Top Cybersecurity & IT Jobs in Pune, MH
Provide system support for operating environment components, databases, servers, and hardware. Act as a senior Systems Administrator for enterprise applications and provide end user support for CRM applications. Evaluate improvement recommendations, deploy structural changes, and manage key information. Develop training materials, coordinate training sessions, and partner with stakeholders to implement initiatives.
The Administrator I - System & Applications Administration role involves routine maintenance tasks, system support, database upgrades, patching, code installation, disaster recovery, user account management, system monitoring, training, and compliance with company policies. Key responsibilities include administering and maintaining business intelligence applications, configuring user access, monitoring system performance, troubleshooting issues, and collaborating with internal teams.
The Administrator III - System & Applications Administration at Cencora is responsible for providing system support for operating environment components, addressing system problems, enhancing system functionality, and providing day-to-day end user support for CRM applications. The role also involves evaluating system improvements, documentation management, and participating in Change Advisory Board meetings.
Featured Jobs
As a SAP Basis Administrator III at Cencora, you will be responsible for providing system support for databases, operating systems, network interfaces, and more. You will work on upgrading databases, managing backups, enhancing system functionality, and collaborating with various teams to ensure the operating environment requirements are met.
Lead Administrator responsible for system and application administration. Design, configure, and customize the Archer platform. Act as a platform subject matter expert, provide day-to-day end user support, and ensure system and application health and stability.
The Information Security Manager at Cencora is responsible for overseeing security initiatives, risk analysis, compliance, and strategic planning. They collaborate with business and IT leaders, manage security projects, and provide guidance on information security policies. The role involves designing secure infrastructure solutions and applications, monitoring cybersecurity risks, and ensuring compliance with legal and regulatory requirements.
All Filters
No Results
No Results