Wyniki wyszukiwania: 20 ofert pracy
...Security Specialist - Vulnerability management
ZF Friedrichshafen AG
ZF is a global technology company and supplies systems for passenger cars, commercial vehicles and industrial technology. View company page
Duties/Responsibilities:
Perform vulnerability...
Zasugerowane
Praca hybrydowa
Praca zdalna
Elastyczny czas pracy
W godzinach popołudniowych
...As an Information Security Manager, you will be responsible for developing, implementing and monitoring a strategic, comprehensive IT... ...Security Manager will provide the vision and leadership necessary to manage the risk to the platform assigned and will ensure business...
Zasugerowane
Praca hybrydowa
W godzinach popołudniowych
...and institutions with expertise in Private Banking, Investment Management, and Investor Services. View company page
At BBH we... ...transform the lives of others.
Join us as a Security Operations Manager (GSOC)
Brown Brothers Harriman Global Payroll team is...
Zasugerowane
Umowa
W godzinach popołudniowych
...by EY GDS Poland – a member of the global integrated service delivery center network by EY.
The opportunity
As a Data Privacy Manager in a Cybersecurity area, you would become a part of Data Protection and Privacy team where you will play a pivotal role in...
Zasugerowane
Legalna praca
W godzinach popołudniowych
...M,A&D Data Quality & Compliance, Senior Manager
GSK
At GSK, we unite science, technology and talent to get ahead of disease together View company page
As M,A&D Data Quality & Compliance Lead, you will play a key delivery role and will be a member of GSK Global...
Zasugerowane
Praca hybrydowa
Legalna praca
Umowa
W godzinach popołudniowych
...Product Manager (PO) for IT Security Reporting Tool
at least 5 years of professional experience within massive data management and reporting,
knowledge on IT Security and principles of Cyber Security,
knowledge on Software Delivery and Quality Assurance,
strong...
Zasugerowane
W godzinach popołudniowych
...investment projects and their execution (CAPEX)
End-to-end project management: planning, managing the budget, project risks as well as the... ...Min. 5 years of experience on the position of Project Manager in production or/and construction companies
Strong project...
Zasugerowane
...Conduct thorough Security Control Policy (SCP) and Identity & Access Management (IAM) reviews, and provide recommendations for enhancements.... ...writing code using Terraform and CloudFormation to create and manage security controls within AWS Config or Azure Policy and other...
Zasugerowane
W godzinach popołudniowych
...and institutions with expertise in Private Banking, Investment Management, and Investor Services. View company page
At BBH we value... ...using Microsoft Excel, VBA Knowledge is a plus,
~ Ability to manage stakeholders, timelines, and resources effectively.
~ Flexibility...
Zasugerowane
Umowa
W godzinach popołudniowych
...Your profile:
Good communicator, with a positive attitude, looking to share your passion and knowledge in the team.
Perfect management of assigned priorities and great autonomy in your work
Bachelor's and Master's DegreeinComputer Science, Intelligence,...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products...
Zasugerowane
Umowa
W godzinach popołudniowych
...Knowledge on authentication protocols (oAuth, SAML, basic auth) and API security.
Understanding of security domains: risk management, security architecture, communications and network security, identity and access management, security assessment and testing....
Zasugerowane
Umowa
W godzinach popołudniowych
...in public cloud ecosystems as well hybrid infrastructure.
Experience working and integrating with multiple Identity and Access Management solutions, such as Ping, Okta, Keycloak, ForgeRock etc;
Deep understanding of frontend, backend and mobile security domains...
Zasugerowane
W godzinach popołudniowych
...Brown Brothers Harriman, we serve the most sophisticated individuals and institutions with expertise in Private Banking, Investment Management, and Investor Services. View company page
At BBH we value diverse backgrounds, so if your experience looks a little...
Zasugerowane
Umowa
W godzinach popołudniowych
...manipulation detection system, secure boot methods, key storage and management, secure on-board communication and secure diagnostics, hardware... ...within a product scope.
Create and maintain solutions to manage cybersecurity risks.
Interface with customer on technical...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...design, and role authorizations.
~· Provide support for user access requirements and user provisioning.
~· Configure, deploy and manage SAP Security Roles, Profiles and Authorizations across multiple SAP systems.
~ Develop and maintain SAP roles management,...
Gotówka
Praca hybrydowa
Praca tymczasowa
Umowa
Legalna praca
W godzinach popołudniowych
...services addressing today’s needs.
Developing, maintaining and managing cyber security requirements and standards
Promote and help... ...assigned work items, change requests, and defects
Store/ manage all work products according to the Configuration Management plan...
Elastyczny czas pracy
W godzinach popołudniowych
...affair concerning cloud security. You will be responsible for managing security assessments to determine cloud security condition.... ...Demonstrated understanding of IT Security domains: security and risk management, asset security, security architecture and engineering,...
Umowa
W godzinach popołudniowych
...English, both written and spoken
~ Strong knowledge of cybersecurity principles and technologies
~ Ability to work independently and manage multiple projects simultaneously
~ In depth knowledge of cryptography will be an asset
~ Bonus points for any relevant security...
W godzinach popołudniowych
...architecture frameworks such as. SABSA, NIST, ISO27001-2, etc.
~ Understanding and some experience in technology and security risk management.
~ Some level of proficiency in leveraging, applying, combining, and placing security controls such as authentication,...
Elastyczny czas pracy
W godzinach popołudniowych