Wyniki wyszukiwania: 17 ofert pracy
...the job offer by EY GDS Poland – a member of the global integrated service delivery center network by EY.
The opportunity
As a Data Privacy Manager in a Cybersecurity area, you would become a part of Data Protection and Privacy team where you will play a pivotal...
Zasugerowane
Legalna praca
W godzinach popołudniowych
...Skills required:
Demonstrated ability to define problem, collect data, establish requirement, and create workable solution and... ...English version.
We offer
Contract of employment
Hybrid work model (3 days from the office, 2 days from home)
Free access to...
Zasugerowane
Gotówka
Praca hybrydowa
Praca tymczasowa
Umowa
Legalna praca
W godzinach popołudniowych
...Analyze application end to end, prepare threat modelling (STRIDE, PASTA & DREAD) based on... ...development to address the pattern
Define Data Protection roadmap and work with... ...similar (would be an advantage)
Hybrid model of working
Annual bonus based on performance...
Zasugerowane
Praca hybrydowa
W godzinach popołudniowych
...AWS, Azure
Hands-on experience with Docker, Podman, CRI-O
Data analysis – operational know-how
Security architecture understanding... ...Poland (within attending the office once a quarter) or hybrid model of work in our offices in Częstochowa, Gliwice and Wrocław....
Zasugerowane
Praca hybrydowa
Praca zdalna
Elastyczny czas pracy
W godzinach popołudniowych
...of Zero Trust architecture is a plus.
~ Knowledge of Threat Modelling and Threat Intelligence are a plus.
~ Fluent in English, both... ...candidates in Poland:Please include permit for processing personal data in CV as following:
In accordance with art. 6 (1) a and b....
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...na polskim rynku, od 1990 roku zajmujemy się sprzedażą elektroniki użytkowej i sprzętu AGD w Polsce. Jako RTV EURO AGD działamy w modelu omnichannel, oferując zaawansowane technologicznie produkty za pośrednictwem ponad 300 sklepów stacjonarnych w całej Polsce, dwóch...
Zasugerowane
Umowa
...applications;
Drive application security requirements in the product;
Ability to lead Architecture Risk Analysis and threat modelling;
Collaborative approach to balancing the demands of security, functional, non-functional and user experience objectives;
Deep...
Zasugerowane
W godzinach popołudniowych
Dostosuj wyszukiwanie!
Filtruj listę ofert pracy za pomocą inteligentnych tagów, które odpowiadają Twoim preferencjom
Podwykonawca(12)
Stałe wynagrodzenie(10)
UX/UI(16)
UX(31)
Windows(43)
3D(27)
Możliwość rozwoju zawodowego(107)
Praktyka/staż(122)
Młodszy specjalista(115)
Photoshop(57)
...team. In this role you willbe key contributor in the Information Security Division; ensuring the overall security of BBH and client data/assets is maintained.
Some of your key responsibilities include:
Administer Attestations in line with security standards
Adhere...
Zasugerowane
Umowa
W godzinach popołudniowych
...and enhance embedded software components of BorgWarner’s products. You will develop the software products utilizing a combination of Model based design, auto-code generation, and embedded c programming. The software development will follow the BorgWarner software...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...complex access and provisioning requests, within established Service Level Agreements. The employee will administer user systems and data entitlements across multiple platforms and applications, ensuring the access requests are processed with high quality and accuracy....
Zasugerowane
Umowa
W godzinach popołudniowych
...****@*****.*** or SACO at ****@*****.***.
Only for candidates in Poland -Please include permit for processing personal data in CV as following:
In accordance with art. 6 (1) a and b. Regulation (EU) 2016/679 of the European Parliament and of the Council...
Zasugerowane
W godzinach popołudniowych
...The Security Admin Analyst is a key contributor in the Information Security Division; ensuring the overall security of BBH and client data/assets is maintained.
The Security Admin Analyst is responsible for, but not limited to:
the staging, proofing and...
Zasugerowane
Umowa
W godzinach popołudniowych
...knowledge sharing. Internal expert communities provide a comfortable environment where you can develop your skillset in areas such as Big Data, cloud computing or artificial intelligence.
What will you do?
As a Cloud Security Delivery Specialist, you will be the face of...
Zasugerowane
Umowa
W godzinach popołudniowych
...related to malicious code, vulnerabilities and attacks.
Assist in the evaluation, development, testing and implementation of emerging data access control technologies, information systems security issues, safeguards and techniques.
Recommend mitigation Tactics...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...knowledge sharing. Internal expert communities provide a comfortable environment where you can develop your skillset in areas such as Big Data, cloud computing or artificial intelligence.
What will you do?
We are looking for a Security Specialist to be part of...
Zasugerowane
Umowa
W godzinach popołudniowych
...Role & Responsibilities:
Advise on the secure design of our applications, services and security processes
Conducting threat modeling and aid teams with risk assessment
Ensuring, that product teams follow internal security policies and privacy requirements
Introduce...
W godzinach popołudniowych
...Product Manager (PO) for IT Security Reporting Tool
at least 5 years of professional experience within massive data management and reporting,
knowledge on IT Security and principles of Cyber Security,
knowledge on Software Delivery and Quality Assurance,
strong...
W godzinach popołudniowych