- ...A Snapshot of Your Day The IT Security Architect (technical and operational) will implement the Cybersecurity Governance rules and requirements... ...'s processes, tools, data and technologies to develop secure architecture for the above services taking into account risk...SugestiiFull time
- ...an IAM (Identity and Access Management) Security Analyst to join our dynamic Security team... ...framework across the organization, ensuring secure and compliant access to systems and data.... ...policies. You will also collaborate with IT and security teams to automate...SugestiiFull time
- ...communication protocols , including key security concepts (e.g., firewalls, VLANs, etc.).... ...basics (authentication, authorization, secure data handling) Programming best practices... ...: Able to work effectively on IT-related projects within cross-disciplinary...SugestiiFull timeLucru la distanța
- ...are looking for a highly skilled Enterprise Security Architect to join our team. The ideal... ...security design and architecture, ensuring its delivery and alignment with the organization... ...Security capabilities. - Analyze the current IT security environment to detect critical...SugestiiFull timeLucru hibridLucru la distanța
- ...example, you could contribute in the creation of a solution design by defining the security measures/functionalities that must be implemented following Cybersecurity guidelines, and aligning it with Enterprise Architects. In the afternoon, you could perform a security...SugestiiFull time
- ...Greece, and Portugal. About this Role We are seeking a security specialist who will provide hands-on expertise in cyber security consultancy, secure-by-design practices, risk management and compliance for Consumer IT & Channels. The individual will work closely with...SugestiiFull timeLucru hibridLucru la distanța
- ...or comparable training and further education ~ Knowledge of the planning, implementation and IT operation of IT infrastructures and networks ~ Knowledge of IT security solutions (cryptography, firewalls, virtual private networks, authorization management, etc.) ~...SugestiiFull time
- ...will be responsible for ensuring adherence to Garmin’s information security strategy, programs and best practice by identifying and... ...Information Systems, or related field AND a minimum of 2-years related IT security experience Demonstrated ability to maintain...SugestiiFull time
- .... You then plan the next steps, from testing the security updates provided on our test field through to installation... ...You'll Make an Impact Designing future-proof IT/OT security strategies, creating test procedures for secure patch management with a focus on integrity and...SugestiiFull timeLucru hibridLucru acasă
- ...Apply now! Learn more: jti.com Cyber Security Technology Manager What this position is about –... ...Operations Center has a defensive role in Information Security, and it is a critical component of organisation that needs to be...Sugestii
- ...Germany, Ireland, and with a network of teams in Czech Republic, Italy, Greece, and Portugal. About this Role We are seeking an IT Security Control and Policy professional to ensure full adherence to security policies and compliance frameworks across Vodafone...SugestiiFull timeLucru hibrid
- ...constructive feedback is encouraged. For us, impact isn't a perk. It's the driver of our work. We are guided and rewarded by a shared... ...develop into the subject matter expert within the team for IT Security and technical IT audit topics and as such after settling in the...SugestiiFull timeMuncă în străinătate
- ...We are looking for an Information Security Officer - Architecture for our Information Security Department in Timișoara. In this... ...information security; Selection and decision on the alignment of the (IT) security tool landscape with the needs of all functions;...SugestiiFull timeLucru ocazional
- ...Responsibilities of the role: Lead vulnerability management activities and coordinate remediation with IT teams. . Act as a technical subject-matter expert during audits and security assessments. Define and maintain technical security documentation, standards, and...SugestiiLucru hibrid
- ...Romania. Role purpose The Security Engineering team is... ...risk to NTT DATA Services and its customers. This includes enterprise... ...controls are in place throughout all IT and cloud systems and... ...strategy; Evaluates and develops secure solutions, based on approved security...SugestiiLucru hibridLucru la distanța
- ...Schaeffler is a dynamic global technology company and its success has been a result of its entrepreneurial spirit and... ...opportunities. In this position, you will play a key role in SAP Security within our global IT landscape. You ensure that our SAP systems are operated...Full time
- ...instruments on markets across the globe. IT is at the heart of their organization... ...our data safe? The need for information security is growing at a fast pace especially within... ...s IT infrastructure. Review & approve Secure Baseline Configurations for various IT...
- ...your career, let's go. Why This Role Matters The Workday Security Specialist will be primarily responsible for reviewing, managing... ...including access restrictions and account errors. Partner with IT to resolve application security issues. Provide vendor...Full time
- ...communication skills in English. ~3-5 years of experience in Dev or DevOps environments. ~ Demonstrates compliance with ITIL, SOX, and IT security standards. ~ Experienced working with public cloud infrastructure and business-critical environments. ~ Able to ensure high...Full timeLucru hibridTură de noapte
- ...constructive feedback is encouraged. For us, impact isn't a perk. It's the driver of our work. We are guided and rewarded by a shared... ...together with DevOps squads, helping to maintain a safe and secure application. Your Day to Day Your primary mission is to help...Full time
- ...better and more caring tomorrow. Job Role The Information Security Expert supports the governance, compliance and assurance activities... ...ISO 27001. Solid understanding of Information Security, IT Security and related processes. Familiarity with COBIT Control...Full timeLucru în weekend
- ...constructive feedback is encouraged. For us, impact isn't a perk. It's the driver of our work. We are guided and rewarded by a shared... ..., tools, techniques and concepts); Familiar with IT Security concepts and terminology related to applications, databases, operating...Full time
- ...your story be? Apply now! Learn more: jti.com IT Resilience Manager What this position is about –... ...criteria for outputs and evidence. Collaborate closely with IT, Security, Risk, Compliance, and business stakeholders, confidently engaging...
- ...feedback is encouraged. For us, impact isn't a perk. It's the driver of our work. We are guided and rewarded... ...components: Firewall, Proxy, Load Balancer Knowledge on IT security topics (understanding of secure protocols like SSL / TLS, encryption principles, etc.)...Full time
- ...of our world-famous clients. The Chief Security Office (CSO) of our client comprises the... ...changing assets to ensure that they are secure by design and adhere to our client's security... ..., governance, and architecture across IT projects, architectures, and designs....
- ...encouraged. For us, impact isn't a perk. It's the driver of our work. We are... ...Boot and related Spring modules (web, data, security) or other DI frameworks Design and... ...Understanding of IT Security concepts and secure coding practices ~ Experience with NoSQL...Full time
- ...to ensure that application platforms and pipelines are reliable, secure, and performant. Experience with technologies such as Apache Kafka... ...compliance and security initiatives in collaboration with IT and Security teams. Requirements ~ Bachelor's degree in Computer...Full timeLucru hibridLucru la distanța
- ...is a dynamic global technology company and its success has been a result of its... ...Conducting audits and quality reviews of IT applications, with a special focus on SAP... ...implementing, and continuously improving IT security and audit processes as well as related tools...Full time
- ...constructive feedback is encouraged. For us, impact isn't a perk. It's the driver of our work. We are guided and rewarded by a shared... ...stack knowledge. Experience or affinity with IT Risk & Security concepts. Experience with messaging technologies and...Full time
- ...constructive feedback is encouraged. For us, impact isn't a perk. It's the driver of our work. We are guided and rewarded by a shared... ...committed to strengthening application resilience by enhancing security, implementing robust quality gates, and improving monitoring and...Full time
