Wyniki wyszukiwania: 18 ofert pracy
...Security Specialist - Vulnerability management
ZF Friedrichshafen AG
ZF is a global technology company and supplies systems for passenger... ...management and apply now!
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical...
Zasugerowane
Praca hybrydowa
Praca zdalna
Elastyczny czas pracy
W godzinach popołudniowych
...and requirements to provide Cybersecurity Security solutions and services... ...Developing, maintaining and managing cyber security requirements... ..., and defects
Store/ manage all work products according... ...Engineering, Threat Research, Vulnerability Management, Cryptography, Digital...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...Private Banking, Investment Management, and Investor Services.... ...us as a Security Operations Manager (GSOC)
Brown Brothers Harriman... ...Explore more InfoSec / Cybersecurity career opportunities
Find... ...Engineering, Threat Research, Vulnerability Management, Cryptography,...
Zasugerowane
Umowa
W godzinach popołudniowych
...center network by EY.
The opportunity
As a Data Privacy Manager in a Cybersecurity area, you would become a part of Data Protection and... ...Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber...
Zasugerowane
Legalna praca
W godzinach popołudniowych
...As an Information Security Manager, you will be responsible for... ...and leadership necessary to manage the risk to the platform assigned... ...breaches/
Evaluate new cybersecurity threats and IT trends and... ...Engineering, Threat Research, Vulnerability Management, Cryptography, Digital...
Zasugerowane
Praca hybrydowa
W godzinach popołudniowych
O pracodawcy:
Naszym Klientem jest firma VOLTA w Gostyniu, która od blisko 30 lat sprzedaje materiały elektrotechniczne oraz lampy. To odpowiedzialny partner biznesowy dla wiodących marek w swej kategorii dla Klienta detalicznego oraz hurtowego.
Obowiązki:
opracowywanie...
Zasugerowane
Umowa
...Product Manager (PO) for IT Security Reporting Tool
at least 5 years of professional... ...Manager II”.
Explore more InfoSec / Cybersecurity career opportunities
Find even more... ...Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics...
Zasugerowane
W godzinach popołudniowych
...expertise in Private Banking, Investment Management, and Investor Services. View company... ...a plus
Explore more InfoSec / Cybersecurity career opportunities
Find even more... ...Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics...
Zasugerowane
Umowa
W godzinach popołudniowych
...integrating with multiple Identity and Access Management solutions, such as Ping, Okta,... ...OSCP, GWEB;
Explore more InfoSec / Cybersecurity career opportunities
Find even more... ...Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital...
Zasugerowane
W godzinach popołudniowych
...expertise in Private Banking, Investment Management, and Investor Services. View company... ...deadlines.
Explore more InfoSec / Cybersecurity career opportunities
Find even more... ...Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics...
Zasugerowane
Umowa
W godzinach popołudniowych
...SCP) and Identity & Access Management (IAM) reviews, and provide... ...CloudFormation to create and manage security controls within... ...the latest security trends, vulnerabilities, and AWS/Azure services to... ...applications. Explore more InfoSec / Cybersecurity career opportunities...
Zasugerowane
W godzinach popołudniowych
...Private Banking, Investment Management, and Investor Services. View... ...is a plus,
~ Ability to manage stakeholders, timelines, and... ...Explore more InfoSec / Cybersecurity career opportunities
Find... ...Engineering, Threat Research, Vulnerability Management, Cryptography, Digital...
Zasugerowane
Umowa
W godzinach popołudniowych
...provisioning.
~· Configure, deploy and manage SAP Security Roles, Profiles and... ...****@*****.***. Explore more InfoSec / Cybersecurity career opportunities
Find even more... ...Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital...
Zasugerowane
Gotówka
Praca hybrydowa
Praca tymczasowa
Umowa
Legalna praca
W godzinach popołudniowych
...and threats related to malicious code, vulnerabilities and attacks.
Assist in the... ...and knowledge in the team.
Perfect management of assigned priorities and great autonomy... ...and apply now!
Explore more InfoSec / Cybersecurity career opportunities
Find even more...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...part of Global Security Practice, which shapes and delivers cybersecurity solutions for GFTs’ customers.
As a specialist, you... ...Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in...
Zasugerowane
Umowa
W godzinach popołudniowych
...for a Security Specialist to be part of cybersecurity team based in Poland, having a global... ...of security domains: risk management, security architecture, communications... ...Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics...
Umowa
W godzinach popołudniowych
...written and spoken
~ Strong knowledge of cybersecurity principles and technologies
~ Ability to work independently and manage multiple projects simultaneously
~ In... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital...
W godzinach popołudniowych
...Production environment.
Work with the Cybersecurity team to guide the selection,... ...experience in technology and security risk management.
~ Some level of proficiency in leveraging... ...Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics...
Elastyczny czas pracy
W godzinach popołudniowych