ComputerSecurity | ComputerSecurityIsnNational Institute OfStandards And Technologye | , , India
main-logo
Profile-Photo
ComputerSecurity
 
Not Disclosed
00.0 Lac (s) / Yearly
30 Days
India
Current
ComputerSecurityIsnNational Institute OfStandards And Technologye
Education
(Ma)
University
Dom Estic
Skills
management test method technological change reciprocity multi-factor authentication information sharing digital signature business process information assurance acceptable use policy vulnerability scanning system development security functional requirement smart tv network protocol design gnu make acting adware leadership built environment nonce common controls restoration secret key track geometry economy quality assurance financial system conversions network service computing information and communications technology purchasing supervision stock selection criterion public key infrastructure resource management development review antivirus software incident response draft checklists fips flash legislation advisories buckling magnetic tape bmc control-m enhanced digital access communication system (edacs) federal information security management act vulnerability management installation milestones policy development system recovery name server standard operating procedure chart datum (cartography) persistence bios transformation performance monitor return on investment raid coordinating exploitation admissions operation ethernet local area network intrusion detection and prevention remedial action system of systems engineering checksum continuous monitoring cost accounting organization information technology management adapters accent reduction cloud case financial asset advanced snort (intrusion detection system) advanced encryption standard (aes) social engineering smart card application protocol data unit archive file process control mobility auditing mailing list system configuration project management session beans supply chain risk management information access assessment and authorization authorization probability defense in depth fault tolerance configuration management physical and environmental security mime cryptography custom function security technology sanitization supply chain intangible assets hardening convention centers ciphertext information gathering memory protection research network performance less risk analysis planning opera archives penetration testing disaster recovery plan desktop communication protocol (dcop) mitigation electronic messaging corrective maintenance spyware inquiry information warfare life cycle planning contrast medium federal information processing standards (fips) cloud storage system call investments usability custom software transparency phishing intrusion detection intellectual property security policy information privacy generally accepted auditing standards resource allocation trustworthiness transmission security awareness information audit physical security technical support interoperability executable policy enforcement dissemination environmental control viruses computer security data element reliability user account control information technology trade secret law computer hardware international standard bibliographic description system administration management system perspective (graphical) freedom of information act organizational structure system software personally identifiable information lftp - sophisticated file transfer program cryptographic hash functions parameter brinell scale resource acquisition security clearance risk management firmware management process guarding information security management algorithms vulnerability furnishing fault test case data integrity risk management planning consumer database management system trusted computing base secure/multipurpose internet mail extensions (s/mime) procurement privacy law federal law cyber security strategy organizational communication cryptographic keys system 7 audit trail mapping insurance concept of operations enforcement civil defense emergency preparedness differential phase extensible authentication protocol risk reduction acquisition processes operational planning information organization framing service provider network computer system control electronic document system architecture system identification criminal procedure accounting absolute manage service desk multidisciplinary approach swift usb mass storage device class industrial process public key cryptography public law telecommunications pelco (security system) honeypots permutation investigation pretty good privacy (pgp) host based security system (hbss) access control encompass hp cloud service automation software disaster recovery deterrence account management advance design system yields data structure alignment fire suppression systems help system writing indirect costs architectural design computer virus disk drive data quality ping android (operating system) encryption strategic human resource planning automation current source security engineering internal control implementation business information system numbers espionage resourcing typing functional testing preparedness public key certificates system life cycle cryptographic module validation programs sampling mobile device management amx programming target audience editing firewall biometrics insider threat risk management framework collaboration communication retina system integrity single sign-on (sso) infrastructure enterprise architecture ethical responsibility nist 800 software development logging program management stamping industrial control information processing data center operations technical analysis data entry establishing trust contingency plan input/output customer service local security policy sabre (computer system) character animation environmental protection public service communications external storage bargaining organizational awareness management control private automatic branch exchange interconnection accountability ad tracking access control list imaging lymph nodes

Expected Salary

Not Disclosed
Employment Preference

Full Time
Mobile

-
Email

Work Experience

Data not Available
Educational Details

Data not Available
Professional Certificate

Data not Available
Profile-Photo
Quality Assurance Team Lead
New Delhi Delhi India
3y 7m
₹8 Lac(s) / Yearly 
15 Days
Current
MBD Group
Pref.Location
Noida Gurugram Delhi
Education
Bachelor of Technology – Btech
School
YMCA university of science and technology , Faridabad
Skills
postman load testing mysql api testing saas +View more
Profile-Photo
Inside Sales Accounts Manager
New Delhi Delhi India
11y
₹18 Lac(s) / Yearly 
30 Days
Current
JoVE
Pref.Location
Delhi
Education
Post Graduation Diploma in Management – PGDM
School
shobhit university
Skills
Inside Sales B2B Sales IT Product Sales Customer Acquisition Customer Relationship +View more
Profile-Photo
Senior Software Developer
Kolkata West Bengal India
10y
₹20 Lac(s) / Yearly 
30 Days
Current
TekisHub Consulting Services
Pref.Location
Kolkata
Education
Bachelor of Commerce – Bcom
School
Calcutta University
Skills
Spring Boot Microservices Design Patterns Singleton Hibernate +View more
Profile-Photo
Service Desk Technician
Hyderabad Telangana India
9y
₹7.28 Lac(s) / Yearly 
30 Days
Current
Bell Integration
Pref.Location
Pune Mumbai Chennai Bengaluru Ahmedabad Hyderabad Mumbai
Education
Bachelor of Technology – Btech
School
Oriental College of Technology, Bhopal
Skills
IT Helpdesk Helpdesk Ticketing Citrix Azure Active Directory +View more
Profile-Photo
Customer Success Manager
Cochin Kerala India
10y
₹11.5 Lac(s) / Yearly 
60 Days
Current
Agilite Group Technologies Pvt Ltd
Pref.Location
Education
Post Graduation Diploma in Management – PGDM
School
IPU, New Zealand
Skills
client retention relationship management csat cross selling upselling +View more