In the last month a large number of enterprises were flooded by unseasonal and incessant rain; the situation was such that people shelved differences and collectively in unison worked to save human lives. Stories of valor and selflessness published and circulated on social media gladdened the heart
17.12.2015
1. Efficient in auditing the information security systems.
2. Skillful at leading, guiding and managing team activities.
3. Knowledge and experience in industry best risk management frameworks
4. Implementing & monitoring Compliance with Information Security policies & procedures
5. Developing Information Security policies, processes & procedures
6. Conducting Compliance review programs
7. Information Security Governance & Enterprise Risk Management
8. Performing Risk Assessment programs & defining strategies to address the identified risks
9. Developing Risk Treatment plans
10. Planning & conducting regular Internal Audits
11. Participating in Information Security External Audits
12. Conducting regular Vulnerability Assessment Programs
13. Developing Service Metric Reports and Management Reporting
14. Developing Business Continuity plan for each and every project & conducting Business Impact Analysis
15. Fair knowledge of network and systems technologies, Web Content Filtering, Web Reporting, Firewalls & Networking devices
- IT-Software/Software Services
- IT-Hardware & Networking
IT Software - Network Administration / Security
System Security
- B.E
- B.Tech
- M.Tech
- Applied Marine Information Technology and Communitcation
- (Hons.) Humanities and Social Sciences
- Economics
- IT
2
- Bangalore
- Kochi
- Trivandrum