Responsible to perform Application security assessment and consulting for new technologies and infrastructure services. This includes I... ...Design, test, implement, maintain and support current and ...
...emerging journey building a strong, resilient, purposed and balanced IT Security capability. Mandated to protect our company assets from... ...and maintain the central IT Security Framework, ...
...JOB SCOPE
Role : Information Security Specialist
The Customer Experience organization provides a common interface to customers including account and relationship management, acting as the voice of the customer...
The Information Security Analyst is part of a team that establishes, supports, and continuously improves the enterprise information security policies, practices, and standards. This role will participate in on-going operatio...
...components to include processes, procedures, and technologies. Deep understanding of privacy and business continuity requirements and support R&C Privacy and BCM teams in execution of their respective program Demons...
About the job :Role : Head of Cyber Security & IT Services Location : Noida /Hyderabad (WFO)-Hybrid Job Responsibilities : We are seeking... ...company, we are looking for a candidate who can lead our...
...virtualization elements comprising multiple locations
Should have very good understanding of security solutions like Firewall, IDS/IPS, Mail security, VPN, Cryptography, and Encryption Techniques.
Good knowled...
We are looking for Information Security Professional in our Corporate office.Experience : 3-6 years of experience in security and privacy roles. Educational/Professional Certifications : Bachelor's degree in Computer Science...
Job Description : We are seeking a Senior Security Engineer with a strong background in cybersecurity and system administration. The ideal candidate will possess hands-on experience in developing robust security solutions, a...
Role: DPOD Consultant
Experience: 3 Years
Location: Noida Only
Notice: Immediate only
Understanding of the Certificate Lifecycle Management
Good Hands on in Data protection on demand (DPoD) with Hardware security module (HSM)
Good H...