APPLICATIONS ARE INVITED FOR THE POSITION OF COURSE ADVISOR, ADMISSIONS & OUTREACH TEAM AT (AND ACADEMY PVT. LTD.), NEW DELHI
About Us :
AND Academy is the brainchild of the founder of the Indian Institute of Art and Design (IIAD), a leading desig...
...success.
Your Role and Responsibilities
We are looking for a Security Analyst (L2) to protect organization from cyberattacks by monitoring... ...measures and operating software to prote...
1) Chairman Office Support / VVIP Support
· Provide dedicated and personalized technical support to Chairman Office, including executives and high-profile individuals.
·
MAC OS
and Apple IOS : Set up, configure, and troubleshoot Apple IPAD & Pho...
Role & responsibilities
Seeking CA Plus CS 1st/2nd Attempt (CA and CS is Must)
and CISA plus DISA Certificate Internal Audit certifications will help
Experience in CAG Audits / Exposure to CAG Audits will be a big P...
...customer satisfaction.
Requirements
Skills Required:
# Should have good understanding of ITIL standards for IT services delivery. ITIL certified shall be preferred.
# Should have good understanding of ...
...understanding of ITIL standards for IT services delivery. ITIL certified shall be preferred.
# Should have good understanding of help desk management monitoring & management tools.
# Should have clear understand...
...JOB SCOPE
Role : ICS Security Researcher
Responsibilities
Conducting penetration testing and vulnerability assessment of Industrial Control System
Develop concepts, algorithms and methods for detecting a...
Job Title: Network Administrator
Location: Dwarka -New Delhi
Job Type: Full-Time
Experience: 7+ Years
Education: Bachelor's Degree in Computer Science, Engineering, or MCA
Certification: CCNA/CCNP
Job Description:
We are seeking a skilled and experie...
...ll work and shape Embee’s performance on IT market.
BDM will be responsible to achieve his/... ...Key Responsibilities
· Responsible for managing and retaining revenu...
Cloud Security engineers see a broad range of activities across cloud application and security domains, from integration tasks (such as key management and logging) to security response (advising during triage, analysis, and remediation) to providin...