2 Opening(s)
5.0 Year(s) To 10.0 Year(s)
10.00 LPA TO 15.00 LPA
Position – Sr. Cloud Engineer M365 - MS Defender for Endpoint (Level 3)
Eligibility Criteria:
Minimum of 5+ years of experience in IT security, with at least 2+ years focused on Microsoft Defender for Endpoint.
Should be Graduate or Above
Should have extensive working knowledge of Microsoft Office365 cloud.
Principal Responsibilities:
Responsible for providing high ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
Key Responsibilities:
Cloud Infrastructure & Operations:
Design, deploy, and manage Azure cloud infrastructure including compute, storage, networking, and security services
Monitor and optimize Azure resources for performance, cost, and reliability
Manage Azure subscriptions, resource groups, policies, and governance frameworks
Perform capacity planning and resource optimization across Azure environments
Cloud Platform Management (Azure & AWS):
Networking: VNets, ExpressRoute, ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
2.40 LPA TO 2.64 LPA
Must be alertness and Vigilance for their surrounding activities, Effective and strong communication, physically fit, Height should be min. 5.10’’, age between 27 to 40.
A security guard job description includes protecting people and property by monitoring premises, controlling access, responding to emergencies, and reporting suspicious activities. Key duties involve patrolling, operating ...
1 Opening(s)
4.0 Year(s) To 5.0 Year(s)
3.60 LPA TO 4.80 LPA
Mission: To lead and execute robust security strategies, ensuring the protection of assets, peopleand inventory and fostering a safe work environment through effective leadership and management of security operations. Outcomes: Develop and implement robust security strategies and policies, aligned with corporate objectives, to protect assets, employees, inventories and facilities, fostering ...
10 Opening(s)
10.0 Year(s) To 12.0 Year(s)
15.00 LPA TO 24.00 LPA
Discuss with Business & IT on new process / system / activity before Onboarding/ Go-Live Conduct risk assessments to identify information security risks Propose controls to business / IT and / or work with business to plan riskmitigation Prepare Risk Assessment & Recommended Control Report Follow-ups for mitigation of ...
1 Opening(s)
0 To 1.0 Year(s)
2.40 LPA TO 3.00 LPA
Provides and/or implements security and security protocols for all assigned facilities and information systems.
Takes proactive steps to provide a safe and secure working environment to staff and visitors.
Provides specialized security for and monitors access to limited and restricted access areas such as inventory areas, network equipment areas, and employee files ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
3.00 LPA TO 4.00 LPA
Provides and/or implements security and security protocols for all assigned facilities and information systems.
Takes proactive steps to provide a safe and secure working environment to staff and visitors.
Provides specialized security for and monitors access to limited and restricted access areas such as inventory areas, network equipment areas, and employee files ...
1 Opening(s)
2.0 Year(s) To 3.0 Year(s)
1.44 LPA TO 1.70 LPA
Provides and/or implements security and security protocols for all assigned facilities and information systems.
Takes proactive steps to provide a safe and secure working environment to staff and visitors.
Provides specialized security for and monitors access to limited and restricted access areas such as inventory areas, network equipment areas, and employee files ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
3.00 LPA TO 4.00 LPA
Provides and/or implements security and security protocols for all assigned facilities and information systems.
Takes proactive steps to provide a safe and secure working environment to staff and visitors.
Provides specialized security for and monitors access to limited and restricted access areas such as inventory areas, network equipment areas, and employee files ...
1 Opening(s)
2.0 Year(s) To 3.0 Year(s)
1.44 LPA TO 1.70 LPA
Provides and/or implements security and security protocols for all assigned facilities and information systems.
Takes proactive steps to provide a safe and secure working environment to staff and visitors.
Provides specialized security for and monitors access to limited and restricted access areas such as inventory areas, network equipment areas, and employee files ...