...Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, firmware and software
Ensures that IS security architecture/...
...leader in the Digital Transformation space, is seeking a highly skilled and experienced individual to join our team as a Sr. Lead Information Security Manager (EKM). At Dew Software, we are committed to partnering w...
...Summary
Description Summary of This Role
Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, firmware and so...
The Technology Risk Analyst plays a crucial role in identifying, assessing, and mitigating technical risks within an organization. Has an understanding of Enterprise Risk Management practices in a technical environment. This...
Manage information technology and computer systems
Plan, organize, control and evaluate IT and electronic data operations
Manage IT staff by recruiting, training and coaching employees, communicating job expecta...
...customers around the globe. We're active in more than 150 countries and have set our sights on becoming the global industry leader. It's w hat you'd expect from a pioneering paints company that's committed to scienc...
1. IT cyber security Framework (Policy design and implementation)
Develop policies and framework for maintaining cyber security (for... ...reporting mechanisms for measuring compliance and performan...
...As Sr. IT Manager you will be responsible for ensuring JetSynthesys users, clients, and partners are adequately supported in all systems and software offerings also be responsible for managing support staff as well ...
...a prestigious clientele, including Fortune 500 companies.
Role Description
This is a full-time on-site role for an Information Security Analyst located in Pune. The Information Security Analyst will be respo...