1 Opening(s)
5.0 Year(s) To 7.0 Year(s)
3.60 LPA TO 4.20 LPA
A Deputy Manager, IT Systems & Networks is responsible for managing and maintaining an organization's network infrastructure, including servers, routers, switches, and firewalls. Key duties include configuring network devices, performing system upgrades and maintenance, monitoring performance, ensuring security, and providing Level 2/3 technical support. The role also involves strategic planning, capacity ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
4.40 LPA TO 4.50 LPA
Key Factors for Selecting, Scrutinizing and Shortlisting (For Assistant Security Officer)(01) Retrd. Naik/Sepoy/Constable 10+2/Graduation/Civilian with Experience.(02) Age Limit is 35-42 Years and Medical Category Shape-1, Height:-170 Cm, Weight:-65 Kg, Chest:-80 Cm(03) Willing to relocate and willing to stay inside the plant as a force bachlor.(05) CTC-4.4 to 4.5 Lacs + ...
1 Opening(s)
18.0 Year(s) To 22.0 Year(s)
16.00 LPA TO 18.00 LPA
Key Factors for Selecting, Scrutinizing and Shortlisting (For AGM/Sr. Manager)(01) Dy. Commandant/Asst. Commandant/Major/Captains. The candidates holding any one of these ranks are eligible for the position of AGM/Sr. Manager.(02) Maximum Upper age limit is 40-45 years and Medical Category Shape-1.(03) Willing to relocate and willing to stay inside the plant ...
1 Opening(s)
18.0 Year(s) To 22.0 Year(s)
16.00 LPA TO 18.00 LPA
Key Factors for Selecting, Scrutinizing and Shortlisting (For AGM/Sr. Manager)(01) Dy. Commandant/Asst. Commandant/Major/Captains. The candidates holding any one of these ranks are eligible for the position of AGM/Sr. Manager.(02) Maximum Upper age limit is 40-45 years and Medical Category Shape-1.(03) Willing to relocate and willing to stay inside the plant ...
2 Opening(s)
10.0 Year(s) To 11.0 Year(s)
Not Disclosed by Recruiter
Compliance: CERT-In, UIDAI eKYC safeguards, DPDP controls. IAM & AppSec: Keycloak hardening, OAuth2/OIDC, SAST/SCA/DAST in Jenkins/SonarQube. Cloud security: AWS IAM, KMS, WAF, GuardDuty, CloudTrail. IR & monitoring: SIEM (Graylog/Dynatrace), playbooks, tabletop exercises Data protection: Encryption at rest/in transit (TLS/PKI), secrets mgmt, anonymization.
10+ years in cybersecurity/IT risk; 4+ years leading org-wide ...
2 Opening(s)
2.0 Year(s) To 10.0 Year(s)
2.00 LPA TO 3.00 LPA
Job Description :1. Co-ordination with weighbridge staff/audit staff/accounts staff so that work can bedone smoothly.2. If any mistake done by user in data entry that should be mailed to it/vnvcs team andto be solved immediately.3. Reporting to senior staff & management on daily basis regarding work relatedissue/work completion so that ...
4 Opening(s)
1.0 Year(s) To 5.0 Year(s)
1.80 LPA TO 2.40 LPA
System Monitoring:
Oversee and monitor surveillance systems and equipment to detect potential threats.
Activity Analysis:
Review footage and data for suspicious behavior, security breaches, or violations of rules.
Incident Reporting:
Promptly report any detected threats, incidents, or unusual activities to security personnel and management.
Record Keeping:
Maintain detailed and accurate logs and records of security activities, incidents, ...
1 Opening(s)
7.0 Year(s) To 12.0 Year(s)
7.00 LPA TO 8.50 LPA
Morning Meeting & Planning
Conduct a morning briefing with Floor Manager, Sales Manager, and staff.
Review yesterday’s sales performance, today’s targets, pending deliveries, and customer appointments.
Assign daily responsibilities to Floor Manager (floor discipline & customer allocation) and Sales Manager (sales target distribution & monitoring).
Share updates from management, HR, or compliance requirements.
Store Operations
Ensure ...
1 Opening(s)
0.6 Year(s) To 2.0 Year(s)
1.80 LPA TO 3.00 LPA
Job Profile: The IT Executive will oversee the company's IT infrastructure, systems, and security, ensuring optimal performance to support food production, distribution, and sales operations. This role includes maintaining data security and compliance with industry regulations while managing backend tasks related to data validation and reporting.
Key Responsibilities:
Maintain IT infrastructure, including hardware, ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
Not Disclosed by Recruiter
• Design, develop, and maintain secure web applications using Rust, WebAssembly, HTML, CSS, and JavaScript with a focus on performance and security.
• Integrate Rust and WebAssembly into browser-based tools for real-time cybercrime analysis and visualization.
• Implement robust authentication, encryption, and data protection features into web solutions.
• Collaborate with cybersecurity researchers ...