...Role purpose
Reporting into the IT Security Governance Manager, this role will encompass... ...The purpose of this role is to lead all Information Security matters rel...
Job Level- Manager
Role- Product Manager-Access
Summary
Airtel are looking for a Partner Manager to develop and manage our Access portfolio, supporting the company's overall strategy, revenue and customer satisfaction goals.
To be the h...
We are seeking a dynamic and an experienced IT Administrator with a focus on Identity and Access Management (IAM) and AWS. As an IAM and AWS IT Administrator, you will be responsible for managing our IT i...
...This role s primary purpose is to significantly improve access of Pfizer therapies in India Market.
The primary responsibilities are:
Designing and detailing the Market Access Plan for Pfizer therapies in In...
...including Asia, EMEA, and the US. The candidate's exposure to sectors such as Private Equity, Index funds, BFSI, IT Software, Logistics, and Shipping adds significant value to our team.
Key Responsibilities:
L...
...mission is to deliver innovative ideas with a focus on quality.
Role Description
This is a full-time on-site role for an IAM Program Manager / Saviynt Expert located in Mumbai. The successful candidate will be...
...world understand what these medicines do, why they matter and how Novartis is striving to reimagine medicine.
As Head of Integrated Health Solutions in charge of Value and Access, Key Accounts Management and Stra...
Job Overview:
The IT Infrastructure Wintel Team is responsible for providing technical support for service requests and day-to-day operations within the infrastructure domain. The role involves ensuring that support tasks are carried out professional...
...receive automated access using a tool designed and maintained by the Global Identity Access Management team. As the Role Based Access Control (RBAC) team we design these automated proposals for the different lines o...
...Security strategy and policy, manages the Information Security program, and identifies and addresses vulnerabilities, Develops, deploys... ...:
Access Provisioning and De-Provisioning – Pe...