1 Opening(s)
1.0 Year(s) To 5.0 Year(s)
3.00 LPA TO 3.60 LPA
ob Description Overview
An IT Officer is a professional who works closely with teams of technical experts to implement and manage computer systems, hardware, software, and networks in an organization. This job requires a solid understanding of networking, web development, and database management.
An IT Officer's job description also includes ensuring that ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
3.00 LPA TO 3.60 LPA
Job Description Overview
An IT Officer is a professional who works closely with teams of technical experts to implement and manage computer systems, hardware, software, and networks in an organization. This job requires a solid understanding of networking, web development, and database management.
An IT Officer's job description also includes ensuring that ...
1 Opening(s)
2.0 Year(s) To 4.0 Year(s)
Not Disclosed by Recruiter
About the role:The key role responsibilities are as follows:• Takes end to end Ownership of ‘Application Support for Production Systems’ Issuesresolution, system deployments, monitoring and associated compliance/certificationtesting, in consonance to mandated process/specifications requirements.• Responsible for providing the first-line of after-deployment technical support forapplications and and/or associated production systems diagnostics, and ...
1 Opening(s)
1.0 Year(s) To 3.0 Year(s)
1.44 LPA TO 2.40 LPA
installing and configuring computer hardware, software, systems, networks, printers, and scanners. Monitoring and maintaining computer systems and networks. Responding in a timely manner to service issues and requests. Providing technical support across the company.
As a CCTV Operator, you will watch closed-circuit television screens in a control centre. You will use a ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
4.00 LPA TO 5.00 LPA
Position: Sr. Executive - IT Security
Location: Piplod - Surat
Experience: 3 - 5 Years
Industries: Chemical
Responsibilities:
Engineering, implementing, and monitoring security measures for the protection of computer systems, networks, and information.
Identifying and defining system security requirements.
Designing computer security architecture and developing detailed cyber security designs.
Vendor Management.
Prepare ...
10 Opening(s)
7.0 Year(s) To 12.0 Year(s)
10.00 LPA TO 18.00 LPA
AppSec (Application Security) Key Terms:
Secure Coding: Writing software with security best practices to prevent vulnerabilities.
Vulnerability: Weaknesses in an application that could be exploited.
SAST (Static Application Security Testing): Code analysis to find vulnerabilities without executing the program.
DAST (Dynamic Application Security Testing): Security testing of running applications to find vulnerabilities.
Penetration Testing: Simulated ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
6.00 LPA TO 8.00 LPA
As a Threat Analyst you will play a pivotal role in safeguarding our organization against cyber threats. Collaborating with enterprise systems, log analysis platforms, and endpoint collection systems, you will lead investigations, identify potential threats, and execute strategies to neutralize them effectively.
This position will require the candidate to be aligned ...
1 Opening(s)
8.0 Year(s) To 12.0 Year(s)
10.00 LPA TO 13.00 LPA
For a role that encompasses IT GRC (Governance, Risk, and Compliance) along with IT Security Auditresponsibilities, especially in the context of NIST, ISO 27001, SOC2, ITGC audit, RBI (Reserve Bank of India)regulatory compliance, IT Security Compliance, Business Continuity Management (BCM), Disaster Recovery(DR), and Vulnerability Assessment (VA), the roles and responsibilities ...
1 Opening(s)
1.0 Year(s) To 3.0 Year(s)
1.00 LPA TO 3.00 LPA
Address user tickets regarding hardware, software and networking
Walk customers through installing applications and computer peripherals
Ask targeted questions to diagnose problems
Guide users with simple, step-by-step instructions
Conduct remote troubleshooting
Test alternative pathways until you resolve an issue
Customize desktop applications to meet user needs
Record technical issues and solutions in logs
Direct unresolved issues to the ...
3 Opening(s)
4.0 Year(s) To 20.0 Year(s)
10.00 LPA TO 20.00 LPA
Key Responsibilities:
· Implement and manage security measures for the protection of systems, networks, and data.
· Collaborate closely with development teams to integrate security into the SDLC.
· Conduct vulnerability assessments and implement remediation plans.
· Monitor security infrastructure for vulnerabilities and intrusions.
· Lead incident response activities and ensure timely resolution of security incidents.
· Evaluate and recommend new security ...