...millions of consumers, small businesses and many of the world's most prominent corporate, institutional and government clients under the J.P. Morgan and Chase brands. Our history spans over 200 years and today we ar...
...This role will be a part of assisting the Security In-charge in planning and managing all station security operations as well as acting... ...time management abilities and should be able to p...
...Position Purpose:
Sandoz Corporate Security protects Sandoz associates, estate, products... ...for the research and collection of threat information from multiple sourc...
...Job Description
Join our dynamic team as a Information Security professional at JPMorgan Chase, a role aligned with our Corporate Technology, to drive our product security initiatives. You'll partner with one or...
...Ability to work with cross functional technology partners – engineering, architecture & product management
Strong leader, culture carrier and team player experienced in matrix organizations
Demonstrated experi...
...transform healthcare.
The candidate should be a seasoned SAP professional with a proven track record in navigating both ECC and S/4HANA... ...Assist fellow employees with cybersecurity, ...
...enablement for critical tasks such as model improvement, supervision, and evaluation. To do this... ...Our data is crucial for building and continuously improving the worl...
YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation.
At YASH, we're...
...millions of consumers, small businesses and many of the world's most prominent corporate, institutional and government clients under the J.P. Morgan and Chase brands. Our history spans over 200 years and today we ar...
Location - Hyderabad(WFO)
Experience - 15 to 20 years
Job Description
The Head of Information Security is a critical member of the CEO's leadership team. This role must be able to translate the IT-risk requirements a...