Jobs Job Description Apply now Start Please wait... Job Title: Cyber Security Analyst L3 Req Id: 112889 City: Pune State/Province: Maharashtra... analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis...
Jobs Job Description Apply now Start Please wait... Job Title: Cyber Security Analyst L4 Req Id: 111431 City: Pune State/Province: Maharashtra... analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis...
. Req Id : 112202 Job Title : Enterprise Security Posture Management Analyst Business Unit sector : CPL-BECIO-CIO... Job Summary The Enterprise Security Posture Management Analyst will oversee the identification, assessment, and mitigation...
and technology products that create value and deliver company results across critical areas of their business. Bring your curiosity... for learning, bold ideas, courage and passion to drive life-changing impact to ZS. We are hiring Senior Offensive Security...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
to understand their security requirements in business processes and IT projects, to enhance overall risk management. Execution...Join us as a “Security Application Support Analyst " at Barclays, where you'll spearhead the evolution of our digital...
to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause... in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist...
potential. Title and Summary Physical Security Analyst II Role Summary The Physical Security SOC Analyst II is a mid... and other business units . · Integrity & Discretion: Demonstrates confidentiality and professionalism when handling sensitive security...
potential. Title and Summary Senior Physical Security Analyst Job Summary: The individual will be responsible... and security of personnel, assets, and facilities. This role manages security personnel, vendors, and technologies to minimize risk...
Job Description Position: Information Security & Control Analyst II Location: Pune, MH Experience Range: Relevant... 3 to 5 years Mode of work: 5 days (office) Job Mission: The Information Security & Control Analyst II or IT...