1 Opening(s)
2.0 Year(s) To 3.0 Year(s)
2.00 LPA TO 3.00 LPA
A Security Officer's primary responsibility is to ensure the safety and security of a designated area and its occupants. This involves deterring criminal activity, monitoring surveillance systems, patrolling premises, controlling access, and responding to emergencies. They are the first line of defense against theft, vandalism, and other security breaches.
Key Responsibilities:
Deterring Criminal Activity:
Preventing theft, ...
1 Opening(s)
5.0 Year(s) To 6.0 Year(s)
2.16 LPA TO 2.52 LPA
A security supervisor is responsible for managing and overseeing the security personnel and operations within a specific area or organization. This includes tasks like assigning duties, training staff, monitoring security systems, handling emergencies, and ensuring compliance with security policies.
Here's a more detailed breakdown of the responsibilities:
1. Managing Security Teams:
Assigning duties and patrol ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Description:We are seeking an experienced Kernel Developer to join our low-level systems and platform securityteam. This role involves developing and enhancing kernel modules for Windows and/or Linuxsystems and troubleshooting kernel-level issues. You will be part of a team focused on systemperformance, custom kernel components, and defensive/offensive kernel engineering.Responsibilities:• Develop and ...
8 Opening(s)
4.0 Year(s) To 15.0 Year(s)
25.00 LPA TO 30.00 LPA
Experience:4-15 Yrs
Location: Bangalore
Strong Azure Platform Knowledge On Data & AI Service Portfolio.
Knowledge and Skills to know how services work and what level of permissions are required. How to Design Access Patterns for Services, Users, Managed Identities to integrate service in a Complex Architecture, Optimize the Access model, without redundant permissions.
Knowledge ...
1 Opening(s)
5.0 Year(s) To 6.0 Year(s)
1.64 LPA TO 1.92 LPA
A security guard's primary role is to protect people and property by deterring crime, responding to incidents, and maintaining a safe environment. This involves monitoring premises, enforcing rules, and potentially using force when necessary. They are often the first point of contact for security-related issues and are responsible for maintaining order and reporting ...
1 Opening(s)
5.0 Year(s) To 18.0 Year(s)
20.00 LPA TO 40.00 LPA
Key Responsibilities:
Develop and maintain a comprehensive data privacy program framework including data Privacy Policies, Procedure, Templates & Process documents
Ensure that the practices in the Bank are in compliance with DPDP Act, GDPR and other applicable regulations.
Play a consulting role for Business Team on all privacy related queries and to provide ...
10 Opening(s)
7.0 Year(s) To 12.0 Year(s)
10.00 LPA TO 18.00 LPA
AppSec (Application Security) Key Terms:
Secure Coding: Writing software with security best practices to prevent vulnerabilities.
Vulnerability: Weaknesses in an application that could be exploited.
SAST (Static Application Security Testing): Code analysis to find vulnerabilities without executing the program.
DAST (Dynamic Application Security Testing): Security testing of running applications to find vulnerabilities.
Penetration Testing: Simulated ...
2 Opening(s)
5.0 Year(s) To 9.0 Year(s)
Not Disclosed by Recruiter
§ Following Broadcom/CA tools -> Siteminder, MultiFactor Authentication (MFA) or Advance Authentication , Directory, Identity manager, Access Gateway, API Gateway.
§ Other tools -> LexiNexis ‘s ThreatMetrix (TMX)
§ Microsoft -> Active Directory, PKI , Azure AD
§ Good to have AWS knowledge.
Expertise in identity and access management (IAM).
• Excellent exposure in working ...
1 Opening(s)
8.0 Year(s) To 13.0 Year(s)
Not Disclosed by Recruiter
Responsibilities Lead the design and implementation of SSH key management technologies and standards tosupport complex enterprise solutions. Create detailed documentation, and provide input on technology standards, and informationsecurity and risk practices. Develop internal and external checks and controls to ensure proper governance, security andquality of information assets. Communicate effectively with ...
1 Opening(s)
5.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Responsibilities Assist in the design and implementation of SSH key management technologies and standards tosupport complex enterprise solutions. Create detailed documentation, and provide input on technology standards, and informationsecurity and risk practices. Develop internal and external checks and controls to ensure proper governance, security andquality of information assets. Communicate effectively ...