Information Security Engineer

Chennai, Tamil Nadu Saaki Argus & Averil Consulting

Posted today

Job Viewed

Tap Again To Close

Job Description

Key Responsibilities:

  • Configure, manage, and monitor network firewalls (e.g., Palo Alto, Fortinet, Cisco, Check Point).
  • Implement and maintain IPsec VPNs for secure remote access and site-to-site connectivity.
  • Administer and optimize Web Application Firewalls (WAF) to protect application traffic.
  • Deploy and manage reverse proxy solutions for secure internal application access.
  • Operate and maintain Secure Service Edge (SSE) and Secure Web Gateway (SWG) platforms (e.g., Cisco Umbrella, Zscaler, Netskope).
  • Analyze and document application traffic flow , identify bottlenecks, and implement secure data paths.
  • Investigate security incidents and generate reports using security logs and SIEM tools.
  • Participate in vulnerability management , threat assessments, and audit response activities.
  • Collaborate with other IT, network, and application teams to integrate security across projects.
  • Maintain up-to-date documentation on system configurations, procedures, and incident reports.


Qualifications and Skills:

Education:

  • Bachelor s degree in Information Technology, Computer Science, Cybersecurity, or related field.

Required Technical Skills:

  • 3+ years of hands-on experience in a cybersecurity or network security role.
  • In-depth knowledge of:
  • Firewall management (rules, NAT, policies)
  • IPsec VPN setup and troubleshooting
  • WAF platforms and configuration
  • Reverse proxy solutions (e.g., F5, NGINX, Apache)
  • SSE/SWG technologies and configurations
  • Understanding of basic network protocols and architecture (TCP/IP, HTTP/S, DNS, routing).
  • Familiarity with application working flows and traffic patterns.

This advertiser has chosen not to accept applicants from your region.

Information Security Engineer

Chennai, Tamil Nadu NTT DATA

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description

Role Summary:  Designs and implements technical solutions for protecting the confidentiality, integrity and availability of sensitive information. Provides technical evaluations of client systems and assists with making security improvements. Provides technical support in the areas of vulnerability assessment, risk assessment, network security and security implementation. Conducts testing and audit log reviews to evaluate the effectiveness of current security measures. Conducts security product evaluations, and recommends products, technologies and upgrades to improve the client’s security posture.

Responsibilities :

  • Customizes, validates, administers and supports a variety of enterprise wide information security platforms, systems, frameworks and applications, based on requirements provided by management;
  • Develops implementation plans related to information security for systems, tools, platforms, and frameworks.
  • Conducts security assessments of systems, tools, platforms, policies, procedures and frameworks.
  • Creates designs and diagrams related to information security for systems, tools, platforms, and frameworks.
  • Develops standard operating procedures for information security related to systems, tools, platforms, and frameworks.
  • Leads audits and reviews designs for information security issues.
  • Validates vulnerabilities identified during security testing, audits, and assessments, while reviewing for false positives.
  • Understands large scale multi-tenant software products supporting multiple government agencies.
  • Understands large scale software integrations of multiple software products.
  • Acts as source for direction, training and guidance for less experienced information security engineers.
  • Works with engineering teams to define and refine information security and systems management policies and settings.
  • Evaluates new and emerging products, technologies and make recommendations to leadership concerning introduction of new technologies.
  • Required Skills

  • > 6 years of information security experience for state and/or federal agencies required.
  • > 6 years of leading information security assessments, policy development, framework implementation, and tool implementation.
  • Must have knowledge of one or more of the following products: Broadcom Identity Manager, Identity Suite and Single Sign On.
  • Preferred Skills

  • Undergraduate degree
  • Certification from Information Security Program (CISM, CompTIA, GSEC, CISSP, etc.) Preferred.
  • Preferred knowledge of one or more of the following products: Dell Nutanix, Dell VxRail, VMware ESXi/vCenter/NSX/SRM, Microsoft Windows Server, RedHat Enterprise Linux, MS SQL Server, Nagios, NewRelic APM/Infrastructure/Browser, Octopus Deploy, Puppet, Splunk, Veracode.
  • Apply

    Listen to the story of Employee Voice

    Annette Barnabas

    Business Analysis Associate Director

    India

    Read more

    Vanathi Asok

    Director – Project and Application Services

    India

    Read more

    Swathi Sujir

    Business Operations Supervisor

    India

    Read more

    Apply Back to search results
    This advertiser has chosen not to accept applicants from your region.

    Information Security Engineer

    Chennai, Tamil Nadu Epergne Solutions

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Job Role : -Information Security Engineer


    Job Location : - Bangalore/Chennai


    Experience :- 6+ Years


    Job Roles & Responsibilities :-


    • Conduct vulnerability assessments and policy compliance scanning using tools like Qualys across on-prem, cloud, container environments, databases, web services, and infrastructure.
    • Validate scan results, eliminate false positives, and produce accurate, high-quality vulnerability reports.
    • Act as technical SME to analyze findings, trace root causes, and recommend sustainable remediations to support teams.
    • Maintain and share a knowledge base for vulnerability management, ensuring team-wide expertise.
    • Research emerging vulnerabilities, trends, and improvements in the vulnerability management lifecycle.
    • Communicate security policies, procedures, and compliance requirements clearly across all organizational levels.
    • Provide leadership support by stepping in for the team lead when needed.


    Job Skills & Requirements : -


    Experience & Education

    • 6+ years in information security
    • Degree in Engineering, Computer Science, or related field.
    • Industry certifications are a plus (e.g., CISSP, CISA, CISM, CRISC, CCNA/CCNP Security, CCIE).

    Technical Proficiency

    • Expert in vulnerability scanning and compliance tools (e.g., Qualys).
    • Skilled in assessing on-prem, cloud, container (Docker, Kubernetes), databases, and application stacks.
    • Experience with security infrastructure: firewalls, routers, switches, load balancers, proxies.
    • Strong analytical capabilities for root-cause analysis and risk assessment.

    Leadership & Communication

    • Able to guide remediation efforts and influence infrastructure/application teams.
    • Exceptional written and verbal communication, capable of clear reporting and policy articulation.
    • Strong organizational, time-management, and team mentorship skills.

    Additional Attributes

    • Proactive learner, adaptable to evolving threats and technologies.
    • Hands-on risk assessment and threat modeling expertise.
    • Ready to take on ad-hoc duties and support team leadership as needed.

    This advertiser has chosen not to accept applicants from your region.

    Senior Information Security Engineer

    Chennai, Tamil Nadu Epergne Solutions

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Job Role : -Senior Information Security Engineer


    Job Location : -Bangalore/Chennai


    Experience : - 8+ Years


    Job Roles & Responsibilities : -


    • Lead vulnerability assessments and policy compliance scans across on prem, cloud, container (Docker/Kubernetes), database, and web environments using tools like Qualys.
    • Validate scan results, eliminate false positives, and deliver accurate, actionable reports to stakeholders.
    • Serve as technical SME: analyze findings, diagnose root causes, and guide remediation efforts.
    • Develop and maintain a knowledge base to support continuous improvement and team expertise.
    • Stay current on emerging threats, tools, and VM lifecycle advancements; recommend service enhancements.
    • Communicate security requirements effectively across the organization and step in as interim team lead when necessary.


    Job Skills & Requirements : -


    Experience & Education

    • 8+ years in information security
    • Bachelor s in Engineering, CS, IT, or equivalent.
    • Industry certifications preferred: CISSP, CISA, CISM, CRISC, CCNA/CCNP/CCIE Security.

    Technical Expertise

    • Proficient with vulnerability scanning platforms (Qualys, Nessus, etc.), false-positive tuning, and compliance frameworks.
    • Experience across cloud, on prem systems, network devices (routers, firewalls, proxies), and infrastructure components.
    • Skilled in risk/threat assessment and security policy enforcement.
    • Familiar with containers, DDI (DNS/DHCP/IPAM), WAF/CDN/DDOS solutions (e.g., Infoblox, Zscaler, Imperva).
    • Advantageous: scripting (Python), and use of monitoring tools like Spectrum, SevOne, ThousandEyes, CyberArk, MS Entra ID.

    Soft Skills & Leadership

    • Excellent analytical, communication, and report-writing abilities.
    • Strong organizational and time-management skills.
    • Demonstrated leadership: capable of guiding teams, managing escalations, and fostering security culture.
    • Adaptable self-starter with a commitment to continuous learning and proactive problem solving.

    This advertiser has chosen not to accept applicants from your region.

    Information Security Analyst

    Chennai, Tamil Nadu Lexitas

    Posted 2 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    About the company

    Lexitas is a high growth company. The Company is built on a belief that having strong personal relationships with our clients, and providing reliable, accurate and professional services, is the driving force of our success.

    Lexitas offers an array of services including local and national court reporting, medical record retrieval, process service, registered agent services and legal talent outsourcing. Our reach is truly national as well as international.

    Lexitas is a MNC Company that has set up a subsidiary in Chennai, India – Lexitas India Pvt. Ltd. This Indian company will be the Lexitas Global Capability Center, helping build a world class IT development team, and over time serve as a Shared Services hub for several of the corporate functions.


    For More Information -


    This is a Full-Time Job located in Chennai, India.


    Summary:

    This position supports information security, privacy, risk and compliance programs and activities under the direction of the VP of Information Security or designated Information Security Manager. The position assists in developing and maintaining a comprehensive security program for Lexitas. Providing functional and technical support is important to maintain security posture and protection of electronically and physically stored information assets across our systems. Tasks include supporting design, implementation, configuration, documentation, and maintenance to mitigate risk to the business and its computing resources and assets, as well as collaborating with applicable providers, managing and monitoring tools, and facilitating applicable processes and procedures.


    Key Roles and Responsibilities :

    • Supports IT security, privacy, risk and compliance systems, processes, supporting activities, with the ability to lead activities and programs.
    • Monitors computer networks and associated tools and provider services for security, privacy, risk and compliance issues
    • Supports the project management, tracking, and documentation of Information, Privacy, Risk, and Compliance programs, processes, and activities
    • Investigate security breaches and cybersecurity incidents.
    • Documents security breaches and assesses impact.
    • Performs and/or supports security tests, risk assessments, and audits to uncover network, application, and process vulnerabilities and provides guidance and training to ensure violations do not persist.
    • Tracks and facilitates the mitigation of vulnerabilities to maintain a high security standard.
    • Supports best practices for IT security, privacy and compliance.
    • Performs and supports 3rd party vulnerability management and penetration testing.
    • Research security enhancements and makes recommendations to management.
    • Stays current on information technology trends and security standards.
    • Prepares reports that detail security, privacy, and compliance risk assessment findings.
    • Supports Security Operations Center functions including monitoring and supporting Incident Response activities.
    • Supports all related IT Security, Privacy, Risk and Compliance policies and provides guidance to the business.
    • Other Information Security, Privacy, Risk, and Compliance duties as required.


    Skills and Abilities:

    • Experience with computer network and application vulnerability management and penetration testing, and techniques.
    • Solid understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
    • Ability to identify and mitigate network and application vulnerabilities.
    • Good understanding of patch management
    • Proficient with various OS
    • Excellent written and verbal communication skills
    • Knowledge of firewalls, antivirus, and intrusion detection system concepts
    • Ability to support and document areas of Information Security, Privacy, Risk, and compliance processes and programs.
    • Ability to support incident response process.
    • Experience directing 3rd Party providers in the areas of Information Security, Privacy, Risk and Compliance
    • Support information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
    • Preferred KSA’s:
    • Strong working knowledge and experience with primary Information Security, Privacy, Risk, and compliance standards and frameworks such as NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.
    • Experience administering information security software and controls.
    • Experience supporting process for managing network and application security.
    • Network and system administration experience a plus.
    • Good understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices.
    • Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
    • Learns and monitors the business processes for the areas of primary support responsibility.
    • Support annual Security Baseline Audits and execution of recommendations.
    • As part of the technology team, performs “Help Desk” day-to-day tasks in support of Information Security, Privacy, Risk, and Compliance.



    Education and Experience:

    • Bachelor’s degree in computer science or related field strongly preferred.
    • IAT Level-2 technical certification strongly preferred (Comp TIA Security+ or CISSP) or ability to obtain within first 90 days of hire.
    • 5+ years’ experience performing role of Information Security Analyst or SOC
    • Demonstrated experience in responding to, managing, and resolving security incidents.
    • Experience with LAN/WAN networking concepts, IP addressing and routing concepts, Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
    • Experience with Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
    • Experience working with Security Information and Even Management (SIEM) system is a plus.
    This advertiser has chosen not to accept applicants from your region.

    Information Security Architect

    Chennai, Tamil Nadu ₹1500000 - ₹2000000 Y Deluxe

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    As a Principal Information Security Architect you will utilize your extensive cybersecurity knowledge including threat modeling, risk assessment, and security controls; expertise in secure software architecture design and security governance frameworks; proficiency in programming languages and security assessment tools.

    Job Functions:

    • Develop and communicate a strategic security vision and roadmap aligned with the organization's business objectives.
    • Ensure that the security strategy guides security initiatives, technology choices, and risk management efforts.
    • Design secure architectures for software systems and infrastructure, including threat modeling, security controls, and secure coding practices.
    • Ensure that security designs are implemented consistently and meet industry best practices.
    • Ensure compliance with industry regulations, standards, and internal security policies. Monitor and report on security compliance.
    • Develop risk mitigation strategies, including security controls, incident response plans, and disaster recovery procedures.
    • Ensure that the organization's workforce is educated about security risks and best practices.
    • Lead and coordinate responses to security incidents, ensuring lessons learned are incorporated into security improvements.

    Basic Qualifications:

    • Bachelor's degree in a related field, such as computer science, information security, cybersecurity, or a related discipline
    • 10 years of related experience in Information Security

    Preferred Qualifications

    • Master's degree in IT, Computer Science, information security, cybersecurity, or related field
    • 12 years of related experience in Information Security
    • Certification in relevant security domains (e.g., GDSA, CISSP-ISSAP, CISM, CISA)

    Must be 18 years of age or older

    Benefits
    In line with our commitment to employee wellbeing, our total rewards benefits package is designed to support the physical, financial, and emotional health of our employees, tailored to meet their unique and evolving needs. Our approach considers our employees' whole selves, ensuring they can thrive both in and outside of work. Here are some of the benefits we offer, which may vary based on role, location, or hours worked:

    • Healthcare (Medical, Dental, Vision)
    • Paid Time Off, Volunteer Time Off, and Holidays
    • Employer-Matched Retirement Plan
    • Employee Stock Purchase Plan
    • Short-Term and Long-Term Disability
    • Infertility Treatment, Adoption and Surrogacy Assistance
    • Tuition Reimbursement

    These benefits are designed to enhance the health, protect the financial security, and provide peace of mind to our employees and their families.

    Deluxe Corporation is an Equal Employment Opportunity employer:
    All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, disability, sex, age, ethnic or national origin, marital status, sexual orientation, gender identity or presentation, pregnancy, genetics, veteran status or any other status protected by state or federal law.

    Please view the electronic EEO is the Law Poster which serves to inform you of your equal employment opportunity protections as part of the application process.

    Reasonable Accommodation for Job Seekers with a Disability:
    If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please direct your inquiries to

    This advertiser has chosen not to accept applicants from your region.

    Head - Information Security

    Chennai, Tamil Nadu ₹1000000 - ₹3000000 Y Aditya Birla Capital

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Job Purpose
    To provide a hassle free trading environment to the clients. Satisfying the clients by providing a timely assistance thereby generating revenue to the organization and goodwill. Launching of New products in the online trading platform to the customers for satisfying their various investment needs

    Job Context & Major Challenges
    Job Context
    ABM has a daily turnover of over 1,000 crores and has been rapidly improving its market shares in the various segments it operates in. In the otherwise fragmented equity broking business, ABM has doubled it market share to over 1.6% of retail cash equity volumes in the last 18 months. The commodity market shares have also doubled during this period. ABM remains one of the largest distributor for BSLI and BSLAMC and the largest distributor for other manufacturing organisations within ABFSG. ABM brings value to other line of business within ABFSG and adds Rs ~ 25-30 Crores to the bottom line of BSLI / BSLAMC / ABFL / ABPE etc ABM works in a highly regulated environment with a host of regulators like SEBI, RBI, AMFI, FMC, IRDA etc. regulating it s day to day operations.In addition to the regulator ABM is also subject to close monitoring and inspection through various agencies like NSE / BSE / NCDX / MCX/ NSDL / CDSL etc. AABM has a daily turnover of over 1,000 crores and has been rapidly improving its market shares in the various segments it operates in. In the otherwise fragmented equity broking business, ABM has doubled it market share to over 1.6% of retail cash equity volumes in the last 18 months. The commodity market shares have also doubled during this period. ABM remains one of the largest distributor for BSLI and BSLAMC and the largest distributor for other manufacturing organisations within ABFSG. ABM brings value to other line of business within ABFSG and adds Rs ~ 25-30 Crores to the bottom line of BSLI / BSLAMC / ABFL

    / ABPE etc ABM works in a highly regulated environment with a host of regulators like SEBI, RBI, AMFI, FMC, IRDA etc. regulating it s day to day operations.In addition to the regulator ABM is also subject to close monitoring and inspection through various agencies like NSE / BSE / NCDX / MCX/ NSDL / CDSL etc. ABM also operates in a highly competitive market mainly in fragmented industry with ABML competition from major National Broking houses like ICICI Securities, HDFC Securities, Angel Broking, MOFSL etc. and a range of local Broking outfits. On the other hand ABMML competition is from Major Distribution Houses like NJ India Invest, Bajaj Capital Prudent, IIFL and a range of Banks (both Indian and MNC). . Product Management Process: The Product Management process includes planning and execution throughout the product lifecycle, including gathering and prioritizing product and customer requirements and working closely with Technical Team and vendor and customer satisfaction goals are met. Product Maintenance: Coordinating with vendors and dev elopers for managing change during the UAT and post implementation phase. Impact Analysis of the Change Requests on the system and follow up on bugs. It also includes Version up gradation and Product enhancement as and when required. Product Support: Product support involves a series of activities which includes Providing Technical and Functional assistance to Internet clients throughout the trading hours and having a dedicated customer care desk for handling all types issues/queries.

    Key Result Areas
    KRA (Accountabilities) (Max 1325 Characters)
    Supporting Actions (Max 1325 Characters)
    KRA1 Product Management- Include gathering the requirements from the clients perspective and from a business perspective, doing benchmarking, preparing BRD's, undergoes thorough checking of the products in UAT, coordinating with the vendor for rectifying the bugs and also explaining the requirements to them

    KRA2 Product Maintenance: The functionality checking of Trading Platforms has to be carried out on a regular basis. Should ensure that we are providing absolute error free software to the clients. On the event of an issue, should coordinate with the Vendors directly or in directly, should escalate the issue to the higher authorities and ensures that the issue is resolved at the earliest. Clients must be communicated well about the issue and also should provide them some alternatives till the issue has been resolved

    KRA3 Product Support Providing support to the clients includes both Technical and Functional Assistance of Trading. When a new product is launched or some up- gradation has been taken place in a product, ensures that clients are all aware of the changes by providing Product Demos to the PAN India Branches, providing a support desk for all clients/branches, sending mailers/teasers etc.

    KRA4 Exchange Compliance regarding IBT Submitting the IBT Trade/Volume confirmation in NSE and BSE.

    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Database security Jobs in Chennai !

    Lead - Information Security

    Chennai, Tamil Nadu ₹90000 - ₹120000 Y Netaccess India Limited

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Role & responsibilities:

    • Serve as the onsite cybersecurity lead and advisor for the client.
    • Conduct security posture assessments, identify risks, and recommend appropriate controls.
    • Guide the development and enforcement of security policies, standards, and procedures.
    • Review and monitor client IT and security operations to ensure risk mitigation and compliance.
    • Support the client during audits, compliance checks, and incident investigations.
    • Advise on and oversee areas such as:

    • Secure configurations and hardening

    • Identity & Access Management (IAM)

    • Vulnerability management & patch governance

    • Network, endpoint, and cloud security

    • Data protection & privacy controls

    • Coordinate with the company's backend cybersecurity team for advanced needs such as:

    • Threat intelligence and analysis

    • Incident response and digital forensics

    • Advanced penetration testing and vulnerability assessments

    • Red/blue team exercises

    • Prepare and present security reports, dashboards, and recommendations to client management.

    • Act as a trusted security partner to both technical teams and business executives at the client site

    Preferred candidate profile

    • Bachelors degree in computer science.
    • Relevant certifications such as CEH, CISSP, CISA, or ISO 27001 Lead Implementer.
    • At least 5 years of experience in cybersecurity, regulatory compliance, or related roles.
    • Strong knowledge of:
    • Security frameworks (NIST CSF, ISO 27001, CIS Controls)
    • Regulatory compliance (DPDP)
    • Risk assessment and governance methodologies.
    • Understanding of IT and security domains (networks, endpoints, cloud, applications).
    • Hands-on experience with vulnerability management, penetration testing, IAM, and incident response.
    • Strong communication and stakeholder management skills.

    Preferred Skills:

    • Ability to work independently onsite while effectively leveraging remote expert teams.
    • Consultative mindset, able to translate technical risks into business impact and executive-level insights.
    • Strong understanding of cybersecurity tools and frameworks.
    • Analytical and problem-solving skills with attention to detail.
    This advertiser has chosen not to accept applicants from your region.

    Information Security Analyst

    Kodambakkam, Tamil Nadu ₹340000 - ₹1167607 Y Crest climber software solution pvt ltd

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    • An Information Security Analyst monitors and protects an organization's computer networks and systems from cyber threats and data breaches. Key responsibilities include implementing security software like firewalls and encryption, conducting vulnerability assessments and penetration tests, responding to and mitigating security incidents, developing security policies and best practices, creating disaster recovery plans, and educating employees on security awareness. They stay current with emerging threats and often collaborate with IT staff and management to enhance overall security posture.
    • Key Responsibilities Monitoring and Detection: Continuously monitor networks for suspicious activity, potential breaches, and viruses.
    • Vulnerability Assessment: Identify weaknesses in systems and networks through testing and analysis to prevent unauthorized access. .
    • Incident Response: Investigate, respond to, and mitigate security incidents and cyberattacks to minimize damage.
    • Implementation of Security Measures: Install and maintain security safeguards, including firewalls, encryption software, and antivirus programs.
    • Policy Development: Create and enforce security policies, standards, and best practices for the organization. .Reporting: Prepare detailed reports on attempted attacks, security breaches, and security metrics for management and stakeholders.
    • Disaster Recovery: Develop and help implement disaster recovery plans to ensure continued IT operations during emergencies.
    • Employee Education: Train employees on cybersecurity awareness, proper security procedures, and best practices to prevent attacks.
    • Research and Awareness: Stay updated on the latest cybersecurity trends, technologies, and emerging threats by consulting external sources and industry publications.
    • Essential Skills
    • Technical Proficiency: Deep knowledge of computer networks, operating systems, security tools, and programming languages like Python and JavaScript.
    • Analytical Skills: Ability to quickly process large datasets to identify security vulnerabilities and patterns.
    • Communication Skills: Strong ability to explain complex technical information clearly to both technical and non-technical audiences.
    • Problem-Solving: Aptitude for diagnosing issues and developing effective mitigation techniques for security threats.
    • Attention to Detail: Meticulous in monitoring systems and reviewing security measures for potential gaps.
    • Tamil candidates only

    Job Type: Full-time

    Pay: ₹340, ₹1,167,607.61 per year

    Benefits:

    • Food provided

    Work Location: In person

    This advertiser has chosen not to accept applicants from your region.
     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Database Security Jobs View All Jobs in Chennai