Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
A day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to get to the heart of customer issues, diagnose problem areas, design innovative solutions and fac...
client interfacing skillssoftware configuration managementteam managementproblem solvingsolution designmanagement systemsclient interfacingtechnology solutionsdigital transformationbusiness profitabilityRoles and Responsibilities JD Administrator Security Qualification and prior experience
The position is a technical support role but that of technical expert so the successful candidate will develop a detailed understanding of their customer s global solution and all the managed secu...
security operationssafetycctvsopriskservice improvement planssecurity incident responsecisco ipsroot causeit securityinstall baseload balancingchange requestsevent managementcomputer sciencesecurity devicestechnical supportcorporate liaisPlease create contract IDs for the below Abhra INC resources Sl No. Name Email ID Ph. no. 1. Meghana koduru meghana.koduru abhrainc.com 6303408887 2. Swathi Dussa swathi.dussa abhrainc.com 8367021543 ...
htmlsourcefiregciajquerysecurity architecture designvulnerabilityarcsightsql serverjavascriptsqlsecurity researchsecurity information event managementIntroduction At IBM, work is more than a job - its a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do...
database administrationmicrosoft accesssecurity informationevent managementit operationstime managementdesign thinkingsecurity servicessoftware businesssoftware solutionssecurity operations
Job Overview Infrastructure security Vulnerability Management with Identity Access Management (IAM Skill) IAM S : CA/PING/IBM/ORACLE. Multifactor Authentication : RSA SecurID...
high quality standardsidentity access managementit securityit projectsrsa securidrsa envisionproxy serverquality controlquality assuranceaccess managementquality standardsIntroduction Information and Data are some of the most important organizational assets in today s businesses. As a Security Consultant, you will be a key advisor for IBM s clients, analyzing business ...
active directorytroubleshootingdeliverymicrosoft accesscomplianceuse casedesign thinkingcreative designaudio masteringmicrosoft officetechnical skillsthreat assessmentdevice integrationsecurity complianceHave experience in SOC monitoring, working knowledge in any of the SIEM tools like ArcSight, Qradar, Splunk, McAfee Nitro CCNA / Security+/ Network+ CEH certified / SIEM technology certified (ArcSigh...
siemsecurity analysisescalation processsecurity operationsinfmation securitynetwkingnetwk securitynetwk servicesIntroduction At IBM, work is more than a job - its a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do...
security informationevent managementdata scienceit operationstime managementdesign thinkingcreative designevent managementmanaged serviceschange managementsecurity servicesIntroduction At IBM, work is more than a job - its a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do...
security informationevent managementdata scienceit operationstime managementdesign thinkingcreative designevent managementmanaged serviceschange managementsecurity servicesIntroduction At IBM, work is more than a job - its a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do...
security informationevent managementdata scienceit operationstime managementdesign thinkingcreative designevent managementmanaged serviceschange managementsecurity servicesIntroduction At IBM, work is more than a job - its a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do...
security informationevent managementdata scienceit operationstime managementdesign thinkingcreative designevent managementmanaged serviceschange managementsecurity servicesLog collection and ingestion to our platform from various network devices (like Firewall, Switches, Router, Proxy, IPS, WAF, Etc.), servers, and Cloud resources. Knowledge on Azure & AWS fundamental r...
grcsaptroubleshootingenvironmentcustomer relationsbig datalog analysisnetwork devicesworking experiencecommunication skillsvulnerability managementawsesmsiemcloudazurebasicstepsipsIntroduction At IBM, work is more than a job - its a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do...
security informationevent managementdata scienceit operationstime managementdesign thinkingcreative designevent managementmanaged serviceschange managementsecurity servicesIntroduction At IBM, work is more than a job - its a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to d...
use caseit securitydata scienceit operationsshell scriptingtime managementaudio masteringmonitoring toolslogical approachit infrastructuresoftware businesssoftware solutionsincident managementsecurity monitoringIntroduction Information and Data are some of the most important organizational assets in today s businesses. As a Security Consultant, you will be a key advisor for IBM s clients, analyzing business ...
web application securityuse caseweb applicationtime managementnetwork securitysecurity devicesthreat assessmentdevice integrationpenetration testingsecurity complianceenterprise securitydata classificationIntroduction Information and Data are some of the most important organizational assets in today s businesses. As a Security Consultant, you will be a key advisor for IBM s clients, analyzing business ...
web application securityuse caseweb applicationtime managementnetwork securitysecurity devicesthreat assessmentdevice integrationpenetration testingsecurity complianceenterprise securitydata classification
Technical and Soft Skill sets required:
- Understanding of various security certifications and compliances including ISO27001, HIPAA, HITECH,GDPR, SOCII etc...
arcsightcontent filteringloss preventionarbordata loss preventionit securityrisk managementendpoint securityadvisorymanagement systemsecurity testingtesting toolssiembasissecure networkscomputer scienceopen sourceiso 27001disaster recoveAbout Nokia At Nokia we create the technology to connect the world. Developing and delivering the industrys only end-to-end portfolio of network equipment, software, services and...
ansyscustomer relationssafetyaptpublic sectorsecurity toolsevent monitoringservice providersprocess managementsecurity monitoringnetwork infrastructureinfrastructure servicesIntroduction At IBM, work is more than a job - its a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do...
computer hardwaredatabase administrationidssecurity informationevent managementdata scienceit operationsevent managementmanaged serviceschange managementsecurity servicessecurity operations10+ years of experience in working with Practice Development / Customer engagement management. - Technical knowledge & Hands on experience on key skills Security Analytics like Qradar, Security Log An...
security incident responsesupply chaincontent developmentcustomer engagementcommunication skillspractice developmentperformance managementcompetency developmentSOC analyst is responsible for ensuring the protection of digital assets from unauthorized access, both on cloud and on-premise. SOC Analyst will actively monitor the system for suspicious activity an...
idsiso 27001troubleshootingdigital assetsfirewallsdigital forensicssiemit securitylog analysiscyber securitysecurity controlsproblem solvingsecurity analysisipsConsults and collaborates with various project team members and external personnel to monitor and manage client networks , resolve client incident and problem tickets , as well as implement adds , mov...
client satisfactionclient onboardingtechnical assistancetechnical supportA day in the life of an Infoscion As part of the Infosys consulting team, your primary role would be to lead the engagement effort of providing high-quality and value-adding consulting solutions to cu...
strong business acumenclient interfacing skillssoftware configuration managementteam managementproblem solvingsolution designbusiness acumenchange managementmanagement systemsSkills: SIEM Sentinel Should have good experience in Implementation. Experience: 7 to 12 Years. Location: Chennai / Bangalore.,...
siemLog ManagementQRadarRSA enVisionArcSightLogRhythmEvent CorrelationSecurity Operations CenterOSSIMIntrushieldSkills: SIEM Sentinel Should have good experience in Implementation. Experience: 7 to 12 Years. Location: Chennai / Bangalore.,...
siemLog ManagementQRadarRSA enVisionArcSightLogRhythmEvent CorrelationSecurity Operations CenterOSSIMIntrushieldAt IBM, work is more than a job - its a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something be...
database administrationdata scienceit operationstime managementsecurity servicessoftware businesssoftware solutionssecurity operationsUST Global is a leading provider of platforms, digital innovation, artificial Intelligence and end-to-end IT services and solutions for Global 1000 companies. We are transforming corporations through ...
group workit servicesjquerysql serversqlbusiness managementdigital innovationjavascriptissue resolutionsecurity operationscyber securityjavacustomer requirementsartificial intelligence
JOB OPENING FOR LOGRHYTHM - SIEM
Description Line of Service Advisory Industry/Sector Not Applicable Specialism Cybersecurity & Privacy Management Level Senior Associate Job Des...
code of ethicsprocess qualityproblem solvingcustomer relationssecurity toolsinsurancehigh sense of urgencypacket captureroot causesalesroot cause analysisqualitysecurity operations centercost effectivemisclient contacta) Participate in the security monitoring of mission-critical network nodes and systems, and security devices to detect any anomalies. b) Provide detailed response investigation to security monitorin...
soccustomer relationscomplianceidsenvironmental impact assessmentsystem auditsecurity risksecurity deviceschange managementsecurity analysisincident managementcisco
The position is a technical support role but that of technical expert so the successful candidate will develop a detailed understanding of their customer s global solution and all the managed secu...
security operationssafetycctvsopriskservice improvement planssecurity incident responsecisco ipsroot causeit securityinstall baseload balancingchange requestsevent managementcomputer sciencesecurity devicestechnical supportcorporate liais
Desired Profile:
Responsibilities and Accountabilities: The principal areas of responsibility are as follows: Responsible for working in a 24x7 Security Operation Center (SOC) environment. Provide security monito...
sieminformation securitynetworkingcustomer relationsidssecurity incident responsecore bankinglog analysiscyber securitysecurity toolsproblem solvingemerging trendsbanking software© 2020 Skillindia All Rights Reserved