Implementation engineers have a wide range of responsibilities, which can include:
Developing and implementing new technologies to improve efficiency or quality of operations
Analyzing customer needs to determine how new technologies can solve ...
Job Description
Job Number 24042595
Job Category Information Technology
Location Port Muziris a Tribute Portfolio Hotel Kochi, VIP Road opposite Kochi International Airport, Kochi, Kerala, India VIEW ON MAP
Schedule Full-Time
Loca...
...Xerox Holdings Corporation
For more than 100 years, Xerox has continually redefined the workplace experience. Harnessing our leadership... ...practices and knowledge of internal or externa...
Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centric...
Opening for one of the reputed FMCG Company for the position of 'Lead associate - Health & Safety Management
JOB DESCRIPTION Designation: Lead Associate- HSE Grade: ML1 Location: Angamaly Type: Permanent Job Purpose:
E...
...Wallem is hiring a maritime safety professional!
The Safety Coordinator is responsible to provide operational support to both the Fleet and Office for Safety, Environmental, Compliance and Security relat...
...access rights.
Perform routine backups and ensure data integrity and security.
Assist in the implementation of IT policies and procedures.... ...to identify areas for improvement and implemen...
We are looking to employ an HR officer with excellent communication skills, both written and verbal. The HR officer is expected to be knowledgeable... ...with employment legislation and possess strate...
...Wallem is hiring a maritime safety professional!
The Safety Coordinator is responsible to provide operational support to both the Fleet and Office for Safety, Environmental, Compliance and Security related issues ...
Role Purpose
The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security ...