... the role: Join our Cyber Security Operations team and play a ... SOAR, TIP, and security enforcement platforms. Onboard new ... scripting skills to automate security tasks and workflows. Solid ... and cloud administration, network security, and next-gen firewalls. ...
a day ago
... Infrastructure & Cybersecurity Manage the cyber maturity uplift across roadside ... Ensure compliance with enterprise cyber security standards and frameworks Develop ... system integration efforts with strategic cyber security objectives Role 2: Roadside Technology ...
a day ago
... , data and analytics, infrastructure, cyber security, fraud prevention, and business resilience ... , AWS Bedrock. Expertise with Security Engineering principles and implementation. Cloud ... solutions with a focus on security and scalability. Promoting code quality ...
19 hours ago
... delivery and data analytics to cyber security and business resilience across the ... , Cursor, AWS Bedrock). Understanding of security engineering and cloud-native development ...
a day ago
... telecommunications procurement and outsourcing arrangements, cyber security, AI, data and privacy. In ... Australian privacy law and data security regulation. A keen interest in staying ...
5 days ago
... organizations of every size. From cyber security, and ISO certification to employment ...
a day ago
... boost efficiency and productivity Embed cyber security best practice in everything you ...
2 days ago
... partnership with cloud, platform, and cyber security teams to ensure that solutions ...
4 days ago
... air, land, sea, space, and cyber domains. With a workforce of nearly ... cutting-edge IT, infrastructure, and cyber capability. They pride themselves on ... ), and data replication. Understanding of security frameworks, particularly in regulated environments ...
a day ago
... , and remediate cyber risk. With UpGuard, organizations leverage our security expertise and ... of vendors or assessing the security of their own infrastructure. UpGuard ... the markets we play in (Cyber VRM, Attack Surface Management) by ...
2 days ago
... , technology and technology infrastructure, cyber, fraud, physical security and business resilience for ... design patterns. Apply best-practice security techniques to web applications and ...
14 hours ago
... , technology and technology infrastructure, cyber, fraud, physical security, and business resilience for ... Engineering & DevSecOps: Deep understanding of security principles, DevSecOps, and SRE practices ...
19 hours ago
... information, such as your social security number. What to know: Commvault ... ) is the gold standard in cyber resilience. The company empowers customers ... -class data protection, exceptional data security, advanced data intelligence, and lightning ...
4 days ago
... , unboxing items, hanging items, ticketing, security tagging, picking orders for customers ... adequate availability across Black Friday & Cyber Weekend at the end of ...
a day ago
... and practices. • Certified Information Systems Security Professional (CISSP) or similar certifications ... postings may be used by cyber criminals to target your personally ...
4 days ago
... systems. Collaborate with developers, business analysts, and stakeholders to ensure requirements ... compliance with healthcare data standards, security, and privacy requirements. Skills & ... as a Test Engineer / QA Analyst within healthcare apps, health record ...
4 days ago
... oversight across backend, infrastructure, and security streams. Delivery & Stakeholder Engagement ... cross-functional teams including engineers, analysts, and product owners. Act ... primary technical liaison between engineering, security, data, compliance, and ...
3 days ago
... (including software, QA and data analysts) You’ll lead your team ... optimize delivery while prioritizing performance, security, and speed. What's in it ...
3 hours ago
... cross-functional teams (data engineers, analysts, application developers) to understand data ... include, ID and work rights, security clearance verification and any other ...
4 days ago
... experiential marketing Collaborate with research analysts to transform market intelligence into ... secure with appropriate level of security and keep for as long ...
5 days ago