1 Opening(s)
7.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
We are having an urgent opening for the position of Manager/Dy Manager–Cyber Security & IT Compliance for a reputed company in the Kolkata location.
Education : BE/B.Tech/MCA or Master Degree inrelated fieldRelevant Cyber security certificationsReporting structure :Reports to Head of the departmentBackground & Experience:
7-10 years of work experience in implementation and managing Cyber Security in ...
1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
The Developer II – Middleware will be responsible for collaborating proactively with Applications analysts to translate business and integration requirements into configurable component designs and solutions. The ideal candidate will reflect a mix of strong technical proficiency, application maintenance ownership, and the ability to work effectively with other business and ...
5 Opening(s)
3.5 Year(s) To 13.0 Year(s)
7.00 LPA TO 26.00 LPA
Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. ...
2 Opening(s)
4.0 Year(s) To 8.0 Year(s)
8.00 LPA TO 12.00 LPA
Education Qualification:
BscIT, BE, Minimum 5years experience working as an Active Directory Administrator, Certification in IT Field is preferred, Prior experience in servers and OS Analysis will be given preference.
Strong in AD architecture creation and problem-solving skills
Sr. Active Directory Administrator
Sr. Active Directory Administrator provides support, implementation, and design services for ...
1 Opening(s)
0 To 1.0 Year(s)
1.00 LPA TO 2.00 LPA
Must have good experience in developing api using Mulesoft Must have good
knowledge on developing microservices using NET core Good to have experience
in developing MuleSoft Services / proxy Good to have experience in developing ap
i specification using RAML Good experience in developing C and ASPNet MVC based
application Good Analytical skill to ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
Not Disclosed by Recruiter
Imagine you working as a Consultant or Snr Consultant and making a big difference by playing an important role in delivering business value to our customers.
We want to shape the future with vision and innovation. Be part of it and develop your full potential!
We are a leading Gold partner for the SAP SuccessFactors ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
6.00 LPA TO 16.00 LPA
Any Other Requirement: Comfortable to work in 24*7 rotational shift
Job Title (OCP Engineer):
Department: ITReports to: Unix Team
Experience: Minimum 5 years of experience in RedHat OpenShift Container Platform (OCP.
Experience in developing, deploying and administering RH OCP solution for enterprise-level applications.Required Qualification: Diploma/ BE/ BSC (IT) or equivalent.Preferred Qualification: In-depth knowledge of RedHat RH OCP.
Skill, Knowledge & Trainings:
Certification ...
5 Opening(s)
2.5 Year(s) To 5.4 Year(s)
5.00 LPA TO 11.00 LPA
Project Role : Application Designer
Project Role Description : Assist in defining requirements and designing applications to meet business process and application requirements.
Must have Skills : SAP PO/PI & APIs Development
Good to Have Skills : SAP ABAP Proxy Framework,SAP ABAP Development for HANA, Job Requirements : Key Responsibilities : -Creation ...
4 Opening(s)
2.0 Year(s) To 10.0 Year(s)
3.00 LPA TO 6.00 LPA
Designing and implementing new network solutions and/or improving the efficiency of current networks
Installing, configuring and supporting network equipment including routers, proxy servers, switches, WAN accelerators, DNS and DHCP
Procuring network equipment and managing subcontractors involved with network installation
Configuring firewalls, routing and switching to maximise network efficiency and security
Maximising network performance through ...