Średnia wypłata: zł18 411 /miesięczne
Więcej statystykWyniki wyszukiwania: 11 ofert pracy
...Job Description
Job Description
In the role of Mechanical Design Engineer, you will be an engineering professional adding value... ...more than 50 countries to create and execute strategies for their digital transformation. From engineering to application development,...
Zasugerowane
...Mechanical Engineer
Infosys is a global leader in next-generation digital services and consulting. We enable clients in more than 50... ...comments and elaborate comprehensive answers
Participate in design and/or technical reviews (internal/external)
Represent the...
Zasugerowane
Praca zdalna
Umowa
...Vocational Training.
Requisition ID: 387661 | Work Area: Software-Design and Development | Expected Travel: 0 - 10% | Career Status:... ..., Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity...
Zasugerowane
Praca na pełen etat
Praca na pół etatu
Praca zdalna
Elastyczny czas pracy
W godzinach popołudniowych
...-focused and passionate as we are about designing great software and having a good time doing... ...with stakeholders, architectural design, implementation, testing to meet quality... ...Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general...
Zasugerowane
Praca na pełen etat
Praca zdalna
Elastyczny czas pracy
W godzinach popołudniowych
...Installation Supervisor / Site Manager, implementing commissioning design changes, providing mark-ups for as-built project documentation.... ...and ability to work with/based on technical documentation.
Digital literacy, confident user of relevant IT-applications (Microsoft...
Zasugerowane
Praca na pełen etat
...even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
#J-...
Zasugerowane
Praca na pełen etat
Elastyczny czas pracy
W godzinach popołudniowych
...even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
#J-...
Zasugerowane
Praca na pełen etat
Elastyczny czas pracy
W godzinach popołudniowych
Info Security Compliance Associate (f/m/d) Corporate Processes & Information Technology organization
...proficiency.
Meet your CPIT Security team
The purpose of the Corporate Processes & Information Technology organization (CPIT) is the digital backbone of SAP. CPIT creates, builds, and runs an intelligent, sustainable enterprise by providing customer-centric insights and...
Zasugerowane
Praca na pełen etat
Legalna praca
Elastyczny czas pracy
W godzinach popołudniowych
...even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
#J-...
Zasugerowane
Praca na pełen etat
Elastyczny czas pracy
W godzinach popołudniowych
...even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
#J-...
Zasugerowane
Praca na pełen etat
Elastyczny czas pracy
W godzinach popołudniowych
...in accordance with applicable specifications or standards and evaluate results
Interpret radiographs, cathode ray tube (CRT) or digital readouts, conductivity meters and visual indicators
Organize and report test results
Perform specialized inspections
May instruct...
Zasugerowane
Elastyczny czas pracy