...Job Description :
Credit Underwriting: Conduct comprehensive credit analysis of loan applications for secured business loans, evaluating the creditworthiness of borrowers, and assessing potential risks involved.
Team Management: Lead and supervise a team of credit analysts...
...in organising subject-specific events, hackathons, competitions, or workshops for students.
Technical Requirement:
SME of Cyber Security should have deep knowledge of
Computer Foundation
Computer Hardware
Networking
Switches & Routers Technology...
...Job Details:
Professor, Associate Professor, Assistant Professor (CE/IT/CS/BCA/MCA/MSc IT/CE-AI ML/CE - Cloud Computing/ CE- Cyber Security; where in the domain of Cyber security with special requirement in the subject like cryptography basics, networking concepts and security...
...students, faculty members and all staff.
About the Position:
CEPT University invites applications for the position of Sr. Executive (Security), Campus Maintenance Office - CEPT University. We are looking for professionals who possess excellent interpersonal skills, excellent...
Rs 3 - 5 lakhs p.a.
# Supervise daily security team operations, ensuring efficient task completion.
# Devise and enforce security policies and procedures to safeguard the organization and its assets.
# Perform routine security assessments to identify and address potential risks and vulnerabilities...
...Are you passionate about private security and eager to immerse yourself in the dynamic world of content development? If so, we invite you to seize a unique opportunity for professional growth and learning through our internship program in private security content development...
...iAppSecure Solutions Pvt. Ltd. is seeking a Security Analyst for the #Ahmedabad location who can conduct vulnerability assessments and penetration testing of web and mobile applications. Candidates must possess good technical, logical, and communication skills. The ability...
...Architect, Cloud Architectures & DevOps/DataOps/MLOPS Frameworks
• Should have provided solutions with Data Governance (Data Quality, Security, Lineage, Data Life Cycle Management practices, Catalog/Metadata Management, Business Glossary)
• Created Valuable & reusable assets...
...solutions that cater to the unique needs of our clients.
Responsibilities:
~ leads through proactive prospecting, networking and secure new business opportunities.
~ a robust pipeline of leads through email, networking events, and social media.
~ a list of...
...and play a pivotal role in driving our company's growth! As a Business Developer, you'll be responsible for identifying, pursuing, and securing new business opportunities. Your key responsibilities will include:
- Conducting market research and analysis to identify potential...
...Open to traveling for business.
Accops empowers modern enterprises with agility, flexibility, and affordability by providing secure and instant remote access to business applications from any device and network. Founded in October 2012, Accops is headquartered in Pune...
...This is a remote position.
Role : Cyber Security Engineer
Team : Infrastructure
Dept: Digital & Technology
Job Description:
As a Cybersecurity Engineer at flydocs you will be responsible for designing implementing and managing cybersecurity solutions...
...: Node Js Developer
Responsibilities
Develop and maintain code for interconnected software systems with an eye to quality and security, using Agile Scrum processes.
Deliver proven and validated code with automated contract, unit, integration, and functional tests....
...efficiency.- Troubleshoot network issues and provide timely resolutions to minimize downtime and disruptions.- Implement and maintain network security measures, including firewalls, intrusion detection systems, and regular security audits.- Manage device inventory, including tracking...
...Responsible for design and sustenance of a robust IT security framework and policies for the Adani Group; Lead the IT Audit, Assurance, Risk Management & Cyber resilience for the organization Works towards building a holistic culture of Security across an organization aimed...
...and other stakeholders to ensure a cohesive approach.
~ Review code written by junior/intermediate developers for quality, security, and adherence to best practices.
~ Address any bugs, issues, or technical debt that may have arisen.
~ Work on developing...
Rs 2 - 5 lakhs p.a.
...Designation : Supervisor Security/ Security In-charge
Qualification : Any Bachelor Degree, Ex- NCC serviceman
Total experience : 2 - 5 years
Total Position : 2
Gender : Male
Location : Sachin, GIDC
Salary Range : Upto 3.5 LPA
1. Having Good Knowledge of safety...
Security Guards duties often include securing premises and personnel by patrolling property monitoring surveillance equipment and inspecting buildings and equipment. Security Guards duties can also access points as well as permitting or prohibiting entry.
meeting with clients...
...oversee the development and maintenance of the university's IT infrastructure, including networks, servers, and databases.- To ensure the security and integrity of data and systems.- To foster a culture of innovation and collaboration to support technological advancements in...
votre rôle
Position : Security Consultant
Location : Onsite - Gujarat
• State Data Center IT Infrastructure Security Management.
• Vulnerability Management
• Major and Critical Incident with respect to Security Domain
• Log Analysis
• Incident Management...
Rs 12 - 15 lakhs p.a.
1) Job Purpose: Write the purpose for which the job exists (in 2-3 lines)
To plan, develop and implement strategies in Security & Intelligence to meet organizational goals and achieve synergy in business.
· Visitor Management
· Traffic Management
2) Dimensions...
...students and controlling left-outs. 4. Ensure adherence to all legal and operational compliances, oversee the safety of facilities and security of students. 5. Educating the team about product portfolio and adherence to process compliance. 6. Responsible for hiring, rostering,...
...cross-functional teams to identify and implement improvements to our IT infrastructure, including hardware, software, networks, and security systems.
• Monitor the performance and availability of IT systems and infrastructure components, proactively identifying and addressing...
...and sectors. Who You Are ? - 7+ years of experience evangelizing enterprise technology, with a particular focus on disruptive cyber security technologies. - 100% professional and highly motivated with excellent analytic and negotiation skills. - Consistent track record of over...
...testable, and efficient code
Design and implementation of low-latency, high-availability, and performant applications
Implementation of security and data protection
MERN software developer must have good communication & interpersonal skills...
...be of interest to clients.
Crafting business proposals and contracts to draw in more revenue from clients.
Negotiating with clients to secure the most attractive prices.
Equipping staff with the technical and social skills needed to enhance sales.
Reviewing clients' feedback...
Rs 10 - 15 lakhs p.a.
...Lead company to SOC2/ISO 27001 certification;
Develop and maintain information security policies;
Design and implement information security policy education, training, and awareness programs;
Establish security risk matrix and framework; select security solutions to...
...business processes.
Developing high-performance applications by writing testable, reusable, and efficient code.
Implementing effective security protocols, data protection measures, and storage solutions.
Running diagnostic tests, repairing defects, and providing technical...
...testable, and efficient code
Design and implementation of low-latency, high-availability, and performant applications
Implementation of security and data protection
MERN software developer must have good communication & interpersonal skills...
Rs 1.24 - 1.3 lakhs p.a.
...Job description
Job Summary
Check figures, postings, and documents for accuracy. Organize, secure, and maintain all files, records, cash and cash equivalents in accordance with policies and procedures. Record, store, access, and/or analyze computerized financial information...