... self-motivated and enthusiastic Software Engineers who want to impact cybersecurity ... to ensure safe and secure systems architectures are followed. Requirements:6+ ... and current systemsBachelor’s Degree in Systems Engineering, Computer Science or related ...
www.jobber.ro
... areas.» Maintaining close collaboration with Network and also Architecture teams, be ... are our main clients.»Global Network team, following their topics and ... , work from home, flexible benefits system, on-the-job training & e- ...
ro.talent.com
... areas.» Maintaining close collaboration with Network and also Architecture teams, be ... are our main clients.»Global Network team, following their topics and ... , work from home, flexible benefits system, on-the-job training & e- ...
ro.talent.com
... power systems, control systems, telecommunications, and signal processing. These engineers will primarily focus on overseeing ... large-scale electrical systems, including motor control ...
ro.talent.com
... segmentation of customer and internal systems and protect them against unwanted access.As a Network Consultant you plan and execute network activities:Day-to-day business: ...
ro.talent.com
... segmentation of customer and internal systems and protect them against unwanted access.As a Network Consultant you plan and execute network activities:Day-to-day business: ...
ro.talent.com
... the operation of the information system (SAP);Trains internal users and elaborates manuals specific to the modules served;Requests the intervention of the Network Manager, if the problem for ...
ro.talent.com
... segmentation of customer and internal systems and protect them against unwanted access.As a Network Consultant you plan and execute network activities:Day-to-day business: ...
ro.talent.com
... segmentation of customer and internal systems and protect them against unwanted access.As a Network Consultant you plan and execute network activities:Create and troubleshoot 60 ...
ro.talent.com
... uses, implements, reviews, or evaluates systems to identify threat actors in ... or successful efforts to compromise systems and protocols. The analyst performs ... vulnerabilities in web applications, operating systems, and networksReview security events that ...
ro.gigroup.com