Technical Program Manager with CyberSecurity |
("Program Mgr" OR "Program Manager" OR "Program manager" OR "program manager" OR "Program Management" OR "Program management" OR "program management") AND (cybersecurity OR Cybersecurity OR "Cyber Security" OR "Cyber security" OR "cyber security") AND ("Identity Access Management" OR CyberArk OR CISM OR CISSP OR "Identity and Access Management" OR NIST OR SailPoint OR IDAM OR IAM OR "Identity Management" OR SSO OR "Identity & Access Management" OR SiteMinder OR "Site Minder" OR CIRM OR eGRC OR CSSP OR "Ping Identity" OR PingFederate OR "Ping Federate" OR RSA OR SOC OR PAM)
|
Mechanical or Industrial Engineering |
Identifying Jobs on recruitment |
Talent Partner OR Talent Acquisition OR Technical recruiter OR IT Recruiter OR Talent Management OR Senior Recruiter OR Senior IT Recruiter
|
Information Technology & Services |
UX Architect |
("UX Architect") AND ("UX Strategy" OR("Fidelity") OR("UI Libraries") OR("Wireframes")) AND ("Prototypes" OR("Screen Flows") OR("Artifacts") OR("User Journeys")) AND ("HTML" OR("CSS") OR("JavaScript") OR("Senior stakeholders and managers") OR("Production Team"))
|
Information Technology & Services |
Warehouse Worker |
(MANUFACTURING OR ASSEMBLY OR ASSEMBLER OR ASSEMBLING OR ASSEMBLE OR PICK OR PICKING OR PACK OR PACKING OR PACKAGING OR PACKAGE OR SORT OR SORTING OR CARRY OR CARRYING OR SHIPPING OR STUFFING OR LIFT OR LIFTING OR LOAD OR LOADING OR UNLOAD OR UNLOADING OR STACKER OR STACKING OR PALLET OR PALLETIZE OR WAREHOUSE OR PRODUCTION OR FORKLIFT)
|
Warehousing |
CAD designer role |
"CAD Designer" OR "Electrical harnesses" OR "harness design" OR "Electrical Harnesses 2D – 3D" OR "2D" OR "3D" AND "Catia V5" OR "Catia V6"
|
Automotive |
Experience in Nautilus/on Base with image + data conversion |
Nautilus OR OnBase AND Image AND Data Conversion
|
Computer & Network Security |
UI/UX Designer/Developer |
(“UX” OR "USER EXPERIENCE" OR “GRAPHIC” OR “VISUAL” OR “INTERACTION”) AND (“CSS” OR “HTML”) OR (“SKETCH” OR “DREAMWEAVER” OR “PHOTOSHOP” OR “ILLUSTRATOR” OR “WIREFRAMES”) AND (“WEB” OR "FRONT END" OR “FRONT-END” OR “FRONTEND” OR “UI” OR “USER INTERFACE”) AND (“JAVASCRIPT” OR “JS”) AND (“MATERIAL UI” OR “MUI”) AND (“BACKSTAGE” OR “D3”)
|
Telecommunications |
UI/UX Designer |
(“UX” OR "USER EXPERIENCE" OR “GRAPHIC” OR “VISUAL” OR “INTERACTION” OR “WEB” OR "FRONT END" OR “FRONT-END” OR “FRONTEND” OR “UI” OR “USER INTERFACE”) AND (“CSS” OR “HTML”) OR (“SKETCH” OR “DREAMWEAVER” OR “PHOTOSHOP” OR “ILLUSTRATOR” OR “WIREFRAMES”) AND (“JAVASCRIPT” OR “JS”) AND (“MATERIAL UI” OR “MUI”) AND (“BACKSTAGE” OR “D3”)
|
Banking |
Wealth Manager Roles and Responsibilities:
Acquiring HNI/ UHNI clients through networking, database, market analysis, and references
Maintain client relationships and generate AUM from HNI/Ultra HNI clients
Achieve the financial goals of the clients through various product line
Key products are - MF, Bonds, AIF, Unlisted shared, Trading – Equity, Commodities &
Currency, in-house Arbitrage strategy, MLD, Corporate FDs, Loans – Secured & Unsecured,
Real Estate advisory
Advise HNI/Ultra HNI clients on their Investments and managing their overall financial
portfolio
Coordinate with product and research teams to taking investment decisions for the clients
Achieve budgeted targets in terms of the number of clients/volume of business & assets
Share regular communications with clients regarding information, research, and material of
the organization
Desired Candidate Profile:
Detailed product knowledge of Key investment products - MF, Bonds, AIF, Insurance,
Unlisted shared, Trading – Equity, Commodities & Currency
Preferably handling AUM of 20cr. and above
Should have excellent social/ interpersonal skills
Should be okay with Client Acquisition (B2C |
("Wealth Manager or "Relationship Manager") AND ("Mutual fund" or "Securities" or "Investment" or "Shares")
|
Banking |
Securing Engineer |
Cyber and security AND ("network security" OR encryption OR authentication OR cryptography OR "compliance" OR "information security" OR "computer security" OR cybersecurity OR "cyber security" or INFOSEC) AND (malware OR antivirus OR worm OR trojan OR spam OR phishing OR fraud OR exploit OR vulnerability OR pki OR ids OR ips OR "access control" OR audit OR policy OR dlp OR "data loss protection" OR compliance OR cissp OR pci OR risk OR privacy OR identity OR forensics OR intrusion OR attack OR ddos or DLP)
|
Computer & Network Security |