5-12 years of industry experience in Security Incident Management (SIM) for large enterprise environment. Candidates with strong SOC L2/L3 engineering experience This role will require working in rotational shifts in 24X7 Security Operations environment. Strong knowledge of Digital Forensics &
Minimum 5 years experience with Firewall, UTM, IDS/IPS, VPN, proxy solutions and technologies Minimum 3 years experience managing security solutions for enterprise customers Experience with Cisco, Checkpoint, Juniper (Netscreen), VPN, Proxy technologies a plus Detailed technical experience
banking, securities brokerage, and wealth management. The Recruiter will focus on assisting to develop and implement innovative and diverse recruiting strategies and campaigns to meet the needs of a business/function. The Recruiter is primarily responsible for recruitment execution with a key focus
interviews. Expertise in handling multiple skill sets and ability to work in a multitasking environment handling multiple assignments at a time. Managing the resource allocation and maintaining database. Salary not constant for deserving candidates ...
Understand Threat and Vulnerability Management at enterprise level, facilitate use of technology-based tools or methodologies to review, design and/or implement products and services. Strong technical background in server, network technologies ...
support, EHS. Supervise & execute Floor Access control & ID badge management. Experience on managing access control application would be a great advantage. Responsible for alarm monitoring, electronic security. Liaising with Law enforcement agencies. To command shift security guard force & take charge
5-12 years of industry experience in Security Incident Management (SIM) for large enterprise environment. Candidates with strong SOC L2/L3 engineering experience This role will require working in rotational shifts in 24X7 Security Operations environment. Strong knowledge of Digital Forensics & Looking for Candidate with below criteria: 1.Good communication skills. 2. Ready to relocate to Bangalore. 3. Work ...
5-7 years experience in Information Security, Risk Management, Internal Audit, Compliance or Reengineering within the Banking or Financial Services industries; experience in Information Security required, additional expertise in Operational Risk highly preferred. - Demonstrated ability
and disaster Recovery exercises. Review all system documentation to be delivered according to specified guidelines (e. g. , Standard Operating Procedures) . (1. ) To provide support for on call escalations and doing incident & problem management (2. ) To independently resolve tickets & esnure that the agreed
To maintain projected fee income at budgeted numbers & undertake cross selling initiatives to achieve them. Promoter Funding, Structured Loans, Broker Funding & Investor Funding spans across multiple asset classes; equity, MF units, Bonds & Assets Good understanding of product and portfolio management in home loans/ loans against securities. Demonstrated skills in ability to ideate, structure and develop value ...
interviews. Expertise in handling multiple skill sets and ability to work in a multitasking environment handling multiple assignments at a time. Managing the resource allocation and maintaining database. Execellent English Communication skills. Salary not constant for deserving candidates. Only Female candidates can apply ...
A good business acumen and entrepreneurial/ commercial attitude is essential Excellent communicator exhibiting leadership and team working skills. Computer literate at least with Microsoft Office Planning, budgeting and project management skills Understanding of manufacturing resource planning
Minimum 5 years experience in Network security operations. Hands on experience to work with Cisco Firewall like Cisco Check point, Juniper PIX or Palo or Alto firewall is Mandatory Ability to work with Cisco products especially Nexus (N7K, 5K and N2K) Familiar to work with any VPN devices
of Information Security including malware, emerging threats, attacks, and vulnerability management. Experience with reviewing raw log files, data correlation, and analysis (i.e. firewall, network flow, IDS, system logs).Certified Forensic Examiner (GCFA-GIAC, CCFP, etc.), CISSP or equivalent certification
administrative and technical requirements are fulfilled.Followup customer email until closure and manage the processes SLAsin a timely manner.ProvideSME support and clarify the customer queries Abilityto analyze data from a SME perspective.Abilityto conduct refresher/ process trainings. Updateshimself
Provide consistent interpretation of policy to IT Establish and maintain relationships with domain architects, project managers, and others within the technology development unit Qualifications 5-10 years of Information security knowledge of information security, IT Risks and controls assessment
knowledge in auditing or managing the following IT audit domains: o Information Security o Data Governance and Management o Network and Internet Security o Business Continuity and Planning and Disaster Recovery o User Access o Data Center and IT Operations o IT Governance o Systems Development Life Cycle
3-8 years hands-on technical experience on IFS ERP applications in Manufacturing and Demand Supply Chain modules. - Process design experience for Supply chain, distribution and manufacturing modules. - System admin experience (security, roles, profiles) would be an added advantage. - Good