About LINC Education LINC Education (www.linceducation.com), based in Singapore, is a global pioneer in providing high-touch, high-quality educator-led support services to universities around the world. Its specialist services are highly sought after by university managements and faculty to retain and grow their online student enrolments. LINC’s services are customized for each university, and delivered using a cutting-edge technology platform (LINCtrac) to provide a superior and effective learning experience to students. LINC is managed by education sector professionals with more than 30 years of combined experience and overseen by an advisory board of the best academic professionals in the world. Dr. M Rammohan Rao (ex-Dean, Indian School of Business and ex-Director, IIM Bangalore) and Deepak Chandra (Secretary – Education, Rajiv Gandhi Foundation and ex-Deputy Dean, Indian School of Business) are members of the LINC Board of Advisors. Responsibilities and Duties LINC is seeking experienced faculty members in the field of Cyber Security across a range of subjects including Network Technologies and Security, Ethical Hacking, Digital Forensics, Data Analysis and Visualisation, Cybersecurity Ethics and Cyberspace Policy. As an experienced faculty member (LINC Fellow), the candidate will serve a diverse international student body for Masters-level programs studying at premier Australian universities. LINC Fellows will be the single point-of-contact for the course-in-charge for student academic matters. LINC Fellows would be “actively engaged” on courses expected to range between 8 to 13 weeks at a time. LINC Fellows will work closely under the guidance of the university faculty-in-charge of the course (or subject) and be responsible for providing: • Guidance to a group of 25-30 postgraduate online students to complete the course • Orientation and support in study planning • Support in report writing and research skills • Guidance on relevant reference material • Assessment marking and feedback • Responding to student queries in a timely manner • Managing discussion boards LINC Fellows will be expected to promptly interact with students over telephone and email from locations of their convenience (e.g. home, office etc.). Required Experience, Skills and Qualifications LINC Fellows candidates must meet the following criteria very strictly: • Minimum Education Qualification: Any of the below qualifications with a distinction of first class from a top university in India o Doctoral degree in the Computer Sciences / Information Technology domain OR o Masters e.g. M.Tech. (Cyber Security), M.Tech. (Information Security), M.Sc. (Information Security) OR o Masters (M.Tech., M.Sc., MCA) in Computer Sciences or IT with a PG Diploma in Cyber Security • At least 5 years of work experience, including o At least 1 year of post-graduate level teaching experience in the field of Cyber Security / Information Security • Highly proficient in spoken and written English • Empathetic, ambitious, warm and outgoing personality willing to work closely with people from diverse cultures • Ability to quickly learn and use technology platforms for interacting with student including host university’s LMS and LINCtrac (training on these platforms will be provided). Only candidates based in Mumbai, Pune, Delhi and Bangalore will be considered. Benefits This is a unique opportunity for academic professionals in the field of Cyber Security to: • Interact with high-quality global university faculty • Work with a diverse range of international students • Develop deeper subject understanding • Gain richer academic exposure • Improve interpersonal and cross-cultural skills The role will be PART-TIME (15-20 hours per week) with scheduled weekend availability. Candidate will have flexibility to work from location of their convenience. The role offers a competitive remuneration between INR 30,000-50,000 per month (when the LINC Fellow is actively engaged in a course), and performance incentives.
Yapsody is looking for Database Architect to join our growing team who can design and build a best-in-class framework to scale and deliver our solutions through web, mobile, and emerging platforms. You will oversee the design & development of data architecture for our event management microservice applications from beginning to end in our “Hard Rock Café”-style YapStudio. Never been in a supervisory role of this kind before? No problem. Believe in yourself the way we believe in you, and you will undoubtedly get the hang of it quickly. Here’s the scoop on Yapsody… Yapsody, based in Los Angeles, California USA, is an expanding worldwide brand with thousands of clients spanning North America, U.K., and Australia. For any passionate techie looking to break from the mundane, this is a very exciting time at Yapsody as we rebuild our event ticketing product from scratch and migrate from our legacy monolithic structure to a vast micro services-based architecture that ventures into all aspects of event management. As a major U.S. concert promoter, we at Yapsody pilot all of our products in live settings and refine them before rolling out to the world. Our fun and inspirational office culture, flexible work policies, and micro-team structure will allow you to dictate the direction of your career. Ultimately, 2 years at Yapsody is like adding 5 years to your CV. Job Description ● Design high-performance, scalable & highly available databases ● Optimize existing databases & queries ● Determines database structural requirements by analyzing client operations, applications, and programming; reviewing objectives with clients; evaluating current systems; ● Develops database solutions by designing proposed system; defining database physical structure and functional capabilities, security, back-up, and recovery specifications. ● Installs database systems by developing flowcharts; applying optimum access techniques; coordinating installation actions; documents actions. ● Maintains database performance by identifying and resolving production and application development problems; calculating optimum values for parameters; evaluating, integrating, and installing new releases; completing maintenance; answering user questions. ● Prepares users by conducting training. ● Provides database support by coding utilities, responding to user questions, and resolving problems. ● Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations. ● Accomplishes information systems and organization mission by completing related results as needed. ● Have fun!! Technical Skills Database Design, Data Maintenance, Database Security, Database Management, Requirements Analysis, Teamwork, Presenting Technical Information, Training, Operating Systems Other Skills ● Excellent communication ● Taking initiative & ownership of whatever, you work on.
Overall purpose of the job - This role would be responsible for identifying and implementing mitigations, practices and controls ensuring adequate application and infrastructure security posture is maintained all at times Key Performance Areas - • Good at application threat modeling and applications risk identification & remediation • Strong web application security experience with thorough understanding of web application vulnerabilities • Knowledge of database, application, and web server design and implementation • Familiarity with Security standards \ frameworks and groups (OWASP, OSSTM, WASC, FISMA) • Experience in dynamic and static application vulnerability scanners like HP WebIspenct, IBM AppScan, HP Fortify, etc • Create, implement & review data protection strategy across the organization. • Experience in client handling including interaction with developers for understanding the mitigations • Experience on Mobility Platform like Phone-Gap \ native Android \ Worklite and MDM /MAM • Knowledge of DevOps and other upcoming technologies used in SDLC • Experience in manual verification of false positives reported by automated tool • Devise and enforce standards and best practices for data protection in line with international standards and industry best practices. • Evaluate the adequacy of security measures including network security to protect organizational data and information assets • Define and implement project as per approved Plan of action. • Identify security solutions as per business needs • Manage POC for agreed and approved solutions as per defined process • Conduct partner reviews • Coordinate with vendors / partners on closure of projects / activities • Manage intra and inter department conflict amicably • Benchmark and compare security practices with the industry • Implementation, operation and maintenance of the Information Security Management System based on standards like ISO/IEC 27001, Cobit, ITIL etc as applicable. • Information security risk assessments and controls selection activities • Track all audit schedules and ensure closure of all security gaps. • Reporting of all critical security issues • Co-ordinate for Risk Assessment of IT systems and Third Party workloads • Facilitate Internal process and IT audits • Software license compliance at all times • Implement tools and processes related to compliance monitoring as per internal security policies and applicable laws and regulations • Facilitate and drive initiatives of Internal Audits for Information Technology and update on Closure and Identified Risk to the Management • Review of Third Party applications / systems and network security on monthly basis • Adherence To Change Management Processes