...services. He/she must provide communication to team members and client sponsors.
Key requirements
Minimum 6-8 years of experience in Project management of IT infra datacenter build/cloud migration/ transformation pr...
...client's Business services. Role demands for working on DC transformation projects, which involves design and building of Enterprise cloud setup. Migration of Virtual and physical infra from as-is environment to new...
...client's Business services. Role demands for working on DC transformation projects, which involves design and building of Enterprise cloud setup. Migration of Virtual and physical infra from as-is environment to new...
...Company: A Large Indian Conglomerate Key Skills: Infrastructure Management, IT Infrastructure, Service Delivery, Policy Management, Project Management, Vendor Management, Operations, Team Management, Budgeting, C...
...private clouds, Openshift infra, dockers/container infra etc.
3. Thorough experience in configurations reviews against CIS benchmarks and security standards
4. Penetration testing skills including the use of securit...
...As a cyber security consultant, you will work in a multinational environment with other top security experts to deliver advanced penetration... ...Tester or GIAC Certified Penetration Tester,...
...Responsibilities
. Service Level Management and reporting inline with ITIL Framework
. Should have strong knowledge in implementation... ...business relationship management
. Supplie...
...accelerate your career?
Responsibilities:
Deliver technical excellence.
Contribute to the translation of business requirements into well-architected software solutions.
Participate and at times facilitate technica...
...accelerate your career?
Responsibilities:
Deliver technical excellence.
Contribute to the translation of business requirements into well-architected software solutions.
Participate and at times facilitate technica...
...clouds, Openshift infra, dockers/container infra etc
3. Thorough experience in configurations reviews against CIS benchmarks and security standards
5. Penetration testing skills including the use of security a...