...and brand standards, whilst meeting employee, guest and owner expectations. The Assistant Security Manager is responsible to develop, implement, monitor and evaluate the hotel’s safety and securi...
...Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Assistant Security Manager is responsible to develop, implement, monitor and evaluate the ho...
Organization- Grand Hyatt Gurgaon
Résumé
You will be responsible for the efficient running of the department in line with Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. Th...
...high performing teams via servant leadership, individual coaching, and mentoring Certifications : - Adobe Experience Manager Business Practitioner (Required)- SAFe Scrum- Master (SCM) or CSM, or PSM is preferred.- O...
Position Summary:
Data Protection Analyst (DPA) will be responsible for the monitoring of all Data Loss Prevention events for Proofpoint's Managed Services clients escalating all necessary events to the c...
...meeting employee, guest and owner expectations. The Cluster Revenue Analyst is responsible to provide revenue accounting leadership and... ...revenue recognition policies and will regularly i...
...to each region in which we operate. In addition to benefits, our employees enjoy perks such as company-sponsored wellness programs, volunteer opportunities, regular team building and engagement events and learning a...
...Hyatt International's Corporate Strategies and brand standards, whilst meeting employee, guest and owner expectations. The Assistant Security Manager is responsible to develop, implement, monitor...
...role will provide key leadership surrounding the hotel's revenue recognition policies and will regularly interface with the sales, operations and marketing organizations. The Cluster Revenue Analyst is also responsi...
...escalation point for Tier 1- Communicate with customers regarding security related incidents- Assist in threat signature implementation and... ...response to cyber threats- Provide teaching/m...