- ...an IAM (Identity and Access Management) Security Analyst to join our dynamic Security team... ...framework across the organization, ensuring secure and compliant access to systems and data.... ...policies. You will also collaborate with IT and security teams to automate...SugestiiFull time
- ...A Snapshot of Your Day The IT Security Architect (technical and operational) will implement the Cybersecurity Governance rules and requirements... ...'s processes, tools, data and technologies to develop secure architecture for the above services taking into account risk...SugestiiFull time
- ...business, your focus will be on developing new security concepts, revising existing processes and... ...support installing patches and upgrading IT-Systems to improve the Cyber Security... ...concepts, creating test procedures for secure patch management with a focus on integrity...SugestiiFull timeLucru hibrid
- ...example, you could contribute in the creation of a solution design by defining the security measures/functionalities that must be implemented following Cybersecurity guidelines, and aligning it with Enterprise Architects. In the afternoon, you could perform a security...SugestiiFull time
- ...communication protocols , including key security concepts (e.g., firewalls, VLANs, etc.).... ...basics (authentication, authorization, secure data handling) Programming best practices... ...: Able to work effectively on IT-related projects within cross-disciplinary...SugestiiFull timeLucru la distanța
- ...instruments on markets across the globe. IT is at the heart of their organization... ...our data safe? The need for information security is growing at a fast pace especially within... ...s IT infrastructure. Review & approve Secure Baseline Configurations for various IT...SugestiiFull time
- ...encouraged. For us, impact isn't a perk. It's the driver of our work. We are guided... ...application resilience by enhancing security, implementing robust quality gates, and improving... ...apps on Kubernetes. ~ Understanding of secure coding principles and general IT security...SugestiiFull time
- .... You then plan the next steps, from testing the security updates provided on our test field through to installation... ...You'll Make an Impact Designing future-proof IT/OT security strategies, creating test procedures for secure patch management with a focus on integrity and...SugestiiFull timeLucru hibridLucru acasă
- ...constructive feedback is encouraged. For us, impact isn't a perk. It's the driver of our work. We are guided and rewarded by a... ...work with a variety of different challenges, from technical to security related. Around the team is a variety of developer squads. Who...SugestiiFull time
- ...Responsibilities of the role: Lead vulnerability management activities and coordinate remediation with IT teams. . Act as a technical subject-matter expert during audits and security assessments. Define and maintain technical security documentation, standards, and...SugestiiLucru hibrid
- ...part of our team as Global Information Security Governance, Risk & Compliance Advanced Analyst... ...effective security controls where it matters most? In this role you will be... ...with the ultimate goal of enabling a more secure environment at speed Should you be interested...Sugestii
- ...is a dynamic global technology company and its success has been a result of its... ...o Planning, research, and design of Cyber security architectures; o Development, review and... ...SaaS, IaaS, PaaS); o Analyse and approve IT Service Changes with impact on Schaeffler'...SugestiiFull time
- ...responsible for the architecture, design, and security of cloud environments and SaaS... ...Celestica. This role reports into the Corporate IT Security leadership and will work within... ...culture Architects, the enablement of secure cloud AI solutions for the consumption of...SugestiiLucru ocazional
- ...Central and Eastern Europe. Since its set-up in 2013, Bucharest... ...ensure compliance with Information Security and Information Technology... ...outlined in DB’s policies. IT Application Owners are responsible... ..., and more. Financially secure: We support you in meeting...SugestiiLucru hibridLucru la distanțaLucru în weekend
- ...We are looking for an Information Security Officer - Architecture for our Information Security Department in Timișoara. In this... ...information security; Selection and decision on the alignment of the (IT) security tool landscape with the needs of all functions;...SugestiiFull timeLucru ocazional
- ...Apply now! Learn more: jti.com Cyber Security Technology Manager What this position is about –... ...Operations Center has a defensive role in Information Security, and it is a critical component of organisation that needs to be...
- ...wide range of listed instruments on markets across the globe. IT is at the heart of their organization with more than 30... .... Develop Information Protection roadmap and align with Data Security and regulatory requirements. Lead the BAU initiative and perform...Full time
- ...constructive feedback is encouraged. For us, impact isn't a perk. It's the driver of our work. We are guided and rewarded by a shared... ...together with DevOps squads, helping to maintain a safe and secure application. Your Day to Day Your primary mission is to help...Full time
- ...online travel, with a mission of making it easier for everyone to experience the world... ...description We are looking for a Security Engineer to own and scale our vulnerability... ...senior management to help maintain a safe and secure enterprise technical operation. Daily,...Full timeLucru hibrid
- ...your story be? Apply now! Learn more: jti.com IT Resilience Manager What this position is about –... ...criteria for outputs and evidence. Collaborate closely with IT, Security, Risk, Compliance, and business stakeholders, confidently engaging...
- ...IT Operations & Security Specialist Role Summary: As part of the IT Operations & Security team, this role requires, on one hand, knowledge... ...Client VPN: Configuring and troubleshooting VPN clients for secure remote access. Office WiFi: Understanding the...Full timeLucru la distanța
- ...feedback is encouraged. For us, impact isn't a perk. It's the driver of our work. We are guided and rewarded... ...components: Firewall, Proxy, Load Balancer Knowledge on IT security topics (understanding of secure protocols like SSL / TLS, encryption principles, etc.)...Full time
- ...is a dynamic global technology company and its success has been a result of its... ...Conducting audits and quality reviews of IT applications, with a special focus on SAP... ...implementing, and continuously improving IT security and audit processes as well as related tools...Full time
- ...communication skills in English. ~3-5 years of experience in Dev or DevOps environments. ~ Demonstrates compliance with ITIL, SOX, and IT security standards. ~ Experienced working with public cloud infrastructure and business-critical environments. ~ Able to ensure high...Full timeLucru hibridTură de noapte
- ...with non-technical stakeholders. What we offer: Global-facing role tied directly to customer trust. Exposure to both IT and OT security at enterprise scale. Clear path toward senior security architecture or cyber governance leadership. Pe jobssup.com...Lucru hibrid
- ...constructive feedback is encouraged. For us, impact isn't a perk. It's the driver of our work. We are guided and rewarded by a shared... ..., testing, and debugging ~ Strong communication skills ~ Security as a mindset ~ Eagerness to learn q language, kdb architecture...Full time
- ...! And we have been doing so for over 145 years! Old values make it possible to discover new paths. When it comes to implementing... ...TECH STACK: Systemintegrator / Kofax / IT-Process / Audit Security / Immutable Data / Scripting: Bash, Javascript, Python. ===...Lucru la distanța
- ...software developers in multiple geographical locations. Within IT, the VDI team is responsible for providing a state-of-the-art... ...tools, and modern development practices. The goal is to deliver secure, innovative, and scalable Virtual Developer Workplace solutions to...
- ...to ensure that application platforms and pipelines are reliable, secure, and performant. Experience with technologies such as Apache Kafka... ...compliance and security initiatives in collaboration with IT and Security teams. Requirements ~ Bachelor's degree in Computer...Full timeLucru hibridLucru la distanța
- ...constructive feedback is encouraged. For us, impact isn't a perk. It's the driver of our work. We are guided and rewarded by a shared... ...NFR Specialist is part of the Center of Expertise (CoE) Cyber Security Risk within the Non-Financial Risk (NFR) domain in Hubs Romania....Full time
