Wyniki wyszukiwania: 18 ofert pracy
...Security Specialist - Vulnerability management
ZF Friedrichshafen AG
ZF is a global technology company and supplies systems for... ...field of computer science/ business informatics/ electrical engineering
Experience with vulnerability and security assessment of Hybrid...
Zasugerowane
Praca hybrydowa
Praca zdalna
Elastyczny czas pracy
W godzinach popołudniowych
...expertise in Private Banking, Investment Management, and Investor Services. View company... ...others.
Join us as a Security Operations Manager (GSOC)
Brown Brothers Harriman Global... ...Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability...
Zasugerowane
Umowa
W godzinach popołudniowych
O pracodawcy:
Naszym Klientem jest firma VOLTA w Gostyniu, która od blisko 30 lat sprzedaje materiały elektrotechniczne oraz lampy. To odpowiedzialny partner biznesowy dla wiodących marek w swej kategorii dla Klienta detalicznego oraz hurtowego.
Obowiązki:
opracowywanie...
Zasugerowane
Umowa
...With the world’s foremost technologists, engineers and OEMs, we’re accelerating the world’s... ...s needs.
Developing, maintaining and managing cyber security requirements and... ...change requests, and defects
Store/ manage all work products according to the Configuration...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...center network by EY.
The opportunity
As a Data Privacy Manager in a Cybersecurity area, you would become a part of Data Protection... ...more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography,...
Zasugerowane
Legalna praca
W godzinach popołudniowych
...As an Information Security Manager, you will be responsible for developing, implementing... ...the vision and leadership necessary to manage the risk to the platform assigned and will... ...Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management...
Zasugerowane
Praca hybrydowa
W godzinach popołudniowych
...Product Manager (PO) for IT Security Reporting Tool
at least 5 years of professional experience within massive data management and... ...more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital...
Zasugerowane
W godzinach popołudniowych
...Experience working and integrating with multiple Identity and Access Management solutions, such as Ping, Okta, Keycloak, ForgeRock etc;... ...more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital...
Zasugerowane
W godzinach popołudniowych
...and institutions with expertise in Private Banking, Investment Management, and Investor Services. View company page
At BBH we... ...even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital...
Zasugerowane
Umowa
W godzinach popołudniowych
...requirements and user provisioning.
~· Configure, deploy and manage SAP Security Roles, Profiles and Authorizations across... ...or Certification
Bachelor’s degree in Computer Science or Engineering
SAP Security Certification is preferred
Knowledge/Skills...
Zasugerowane
Gotówka
Praca hybrydowa
Praca tymczasowa
Umowa
Legalna praca
W godzinach popołudniowych
...expertise in Private Banking, Investment Management, and Investor Services. View company... ...VBA Knowledge is a plus,
~ Ability to manage stakeholders, timelines, and resources effectively... ...Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability...
Zasugerowane
Umowa
W godzinach popołudniowych
...to share your passion and knowledge in the team.
Perfect management of assigned priorities and great autonomy in your work
Bachelor... ...DegreeinComputer Science, Intelligence, Education, Computer Engineering, Cyber Security, Technical, Engineering, Technology,...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...learn from top IT experts. You will join a crew of experienced engineers: 70% of our employees are senior level. You will be part of QA... ...and API security.
Understanding of security domains: risk management, security architecture, communications and network security, identity...
Zasugerowane
Umowa
W godzinach popołudniowych
...Understanding and some experience in technology and security risk management.
~ Some level of proficiency in leveraging, applying,... ...even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography,...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...will be working in very close collaboration with some of the best engineers in the industry, and we offer an environment with international... ...and technologies
~ Ability to work independently and manage multiple projects simultaneously
~ In depth knowledge of cryptography...
Zasugerowane
W godzinach popołudniowych
...this opportunity
Welcome to the Cloud Engineering and Operations team. We are seeking a... ...Control Policy (SCP) and Identity & Access Management (IAM) reviews, and provide... ...Terraform and CloudFormation to create and manage security controls within AWS Config or Azure...
W godzinach popołudniowych
...and institutions with expertise in Private Banking, Investment Management, and Investor Services. View company page
At BBH we... ...even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital...
Umowa
W godzinach popołudniowych
...learn from top IT experts. You will join a crew of experienced engineers: 70% of our employees are senior level. You will be part of QA... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general...
Umowa
W godzinach popołudniowych