... with vendors (as required) maintain cyber security To be successful in this ...
5 days ago
... accurate records and billing. Upholding cyber security measures. Skills/Knowledge: A minimum of ...
8 days ago
... advice on design, implementation, scalability, cyber security and system performance. Importantly, you ...
14 days ago
... Regional Sales Manager (Entry level, Cyber Security background) Melbourne, Victoria, Australia 5 days ...
22 days ago
... Regional Sales Manager (Entry level, Cyber Security background) Melbourne, Victoria, Australia 3 days ...
22 days ago
... Regional Sales Manager (Entry level, Cyber Security background) Melbourne, Victoria, Australia 2 days ...
22 days ago
... development, infrastructure, corporate systems or cyber security projects (desirable). About our workforce ...
22 days ago
... related to safety compliance, including cyber security and data protection, are met ...
a month ago
... alignment between our customers’ security frameworks and their evolving digital ... as their foundation to manage cyber risk, ensure compliance, ... the compliance of all cyber assets across the modern ... compliant. Our Cultural Values Cyber Obsessed – We are curious ...
18 days ago
... and implementation of data security and/ or privacy ... Positioned first globally in Security Consulting Services for the ... ? Yes, that's Deloitte. Cyber, data and privacy are constantly ... a data protection, cyber, or data security technology advisory role Strong ...
3 days ago
... executive-level reporting to communicate cyber risks and prioritise remediation ... and support them throughout their cyber maturity journey Experience & Skills 2–4 ... control environments Technical awareness of security operations and engineering concepts ...
17 days ago
... and remediate cyber risk. With UpGuard, organizations leverage our security expertise and ... role (all regions) Personal device security & online privacy protection subsidy: ... a paid subscription to personal device security & online privacy protection platform ( ...
29 days ago
... , and remediate cyber risk. With UpGuard, organizations leverage our security expertise and ... of vendors or assessing the security of their own infrastructure. UpGuard ... the markets we play in (Cyber VRM, Attack Surface Management) by ...
3 days ago
... , and remediate cyber risk. With UpGuard, organizations leverage our security expertise and ... of vendors or assessing the security of their own infrastructure. UpGuard ... become the leader in the Cyber VRM category by providing a best ...
15 days ago
... at the intersection of cyber, data, and AI. ... & Delivery Work closely with architects, DevOps engineers, and product ... code quality, performance, and security standards are met Innovation & ... and DevOps practices Understanding of security protocols (OAuth2, JWT) ...
19 days ago
... and meet objectives with AWS Security Assurance Services. Our expertise and ... solutions that leverage services; Architecting and developing customer applications to ... as a contact center technology architect, enterprise IT Architect or senior contact center ...
27 days ago
... and meet objectives with AWS Security Assurance Services. Our expertise and ... solutions that leverage services; Architecting and developing customer applications to ... as a contact center technology architect, enterprise IT Architect or senior contact center ...
2 months ago
... from unauthorised access and cyber threats Experience managing hybrid ... reports on infrastructure performance, security incidents, and capacity utilisation ... strong understanding of networking protocols, security measures, and troubleshooting techniques A ...
14 days ago
... DevSecOps initiatives, embedding security and observability throughout the ... APIs usingPython (FastAPI). Architect and implementmicroservicesfollowing best practices ... andOctopus. DriveDevSecOpsinitiatives, embedding security and observability into the ...
26 days ago
... role in shaping a maturing security culture. This is an ... , phishing, and physical security incidents Develop and implement proactive ... threat monitoring strategies Collaborate with cyber, fraud, HR, and ... for senior stakeholders on security incidents and trends ...
28 days ago