...Your Role and Responsibilities
We are looking for a NAC Security Analyst (L2) to protect organization from cyberattacks by monitoring systems... ...measures and operating software to prote...
...SoftSages Technology is an information technology company providing IT consulting, software development, mobile application development,... ...professional will be responsible for lead genera...
...emerging journey building a strong, resilient, purposed and balanced IT Security capability. Mandated to protect our company assets from... ...and maintain the central IT Security Framework, ...
...components to include processes, procedures, and technologies. Deep understanding of privacy and business continuity requirements and support R&C Privacy and BCM teams in execution of their respective program Demons...
About the job :Role : Head of Cyber Security & IT Services Location : Noida /Hyderabad (WFO)-Hybrid Job Responsibilities : We are seeking... ...company, we are looking for a candidate who can lead our...
...and the aptitude to remain up to date with information security and IT developments
Ability to communicate Risk to non IT business owners and support function such as delivery, HR, Admin, Legal, Contracting and o...
...Professional (CISSP), Certified Information Security Manager (CISM), Computer Hacking Forensic Investigator (CHFI), Any SIEM (Splunk, ArcSight or Q-Radar) certification
Proven track record and experience in Manag...
reate and maintain filing systems
Create and type office correspondence using a computer
Distribute and route mail
Order and track Human Resources office supplies and forms
Answer phone calls ...
We are looking for Information Security Professional in our Corporate office.Experience : 3-6 years of experience in security and privacy roles. Educational/Professional Certifications : Bachelor's degree in Computer Science...
...Information security knowledge in one or more areas such as Enterprise end-point security products (e.g., Trend Micro, VirusScan, Anti-Spyware, Host Data Loss Protection, Endpoint Encryption,etc.)
Experience with ...