... all consumer touchpoints in the retail landscape including merchandising units. Plan, ... , execute and monitor initiatives in retail channels. Assist in the execution ... store, pop-ups, roving kiosks & retail merchandising. Plan and execute events ...
jobs.jti.com
... are bonus Responsibilities: Perform software security audit and testing.Ensure security gaps are closed.Ensure software compliance with security standards. What We Offer Empowering ...
www.globallogic.com
... . With a focus on Information Security and Risk Management, this role ... coordination point, ensuring business and security requirements are accurately captured, dependencies ... leading Information Technology and Cyber Security projects.2+ years leading large ...
www.smartrecruiters.com
... . With a focus on Information Security and Risk Management, this role ... coordination point, ensuring business and security requirements are accurately captured, dependencies ... leading Information Technology and Cyber Security projects.2+ years leading large ...
www.smartrecruiters.com
... management self-assessment of internal security controls and JSOX remediation process ... in relevant field Understanding of security frameworks (ISO 27001, NIST, COBIT, ... a proficient knowledge of SAP Security or SAP Function module on- ...
jobs.jti.com
... data protection and data security for granted every day An ... with certifications and information security (e.g. ISO 27001) is ... of data protection, data security and digital working environments, as ... data protection and data security like no other company in ...
ua.talent.com
... implementation of monitoring and security solutions such as firewalls and ... network and or IT security Ability to work on site ... and implement monitoring and security solutions such as firewalls and ... networking and or IT security Able to work on-site ...
ua.talent.com
... -farm) to improve the food security and self-reliance of vulnerable, ... clear analysis and understanding of security.Ensure compliance with security procedures and policies as determined ... , and to follow laws and security protocols. The most successful Mercy ...
ua.talent.com
... (Spring Data, Spring Messaging, Spring Security, Spring MVC) to develop RESTful ... programs in CX, Data, IT Security, Leadership, Agile. Corporate library and ... програми з CX, Data, IT Security, Лідерства, Agile. Корпоративна бібліотека та ...
ua.talent.com
... for a US-based security and networking company, empowers people ... to help IT and security professionals manage dynamic and scalable endpoint security agents through a unified interface. ... solutions for enhanced security and connectivity Code Quality: Ensure ...
ua.talent.com