Designing CCM application using OpenText Exstream and responsible for requirement gathering, providing solutions, Design and Analysis, Development and deployment of project.
Responsible for Designing and Developing of simple to complex documents(...
Job Description :We are seeking an experienced Linux administration with 8-12 years of professional experience in System Administrator with expertise... ...administration (CentOS, Red Hat, Ubuntu) wit...
...Department: Siemens Energy – Information Technology
Mode of Employment: Permanent
GGN/Pune
Role : ECC, Service Delivery Manager
You will help us run one of the sophisticated Enterprise Command Center f...
...1 IT Services Company
is looking to hire for a
Security Operations Center (SOC) Shift Supervisor role.
Role: Security Operations... ...answering routine and emergency calls, monitori...
...2th, Graduate & Post Graduate Etc.
Great opportunity for freshers and experience candidate.
Post :- Computer Operator, Electrician, Food Counter, Luggage Counter, Front Desk, Security Supervise, Floor In...
...Job Description
Command center lead
keywords: Command center
Desired Experience Range 5 -8 years
Location of Requirement Pune/Chennai
Responsibility Expectations from the role:
Should have L1/L1.5 ...
...Troubleshooting and resolving complex and escalated Application issues using tools such as Process Monitor, Process Explorer, Dependency Walker and Installrite
Excellent Communication Skills ( Oral and E-Mail )
...
...adherence to defined safety and security guidelines for all operations with focus on specific geographic areas of the Centre and assist the Chief Security Officer in establishing systems, processes and procedures fo...
...competitive health and wellness benefits, empowering you to value life in and out of the office
Retirement Savings Plans, Parental... ...Training and development to help you excel in your ...
Job Description Job Title Position Type Location Data Entry Operator Contractual (1 year) Pune ROLE & RESPONSIBILITIES We are looking for... ...data integrity and security policies. Ensure proper use ...