1 Opening(s)
8.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
We are seeking a seasoned Information Security professional who has expertise in GRC with over 8+ years of progressive experience across data security, access management, IT security, network security, IT risk management, and compliance with standards such as ISO 27001, HIPAA, GDPR, NIST. This individual will lead GRC efforts, ensuring ...
1 Opening(s)
8.0 Year(s) To 13.0 Year(s)
13.00 LPA TO 15.00 LPA
-----JOB DESCRIPTION---
Act as the main point of contact for the design and deployment of the IT Security GRCframework and work with Very Senior IT leadership (CTO, IT Head)* Partner with all team members in the IT head's function to build/govern/sustain /improve anintegrated end-to-end security GRC framework to provide a "one-stop ...
1 Opening(s)
7.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
We are having an urgent opening for the position of Manager/Dy Manager–Cyber Security & IT Compliance for a reputed company in the Kolkata location.
Education : BE/B.Tech/MCA or Master Degree inrelated fieldRelevant Cyber security certificationsReporting structure :Reports to Head of the departmentBackground & Experience:
7-10 years of work experience in implementation and managing Cyber Security in ...
3 Opening(s)
8.0 Year(s) To 13.0 Year(s)
25.00 LPA TO 30.00 LPA
Role : Application Developer Role Description : Design, build and configure applications to meet business process and application requirements. ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
6.00 LPA TO 8.00 LPA
As a Threat Analyst you will play a pivotal role in safeguarding our organization against cyber threats. Collaborating with enterprise systems, log analysis platforms, and endpoint collection systems, you will lead investigations, identify potential threats, and execute strategies to neutralize them effectively.
This position will require the candidate to be aligned ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
Not Disclosed by Recruiter
Job Description:
We are seeking a skilled and motivated Information Security Analyst 1 with 3 to 4 years of experience to join our team. The ideal candidate will have hands-on experience with Active Directory (AD) and Privileged Access Management (PAM) systems. This role involves ensuring the security and integrity of our ...
1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
ob Title: SOC (Security Analyst)
Job Overview:
We are seeking a highly skilled SOC Expert to join our dynamic cybersecurity team. The ideal candidate will play a crucial role in monitoring, detecting, analysing, and responding to security incidents. Candidate requires a deep understanding of security operations and a proactive approach to threat management ...
3 Opening(s)
4.0 Year(s) To 20.0 Year(s)
10.00 LPA TO 20.00 LPA
Key Responsibilities:
· Implement and manage security measures for the protection of systems, networks, and data.
· Collaborate closely with development teams to integrate security into the SDLC.
· Conduct vulnerability assessments and implement remediation plans.
· Monitor security infrastructure for vulnerabilities and intrusions.
· Lead incident response activities and ensure timely resolution of security incidents.
· Evaluate and recommend new security ...
1 Opening(s)
4.0 Year(s) To 7.0 Year(s)
Not Disclosed by Recruiter
Key Responsibilities:Technical Support: Provide expert technical support for Windows, Linux, and Mac operating systems,including troubleshooting and resolving issues. Identify and address operational issues in client computer systems, providingguidance and solutions. Respond promptly to support requests via email, phone calls, and othercommunication channels. Leverage hardware and software knowledge to diagnose and ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
3.00 LPA TO 4.00 LPA
Detect, analyze and defend against network penetration: execute intrusion detectionprevention system. Install firewalls: applications gateways and access control list based packet filters. Configure and handle routers and virtual private Networks. Propose, plan, experiment and implement robust authentication mechanisms both network andhost based. Gather, interpret, and analyze ...