BOOLEAN STRING RESULTS
Description String Industry
Technical Program Manager with CyberSecurity ("Program Mgr" OR "Program Manager" OR "Program manager" OR "program manager" OR "Program Management" OR "Program management" OR "program management") AND (cybersecurity OR Cybersecurity OR "Cyber Security" OR "Cyber security" OR "cyber security") AND ("Identity Access Management" OR CyberArk OR CISM OR CISSP OR "Identity and Access Management" OR NIST OR SailPoint OR IDAM OR IAM OR "Identity Management" OR SSO OR "Identity & Access Management" OR SiteMinder OR "Site Minder" OR CIRM OR eGRC OR CSSP OR "Ping Identity" OR PingFederate OR "Ping Federate" OR RSA OR SOC OR PAM) Mechanical or Industrial Engineering
Identifying Jobs on recruitment Talent Partner OR Talent Acquisition OR Technical recruiter OR IT Recruiter OR Talent Management OR Senior Recruiter OR Senior IT Recruiter Information Technology & Services
UX Architect ("UX Architect") AND ("UX Strategy" OR("Fidelity") OR("UI Libraries") OR("Wireframes")) AND ("Prototypes" OR("Screen Flows") OR("Artifacts") OR("User Journeys")) AND ("HTML" OR("CSS") OR("JavaScript") OR("Senior stakeholders and managers") OR("Production Team")) Information Technology & Services
Warehouse Worker (MANUFACTURING OR ASSEMBLY OR ASSEMBLER OR ASSEMBLING OR ASSEMBLE OR PICK OR PICKING OR PACK OR PACKING OR PACKAGING OR PACKAGE OR SORT OR SORTING OR CARRY OR CARRYING OR SHIPPING OR STUFFING OR LIFT OR LIFTING OR LOAD OR LOADING OR UNLOAD OR UNLOADING OR STACKER OR STACKING OR PALLET OR PALLETIZE OR WAREHOUSE OR PRODUCTION OR FORKLIFT) Warehousing
CAD designer role "CAD Designer" OR "Electrical harnesses" OR "harness design" OR "Electrical Harnesses 2D – 3D" OR "2D" OR "3D" AND "Catia V5" OR "Catia V6" Automotive
Experience in Nautilus/on Base with image + data conversion Nautilus OR OnBase AND Image AND Data Conversion Computer & Network Security
UI/UX Designer/Developer (“UX” OR "USER EXPERIENCE" OR “GRAPHIC” OR “VISUAL” OR “INTERACTION”) AND (“CSS” OR “HTML”) OR (“SKETCH” OR “DREAMWEAVER” OR “PHOTOSHOP” OR “ILLUSTRATOR” OR “WIREFRAMES”) AND (“WEB” OR "FRONT END" OR “FRONT-END” OR “FRONTEND” OR “UI” OR “USER INTERFACE”) AND (“JAVASCRIPT” OR “JS”) AND (“MATERIAL UI” OR “MUI”) AND (“BACKSTAGE” OR “D3”) Telecommunications
UI/UX Designer (“UX” OR "USER EXPERIENCE" OR “GRAPHIC” OR “VISUAL” OR “INTERACTION” OR “WEB” OR "FRONT END" OR “FRONT-END” OR “FRONTEND” OR “UI” OR “USER INTERFACE”) AND (“CSS” OR “HTML”) OR (“SKETCH” OR “DREAMWEAVER” OR “PHOTOSHOP” OR “ILLUSTRATOR” OR “WIREFRAMES”) AND (“JAVASCRIPT” OR “JS”) AND (“MATERIAL UI” OR “MUI”) AND (“BACKSTAGE” OR “D3”) Banking
Wealth Manager Roles and Responsibilities:  Acquiring HNI/ UHNI clients through networking, database, market analysis, and references  Maintain client relationships and generate AUM from HNI/Ultra HNI clients  Achieve the financial goals of the clients through various product line  Key products are - MF, Bonds, AIF, Unlisted shared, Trading – Equity, Commodities & Currency, in-house Arbitrage strategy, MLD, Corporate FDs, Loans – Secured & Unsecured, Real Estate advisory  Advise HNI/Ultra HNI clients on their Investments and managing their overall financial portfolio  Coordinate with product and research teams to taking investment decisions for the clients  Achieve budgeted targets in terms of the number of clients/volume of business & assets  Share regular communications with clients regarding information, research, and material of the organization Desired Candidate Profile:  Detailed product knowledge of Key investment products - MF, Bonds, AIF, Insurance, Unlisted shared, Trading – Equity, Commodities & Currency  Preferably handling AUM of 20cr. and above  Should have excellent social/ interpersonal skills  Should be okay with Client Acquisition (B2C ("Wealth Manager or "Relationship Manager") AND ("Mutual fund" or "Securities" or "Investment" or "Shares") Banking
Securing Engineer Cyber and security AND ("network security" OR encryption OR authentication OR cryptography OR "compliance" OR "information security" OR "computer security" OR cybersecurity OR "cyber security" or INFOSEC) AND (malware OR antivirus OR worm OR trojan OR spam OR phishing OR fraud OR exploit OR vulnerability OR pki OR ids OR ips OR "access control" OR audit OR policy OR dlp OR "data loss protection" OR compliance OR cissp OR pci OR risk OR privacy OR identity OR forensics OR intrusion OR attack OR ddos or DLP) Computer & Network Security