analyst; Reverse Malware Analysis; SIEM, EDR; XDR; Cloud Security...
...management and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the... ...good knowledge of llvm compiler, assembler, linkers, loaders and executable binary formats (you like handling bits and bytes)
Experience...
...Job Description
Project Role : Security Architect
Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition...
...with skill development mapping and competency mapping. We focus on executive training and development to enable organizations to achieve... ...home.
Role Description
This is a remote role for a Cyber Security Instructor. As a Cyber Security Instructor, you will be responsible...
...files using keyboards, data recorders, or optical scanners.
Benefits
Overall, data entry work offers benefits such as improved data accuracy, time and cost efficiency, enhanced organizational efficiency, data analysis capabilities, and compliance and security measures....
...continuous integration and
deployment are core pillars of technology execution.
Key Responsibilities :
● Establish, implement and monitor a strategic, comprehensive enterprise information
security and IT risk management program
● Work directly with the business...
...access or destruction.
Hands-on experience in Information Security Management System implementation and audit inline to ISO 27001... ...FIS policy.
Knowledge/ Experience in SSAE18 assessments.
Executes security controls to prevent hackers from infiltrating company information...
...Job Location: Delhi Position/Title: Security Operation Centre (SOC), Assistant Manager
Department: Information Security
About the... ...activities, incidents, and trends.
Communicate effectively with executive leadership and other stakeholders.
Provide actionable...
...About the Job: We are searching for a highly skilled and experienced Email Security Subject Matter Expert (SME) to join our growing security team. In this role, you will play a pivotal role in safeguarding our organization from email-borne threats by leveraging your expertise...
...Collaboration Technology; Functional Technology; Digital Technology; Security & Architecture; Infrastructure & Services, Digital Success to... ...Control solutions for managing and controlling application execution on endpoints, including policy management and application behavior...
...initiatives to 60 plus global offices. Digital IT has six key pillars – Collaboration Technology; Functional Technology; Digital Technology; Security & Architecture; Infrastructure & Services, Digital Success to support business and to take lead on digital transformation initiatives...
votre rôle
Excellent troubleshooting skills on Data Center technologies.
* Manage Customer Service support & Improvement Program in order to increase customer satisfaction.
* Working knowledge on Incident and change management
* Ability to drive the projects end...
...communities.
The Role
~ Ownership of the fulfillment of security services deliverables, SLAs, KPIs and Reporting
~ Ensure 100%... ...VECV environment. Irrespective of Severity and all Incidents
~ Executing preventive actions prepared by SOC team and work closely with SOC...
Job Advert
Join our team as Payroll Executive and be responsible for protecting computer networks from cyber-attacks, setting up and maintain security standards at Concentrix office in Gurgaon.
With game-changers in over 70 different countries, we celebrate our differences...
...performance for the customer network, devices and services
Maintaining internal and customer communication during the ticket resolution
Execute project tasks, including but not limited to gathering customer technical requirement, configuring router, switches, firewalls and...
Rs 11 - 15 lakhs p.a.
...Description : Design, build and configure applications to meet business process and application requirements. Must have Skills : Data Security Good to Have Skills : Master Data Management, Data Protection Job Requirements : Key Responsibilities : A: Adoption of privacy...
Who We Are
At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable...
Rs 7 - 11 lakhs p.a.
...Description : Design, build and configure applications to meet business process and application requirements. Must have Skills : Data Security Good to Have Skills : Master Data Management Job Requirements : Key Responsibilities : A: Conduct detailed analysis of the...
JOB SUMMARY:Data Security specialist with experience in data security technologies such as Classification, DLP, DRM along with exposure to implementation of data privacy and security frameworks. A continuous learner who is self-driven, team player and zeal to bring security...