...for good, whether you're championing cyber security, defining how we harness the power of... ...support to take your development to the next level. Every day, there will be opportunities to... ...role in cybersecurity with Reckitt as an IT & D Manager. Your expertise will safeguard...
...for good, whether you're championing cyber security, defining how we harness the power of... ...support to take your development to the next level. Every day, there will be opportunities to... ...role in cybersecurity with Reckitt as an IT & D Manager. Your expertise will safeguard...
...can belong, grow and do the best work of their lives.
As a Security Architect, you will have the opportunity to design, build, and... ...in place across the tech stack to support DevSecOps.
Provide level 3 SME support for security technologies or in the event of a security...
...can thrive.
SUMMARY OF POSITION: The SAP Security Lead is accountable to maintain a secure... ...strategy.
· Liaise with Compliance/SOX, IT, Internal/External Audit and Business teams... ...knowledge & skills
• Expert level knowledge of SAP Security functionality and...
...and maintain the organization's information security policies, procedures, and standards in... ...requirements.
• Establish partnerships with IT function in implementing technical... ...fast-paced and dynamic environment.
• High level of integrity, professionalism, and commitment...
Nisum is a leading global digital commerce firm headquartered in California, with services spanning digital strategy and transformation, insights and analytics, blockchain, business agility, and custom software development. Founded in 2000 with the customer-centric motto...
...company. In order to do that, we’re building a company that is secure and protects the data and money of our customers, employees and... ...cyber security as a Project Manager or similar experience.
High level knowledge of the security technologies and capabilities used in...
Nisum is a leading global digital commerce firm headquartered in California, with services spanning digital strategy and transformation, insights and analytics, blockchain, business agility, and custom software development. Founded in 2000 with the customer-centric motto...
Nisum is a leading global digital commerce firm headquartered in California, with services spanning digital strategy and transformation, insights and analytics, blockchain, business agility, and custom software development. Founded in 2000 with the customer-centric motto...
...nourishment a right and not a privilege.
IT & D
In IT&D, you'll be a force for good, whether you're championing cyber security, defining how we harness the power of... ...support to take your development to the next level. Every day, there will be opportunities to...
...nourishment a right and not a privilege.
IT & D
In IT&D, you'll be a force for good, whether you're championing cyber security, defining how we harness the power of... ...support to take your development to the next level. Every day, there will be opportunities to...
...a pragmatic approach and working closely with others to achieve a great outcome.
You will also be interfacing with the Global Security Office to identify and manage.
security issues and technical risks for the platform and solutions.
On an ad-hoc basis, you will...
...Developer with microservices experience
Ready to help build the IT future of DSV Solutions, one microservice at the time?
We’re... ...frameworks. Has a proven track record of developing high-quality, secure microservice-based products. Might even have worked on a monolith...
...Group Software Engineering General Summary:
Experience in security software development.
Hands on C programing for embedded platforms... ...• Trusted execution environment.
•Debugging overall system level issues using ARM Trace32.
Applicants : If you need an...
...Mattermost provides secure, workflow-centric collaboration for technical and operational teams that need to meet nation-state-level security and trust requirements. We serve technology, public... ..., visit
Mattermost is seeking an IT Operations Specialist who thrives...
...nourishment a right and not a privilege.
IT & D
In IT&D, you'll be a force for good, whether you're championing cyber security, defining how we harness the power of... ...support to take your development to the next level. Every day, there will be opportunities to...
...Asia-Pacific (APAC) Business Information Security Office is a key leader in shaping WBD's Global... ...with technology leadership, GICS, and all IT Service Owners to generate appropriate... ...architecture, engineering, or InfoSec Director level.
Security certifications are a plus (...
...Company: Qualcomm India Private Limited Job Area: Information Technology Group, Information Technology Group Cyber Security Engineering General Summary:
You will be collaborating with our engineering team to refine and enhance our security strategies across...
...where you'll be a key part of a high-performing team delivering secure software solutions. Make a real impact as you help shape the future... ...Skilled in planning, designing, and implementing enterprise level security solutions Hands on experience in Ant; Apache Tomcat; defining...
...IT Project Manager
Minimum 5 years of experience in -
Hands on experience in managing M365 suite implementation project is a must (migrating emails from on premise, automation/workflows, security measures, intranet portals and document management systems).
Understanding...
1.Job Purpose:
IT Service Manager – Automotive; manages day to day relationship with... ....
•Monitors the compliance with service level agreements (SLAs) with GIT and external vendors... ..., operation, documentation, roadmap, and security to be of the highest standards.
•...
...for good, whether you're championing cyber security, defining how we harness the power of... ...support to take your development to the next level. Every day, there will be opportunities to... ...with the business users in providing the IT solution for the business requirements and...
...Project Role : Security Delivery Lead
Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets).
Must have skills : Endpoint Protection
Good to have...
Job Category - IT
Job Type - Full Time
Job ID - PR_807_JOB
No of openings... ..., developing, and maintaining enterprise-level applications. As a Senior J2EE Developer,... ...to DevOps CI/CD process, Code Promotions, Security Standards.
Bachelor's degree in Computer...
...workforce diversity.
Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary...
...Your seniority as a security engineer puts you in the ranks of the top talent in your field. Play a critical role at one of the world's most iconic financial institutions where security is vital.
As a Security Engineer III at JPMorgan Chase within the Cyber Security...
...Private Limited Job Area: Engineering Group, Engineering Group Software Engineering General Summary:
Job function: Enable security Mitigation features and develop tools to detect vulnerabilities.
Minimum Qualifications:
• Bachelor's degree in Engineering,...
...Information Technology Group, Information Technology Group Cyber Security Engineering General Summary:
· Working under close... ...integrate, and interpret information from several sources.
· IT Security - Knowledge of IT security policies and how to apply them...
...nourishment a right and not a privilege.
IT and D
In IT&D, you'll be a force for good, whether you're championing cyber security, defining how we harness the power of... ...support to take your development to the next level. Every day, there will be opportunities to...
...Information Technology Group, Information Technology Group Cyber Security Engineering General Summary:
Your role as a member of the... ...is the position for you.
Responsibilities:
• Partner with IT and business units to conduct security assessments, generate threat...