1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
4.40 LPA TO 4.50 LPA
Key Factors for Selecting, Scrutinizing and Shortlisting (For Assistant Security Officer)(01) Retrd. Naik/Sepoy/Constable 10+2/Graduation/Civilian with Experience.(02) Age Limit is 35-42 Years and Medical Category Shape-1, Height:-170 Cm, Weight:-65 Kg, Chest:-80 Cm(03) Willing to relocate and willing to stay inside the plant as a force bachlor.(05) CTC-4.4 to 4.5 Lacs + ...
1 Opening(s)
18.0 Year(s) To 22.0 Year(s)
16.00 LPA TO 18.00 LPA
Key Factors for Selecting, Scrutinizing and Shortlisting (For AGM/Sr. Manager)(01) Dy. Commandant/Asst. Commandant/Major/Captains. The candidates holding any one of these ranks are eligible for the position of AGM/Sr. Manager.(02) Maximum Upper age limit is 40-45 years and Medical Category Shape-1.(03) Willing to relocate and willing to stay inside the plant ...
1 Opening(s)
18.0 Year(s) To 22.0 Year(s)
16.00 LPA TO 18.00 LPA
Key Factors for Selecting, Scrutinizing and Shortlisting (For AGM/Sr. Manager)(01) Dy. Commandant/Asst. Commandant/Major/Captains. The candidates holding any one of these ranks are eligible for the position of AGM/Sr. Manager.(02) Maximum Upper age limit is 40-45 years and Medical Category Shape-1.(03) Willing to relocate and willing to stay inside the plant ...
1 Opening(s)
1.0 Year(s) To 2.0 Year(s)
1.80 LPA TO 2.16 LPA
A computer operator job description involves monitoring, maintaining, and troubleshooting computer systems and hardware to ensure efficient data processing and minimal downtime. Key duties include operating and maintaining equipment like CPUs and printers, installing software and updates, performing data backups, managing data storage, and following security protocols. They also provide user support, handle ...
2 Opening(s)
10.0 Year(s) To 11.0 Year(s)
Not Disclosed by Recruiter
Compliance: CERT-In, UIDAI eKYC safeguards, DPDP controls. IAM & AppSec: Keycloak hardening, OAuth2/OIDC, SAST/SCA/DAST in Jenkins/SonarQube. Cloud security: AWS IAM, KMS, WAF, GuardDuty, CloudTrail. IR & monitoring: SIEM (Graylog/Dynatrace), playbooks, tabletop exercises Data protection: Encryption at rest/in transit (TLS/PKI), secrets mgmt, anonymization.
10+ years in cybersecurity/IT risk; 4+ years leading org-wide ...
1 Opening(s)
6.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
What You’ll Do
Design Intelligent Architectures: Lead the design of secure, scalable cloud-native and hybrid architectures optimised for AI innovation.
Develop & Accelerate: Build GenAI components, multi-modal agents, fine-tune LLMs, and work on reusable modules using tools like LangGraph and LangChain, automate workflows using platforms like n8n.
Cloud Leadership: Architect and implement solutions ...
4 Opening(s)
1.0 Year(s) To 5.0 Year(s)
1.80 LPA TO 2.40 LPA
System Monitoring:
Oversee and monitor surveillance systems and equipment to detect potential threats.
Activity Analysis:
Review footage and data for suspicious behavior, security breaches, or violations of rules.
Incident Reporting:
Promptly report any detected threats, incidents, or unusual activities to security personnel and management.
Record Keeping:
Maintain detailed and accurate logs and records of security activities, incidents, ...
1 Opening(s)
7.0 Year(s) To 12.0 Year(s)
7.00 LPA TO 8.50 LPA
Morning Meeting & Planning
Conduct a morning briefing with Floor Manager, Sales Manager, and staff.
Review yesterday’s sales performance, today’s targets, pending deliveries, and customer appointments.
Assign daily responsibilities to Floor Manager (floor discipline & customer allocation) and Sales Manager (sales target distribution & monitoring).
Share updates from management, HR, or compliance requirements.
Store Operations
Ensure ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
Not Disclosed by Recruiter
• Design, develop, and maintain secure web applications using Rust, WebAssembly, HTML, CSS, and JavaScript with a focus on performance and security.
• Integrate Rust and WebAssembly into browser-based tools for real-time cybercrime analysis and visualization.
• Implement robust authentication, encryption, and data protection features into web solutions.
• Collaborate with cybersecurity researchers ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
14.00 LPA TO 16.00 LPA
We are seeking a passionate, customer problem-solving focused Business DevelopmentManager in the domain of cloud, cyber security, and digital services. You’ll work alongsideindustry specialists and technology experts to help customers maximize AWS andaccelerate their transformation journeys across cloud, cybersecurity, digital, and generativeAI domains.Location:Mumbai & BangaloreExperience:6–8 yearsKey Responsibilities
Drive sales for AWS ...