ComputerSecurity | ComputerSecurityIsnNational Institute OfStandards And Technologye | , , India
main-logo
Profile-Photo
ComputerSecurity
 
Not Disclosed
00.0 Lac (s) / Yearly
30 Days
India
Current
ComputerSecurityIsnNational Institute OfStandards And Technologye
Education
(Ma)
University
Dom Estic
Skills
management test method technological change reciprocity multi-factor authentication information sharing digital signature business process information assurance acceptable use policy vulnerability scanning system development security functional requirement smart tv network protocol design gnu make acting adware leadership built environment nonce common controls restoration secret key track geometry economy quality assurance financial system conversions network service computing information and communications technology purchasing supervision stock selection criterion public key infrastructure resource management development review antivirus software incident response draft checklists fips flash legislation advisories buckling magnetic tape bmc control-m enhanced digital access communication system (edacs) federal information security management act vulnerability management installation milestones policy development system recovery name server standard operating procedure chart datum (cartography) persistence bios transformation performance monitor return on investment raid coordinating exploitation admissions operation ethernet local area network intrusion detection and prevention remedial action system of systems engineering checksum continuous monitoring cost accounting organization information technology management adapters accent reduction cloud case financial asset advanced snort (intrusion detection system) advanced encryption standard (aes) social engineering smart card application protocol data unit archive file process control mobility auditing mailing list system configuration project management session beans supply chain risk management information access assessment and authorization authorization probability defense in depth fault tolerance configuration management physical and environmental security mime cryptography custom function security technology sanitization supply chain intangible assets hardening convention centers ciphertext information gathering memory protection research network performance less risk analysis planning opera archives penetration testing disaster recovery plan desktop communication protocol (dcop) mitigation electronic messaging corrective maintenance spyware inquiry information warfare life cycle planning contrast medium federal information processing standards (fips) cloud storage system call investments usability custom software transparency phishing intrusion detection intellectual property security policy information privacy generally accepted auditing standards resource allocation trustworthiness transmission security awareness information audit physical security technical support interoperability executable policy enforcement dissemination environmental control viruses computer security data element reliability user account control information technology trade secret law computer hardware international standard bibliographic description system administration management system perspective (graphical) freedom of information act organizational structure system software personally identifiable information lftp - sophisticated file transfer program cryptographic hash functions parameter brinell scale resource acquisition security clearance risk management firmware management process guarding information security management algorithms vulnerability furnishing fault test case data integrity risk management planning consumer database management system trusted computing base secure/multipurpose internet mail extensions (s/mime) procurement privacy law federal law cyber security strategy organizational communication cryptographic keys system 7 audit trail mapping insurance concept of operations enforcement civil defense emergency preparedness differential phase extensible authentication protocol risk reduction acquisition processes operational planning information organization framing service provider network computer system control electronic document system architecture system identification criminal procedure accounting absolute manage service desk multidisciplinary approach swift usb mass storage device class industrial process public key cryptography public law telecommunications pelco (security system) honeypots permutation investigation pretty good privacy (pgp) host based security system (hbss) access control encompass hp cloud service automation software disaster recovery deterrence account management advance design system yields data structure alignment fire suppression systems help system writing indirect costs architectural design computer virus disk drive data quality ping android (operating system) encryption strategic human resource planning automation current source security engineering internal control implementation business information system numbers espionage resourcing typing functional testing preparedness public key certificates system life cycle cryptographic module validation programs sampling mobile device management amx programming target audience editing firewall biometrics insider threat risk management framework collaboration communication retina system integrity single sign-on (sso) infrastructure enterprise architecture ethical responsibility nist 800 software development logging program management stamping industrial control information processing data center operations technical analysis data entry establishing trust contingency plan input/output customer service local security policy sabre (computer system) character animation environmental protection public service communications external storage bargaining organizational awareness management control private automatic branch exchange interconnection accountability ad tracking access control list imaging lymph nodes

Expected Salary

Not Disclosed
Employment Preference

Full Time
Mobile

-
Email

Work Experience

Data not Available
Educational Details

Data not Available
Professional Certificate

Data not Available
Profile-Photo
Python Developer
Dehradun Uttarakhand India
4y 5m
₹16 Lac(s) / Yearly 
60 Days
Current
Faxoc Jobs & HRMS
Pref.Location
Hyderabad Bengaluru Noida
Education
Master of Technology – Mtech
School
Indian Institute Of Technology (IIT Patna)
Skills
Production Support Software Development Talent Acquisition Npm Governance +View more
Profile-Photo
Technical Lead Fullstack Developer
Mumbai Maharashtra India
13y 7m
₹22 Lac(s) / Yearly 
15 Days
Current
Wipro Limited
Pref.Location
Mumbai Bengaluru Hyderabad Ahmedabad greater noida
Education
Bachelor of Technology – Btech
School
dr. a.p.j. abdul kalam techincal university lucknow
Skills
Management Centos Linux Server Shopify Bitbucket +View more
Profile-Photo
Senior QA Engineer
bengaluru karnataka india
4y 5m
₹10 Lac(s) / Yearly 
30 Days
Current
Quantum StreetAi
Pref.Location
New Delhi Bangalore Urban Pune Mumbai Kolkata
Education
Bachelor of Technology – Btech
School
bput,orissa
Skills
Jira Agile Methodology Postman Json Agile +View more
Profile-Photo
Backend Engineer
Pune Maharashtra India
3y 3m
₹5 Lac(s) / Yearly 
Immediate Joi ...
Current
Velox Solutions
Pref.Location
Pune
Education
PG
School
Acts College
Skills
Rest Api Java 11 Json Soap Version Control +View more
Profile-Photo
Web Developer
Noida Uttar Pradesh India
6y 8m
₹17 Lac(s) / Yearly 
Immediate Joi ...
Current
Web4Bharat
Pref.Location
Pune Delhi Noida Hyderabad
Education
Bachelor of Computer Application – BCA
School
Makhanlal Chaturvedi National university of journalish and communication Bhopal
Skills
Javascript Bootstrap Node.Js Css Html5 +View more