Phoenix Job Description
Job Location : Delhi
5 Days working
Work from Office Only
Strong knowledge in overall IT Infrastructure 1 to 2 Years
Strong Technical knowledge and hands on Fortinet product (Firewall/AP/Manager/Analyzer) 4 to 6 Years
Pl...
Job Summary
We're looking for a detail-oriented project manager to oversee technical projects within the Shipboard Support area. A strong understanding of security and compliance regulations is essential (Offshore)
Qualifications
Well-rounded techn...
Job Summary
We're looking for a detail-oriented project manager to oversee technical projects within the Shipboard Support area. A strong understanding of security and compliance regulations is essential (Offshore)
Qualifi...
Product Manager Networking
100% REMOTE
DESCRIPTION OF SERVICES:
The Project Manager position will be responsible for managing Network Services projects through all phases of the project management lifecycle involving technical design, hardware,...
...As a Network Security Engineer, you will be responsible for designing, implementing, and maintaining the security infrastructure of our network
The ideal candidate should have a strong background in network secur...
Job Description
Amazon’s Transportation team is seeking highly skilled and motivated person to help develop and implement a world class security program for our transportation network which will ensure that our customers receive the items they ...
Company Description
Aexonic is a global IT solutions company that provides full-cycle services in the areas of software development, IT consulting, mobile application development, Digital Marketing, Cloud-based enterprise solutions, and portal develo...
Phoenix Job Description
Job Location : Delhi
5 Days working
Work from Office Only
Strong knowledge in overall IT Infrastructure 1 to 2 Years
Strong Technical knowledge and hands on Fortinet product (Firewall/AP/Manager/Analyzer) 4 to 6 Years
Pl...
...WHAT YOU'LL DO
As a Global IT Security Engineer Senior Manager at BCG Worldwide IT, you will:
Develop and implement 'assume breach' strategies to proactively handle potential security bre...