...Role purpose
Reporting into the IT Security Governance Manager, this role will encompass... ...The purpose of this role is to lead all Information Security matters rel...
IT compliance focuses on ensuring that an organization adheres to industry regulations standards and
internal policies related to information technology and data security.
Responsibilities:
IT compliance specialist is responsible for ensuri...
We are seeking a dynamic and an experienced IT Administrator with a focus on Identity and Access Management (IAM) and AWS. As an IAM and AWS IT Administrator, you will be responsible for managing our IT i...
...Conduct regular risk assessments to identify and prioritize security threats and vulnerabilities.
Develop and implement security... ...mitigate identified risks.
Manage and maintain the...
...including Asia, EMEA, and the US. The candidate's exposure to sectors such as Private Equity, Index funds, BFSI, IT Software, Logistics, and Shipping adds significant value to our team.
Key Responsibilities:
L...
IT compliance focuses on ensuring that an organization adheres to industry regulations, standards, and
internal policies related to information technology and data security.
Responsibilities
IT compliance specialist is responsible for ensuri...
...collect company property and revoke system access.
Process final settlements and conduct clearance procedures.
HR Systems & Operational activities
Able to handle and mange HRMS / HRIS. Is conversant wit...
Mumbai
MONEYLICIOUS INVESTMENTS AND CONSULTING SERVICES PRIVATE LIM...
...mission is to deliver innovative ideas with a focus on quality.
Role Description
This is a full-time on-site role for an IAM Program Manager / Saviynt Expert located in Mumbai. The successful candidate will be...
...Security strategy and policy, manages the Information Security program, and identifies and addresses vulnerabilities, Develops, deploys... ...:
Access Provisioning and De-Provisioning – Pe...
...Responsibilities
Perform Information Systems (IS) audit of companies for assessing the Internal Control environment to identify Design Gap and Information Security Risk exposure.
Performing...