... We are seeking an experienced IT Procurement & Vendor Analyst to effectively support and manage our IT supply chain and vendors. The role involves sourcing and procuring IT products and services, managing vendor ...
ro.talent.com
... seeking a seasoned Business Systems Analyst to join the Accounting Systems ... personnel are mainly business system analysts who understand both the business and the IT solutions. Responsibilities: Works with organizations ...
ro.talent.com
... us, impact isnt a perk. Its the driver of our work. ... of experience working as an IT Business Analyst (Technical) Product Owner Technical Project ... microservices architectures).Understanding of web security principles and practicesProven ability to ...
ro.talent.com
... central component of the IT architecture, we play an important ... lead and work on IT projects You program tools scripts ... modern working in the IT sector; height-adjustable desks with ... willing to undergo possible security checks by the DRV Bund. ...
ro.talent.com
... hands-on experience on security domain managing Security Infrastructure Should have good working ... IPSEC VPNs, Tunnelling and Security. Ensure all network security rules are configured according to ... Cisco Email and DNS security Good hands-on experience in ...
ro.talent.com
... future. WHAT WE OFFER YOU SECURITY We offer a permanent job ... received from part-time employees, it will be checked whether the ...
ro.talent.com
... in. Snyk is a developer security platform that makes it easy for development teams to find, prioritize, and fix security vulnerabilities in code, dependencies, containers, ...
ro.talent.com
... in. Snyk is a developer security platform that makes it easy for development teams to find, prioritize, and fix security vulnerabilities in code, dependencies, containers, ...
ro.talent.com
... experience in an Ops DevOps IT Risk (worked with it risk methodology, tools, techniques and concepts)Familiar with IT Security concepts and terminology related to ...
ro.talent.com
... of information technology concerning vulnerabilities, security breaches or malicious attacksBe compliant to security policy, processes and procedures for completenessPrepare Reports on IT system vulnerability and be accountable & ...
ro.talent.com