1810 Job openings found

1 Opening(s)
4.0 Year(s) To 12.0 Year(s)
10.00 LPA TO 23.00 LPA
● Independently run the Key Risk Indicator program for IT & Cyber Security● Review the bank’s Risk Assessment & Risk Treatment plan/register and update same withrelevant risks● Periodically test the design strength of the controls and track changing risk patterns acrossmultiple IT & Cyber areas of the bank● Conduct thematic ...
1 Opening(s)
10.0 Year(s) To 13.0 Year(s)
Not Disclosed by Recruiter
BASIC PURPOSE: Cloud Engineer who will be responsible for the plan, design, as well as deployment automation of platform solutions on AWS. Instrumental in profiling and improving front-end and back-end application performance, mentor team members and take end to end technical ownership of applications. Must be able to stay on top ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
3.60 LPA TO 6.00 LPA
Description:   Urgent Requirement for Gunman PSO in Ex Army Experince indian force/ Primary responsibility of a PSO is to protect the principal against possible threats. A PSO is required to operate within the confines of the assigned tasks and are required to operate alone or as part of a team both in ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
Responsibilities: Assist in the design and implementation of BeyondTrust Privilege Remote Access. Work with stakeholders to identify requirements and convert those requirements intoBeyondTrust Privilege Remote Access configurations. Create detailed documentation, and provide input on technology standards, and informationsecurity and risk practices. Develop internal and external checks and controls to ensure ...
1 Opening(s)
8.0 Year(s) To 13.0 Year(s)
Not Disclosed by Recruiter
Responsibilities Lead the design and implementation of SSH key management technologies and standards tosupport complex enterprise solutions. Create detailed documentation, and provide input on technology standards, and informationsecurity and risk practices. Develop internal and external checks and controls to ensure proper governance, security andquality of information assets. Communicate effectively with ...
1 Opening(s)
5.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Responsibilities Assist in the design and implementation of SSH key management technologies and standards tosupport complex enterprise solutions. Create detailed documentation, and provide input on technology standards, and informationsecurity and risk practices. Develop internal and external checks and controls to ensure proper governance, security andquality of information assets. Communicate effectively ...
1 Opening(s)
4.0 Year(s) To 9.0 Year(s)
12.00 LPA TO 20.00 LPA
Job Description   Job Summary We are seeking an experienced IT SecOps Engineer with 5+ years of experience to join our dynamic team. The ideal candidate will have strong hands-on experience with the latest security operations and IT infrastructure technologies. This role involves managing and enhancing our security posture, ensuring compliance with relevant ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
Job Description We are seeking a highly skilled Microsoft 365 Migration Expert to join our dynamic IT team. The ideal candidate will possess extensive knowledge and hands-on experience in Tenant-to-Tenant migrations, tool-based migrations, Active Directory migrations, Entra ID, Microsoft Intune, Microsoft Exchange, and SharePoint migrations. This role is critical in ensuring ...
1 Opening(s)
6.0 Year(s) To 9.0 Year(s)
Not Disclosed by Recruiter
Location:- Gurgaon     Total-6-9 yrs , Minimum 5 Years of experience in IAM, out of which 2-3 years in Saviynt Hands on IGA Systems and implementation Saviynt would be preferable over Sailpoint Seen the complete HRIT life cycle Identity Lifecycle Management, Access Controls (Provisioning/Deprovisioning) for applications, Certified Access Identity Governance and Administration (IGA) the tool is Saviynt, ...
1 Opening(s)
7.0 Year(s) To 15.0 Year(s)
15.00 LPA TO 26.00 LPA
Minimum 7 years of experience in conducting hypothesis based threat hunting using SIEM logs (preferably Splunk) Good knowledge of recent cyber trends/attacks, MITRE framework Good understanding of network, end point based attacks Must have experience in developing hypothesis using DNS, Proxy, EDR logs Must have experience in drafting hunting reports and communicating to senior ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile