Department : Retails & Liabilities JOB SUMMARY : Should have a clear understanding of KYC and documentation complexities in this segment Should be currently working in this segment in that particular location Should be able to articulate his key achievements and his personal contribution in those Aggressive in intent , not in body language Should be self driven & self motivated. Patience is a virtue in this ...
Cisco NAC - Network Access Control (Mandatory) ForeScout CounterACTAs a Lead Administrator, you should be able to act as a Single point of contact for the technical tower in front of the customer management. Ensure proper communication and quick resolution as a crisis manager. Responsible
Windows Desktop OS, VMWare vSphere, Hyper-V, Oracle, SQL, Sharepoint, Certificate Servers, DNS/DHCP serversExperience in Windows Server 2012 / 2008 operating environment and related security, patching, monitoring and other management/administration software and componentsBackup Solution: VERITAS / Arc
Discipline - Business OperationsIndustry - Business Analysis Job Description : As a key member of the Analyst team, you will be part of Optum-United Health Group's mission of helping people live healthier lives. As a Lead Business Analyst, you will grow and develop as you conduct and manage
Demonstrated collaboration skills - Ability to explain complex technical problems to a non-technical audience No. of Openings - 0Qualifications :- Bachelor- s Degree OR High School Diploma/GED with 1 to 2 years of equivalent experience and GIAC and/or other Security-related Certification- 1 to 2 years
, such as CISSP, GSEC, and/or Sec+- Industry certifications in networking, such as CCNA, CWNA and/or Net+- Foundational knowledge of multiple areas of cyber security operations, such as attack surface management, SOC operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), threats (including APT ...
- Conduct Internal Compliance reviews - Ensure implementation and maintenance of Cyber Security Architecture - Periodic MIS/ Dashboards reporting on the open vulnerabilities/ issues. - Skills Required (Knowledge and Skills) - Strong knowledge on Information Security areas such as Endpoint
as a part of Assurance- Hands-on experience on working on IT GRC tools such as Archer or SAP GRC- Strong Interpersonal and Communication SkillsExperience and Qualifications:- BE/B.Tech/ME/M.Tech/MCA from a reputed/recognized institute- 4 to 6 years of relevant experience in IT or Information Security Domain- Archer
, privacy and data protection.- Basic experience in architecting technology solutions in the Security & Privacy services space- Business Continuity & Technology strategy development- Demonstrates in-depth knowledge of security and privacy controls and risk management process"- Extensive experience
and exposure on Security concepts such as Firewall/UTM, IDPS, proxy, 2FA, DDOS, - Vulnerability Management, SIEM, Security Incident Analysis, etc;- (preferably someone who has already supported such services from Help Desk /Service Desk function) - Excellent communication in English (Verbal and written ...
with F5oValid certifications:#F5 Certified Technology Specialist in GTM (F5-CTS, GTM)- Drive technical innovation and efficiency in networking and security via automation- Create processes that enhance operational workflow and provide positive customer impact- Dive deep to resolve problems at their root ...
troubleshooting software and application issues for IOS and MAC.3. Should maintain backup of all MAC and IOS devices4. Installation and configuration of Blackberry OS 7.1 and 10.05. Installation and configuration of mails using, BIS and active sync6. Well versed with troubleshooting complex issues related
with the analysis and development teams to ensure that changes are made.Risk and Control Objective :Ensure that all activities and duties are carried out in full compliance with regulatory requirements, Enterprise Wide Risk Management Framework and internal Barclays Policies and Policy StandardsPerson
to respond to and recover from a security breach. Educating staff on information security through training and building awareness.- Implement protections: install (with support from infra team) and use software, such as firewalls and data encryption programs, to protect MatchMove's sensitive information ...
standards- Work with Security team to provide awareness and training to employees on security aspects in Information eco systems- Execute & Manage end-point security on firewalls and other systems, proof-of-concepts etc.- Engage with Industry and community in learning latest industry progress on risk
Board and IRM Steering committee meetings- Coordination with IT Strategy & Architecture team for alignment with IT Strategy requirements- Periodic Reports to CIO and all other reporting to Top Management- All activities related to planning of the IRM budget- Launching innovative campaigns
Job Description For SAP SD Consultant : SAP-Application Security Job Description :Summary: Provides functional expertise in support, administration and maintenance of SAP- Application Security related support work. Requires the ability to work effectively and independently, as well as in cooperation
Job Summary :- 2-4 years of technical experience in product based web startups - Aggressively become a critical team member by quickly gaining a complete understanding of the platforms application functionality, system flow, and technology infrastructure, and the associated workflows.- Provide