Wyniki wyszukiwania: 18 ofert pracy
...As an Information Security Manager, you will be responsible for developing... ...and leadership necessary to manage the risk to the platform... ...framework, support solution development to address the pattern... ...Security Engineering, Threat Research, Vulnerability Management, Cryptography...
Zasugerowane
Praca hybrydowa
W godzinach popołudniowych
...Security Specialist - Vulnerability management
ZF Friedrichshafen AG
ZF is a global... ..., penetration testing, application development, security officers, etc).
Provide vulnerability... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography...
Zasugerowane
Praca hybrydowa
Praca zdalna
Elastyczny czas pracy
W godzinach popołudniowych
...network by EY.
The opportunity
As a Data Privacy Manager in a Cybersecurity area, you would become a part... ...lead the Data Privacy team with focus on Market Research for projects, people management and business development.
EY’s Cybersecurity Practice functions as a...
Zasugerowane
Legalna praca
W godzinach popołudniowych
...expertise in Private Banking, Investment Management, and Investor Services. View company... ...others.
Join us as a Security Operations Manager (GSOC)
Brown Brothers Harriman Global... ...invoices submitted.
Conduct critical research related to global events that could...
Zasugerowane
Umowa
W godzinach popołudniowych
O pracodawcy:
Naszym Klientem jest firma VOLTA w Gostyniu, która od blisko 30 lat sprzedaje materiały elektrotechniczne oraz lampy. To odpowiedzialny partner biznesowy dla wiodących marek w swej kategorii dla Klienta detalicznego oraz hurtowego.
Obowiązki:
opracowywanie...
Zasugerowane
Umowa
...Product Manager (PO) for IT Security Reporting Tool
at least 5 years of professional experience within massive data management and... ...in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and...
Zasugerowane
W godzinach popołudniowych
...you?
Extensive experience in software development and architecture and at least 5+ years... ...integrating with multiple Identity and Access Management solutions, such as Ping, Okta, Keycloak... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography...
Zasugerowane
W godzinach popołudniowych
Dostosuj wyszukiwanie!
Filtruj listę ofert pracy za pomocą inteligentnych tagów, które odpowiadają Twoim preferencjom
CRM(32)
Podwykonawca(12)
Jira(28)
Stałe wynagrodzenie(10)
Azure(20)
UX/UI(16)
Back-End(15)
UX(31)
SQL(38)
Windows(43)
...c programming. The software development will follow the BorgWarner software... ...Developing, maintaining and managing cyber security requirements... ..., and defects
Store/ manage all work products according to... ...Security Engineering, Threat Research, Vulnerability Management, Cryptography...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...provisioning.
~· Configure, deploy and manage SAP Security Roles, Profiles and... ...collegial approach required when working with development teams, vendors and external/outsource partners... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography,...
Zasugerowane
Gotówka
Praca hybrydowa
Praca tymczasowa
Umowa
Legalna praca
W godzinach popołudniowych
...attacks.
Assist in the evaluation, development, testing and implementation of emerging... ...and knowledge in the team.
Perfect management of assigned priorities and great autonomy... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...in AWS or Azure.We are focused on development and knowledge sharing. Internal expert... ...particular technical solutions.
Researching for the latest security news and... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics...
Zasugerowane
Umowa
W godzinach popołudniowych
...or Azure.We are focused on development and knowledge sharing. Internal... ...in GFT globally.
Researching for the latest security threats... ...Understanding of security domains: risk management, security architecture,... ...Engineering, Threat Research, Vulnerability Management, Cryptography...
Zasugerowane
Umowa
W godzinach popołudniowych
...requirements
Introduce new tools and methods to development teams
Help product teams find,... ...~ Ability to work independently and manage multiple projects simultaneously
~ In... ...Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography,...
Zasugerowane
W godzinach popołudniowych
...security-related technical standards to guide Development teams.
Provide security architecture... ...in technology and security risk management.
~ Some level of proficiency in leveraging... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...and institutions with expertise in Private Banking, Investment Management, and Investor Services. View company page
At BBH we... ...in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and...
Zasugerowane
Umowa
W godzinach popołudniowych
...and institutions with expertise in Private Banking, Investment Management, and Investor Services. View company page
At BBH we... ...in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and...
Umowa
W godzinach popołudniowych
...Control Policy (SCP) and Identity & Access Management (IAM) reviews, and provide... ...Terraform and CloudFormation to create and manage security controls within AWS Config or Azure... ...Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography,...
W godzinach popołudniowych
...expertise in Private Banking, Investment Management, and Investor Services. View company... ...VBA Knowledge is a plus,
~ Ability to manage stakeholders, timelines, and resources effectively... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography,...
Umowa
W godzinach popołudniowych