3 Opening(s)
3.5 Year(s) To 5.4 Year(s)
15.00 LPA TO 20.00 LPA
Role : Security Architect Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals. ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : SW/Application Tech Support Practitioner
Role Description : Define the SW/Application Tech Support Practitionerure, ensuring that it meets the business requirements and performance goals.
Must have Skills : Security & Risk
Good to Have Skills : Cloud Security Infrastructure
Job Requirements : At least 2-4 years experience in supporting Cloud ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Cloud Security Architecture, No Technology Specialty
Job Requirements : At least 2-4 years experience in supporting Cloud Security solution management and Operations Support At least 4-5 years experience ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Cloud Security Architecture, No Technology Specialty
Job Requirements : At least 2-4 years experience in supporting Cloud Security solution management and Operations Support
At least 4-5 years experience in ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Cloud Security Architecture, No Technology Specialty
Job Requirements : At least 2-4 years experience in supporting Cloud Security solution management and Operations Support
At least 4-5 years experience in ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
10.00 LPA TO 20.00 LPA
Role : SW/Application Tech Support Practitioner
Role Description : Define the SW/Application Tech Support Practitionerure, ensuring that it meets the business requirements and performance goals.
Must have Skills : Security & Risk
Good to Have Skills : Cloud Security Infrastructure
Job Requirements : At least 2-4 years experience in supporting Cloud Security solution management ...
3 Opening(s)
3.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Cloud Security Architecture, No Technology Specialty
Job Requirements : At least 2-4 years experience in supporting Cloud Security solution management and Operations Support At least 4-5 years experience ...
3 Opening(s)
3.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : SW/Application Tech Support Practitioner
Role Description : Define the SW/Application Tech Support Practitionerure, ensuring that it meets the business requirements and performance goals.
Must have Skills : Security & Risk
Good to Have Skills : Cloud Security Infrastructure
Job Requirements : At least 2-4 years experience in supporting Cloud Security solution management ...
3 Opening(s)
3.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : SW/Application Tech Support Practitioner
Role Description : Define the SW/Application Tech Support Practitionerure, ensuring that it meets the business requirements and performance goals.
Must have Skills : Security & Risk
Good to Have Skills : Cloud Security Infrastructure
Job Requirements : At least 2-4 years experience in supporting Cloud Security solution management ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 20.00 LPA
Handle Escalated incident tickets from L1 Team.
Analyse and investigate security events from various sources; Triage security events and incidents, detect anomalies, and report remediation actions.
Manage security incidents through all phases of the incident response process through to
Closure
Using SIEM, Full Packet Capture, Intrusion Detection, Vulnerability Scanning and Malware analysis technologies for ...