Implement Information security policies, procedures, regulations, and best practices to ensure the confidentiality, integrity and availability of MHDI information and information asset.
Implementing effective information sec...
...Role purpose
Reporting into the IT Security Governance Manager, this role will encompass... ...The purpose of this role is to lead all Information Security matters rel...
...primary planning and ensure execution of audit plan as per agreed
Conduct the IS audits (ITGC controls, VA, PT, APPSEC, CA, BCP, DR, Cloud Security, Cyber Security, Security Operations and Surveillance, Information ...
We are seeking a dynamic and an experienced IT Administrator with a focus on Identity and Access Management (IAM) and AWS. As an IAM and AWS IT Administrator, you will be responsible for managing our IT i...
...including Asia, EMEA, and the US. The candidate's exposure to sectors such as Private Equity, Index funds, BFSI, IT Software, Logistics, and Shipping adds significant value to our team.
Key Responsibilities:
L...
...mission is to deliver innovative ideas with a focus on quality.
Role Description
This is a full-time on-site role for an IAM Program Manager / Saviynt Expert located in Mumbai. The successful candidate will be...
Job Overview:
The IT Infrastructure Wintel Team is responsible for providing technical support for service requests and day-to-day operations within the infrastructure domain. The role involves ensuring that support tasks are carried out professional...
...receive automated access using a tool designed and maintained by the Global Identity Access Management team. As the Role Based Access Control (RBAC) team we design these automated proposals for the different lines o...
...Security strategy and policy, manages the Information Security program, and identifies and addresses vulnerabilities, Develops, deploys... ...:
Access Provisioning and De-Provisioning – Pe...
Implement Information security policies, procedures, regulations, and best practices to ensure the confidentiality, integrity and availability of MHDI information and information asset.
Implementing effective information sec...