Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Position: SecOps Engineer Reports to: SOC Lead Department: Information Security Status: Exempt Location: TBD POSITION SUMMARY: The SecOps Engineer will fit into a global Security Operations team...
operating systemslog managementsecurity toolscyber defensesecurity controlsworking experiencesecurity operationsinformation securitycyber securityproject teamscloud securityMain Purpose of Job:
Job Title Associate Security Operations Analyst Job Description IG s Security Operations team (SOC) are responsible for managing security related events within IG. The goals of the te...
customer relationsreportingmisslaaccountsroot cause analysisms officeroot causeentry leveltesting toolspolicy reviewcyber securityexternal auditsecurity toolsJob ID: JR0188497 Job Category: Information Technology Primary Location: Bangalore, KA IN Other Locations: Job Type: Experienced Hire Information Security InvestigatorJob Desc...
web contenthard drivesmusic makingdata analysisdigital mediaprivate sectorbusiness unitslaw enforcementfactor analysissecurity policyhuman resourcesenterprise datacomputer scienceDescription The Cyber Security Authority delivers cyber security activities, aligning global cyber security risk reduction with local market business and technology priorities ...
deliveryaaasecurity risksoftware as a servicecyber securitysolution designiso 27001 lead auditoraccess managementiso 27001google cloud platformdocumentationmusic makingweb servicesrisk reductionsiem
* KPMG is currently seeking a Manager in Cyber Security Services for our KPMG Consulting practice. Responsibilities:
About Northern Trust: Northern Trust provides innovative financial services and guidance to corporations, institutions and affluent families and individuals globally. With over 130 y...
product strategyaccess managementagile methodologyfinancial servicesidentity managementsoftware developmentinformation securityregulatory complianceapplication engineeringregulatory requirements* About Standard Chartered We are a leading international bank focused on helping people and companies prosper across Asia, Africa and the Middle East. To us, good performance is about much mor...
certified ethical hackerroot causesupport groupssecurity analysiscomputer securityincident managementsecurity monitoringchanging environmentsinformation technologyrisk24x7rootturngiacbrandvisitidealPosition:Sr. IoT/Cyber Security Specialist with automotive experience * Detailed Description of the Job Profile
Description The Cyber Security Manager delivers cyber security activities, aligning global cyber security risk reduction with local market business and technology priorities an...
iso 27001advertisinginformation securitysitegoogle cloud platformmusic makingweb servicesautocadaccess managementsecurity risksecurity controlsrisk reductioncyber securityisonetpenetration testingOur TDR team sits within the Group Operations function and is responsible for mission-critical areas including cyber, information, data, privacy and resilience. These are challenges that impact our cl...
equipment supplyquality assurancebusiness solutionpenetration testingcontinuous improvementcehtdrocspturngiacsitsprocess reengineeringRoles and Responsibilities
The Cyber Security and Data Protection resource deals with advanced, complex, and ever changing threats which could affect the Syniverse brand and/or business operations. Demonstrates a strong self-ma...
firewallsnetworkingtroubleshootingred hat linuxsecure network architecturetoken ringhp openviewframe relaycyber securityciscoRoles and Responsibilities
Our Purpose We work to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart and accessible. Using secure data and netwo...
data loss preventionsecurity operations centerequal employment opportunitynew hirescloud securitysecurity toolsloss preventiondigital economytechnical writingcorporate securitythought leadershipbehavioral trainingIndustry - Manufacturing Job Type - Permanent Job Description - The Director - Security Governance is responsible for the establishment, operationalization and continuous improvement of global Secur...
it governancerisk managementsecurity policyservice deliverychange managementdisaster recoveryInformation systemsinformation securitycritical infrastructureoperational improvementeisriskcismgiacReq ID:142921 We create smart innovations to meet the mobility challenges of today and tomorrow. We design and manufacture a complete range of transportation systems, from high-speed trains to elect...
cloud securitymusic makingsecurity analysissecurity toolsproject teamsactive directoryoffice 365management skillsend user supportuser supportdrive changeworkable solutionsiso 27002business processDescription Responsibilities Create signatures for the QualysGuard product to detect vulnerabilities in the areas of Databases, Applications, Operating systems, TCP/IP Protocols, and ...
open sourcetime keepingproblem solvingnetwork analysisoperating systemsintrusion detectionverbal communicationsystem administrationtroubleshooting skillsRoles and Responsibilities Immediately hiring Software engineers with following description: 3+ Years of experience in Software Engineering involving secure prod...
javasqljavascriptsql serverjquerymusic makingcyber securitysecurity auditweb applicationnetwork securitysecurity testingsoftware engineerspenetration testingbehavioral trainingsecurity compliancesoftware engineeringengineering projectscomReq ID:145649 We create smart innovations to meet the mobility challenges of today and tomorrow. We design and manufacture a complete range of transportation systems, from high-speed trains to elect...
salesitil processiso 27002marketingdrive changecustomer relationsproblem solvingdeliveryend user supportmanagementsecurity toolsuser supportdata analysisReq ID:132539 NTT DATA Services strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thi...
computer sciencenistit servicesproblem solvingriskthreat intelligencesocunixslide decksrootopen sourcevulnerability managementdata servicessiembusiness processaptroot causeitiluse casesFICO (NYSE: FICO) is a leading global analytics software company, helping businesses in 90+ countries make better decisions. Join our world-class team today and fulfill your career potential! ...
documentationcyber securitypayment cardssolution designsiemproduct designaaaequal employment opportunityuser storiesbig datadeliverysecurity riskAbout the job Who are we and What do we do InMobi Group s mission is to power intelligent, mobile-first experiences for enterprises and consumers. Its businesses a...
firewallsnetworkingtroubleshootingcrime prevention through environmental designfun at workweb application securityapplication security testingtesting toolsdesign reviewsecure codingcyber securityrisk managementciscoA Bachelors Degree is required, preferably with an educational background in Computer Science, Business Administration, or a related field. 8 to 10 years of professional experience in IBM Stack. 4 t...
javadeliverycustomer relationssalesenvironmentibm bpmcomputer sciencemicrosoft officemanaged servicessecurity analysiscommunication skillsbusiness administration* About Standard Chartered We are a leading international bank focused on helping people and companies prosper across Asia, Africa and the Middle East. To us, good performance is about much mor...
automationenvironmentdeliverynetapacheoperating system administrationdata centercyber securitysolution designequipment supplyproject managersbusiness solutioninformation securitysystem administrationDesired Profile: You will develop algorithms, ciphers and security system to encrypt sensitive information. You will analyse and decrypt any types of hidden information (eg. encrypted data, cipher tex...
reverse engineeringdiscreteprotocolscopyingalgebraanalysisalgorithmsoperations integrationsecurityresearchfinancial data
We create and optimize solutions for a rapidly growing mature Adtech business on a global scale. We work with distributed infrastructure, petabytes of data, and billions of transactions with no...
firewallnetworkingcustomer relationsidspenetration testingdata loss preventionbig datait auditopen sourceloss preventioncustomer servicenetwork securitysecurity systemsdomain controllerevent correlationsecurity controlscorporate security
Responsible for working in a 24 7 IT Security Operation Centre (SOC) environment, the SOC analysts are the first responders to cyber-incidents. They report cyber threats and then implement changes to ...
troubleshootingcompliancedeliveryengineeringnetworkingstandard operating proceduresit securitycyber securitymicrosoft azuretrend microTo get the best candidate experience, please consider applying for a maximum of 3 roles within 12 months to ensure you are not duplicating efforts. Job CategoryProducts and Tec...
change managementidentity managementwindowstroubleshootingsecurity compliancemanagement systemsaffirmative actioniso 27001slaequal employment opportunityitilagile developmentmusic makingAbout EY As a global leader in assurance, tax, transaction and advisory services, we re using the finance products, expertise and systems we ve developed to build a better working world. That starts ...
security operations centerit riskdata centerit securitycyber securityevent managementchange managementbusiness strategysecurity analysisleadership skillsadvisory servicesDesired Profile: You will develop algorithms, ciphers and security system to encrypt sensitive information. You will analyse and decrypt any types of hidden information (eg. encrypted data, cipher tex...
reverse engineeringdiscreteprotocolscopyingalgebraanalysisalgorithmsoperations integrationsecurityresearchfinancial dataAs our new Assistant Manager, Head of Detection and Response India you will be part of managing a growing team of personnel that protect and actively secure Ramboll s Global IT Network. You will be re...
salesbankingcyber securityit securityinformation security managementaccountsurban designbusiness unitsit security operationstatmisLooking for a Senior Information Security Engineer to join the VMware InfoSec Automation Team in Palo Alto, CA campus. InfoSec Automation Team builds solutions and strategies for detecting an...
firewallnetworkingcustomer relationsidspenetration testingeuropean works councilssubject matter expertiseequal employment opportunitycloud security
Dear candidates, Greetings, Profile:Java Application Security Work Location:Bangalore Experience:8 to 12 years Experience in Web Application Sec...
rubycloud foundryc++perlawspythonjenkinsjavascriptjava application securityDear candidates, Greetings, Profile:Threat Hunting Work Location:Bangalore Experience:6 to 9 Years Shift Timings:1:00 PM to 9:3...
linux system administrationdnsdatabase administrationnosqlwindowstestinghttprdbmsscriptingthreat huntingnetwork environmentsIn a constantly changing world, we work together with our people, clients and communities to enable them to fulfill their potential to do great things. We believe that by bringing everyone together, w...
information securitysiemnetworkingmicrosoft accesscustomer relationssecurity incident responseinformation security managementroot causeaudit trailrisk assessmentsecurity policythreat analysiscustom softwareInfoSec Security Consultant Information Security takes a proactive approach to protecting EY s brand through robust technical security controls, a clearly defined security strategy a...
grcsaptroubleshootingenvironmentcustomer relationsinformation security standardsenvironmental impact assessmentpci dsslife cycleproject teamsdata analyticslanguage skillscomputer scienceenglish languageEvery day, Global Payments makes it possible for millions of people to move money between buyers and sellers using our payments solutions for credit, debit, prepaid and merchant services. Our worldwid...
information securitycustomer relationsdata feedsweb application testingnetworkingmicrosoft accesssecurity riskremote accesssiemsecurity event managementaccess controlsecurity information event managementAbout EY As a global leader in assurance, tax, transaction and advisory services, we re using the finance products, expertise and systems we ve developed to build a better working world. That starts ...
security operations centerit riskdata centerit securitycyber securityevent managementchange managementbusiness strategysecurity analysisleadership skillsadvisory servicesFollowing defined workflow and processes for threat remediation and escalation/handoff where required. Utilizing a variety of cloud-based and on-premises security tools and techniques to pro...
security informationevent managementitem response theorydeep packet inspectionmanaged security servicessecurity operations centersecurity incident responseEY-Cyber Security-TDR Transition Senior As part of our EY-cyber security team, who shall work as Threat Response & Detection Transition Senior who will work in client onboarding phas...
perl scriptingmonthly reportsthreat intelligenceclient onboardingnetwork monitoringcarbon blacktechnology platformsfortune 500Lead Security Analyst Key Responsibilities: The Lead Security Analyst will be responsible for Ensuring applications, networks, systems and cloud services are monitored in accordance w...
application securitynetworkingactive directorysecurity operations centernetwork designload balancingsecurity analysisendpoint securitythreat managementsecurity controlsincident managementsecurity operationsReq ID:103074 We create smart innovations to meet the mobility challenges of today and tomorrow. We design and manufacture a complete range of transportation systems, from high-speed trains to elect...
itil processactive directoryasset trackingproblem solvingiso 27002security toolsend user supportanalytical skillsdrive changedata centerbusiness processuser supportsecurity metricsnetwork securityDesired Profile: You will develop algorithms, ciphers and security system to encrypt sensitive information. You will analyse and decrypt any types of hidden information (eg. encrypted data, cipher tex...
reverse engineeringdiscreteprotocolscopyingalgebraanalysisalgorithmsoperations integrationsecurityresearchfinancial dataDescription Responsibilities Create signatures for the QualysGuard product to detect vulnerabilities in the areas of Databases, Applications, Operating System, TCP/IP Protocols and ne...
open sourcetime keepingproblem solvingnetwork analysisintrusion detectionverbal communicationsystem administrationtroubleshooting skillsReq ID:101066 We create smart innovations to meet the mobility challenges of today and tomorrow. We design and manufacture a complete range of transportation systems, from high-speed trains to elect...
itil processend user supportcustomer relationsdata analysisproblem solvingcustomer servicereportingsecurity toolsiso 27002qualityuser supportsalesdrive change© 2020 Skillindia All Rights Reserved