Wyniki wyszukiwania: 21 ofert pracy
...The opportunity
As a Data Privacy Manager in a Cybersecurity area, you would become... ...Data Privacy team with focus on Market Research for projects, people management and business... ...of people, learning, skills and insights that will stay with you throughout your...
Zasugerowane
Legalna praca
W godzinach popołudniowych
...expertise in Private Banking, Investment Management, and Investor Services. View company... ...others.
Join us as a Security Operations Manager (GSOC)
Brown Brothers Harriman Global... ...invoices submitted.
Conduct critical research related to global events that could...
Zasugerowane
Umowa
W godzinach popołudniowych
...Security Specialist - Vulnerability management
ZF Friedrichshafen AG
ZF is a global technology company and supplies systems for... ...in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and...
Zasugerowane
Praca hybrydowa
Praca zdalna
Elastyczny czas pracy
W godzinach popołudniowych
O pracodawcy:
Naszym Klientem jest firma VOLTA w Gostyniu, która od blisko 30 lat sprzedaje materiały elektrotechniczne oraz lampy. To odpowiedzialny partner biznesowy dla wiodących marek w swej kategorii dla Klienta detalicznego oraz hurtowego.
Obowiązki:
opracowywanie...
Zasugerowane
Umowa
...As an Information Security Manager, you will be responsible for developing, implementing... ...provide the vision and leadership necessary to manage the risk to the platform assigned and... ...Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography,...
Zasugerowane
Praca hybrydowa
W godzinach popołudniowych
PROJECT MANAGER
Nr ref. MP/01/2024
Data dodania: 2024-01-23
Zakres obowiązków:
Monitorowanie działań związanych z realizacją projektu zgodnie z wymaganiami Klienta oraz przyjętymi standardami firmy
Analiza i identyfikacja potrzeb Klienta
Terminowa...
Zasugerowane
...Product Manager (PO) for IT Security Reporting Tool
at least 5 years of professional experience within massive data management and... ...in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and...
Zasugerowane
W godzinach popołudniowych
...provisioning.
~· Configure, deploy and manage SAP Security Roles, Profiles and... .... You can find them at along with some insights from the team on what they mean and how... ...Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography,...
Zasugerowane
Gotówka
Praca hybrydowa
Praca tymczasowa
Umowa
Legalna praca
W godzinach popołudniowych
...and institutions with expertise in Private Banking, Investment Management, and Investor Services. View company page
At BBH we... ...in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and...
Zasugerowane
Umowa
W godzinach popołudniowych
...Experience working and integrating with multiple Identity and Access Management solutions, such as Ping, Okta, Keycloak, ForgeRock etc;... ...in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and...
Zasugerowane
W godzinach popołudniowych
...You will be responsible for managing security assessments to determine... ...sales activities (rarely)
Researching for latest cloud security... ...domains: security and risk management, asset security, security... ...Security Engineering, Threat Research, Vulnerability Management, Cryptography...
Zasugerowane
Umowa
W godzinach popołudniowych
...s needs.
Developing, maintaining and managing cyber security requirements and standards... ...change requests, and defects
Store/ manage all work products according to the Configuration... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography,...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...expertise in Private Banking, Investment Management, and Investor Services. View company... ...VBA Knowledge is a plus,
~ Ability to manage stakeholders, timelines, and resources effectively... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography,...
Zasugerowane
Umowa
W godzinach popołudniowych
...Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills,...
Zasugerowane
W godzinach popołudniowych
...looking to share your passion and knowledge in the team.
Perfect management of assigned priorities and great autonomy in your work... ...in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...strengthen cyber resilience in GFT globally.
Researching for the latest security threats (incl.... ...of security domains: risk management, security architecture, communications... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography...
Umowa
W godzinach popołudniowych
...principles and technologies
~ Ability to work independently and manage multiple projects simultaneously
~ In depth knowledge of... ...in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and...
W godzinach popołudniowych
...Understanding and some experience in technology and security risk management.
~ Some level of proficiency in leveraging, applying,... ...in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and...
Elastyczny czas pracy
W godzinach popołudniowych
...Control Policy (SCP) and Identity & Access Management (IAM) reviews, and provide... ...Terraform and CloudFormation to create and manage security controls within AWS Config or Azure... ...Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography,...
W godzinach popołudniowych
...and institutions with expertise in Private Banking, Investment Management, and Investor Services. View company page
At BBH we... ...in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and...
Umowa
W godzinach popołudniowych