...Administering Process Control applications in IT/Business network in coordination with IT.
Ensures the Compliance with the OT Cybersecurity requirements as per the applicable regulations without any impact on APC Functionality.
QUALIFICATIONS, EXPERIENCE:...
...security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity
# Monitoring and safeguarding the log sources and security access
# Planning for disaster recovery in the event of any...
...experience
2.
Process Adherence
Adherence to SLA’s (90-95%), response time and resolutiontime TAT
~10+ years of overall Cybersecurity experience with an interest to learn Industry 4.0, OT & IoT Security adaptive security approaches
~ Must have experience in...
...backups.
Managing user accounts & computers.
Managing network devices day-to-day operation and troubleshooting.
Managing cybersecurity controls day-to-day operation & troubleshooting.
Participate in OT cybersecurity assessment against national standard,...
...Educational Qualifications: Bachelor's degree in information technology, cybersecurity, or similar field. Recognized cybersecurity certifications such as CISSP, CEH, CompTIA Security+ are preferred.
Experience: Practical experience in the field of cybersecurity. Regular...
...qualifications:
Bachelor's degree in computer science, information security, computer engineering, or related field.
Recognized cybersecurity certifications such as CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional), or CompTIA...
...Application, Cloud, Network, IT Infrastructure and etc
Good experience in troubleshooting and resolving issues related to Firewall, Cybersecurity Attack, Threat Management, Vulnerability and etc
Good understanding of the Cyber Security monitoring, process, flow best...
...degree is a plus.
Proven experience in IT consulting, with a strong understanding of IT infrastructure, systems integration, and cybersecurity.
Expertise in a variety of technologies and platforms, including cloud computing, networking, and database management....
...degree in computer science, information security, or related field.
At least 5-7 years of experience in application security or cybersecurity.
Technical knowledge:
Deep understanding of application and software security concepts and methods, including OWASP Top 10...
...University degree in a related field such as cybersecurity, electronic security, computer science, or equivalent.
Practical experience in the field of security, especially in security coordination, preferably prior experience in areas such as design and implementation...
...part of a team in a fast-paced environment.
Flexibility to work evenings, weekends, and holidays as needed.
Knowledge of cybersecurity best practices and data protection regulations is a plus.
Benefits:
Competitive salary based on experience.
Comprehensive...
...University degree in a related field such as information technology, cybersecurity, security management, or a related field.
Deep knowledge of cybersecurity methods and best practices in the field of security.
A comprehensive understanding of network systems and...
...University degree in a related field such as cybersecurity, risk management, engineering, or any related discipline.
Deep knowledge of security incident and event management methods and related regulatory frameworks, such as NIST, ISO 27001, or other standards.
Ability...
...Technical knowledge:
Extensive practical experience in information technology and operating systems.
Knowledge of networking, cybersecurity and Human Resource Management Systems (HRMS).
Artistic skills:
Ability to install and maintain software and hardware....
...ability to deal tactfully with users and understand their technical needs.
Technical solutions skills:
Ability to diagnose and solve technical problems effectively and quickly.
Knowledge of the basics of networking, cybersecurity, and systems administration....
...of architectural and security systems design concepts and their applications in different environments.
Deep understanding of cybersecurity concepts and best practices for protecting systems, networks and data.
Ability to design and implement innovative and...