... decision making by Corporate Security and the business Assessment Management: Utilize various security databases, open-source options, and security providers and consultants to support ... (verbal and written), with solid computer skills and IT awareness; ...
jobs.jti.com
... English (verbal and written), with solid computer skills and IT awareness; ... various sources that allow Corporate Security and the business to understand ...
jobs.jti.com
... state in the global store,Solid knowledge in RTK Query to perform queries and mutations efficiently,Solid knowledge in Jest with React ...
careers.n-ix.com
... English (verbal and written), with solid computer skills and IT awareness; ... various sources that allow Corporate Security and the business to understand ...
jobs.jti.com
... while ensuring the operability, security and compliance of our cloud- ... , and other relevant regulations.Security: Design and implement robust security practices for cloud and hybrid ... focused on cloud operations, security, and cloud management.At least ...
jobs.smartrecruiters.com
... pivotal role in enhancing our security posture. Collaborating closely with our ... intellectual property and ensuring the security of our digital assets. This ... contribute to the protection and security of our intellectual property.Conduct ...
jobs.smartrecruiters.com
... d) (focus on M365 and security) We are Protina, an independent ... promote best practices for cloud security Management of identity and access ...
ua.talent.com
... our associates is rock-solid: we grow together, we enjoy ... of experience as a Security Consultant, Information Security Analyst or Security Engineer;Good knowledge in SAP ... the following fields: Cryptography, security, privacy, software development will be ...
jobs.smartrecruiters.com
... promote teamwork.Keep the Safety & Security Manager informed of any noteworthy ... to the performance of the Security Department.Oversee the work of ...
jobs.smartrecruiters.com
... corporate systems.Provision of ICT security advice, based on the government IT Security Manual (ITSM)Physical security tasks, such as supervision of ... design and operate the cyber security tools used across the Army, ...
jobs.smartrecruiters.com