Job Description :- Should have done security implementation on the following controls like firewall, IPS, VPN, NEXT GEN, Eirewall Technology... ...COBIT Etc ) Audit planning ,Implementing ISO- Well Ve...
...communities to grow through differentiation, agility and innovation.
We are looking for a skilled Head of Information Security - Business Continuity and Privacy - India in our FAB office in Mumbai. Accelerate y...
...of 100+ service offerings Online Catering Services and Facility Management and varied clientele corporates, healthcare organizations,... ...activities, in alignment with and leveraging the gl...
...They are looking for an accomplished individual who can lead them as Chief Transformation Officer. This role would suit an experienced COO/CIO with strong operations and technology background into insurance in Asia ...
...read through what our employees have to say about us .
Job Requirements:
Purpose of the Job – State concisely the aim of the job.
The Head of Applications aims to oversee both BUILD and RUN aspects on the differe...
...implement best practices for modular extensible and maintainable software.
# Cloud Expertise: Utilize your expertise in cloud platforms (e.g. AWS Azure Google Cloud) to architect solutions that leverage cloudnati...
...shareholders, and communities to grow through differentiation, agility and innovation.
We are looking for a skilled Head of Information Security - Business Continuity and Privacy - India in our FAB office in Mu...
Job Description
Roles & Responsibilities:
Strategic
· Work with the IT Head and other stakeholders to develop a security program and security projects that address identified risks and business security requirements...
...challenges.
• Ensures the reliability of computer systems and data security, implementing backup and recovery plans.
• Coordinates and... ...least 10+ years of professional experience.
...
Role/Job Title :Security Architect
Function/ Department :ISG
Job Purpose :
Assist the Security Provision Role in review of new systems, and changes to existing systems via a technical security risk assessment. Analyse the threat landsc...