Search Results: 58 vacancies
...Responsibilities
We are looking for an exceptional Senior Security Engineer to join our growing team. For the first 6 months you will... ...Shield)
~Hands-on experience designing and deploying security controls across all security domains, such as access management, data protection...
...where everyone can belong, grow and do the best work of their lives.
As a Security Architect, you will have the opportunity to design, build, and implement various company wide security controls and technologies spanning 12 geographies. Working closely with key...
Security Operations Centre Specialist
At Deliveroo, it is our mission to build the definitive food company. In order to do that, we’re building a company where everyone can belong, grow and do the best work of their lives.
As a Security Operations Centre Specialist...
...Role:
The Cloud Access team is looking for a Principal Product Security Engineer to join us. As a member of the team, you will... ...security solution providers, to help improve the team's access control and security posture and achieve success.
In this role, you will...
...everyone can belong and do the best work of their lives.
As a Mobile Security Engineer, you will work with IT and engineering teams daily to... ...~Promote mobile security and the adoption of advanced security controls and testing methodologies across the business..
~Integrate and...
At Deliveroo, it is our mission to build the definitive food company. To do that, we're building a company that is secure and protects the data and money of our customers, employees and investors.
As a Security Project Manager, you will work with the fast-growing Security...
...only company whose products have been named as leaders in both Security and Observability. You will help in smooth and agile continuous... ...product implementation, make sure that compliance and quality controls are part of the design. You will contribute to development if required...
...CyberArk:
CyberArk (NASDAQ: CYBR), the global leader in Identity Security, centered on privileged access management, CyberArk provides... ...provides a set of capabilities, services and APIs to secure and control users access to applications and services with a high degree of...
...considered.
Extended Qualifications
Experience with implementing security standards and compliance across a huge enterprise organization... ...databases, distributed file systems, distributed concurrency control
Experience in the software development lifecycle process,...
...will deliver the industry’s only modern identity platform with a security-first approach. Our comprehensive SaaS solution runs primarily... ...for IT. Our flexible and granular role-based access controls work across Windows, macOS and mobile platforms.
You must be an...
...participation in the Test Community of Practice
Ensuring security and regulatory responsibilities are adhered to
Test monitoring... ...),SQL
CI/CD – Jenkins / GitHub Actions
Source Control System: Git, BitBucket
Test Management Tools: JIRA (preferred...
...CyberArk:
CyberArk (NASDAQ: CYBR), the global leader in Identity Security, centered on privileged access management, CyberArk provides... ...provides a set of capabilities, services and APIs to secure and control users access to applications and services with a high degree of...
...the required times. This can include Change Capture, Change Data Control and other “delta loading” approaches
~Support data... ...architecture covering data ingestion, data processing, data cataloguing, security, devops, consumption, etc
You have experience implementing...
...delivered solutions, covering core pillars of operational excellence, security, performance, reliability & cost.
Create re-usable patterns... ...with technical squads to keep technical debt under control.
Communicate our technical vision and strategy to both teams...
...requirements, ensuring they are aligned to broader architectural and security standards and that they meet tactical and strategic objectives.... ...standard in the SAP S/4HANA system and establish necessary controls and processes to maintain compliance.
Thorough understanding...
...on technical integrations and administrative role-based access controls.
This role will encompass managing and refining a Role Based... ...Organisation's apps (Lifecycle Management)
~Ensure the Organisation's security is maintained by setting up various Okta policies (MFA, Sign-on...
...related services, whilst being an advocate for automation and security.
You will report into the Workplace Technology Engineering Manager... ...standards supporting the delivery of IAM solutions and controls.
#Collaborate with team members to identify roles, permissions...
...CyberArk:
(NASDAQ: ), the global leader in , Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout...
...in collaboration with IT, to drive efficiency and scalability across financial processes.
~Manage processes in accordance with SOX control requirements, ensuring adequate identification and mitigation of control risks and documentation of control procedures.
~Work with...
A little about us. Splunk is the key to enterprise resilience for the 11,000+ organizations that use our Unified Security and Observability Platform. We regularly appear on a lot of “Best Places to Work” lists and we think it’s because we encourage our Splunkers to bring...