1 Opening(s)
14.0 Year(s) To 25.0 Year(s)
30.00 LPA TO 65.00 LPA
KEY RESPONSIBILITIES
Responsible for leading the design, implementation, and maintenance of comprehensive security measures across all stages of medical device development, ensuring compliance with relevant regulations and standards while protecting patient data and device integrity
Lead the design and implementation of secure architectures for new medical devices, considering connectivity, data protection, access ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
15.00 LPA TO 16.00 LPA
Job Role:
Leading a team that performs Application Security Testing, Server Configuration Audits and Vulnerability Assessments
Ensuring that VAPT for existing applications/systems are performed as per policy, track the compliance status, following up with application/system owners for closures of the security findings.
Releasing VAPT dashboards and reports periodically to management and relevant stake ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 20.00 LPA
Handle Escalated incident tickets from L1 Team.
Analyse and investigate security events from various sources; Triage security events and incidents, detect anomalies, and report remediation actions.
Manage security incidents through all phases of the incident response process through to
Closure
Using SIEM, Full Packet Capture, Intrusion Detection, Vulnerability Scanning and Malware analysis technologies for ...
1 Opening(s)
2.0 Year(s) To 3.0 Year(s)
5.00 LPA TO 7.00 LPA
JOB DESCRIPTION of Endpoint Security Support Executive
Job Title (Designation): Assistant Manager II
Endpoint Security Support Executive
Department: Information Technology
Reports to: Senior Manager
Experience: 2 /3 Years of work experience
Required Qualification: Diploma in Engineering/Any Graduation Degree
Preferred Qualification: Diploma in Engineering/Any Graduation Degree
Skill, Knowledge & Trainings:
Excellent command / highly proficient in spoken and written English
Should have Exceptional customer service ...
1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
Job Description:
- Cloud operations team supports and configures Windows OS, Linux OS and manages all data protection services
Functions:
- Support of OS and systems infrastructure for all new builds in AWS
- OS release management - certification of new OS versions
- ASG AMI security patching
- Patch management
- Coordination with EOC for ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
HOW YOU WOULD CONTRIBUTE:
Build, run and maintain technical Cybersecurity tools and solutions • Provide technical support for Cybersecurity solutions and projects implementation • Collaborate with Global Technology Services to perform review and update hardening standards • Perform periodic vulnerability status reviews and remediation activities • Offer guidance on understanding security ...
5 Opening(s)
3.0 Year(s) To 5.0 Year(s)
0.00 LPA TO 20.00 LPA
Hi,
Greetings,
Your Profile has been shortlisted for IOS Developer for a leading IT company.
Position : IOS DeveloperExp: 3+ yearsLocation : Permanent WFHNotice Period :Immediate to 15 Days
Description:
As Mobile App Developer, You Will Be Working Extensively On Ios 10 And Above, Using Xcode 11 And Above, Swift/Swift Ui , Objective-C, Cocoa Pods ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Web Application Security Testing
Good to Have Skills : Web Application Development
Job Requirements :
1 Experience in Web Application Security Scanning tools like IBM AppScan Tool, Qualys, Netspaker etc
2 ...
2 Opening(s)
10.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
Role and Responsibilities:Audit Representation:• Act as the primary representative for NPCI and customer audits related to information andcyber security.Cybersecurity Governance:• Drive the organization's cybersecurity strategy and ensure compliance with applicableregulatory/statutory guidelines, particularly those from RBI and NPCI.• Present cyber security risks, initiatives, and preparedness to the Board and its Committeesperiodically.Policy ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
Not Disclosed by Recruiter
Review security designs for compliance with best practices and regulations.
Advise application and technical teams on securing solutions throughout the application lifecycle.
Align cybersecurity strategies with business objectives.
Identify and mitigate business threats through appropriate countermeasures.
Leverage technical expertise to defend against cyber threats using tools like firewalls, DLP, IDS/IPS, APIs, cloud security, etc.
Perform ...