... implement the security requirements, including on security architecture, cloud security, infrastructure security, network security, cryptology or authentication.-Security testing, this team is able ... team of other security architects.In the team, everyone ...
ro.talent.com
... worldwide strategy to improve IT security & compliance and protect the business. ... region to improve the IT Security and Resilience of the BUs ... conviction to persuade others that security is paramount and not just ...
ro.talent.com
... experience in designing robust security frameworks and implementing security best practices across complex AI- ... projects.Lead the development of security architectures that address the unique ... with a well-balanced personal life. This model not only ...
ro.talent.com
... , and applying fixes to address security vulnerabilities and exposures at different ... safeguarding our software against potential security threats, and most importantly, fixing ... . If you are excited about Security, Quality, Cloud, SaaS, AWS, Scale, ...
ro.talent.com
... management.Position SCOPE & Key ResponsibilitiesThe Security Operations Expert will be reporting ... in accordance with Edenred IT Security policies.Lead implementation of new ... addressed by the Global Information Security team, such as penetration testing, ...
ro.talent.com
... 6 – Plaza RomaniaThe Challenge:As Security Analyst, you will analyze and ... of informative data relating to security events. The analyst uses, implements, ... , be adaptable to change, set personal standards“On call” availabilityKnowledge of ...
ro.gigroup.com
... descriptionAs part of the IT Security Operations Team your activities will ... management, rights, etc.) based on security policies.To produce procedures and ... are accepted and retained (Foster Security Culture).To manage the PAM ...
ro.talent.com
... descriptionAs part of the IT Security Operations Team your activities will ... management, rights, etc.) based on security policies.To produce procedures and ... are accepted and retained (Foster Security Culture).To manage the PAM ...
ro.talent.com
... pentru procesarea datelor cu carcter personal în cadrul procesului de recrutare ... pentru prelucrarea datelor cu caracter personal în toate etapele procesului de ... ă prelucreze datele mele cu caracter personal. Angajații sunt persoanele angajate ...
ro.talent.com
... pentru procesarea datelor cu carcter personal în cadrul procesului de recrutare ... pentru prelucrarea datelor cu caracter personal în toate etapele procesului de ... ă prelucreze datele mele cu caracter personal. Angajații sunt persoanele angajate ...
ro.talent.com