3 Opening(s)
2.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Archer Solution Developer, No Technology Specialty
Job Requirements : Responsible for installation, configuration, customization of RSA-Archer GRC Platform Create High low level technical design ...
3 Opening(s)
2.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Archer Solution Developer, No Technology Specialty
Job Requirements : Responsible for installation, configuration, customization of RSA-Archer GRC Platform Integration of RSA-Archer with 3rd party tools/applications/platforms Responsible for ...
3 Opening(s)
2.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Cloud Security Architecture, No Technology Specialty
Job Requirements : At least 7-9 years experience in supporting Cloud Security solution management and Operations Support Strong Experience in deploying and ...
3 Opening(s)
2.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Splunk SIEM
Good to Have Skills : Security Information & Event Management (SIEM) Platform Operations
Description Position Scope: Senior Security analyst will ensure the daily operations of monitoring and ...
3 Opening(s)
2.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Security Information and Event Management,No Technology Specialty
Job Requirements : 6 years of deployment, integration and administration experience on RSA Envision/ Analytics or similar solutions Must ...
3 Opening(s)
2.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals. ...
1 Opening(s)
10.0 Year(s) To 12.0 Year(s)
12.00 LPA TO 15.00 LPA
Client Info:
We are renowned gaming solutions provider in India. Our approach is customer centric i.e. we aim at providing top-notch gaming solutions to our customers. We are exclusively B2B site. Our software is 100% self developed and proprietary with RNG license for developer as well as ability to give each operator ...
1 Opening(s)
2.0 Year(s) To 4.0 Year(s)
3.00 LPA TO 4.00 LPA
Architect
Requirements: -
Qualification: Bachelor’s or Master’s degree in Architecture. - Experience: 2-4 years of relevant - Knowledge: Proficient in AutoCAD, Revit, SketchUp, and Adobe Creative Suite Strong knowledge of building codes, materials, and construction methods. Excellent communication, presentation, and project management skills. Creative problemsolving abilities and strong attention to detail. - ...
1 Opening(s)
14.0 Year(s) To 25.0 Year(s)
30.00 LPA TO 65.00 LPA
KEY RESPONSIBILITIES
Responsible for leading the design, implementation, and maintenance of comprehensive security measures across all stages of medical device development, ensuring compliance with relevant regulations and standards while protecting patient data and device integrity
Lead the design and implementation of secure architectures for new medical devices, considering connectivity, data protection, access ...
1 Opening(s)
10.0 Year(s) To 15.0 Year(s)
29.00 LPA TO 30.00 LPA
Roles and Responsibilities: Need to have 10+ years of experience. Hands-on experience in building Angular/Java web applications, preferably using Spring andQuarkus framework. Experience in design and implementation of microservices Using identity providers and OAUTH, SAML and other protocols as the security standard forimplementing web application and microservices. Understanding of backend ...