Spot offer for captive bank : Hyderabad : Information Security experience in compliance, operational risk management, information security governance, technology policy implementation, control assessments or risk assessments.Any one Certified - CRISC, CRCM, CCSA, CRMA, CISM, CGEIT, CISA
MSC/ BE/ MCA having 10+yrs into IT Infrastructure Mgmt with strong skills in DATA SECURITY, IT GOVERNANCE, IT INFRASTRUCTURE, ITIL, COBIT, CISSP, CISA, CISM, ISO27001 LA CERTIFICATION etc with strong Technical Skills apply
For our client, into the financial markets, we are looking for relationship managers - Securities. Providing advisory services to clients to manage their portfolio, keeping knowledge of financial markets & inteleglience. Developing fresh customers. Food knowledge in the financial markets in terms of funds & securities. Understanding capital markets, & equity broking. Certified by NIMS (Equity ...
1) Excellent communication skills 2) Good understanding of overall cloud platforms 3) Hands on experience on AWS / Azzure 4) Experience in Information Security along with Cloud. 5) Local candidates preferred(Bangalore) 6)Strong grasp of cloud computing SaaS, PaaS and IaaS fundamentals
your solid understanding of authentication protocols, core network and system security principles along with your up-to-date understanding of modern attack patterns and methods to drive security into tools used by us every day - Data-driven decisions are important to us. You will draw heavily on your
over WAN and LAN. Exposure to Firewall migration / Integration projects and integration of heterogeneous Networks/Services/systems would be an added advantage. Performs analysis and diagnosis of complex security problems Ability to provide detailed network Security drawings and diagrams and relation
JD is security testing with Vulnerability testing and penetration testing, CEH (certification in ethical hacking), Source code analysis. Communication skills should be excellent. Years of Experience: 4-6 Years Location: White Field Notice Period: Immediate I look forward to hearing from you! Please
and SIEM solutions in a large enterprise globally17. Experience with perimeter security solutions, including proxy servers and firewalls18. Previous experience with operating in a global and innovative team is essential19. Knowledge of secure WAN design, configuring firewalls and routers.20. Expertise
Analytics, Digital and Security. Should have developed or is aware of content creation process from idea generation, topic selection, commissioning of articles, proof reading, editing and delivering of content Should have worked with business/ industry associations/ groups/ chambers of commerce Required Qualifications: MBA/ BTech/ Mtech/ MCA Good command on written and spoken English Good presentation skills ...
as designed and working effectively. Review and consult with development teams on any deficiencies identified with the secure coding practices. Be able to explain expectations for each security practice and recommend how to remediate any deficiencies noted. 5+ years with information security applications
and organizational level towards in-house management and our customers Select suitable security base technologies, security components, security products, and cryptography Develop and present feasibility studies, decision papers and ideas for new automotive security solutions Work closely with our local and remote
We have a job opening with a large IT MNC. Need profiles of candidates with 8+ years of experience in presales/BD . Full lifecycle project experience as Security Consultant including design and implementation of Data center security , Cloud security solutions like Firewalls, IDS/IPS, VPN, NAC ...
WAF and Web Security Specialist (1C) This position is for an experienced Akamai or other WAF platform specialist. Candidates must demonstrate a subject-matter expertise in WAF technologies used to mitigate web security vulnerabilities and protect hosted applications. The ideal candidate will have
and demonstrable knowledge gathered during study and/or work in the area of applied security, cryptography, security protocols. Advanced knowledge in the area of communication security, embedded security, security concepts such as authentication, encryption. Publications in leading security and cryptography