Key Responsibilities:
Lead the preparation and submission of bids, proposals, RFIs, and RFQs.
Analyze bid documents to grasp client needs and tailor responses effectively.
Collaborate with cross-functional teams to gather essential bid information.
C...
...success.
Your Role and Responsibilities
We are looking for a Security Analyst (L2) to protect organization from cyberattacks by monitoring... ...measures and operating software to prote...
SOC Engineer - Application Security ExpertThe security operations center is a team dedicated... ...Research team to share findings and information, consultation, and maintain updat...
Job Description
Eurocert is seeking an experienced engineer to help develop our business model. In this role, you will join our development... ...events
Skills and Qualifications
• Bachelor’s degre...
...reducing poverty, enhancing food and nutrition security, and improving natural resources. CIFOR-ICRAF is looking for a
Project Auditor -Donor Compliance
Overview
The Project Auditor is responsible for pr...
Role & responsibilities
Seeking CA Plus CS 1st/2nd Attempt (CA and CS is Must)
and CISA plus DISA Certificate Internal Audit certifications will help
Experience in CAG Audits / Exposure to CAG Audits will be a big P...
Job Description
Eurocert is seeking an experienced engineer to help develop our business model. In this role, you will join our development... ...events
Skills and Qualifications
• Bachelor’s degre...
Job Title: Network Administrator
Location: Dwarka -New Delhi
Job Type: Full-Time
Experience: 7+ Years
Education: Bachelor's Degree in Computer Science, Engineering, or MCA
Certification: CCNA/CCNP
Job Description:
We are seeking a skilled and experie...
...Office and Social Media tools
Exposure to Quality management system, Quality Tools, Proposal drafting, Pre-sales support, report writing, research-based work
Exposure to Projects based work, Training / L & D will be...
JOB DESCRIPTION:
Play a role in delivery of Security Penetration Testing and Vulnerability management
Conduct security assessments by Scanning Application and Networks, review and perform Pentest for further exploitation.
Conduct Web Application S...