When should you discuss your salary in a job interview?

Revealing your current compensation too soon could undermine your chances for higher pay. Here’s how to negotiate.

1. Don’t send salary requirements with your resume.
2. Don’t write down your pay history on an application.
3. Delay salary discussions until you have a clear understanding of the job.
4. Emphasize what you’ll be bringing to the table.
5. Keep in mind that an offer is not always the last word.

Asking “Is there any flexibility in this offer?” may lead to a juicier deal. It’s more realistic to expect something like “an extra week of paid vacation or a signing bonus” than a big boost in base pay.


Hiring Senior Auditor for a leading MNC

Title: Senior Auditor
Department: Internal Audit
Location: Mumbai / Bangalore
Work Time: 1PM to 10 PM (cab service available)
Positions: 5
Salary Range: 12L

The Internal Audit Department is responsible for overseeing the company's Internal Audit program at the direction of the Audit Committee. The Internal audit program is established to ensure that the company has an effective internal controls structure with controls that are properly designed and operating effectively and efficiently.
This position is for an experienced internal audit lead who enjoys hands-on involvement in planning and executing reviews and in developing a durable internal audit methodology suitable to a fast-paced highly demanding environment. This position will report to the Manager, Internal Audit.

• Manage independently and perform audits end to end.
• Should be capable of understanding processes and related risks, preparing audit plans and work programs and preparing reports.
• Communicating results verbally and in writing to members of senior management.
• Provide regular updates to senior manager and process owners on status of project.
• Work with various business unit representatives and process owners to review and test internal systems and processes.
• Investigate opportunities for cost savings or process improvements.
• Maintain and update appropriate audit work papers.
• Follow up timely on remediation items.

Key Result Areas:
• Identify any weaknesses in processes and recommend and implement changes to strengthen internal controls.
• Identify areas for process improvement.
• Timely completion of Projects.
• Quality deliverables.

Eligibility to apply:

  • A CA, MBA, CPA or Certified Internal Auditor Designation is a plus.
  • Experience in the Mortgage Servicing industry is a plus.
  • 4-6 years experience, of which at least 3 years should be related to process reviews.
  • Excellent communication skills, both oral and written, are required. 

Send resumes to 
t5@provizor.co.in, t9@provizor.co.in

Niranjana 8123323444 for more quires. 

Commonly mispronounced words

Some words in the English language are often mispronounced when spoken. Here are a few commonly mispronounced words with their correct pronunciations and most common mispronunciations.

10 Reasons Why You Haven’t Heard Back From A Recruiter

1. Executive recruiters work for client companies, not individuals.

Despite how friendly and understanding the recruiter is, he is not an objective player. The recruiter’s time and attention will go to the candidate most likely to close the search.

2. All job criteria is not always listed in the job description.

Job descriptions are typically written by a recruiter, and sometimes miss the mark when it comes to how a company will evaluate the right person for the job. Issues like personality and fit with the company culture are often overlooked in the job description, but become critical in the interview process. This is why recruiters are sometimes caught off guard when they send a candidate with the perfect resume into an interview and she fails to impress the client.

3. The average executive search takes 5-6 months to complete.

If you are one of the first candidates interviewed, you may be in for a long wait as the recruiter searches the market for top candidates.

4. Only 2/3 of most executive searches are ever completed.

The reasons for searches remaining incomplete can include lack of internal agreement about the role, reorganization, or the surfacing of an internal candidate.

5. Recruiters regularly practice “keeping candidates warm.”

That is, keeping 2nd and 3rd choice candidates in play while the client company negotiates an offer with its first choice. If this is the case, most recruiters will not tell you what is actually happening with the search. Your waiting time can drag on for over a month while negotiations are resolved. Still, it can be worth the wait if you ultimately get the job.

6. Relationships matter.

If you have relationships within the hiring company who can put in a good word for you, use them. Hiring managers are risk averse and are not always trained at assessing candidates. For this reason, people frequently rely on referrals they can trust.

7. Your reputation follows you.

It is not uncommon for a recruiter to make a few calls to former co-workers to get some background on you without asking for your permission. Make sure you know your reputation in the marketplace.

8. All contact with an executive recruiter is documented.

Recruiting firms maintain huge, confidential databases that track each conversation with you. If you tell someone from the one office your current salary and career goals, his fellow recruiters else where will also know immediately. Be diplomatic and strategic with your communications with recruiters.

9. Executive recruiters are not therapists or coaches.

When you speak with a recruiter about your career, you should not have any expectations of confidentiality unless you have a longstanding relationship with them and have built a basis for this trust.

10. Recruiters are busy.

A typical recruiter will work on as many as 7-10 searches at once, interacting with hundreds of potential candidates. Consequently, they may not be able to take the time to communicate with you despite having the best intentions. Do not take it personally if your recruiter does not call you back. Continue to check in every few weeks until you get a response.

11. How you are introduced to a recruiter matters.

Recruiters will track who referred you, although they may not divulge this information to you. If you were referred by a trusted source, they will be much more likely to contact you about future opportunities. 


10 Essential Email Etiquette Tips


No one likes to read on and on to get to the point. State your message concisely and simply. If you have a question, get to it quickly.


Alert your recipient to what your email is about or you risk being ignored or relegated to the read-later (or never) list. Avoid using alert words, like Urgent, unless the matter really requires urgent attention or you become the boy who cried wolf.


If you blanket someone’s inbox, you’ll soon be ignored. Save up several little matters to send in one email.
On the other hand, if you have a matter that needs immediate attention, don’t bury it inside a laundry list of insignificant issues.


Edit your emails as if they were formal letters. Omit slang and overly familiar language.


Don’t use all caps for emphasis. Use 12 point type and proper punctuation, meaning capitalize the first letter of each sentence and use a period at the end. Then, proofread. (And please don’t use a ridiculous font.)


Don’t copy people on your email unless they need to see the message. And don’t forget to use the BCC field, particularly for emails sent to large groups. People don’t want their emails shared so widely.
Hide the recipients’ addresses in the Blind Carbon Copy (BCC) Field.


Sometimes people are copied on emails out of courtesy, but individual replies don’t need to be copied to everyone. It’s a rookie mistake.


If you’re trying to be funny, stop; business emails are not the place for this. Your recipients, frankly, may be in no mood for lightness and mirth.


Without the benefit of facial expressions or body language, words are easily misinterpreted. So, keep your sentences simple and declarative. Keep the message focused and don’t go off on tangents.


Never add a link without indicating what it is — not in an age of uber vigilance over suspicious links that threaten to take us to where thieves lay in wait to steal our identities.
Not only should you not send an unidentified link — never open one either.


Storage Troubleshoot/Storage Support

Storage - JD

Essential Functions:

ü  Resolve customer problems via the telephone, the web or Auto Support.
ü  Research customer issues in a timely manner and follow up directly with the customer with recommendations and action plans.
ü  Escalate cases to other more senior Technical Support Engineers and/or Escalation Engineers when the problem is too complex or falls out of specific area of expertise. Leverage internal technical expertise, including higher-level engineers, knowledge base, and other internal tools, to add to knowledge base in order to provide solutions to customer issues.
ü  Create new knowledge base articles to capture new learning for reuse throughout the center.
ü  Participate in technical communication within the Technical Support Engineering team to learn about new technologies and complimentary storage applications.
ü  Gain knowledge and expertise through hand-on experience, self-study, and through a variety of learning environments. Initial focus is on learning Net App’s proprietary operating system, On Tap, and troubleshooting NetApp hardware issues.
ü  Some opportunity, after training, to work on small volumes of Top Enterprise Accounts (NetApp’ s highest priority customers) and Support Edge Premium cases (customers with a higher level of support agreement).
ü  Good written and verbal communication skills.
ü  Good interpersonal communication and customer service skills are needed in order work successfully with customers in high stress and or ambiguous situations.

- Basic understanding of some of the following protocols and applications:

a.       NFS, the UNIX remote file sharing protocol
b.      CIFS, the Windows NT remote file sharing protocol
c.       TCP/IP
d.      Networking
e.      RAID
f.        Microsoft Exchange and/or Veritas software.
g.       Strong aptitude for learning new technologies and understanding how to utilize them in a customer facing environment.
h.      Ability to follow standard engineering principles and practices.
i.         Creative approach to problem solving.
2.       Responsibility and Interaction:
a.       Responsibility:
b.      The types of tasks this individual is responsible for are well defined and utilize and build understanding of standard principles and practices within a team environment.

c.       Interaction:

Only Graduates
experience in UNIX, Windows networking administration or technical support is required.

Location: Bangalore
CTC: Upto 7Lac
Shift: Day

Walkin on 25/27/28 April 2015

Walkin  to:

Provizor IT Services
2nd Floor,Money Centre building
Above Coffee Day, Opposite to Forum Mall
Koramangala 7th Block
BANGALORE,Karnataka,India 560095

For further details contact

Niranjana 8123323444

Firewall Technical Assistance Center -Contact 8123323444

Job Location: Bangalore

Experience: 3-9 years

CTC: Upto 14Lac

Job Description

    -Ability to work in a highly dynamic TAC (Technical Assistance Center) environment with High focus on Customer satisfaction. Able to determine problems and deliver solutions with a high level of customer satisfaction.

    -Candidate should be a technical expert in Network Security products specifically in Firewall technology. Candidate should have in-depth knowledge about Implementation scenarios, configuration and troubleshooting of Firewall related issues.

    -In-depth knowledge of Virtual Private Networks VPNs wrt. Design, Implementation Scenarios, Connectivity troubleshooting and other Algorithms such as DES, 3DES, MD5, SHA, PKI etc.

    -Candidate should have very strong fundamental "core" networking skills, with thorough knowledge of TCP/IP Protocol suite, OSI layered architecture and should be able to relate that knowledge in troubleshooting related issues.

    -Proven knowledge and practical application of Security, Firewalls, access and perimeter control, vulnerability management and intrusion detection. Should have a strong knowledge on various attacks like SYN flood , Replay attacks etc and the mitigation techniques .

    -Proven experience with data networks including physical layer infrastructure, servers, LAN/WAN hardware, software, data transmission facilities and interconnecting devices.

    -Ability to understand and troubleshoot various network problems using utilities like nslookup, traceroute, ping, net stat and packet sniffers like wire shark, tcp dump etc.

    -In-depth knowledge, not limited to understanding but troubleshooting of, IP routing protocols (OSPF, BGP, RIP), IPSEC VPN, and xDSL Technologies, , MULTICAST .

    -In-depth knowledge of L2 technology and protocols like VLANs, VLAN Tagging (IEEE 802.1q), LACP, VLAN trunking, STP (IEEE 802.1D and other 802.1 implementations.).

    -Effectively utilizes complex lab setups to duplicate and solve problems.

    -Ability to interact effectively at all levels with sensitivity to cultural diversity.

    -Ability to adapt new product support as organization evolves.

    -Train and mentor junior engineers and peers

    -Proven crisis management, planning, prioritization and organizing skills.

    -Excellent verbal and written communication, interpersonal, presentation and customer handling skills.

    -Must be a team player and should be ready for weekend on call/in-office support as needed.

    Candidates with experience and knowledge in any of the following would be preferred:

    -Prior sonic firewall experience preferred
    -VoIP experience including thorough understanding, configuration, implementation designs and troubleshooting of VoIP protocols like, SIP, H323, SCCP, MGCP, RTSP.
    -Good working knowledge of Application layer protocols and functions such as FTP, DNS, SNMP, HTTP/HTTPS, LDAP, Radius, User Authentication Mechanisms, SMTP etc.
    -Demonstrated ability to provide third tier and technical support for Security related products like Commercial Firewalls, IPS/IDS, Unifed Threat Management Systems (UTMs) like URL Filtering, AV, Anti-Spam.
    -Understanding, Integration and troubleshooting of Various OSes like Windows, Unix and MAC and their specific application technologies like NIS, NFS, Sun-RPC, MS-RPC etc. in a security enabled environment.
    -Certified in either of JNCIA-FWV, JNCIS-FWV, CCNA, CCNP other certifications are added plus.

    For further information
    Niranjana 8123323444