• The ideal candidate will have experience supporting & managing vulnerability scanning tools and technologies in an enterprise environment• Develop and maintain a vulnerability assessment database/repository
We are hiring for SOC Analyst (Junior / Senior) able to be part of SOC team for security services delivery with 5+ years of Security Operations Centre (SOC) experience in conducting security analysis..
• A degree in Information Technology, Information Security or related major and 2-6 years of direct experience in the field of cybersecurity. • Good Understanding of current PCI DSS requirements, OWASP Top 10.
Good experience in dealing/handling GLC account’s customer is a pre-requisite requirement; best fit candidate should have experience in both GLC and services sales or without services sales exp but must have GLC customer dealing experience
We are hiring for Presales, SOC able to be part of Sales team for security services business development with 5+ years of Security Operations Centre (SOC) experience, particularly security services business.
The Network Engineer for Network Solution Business is responsible to provide post-sales functions related to Network infrastructure for sales team. Work on a daily basis with customers (internal and external) or business partners to provide consult
Candidate should have at least 15 years of experience in development / architecture with a minimum 5 years as Architecture lead. Must have development experience using Java (preferably using Spring Boot platform).
Required Skills:- • Banking or Insurance Industry experience • Background in one or more of the following areas (Capital Markets, Retail/Commercial Banking, eBanking/Electronic Payments, Risk, Compliance or Capital Markets)
Required Skills: Strong communicator PMP certified; been working with Agile 5 years and above in BFSI and up to max of 10 - 12 years of total experience Worked with vendor who are supporting BFSI, Compliance projects
We are hiring for Head of Cyber Security (MSSP) accountable to safeguard all IT systems and operations from potential security threats and exposure through the development, execution and enforcement of information security controls and policies