Graphic design python turtle 🐢

from turtle import * import colorsys bgcolor('black') pensize(0) tracer(50) h=0 for i in range(300): c=colorsys.hsv_to_rgb(h,1,1) h+=0.9 color(c) forward(300) left(100) fd(i) goto(0,0) down() rt(90) begin_fill() circle(0) end_fill() rt(10) for j in range(5): rt(30) done() Please follow my blog and subscribe my channel for more videos and newly updates 👍👍👍👍👍 import turtle as t import colorsys t.bgcolor('black') t.tracer(100) h=0.4 def draw(ang,n): t.circle(5+n,60) t.left(ang) t.circle(5+n,60) for i in range(200): c=colorsys.hsv_to_rgb(h,1,1) h+=0.005 t.color(c) t.pensize(2) draw(90,i*2) draw(120,i*2.5) draw()

Deloitte hiring//batch 2022 //off campus drive

https://deloitteadvisoryotn.hirepro.in/

 Registrations are Open! Please register before 11:55 PM, Dec 21, 2021


Analyst Trainee - Risk and Financial Advisory - Job Description

At Deloitte, we do not offer you just a job, but a career in the highly sought-after Risk Management field. We are the business leader in the risk market. We work with a vision to make the world more prosperous, trustworthy, and safe. Our clients, primarily based outside of India, are large, complex organizations that constantly evolve and innovate to build better products and services. In the process, they encounter various risks and the work we do to help them address these risks is increasingly important to their success—and to the strength of the economy and public security.


By joining us, you will get to work with diverse teams of professionals who design, manage and implement operations related to risk-centric solutions across a variety of risk domains for supporting global clients. In the process, you will gain exposure to the risk-centric challenges faced in today’s world by organizations across a range of industry sectors and become subject matter specialists in those areas and develop into a well-rounded professional who not only has the depth in few risk domains, but also has width of exposure to wide variety of risk domains.


The average earning potential for this role is INR 6 Lacs Per Annum + Variable Benefits


Work you’ll do

You will gain exposure to multiple technology risk domains like access control, identity, authentication, cyber incident simulations, security testing, ethical hacking, cyber incident response, penetration testing, threat modeling, risk analytics, cloud application security, secure software, forensics, and IT controls to name some key areas.


Professionals will also gain exposure to the following leading-edge security solutions related to Identity Access Management (Sailpoint, Okta, Oracle, IBM, CA etc.); Application Security (Packaged ERP suites like SAP, Oracle, Oracle GRC, SAP GRC, Onapsis, Virtual Forge); Monitoring (Splunk, QRadar, Arcsight); and Analytics (Tableau, Qlikview, SAS).


In this role, you will build on your foundational expertise in technology and business to be able to design, implement, test, manage and operate risk management programs, processes, and systems to address the growing challenges and risks our global clients face.


Your experiences could include

Your experiences could include:

Improving operational performance by analyzing our clients’ information technology (IT) controls and processes across security and risk management operations


Supporting various live applications related to data privacy and security controls.


Provide managed services programs through ITIL aligned processes and approach to sustain highly secure and available mission-critical systems and address software vulnerabilities.


Establishing methods for monitoring “smart” devices connected to enterprise network.


Perform continuous monitoring and security analytics as part of SOC.


Assisting forensic accountants in the detection and measurement of fraud or other violations.


Handle incident response support, troubleshoot, problem solve, and simplify complex technical issues for clients as part of operations.


Integrating business needs and technology solutions, including developing system requirements, designing and prototyping, testing,training, defining support procedures and implementation.


Querying and mining large data sets to discover patterns and assessing through predictive modeling capabilities.


Assess clients’ controls effectiveness to ensure high degree of reliability of their external financial reporting, compliances to the regulations, and law of the land and in safeguarding their mission critical assets.


Qualifications Required

Qualifications Required:

Bachelor’s in Engineering – Cyber Security, Information Technology, Computer Science, Software Engineering and/or other ancillary Circuital and Non-Circuital Branches. 2022 graduates only.


Master’s in Engineering/Master’s in Science/Master’s in Computer Application – Cyber Security/Computer Science/Software Engineering. 2022 graduates only.


Cumulative Grade Point Average (CGPA) of 60% equivalent with no current backlog.


Note: You would not be eligible for this hiring process if Deloitte has visited your campus in the last 6 months.


Note: Individuals currently employed with or by Deloitte (in the capacity of Full-time Employee, Fixed-Term Hire/Intern/Trainee or Contractor) are not eligible to apply for this role of Analyst Trainee.


Excellent interpersonal and communication skills (written, verbal, and presentation) to be able to communicate in a global, virtual platform.


Should demonstrate higher sense of ownership, attention to detail and process adherence.


Should be customer centric and focus on solving the customer reported issues in the most impactful way.


Moderate analytical and problem-solving skills to identify areas of continuous improvement.


Moderate computer programming skills involving programming languages like C, C++, Java, Python, programming foundations, Relational Databases, Networking Concepts, SQL.


Good working knowledge of Microsoft Word, Excel, and PowerPoint.


Good grasp of the cybersecurity and risk domains would be an added plus.


Profoundly curious and agile.


Inclination to solving complex and challenging problems would be an added plus.

Comments

Popular posts from this blog

Protocol verification using finite state machine model in computer network

Make fire crackers using python turtle 🐢

Scope and Limitation of Machine Learning