1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
16.00 LPA TO 25.00 LPA
Job Summary:
Under the direction of the IT Portfolio and Security Manager, the SAP Security Administrator will be responsible for implementing and maintaining SAP security policies and segregation of duties across multiple SAP instances. This position will help the SAP security team with project duties such as role and catalog design ...
1 Opening(s)
1.0 Year(s) To 3.0 Year(s)
6.00 LPA TO 12.00 LPA
About the position
We are looking for people who are passionate about cyber security and have a knack for breaking the IT-systems and making a difference in the world.
An ideal candidate will be passionate about cyber security, have his/her basics clear, and will have the fire to learn.
The selected candidate will ...
3 Opening(s)
8.0 Year(s) To 13.0 Year(s)
25.00 LPA TO 30.00 LPA
Role : Application Lead Role Description : Lead the effort to design, build and configure applications, acting as the primary point of contact. ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : Security Architect Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Archer Solution Developer
Good to Have Skills : No Technology Specialty
Job Requirements :
1 Overall 2-3 years of consulting experience in the areas of Information Security, Risk Management, Governance, ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Archer Solution Developer
Good to Have Skills : No Technology Specialty
Job Requirements :
1 Overall 2-3 years of consulting experience in the areas of Information Security, Risk Management, Governance, ...
1 Opening(s)
1.0 Year(s) To 3.0 Year(s)
5.00 LPA TO 6.00 LPA
Training and Employee involvement:
Conduct safety Induction program for all new entrants and continuous training programs for all employees working in the plant.
Conduct Mock drills on Emergency situations
Attend safety meetings in the plant and closing safety points of such meetings.
Conduct Safety round and sharing observation report on daily basis.
Conduct and ensure ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
2.16 LPA TO 3.00 LPA
An IT Executive manages an organization's technology infrastructure (hardware, software, networks, security), provides technical support, oversees IT staff/projects, aligns tech with business goals, manages budgets, and ensures system security, often bridging daily operations with strategic IT planning to drive efficiency and innovation. Key duties include managing infrastructure, resolving issues, implementing policies, ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
12.00 LPA TO 15.00 LPA
Compliance, Governance & Risk (CFO-style Operator)
Background: A sturdy ex-Big 4, ex-consulting, or ex-CFO type. 3+ years. Someone who knows ICAI regulations, fund structures, FEMA, RBI rules, SEBI rules, and can translate regulatory Sanskrit into English.
Experience:
Experience in large corporates, family offices, or consulting
Deep knowledge of compliance frameworks, tax structuring, and risk ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Location – Mumbai/Delhi NCR
Job Description: Senior Executive/ Assistant Manager- Information Security
Grant Thornton India is seeking a dynamic and detail-oriented Executive to join our Information Security team. This role is pivotal in developing, implementing, and monitoring security policies, ensuring compliance, and managing risk across the firm. The ideal candidate will have ...
5 Opening(s)
2.0 Year(s) To 5.0 Year(s)
3.00 LPA TO 8.00 LPA
Security Monitoring & Alert Triage:
Continuously monitor security alerts generated by various security tools (SIEM, EDR, IDS/IPS, firewalls, etc.) for suspicious activities, anomalies, and potential security breaches.
Perform initial triage and analysis of security events, correlating data from multiple sources to determine the severity and legitimacy of alerts.
Prioritize alerts based on risk ...