MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious
Largest dedicated platform of global Information Technology (IT) job search and career opportunities for IT professionals.If you are hiring IT professionals, post IT & Technology Job Descriptions for free. IT jobs can be viewed anytime from anywhere using mobile devices.
Thank you. Your job is saved. You can edit the details at any time via "My Page".
    Technology Jobs for Data exfiltration (Data extrusion)
  • Staff Systems Engineer (3 - 7 yrs)

    Expertise in data-protection mechanisms including an in understanding of cryptographic algorithms such as AES, 3DES, RSA, ECC, SHA etc.Knowledge and experience with key management protocols such as KMIP and techniques of effective key management and industry standard guidelines from X9, NIST etc.Exp...

  • Staff Systems Engineer (3 - 7 yrs)

    The Enterprise Security Architect will work as a member of the Global Information Security team whose team is focused on improving decision-making through collaboration with management, staff and customers on technology strategy, enterprise architecture, and investments in strategic technology.The i...

  • Staff Systems Engineer (3 - 7 yrs)

    The Enterprise Security Architect will work as a member of the Global Information Security team whose team is focused on improving decision-making through collaboration with management, staff and customers on technology strategy, enterprise architecture, and investments in strategic technology.The i...

  • Systems Administrator

    - Review DLP incidents to identify anomalous behavior and trends.- Identify DLP detection signature improvements to reduce false positives and more accurately detect sensitive data.- Propose new DLP policies, and identify ways to more effectively use existing technologies to protect data at the OCC....

  • Staff Systems Engineer (3 - 7 yrs)

    - Expertise in data-protection mechanisms including an in understanding of cryptographic algorithms such as AES, 3DES, RSA, ECC, SHA etc.- Knowledge and experience with key management protocols such as KMIP and techniques of effective key management and industry standard guidelines from X9, NIST etc...

  • SIEM - 3 TO 6 years - Bangalore

    Confidential - collegerecruiter

    SIEMjob description :Morgan Stanley is seeking an analyst to join our IT Security Incident Response Team. The role the event monitoring and analysis function and will be part of the first line of defense responsible for identifying attacks against Morgan Stanleys assets/properties; potential data e...

  • SIEM - 3 TO 6 years - Bangalore

    Confidential - collegerecruiter

    SIEMjJob description :Morgan Stanley is seeking an analyst to join our IT Security Incident Response Team. The role the event monitoring and analysis function and will be part of the first line of defense responsible for identifying attacks against Morgan Stanleys assets/properties; potential data ...

  • SIEM - 7 to 9 years - Bangalore

    Confidential - collegerecruiter

    SIEMjob description :Morgan Stanley is seeking an analyst to join our IT Security Incident Response Team. The role the event monitoring and analysis function and will be part of the first line of defense responsible for identifying attacks against Morgan Stanleys assets/properties; potential data e...

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top