Clear Filter✗
Jobs by Location
Jobs by Role
- Security Architect / Consultant(8)✗
₹ Not disclosed Kolkata
. Educational Qualification : 15 years full time education Qualification . 15 years full time education . Must have skills : SailPoint IdentityIQ . Good to have skills : SailPoint IdentityNowMinimum...view more
₹ Not disclosed Kolkata
. Educational Qualification : 15 years full time education Qualification . 15 years full time education . Must have skills : SAP Governance Risk and Compliance (SAP GRC) . Good to have skills : NAMi...view more
₹ Not disclosed Nagpur
. Educational Qualification : 15 years full time education Qualification . 15 years full time education . Must have skills : Security Governance . Good to have skills : NAMinimum . 18 year(s) of exp...view more
₹ Not disclosed Nagpur
. Educational Qualification : 15 years full time educationAdditional Information:- The candidate should have a minimum of 12 years of experience in ServiceNow Governance,Risk,and Compliance (GRC)- Th...view more
₹ Not disclosed Nagpur
. Educational Qualification : 15 years full time education Qualification . 15 years full time education . Must have skills : Identity and Access Management (IAM) Operations . Good to have skills : N...view more
₹ Not disclosed Kolkata
. Educational Qualification : 15 years full time education Qualification . 15 years full time education . Must have skills : SailPoint IdentityNow . Good to have skills : NAMinimum . 3 year(s) of ex...view more
₹ Not disclosed Kolkata
Zscaler ZTNA,Netskope,Cloudflare WAFHands on experience to skybox,firemon,Tufin Firewall rule review toolCheckpoint,Cisco,Palo alto Certifications,Cloud certificationExperince on Infra Security tools ...view more
₹ Not disclosed Nagpur
. Educational Qualification : 15 years full time education . Must have skills : Palo Alto Networks Prisma Access Secure Access Service Edge (SASE) . Good to have skills : NAMinimum . 5 year(s) of exp...view more
Content provided by Accenture, Info Edge India Limited disclaims all warranties against infringement.
Visit Security Guidelines and Terms and conditions for more comprehensive information in this regard.