satisfaction. To proactively seek and secure repeat and additional vehicle loan sales using prospecting, follow-up, referral and other available methods. To update the dealership’s records with customer information to ensure that the database is fully and accurately maintained. Pune, Pune
Inventory (CGI) owned by Information Security function. Carry out Gap Analysis and Risk Assessment under Project AVA in liaison with Information Security function, highlight gaps and incidents arriving therefrom to the DPPO. Conduct vendor on-boarding privacy assessment Incident Reporting Management Quarterly collection and updation of DPP Incident Management Register and ensure the same is reported to ...
Functional and Security Requirements Management Design and specification (UML) of embedded software security solutions with hardware security support Select suitable security base technologies, security components, security products, and cryptography Implementation of embedded software according
of physical and cyber events. Use of advanced cyber and physical security tools, such as intrusion detection prevention systems, threat monitoring, wireless security monitoring, malware detection, data loss prevention, SIEM tools, high risk travel, and internal and perimeter controls. Are you passionate about
job description ?Education : BE ( IT) Or BE ( Comp science ) or MCA with IT security certification.� 4+ years strong experience in handling the Information Security, Policy and Compliance portfolio� Knowledgee and practical application experience of information security, cyber security "best
job responsibilities will include troubleshooting, diagnosing and resolving security problems in complex and largest worldwide Customer networks, working in our global 24/7 organization. You will also research device configuration changes and own sophisticated tuning requests for change management across the most
will work with our global Team of security experts - Investigators, Analysts, Security Engineers, Threat Intelligence and Researchers to achieve one goal - find the threats and mitigate them using state-of-the-art approaches and techniques like nobody else in the industry can. You will maintain a thorough
performance, Capacity and Network Security. Actively participate in Customer reviews towards Network augmentation. Actively drive Network improvement programs through measured Operations KPIs and best delivery practices Actively mentor the Operations engineers through various training programs ...
Notice Period: Immediate or Max 15 Days Primary Skills (not more than 2): SIEM Arcsight Event Analysis, Monitoring, Intrusion detection systems, First Level Incident Management Rope Purpose: The purpose of this role is to provide security analyst expertise and contribute to the success
A good business acumen and entrepreneurial/ commercial attitude is essential Excellent communicator exhibiting leadership and team working skills. Computer literate at least with Microsoft Office Planning, budgeting and project management skills Understanding of manufacturing resource planning and value chain management Understanding of customer service and quality management systems Be prepared to ...
Skills: Load Balancers , Netscaler , Cisco Certified Network Professional (Routing ), Switching & Routing Description: spanning two physical Datacentres IRE11 and IRE19. At a network level these DCs are active/active but at a host and services level IRE11 primarily provides live service with IRE19 used to facilitate DR. Support mainly Cisco technology with additional components including IPS/IDS devices ...
other job related functions as assigned. Interested Candidate please share CV on email@example.com Thanks & Regards, Dhamma Bhawsagar Growel Softech Ltd |Pune (IT Consulting Services) MB: 9371116013 Salary: Not Disclosed by Recruiter Industry: IT-Software / Software Services
Maintenance Role Category: Admin/Maintenance/Security/Datawarehousing Role: Technical Support Engineer Keyskills: NetworkingWindowsDesktop SupportCustomer ServiceIT Consultingtechnical supportdesktop engineerHardware and NetworkinHardware & Networking
Primary Location: India,Maharashtra,Pune Education: Bachelor's Degree Job Function: Operations Schedule: Full-time Shift: Rotating Employee Status: Regular Travel Time: Yes, 10 % of the Time Job ID: 16058111 Description Role Outline/Job Summary The successful candidate will be responsible
analysis (e.g. netflow traffic data, log file information, consolidated event / alarm data, firewall data) with the wide range of security tools and defense line products. Additionally, the role will deliver qualified information about actual threats and indications/recommendations how the associated risk
applicable):Firewalls, Anti-virus, Anti-Spams, Intrusion Detection/Prevent System, Event Correlation Devices, Log File Analyser, etc. Niche : YesNo Salary Range (to be filled by HRBP) Minimum Median Maximum Role purpose: The purpose of this role is to provide security analyst expertise and contribute
assessments like Vulnerability Assessment, Penetration Testing, Application Security Testing, Network Security Architecture Review, Password Compliance Review, Firewall Rule base Reviews, Firewall Configuration Reviews etc. Security risk assessments for general controls like process reviews, assessment