... kwietnia 2016 r. w sprawie ochrony osób fizycznych w związku z ... do niego: Kontakt do inspektora ochrony danych: Cel przetwarzania danych: przeprowadzenie ... do organu nadzorczego - Prezesa Urzędu Ochrony Danych Osobowych (ul. Stawki 2, ...
www.praca.pl
... kwietnia 2016 r. w sprawie ochrony osób fizycznych w związku z ... do niego: Kontakt do inspektora ochrony danych: Cel przetwarzania danych: przeprowadzenie ... do organu nadzorczego - Prezesa Urzędu Ochrony Danych Osobowych (ul. Stawki 2, ...
www.praca.pl
... in the areas of IT security, network and IT infrastructure management, ... guarantee the availability, performance, and security of our systems.Utilize your ... procedures.Lead initiatives to enhance security, compliance, and disaster recovery strategies. ...
jobdesk.pl
... for:Ensuring the integrity and security of databases, including installing, upgrading, ... .Implementing up-to-date security measures and planning capacity based ... Data Governance, including accuracy, consistency, security, and auditing.Collaborating with Dev ...
jobdesk.pl
... , including performance, quality and security aspects; Willingness to learn and ... , including performance, quality and security aspects; Willingness to learn and ... , Docker, Kubernetes, Web applications, Security, C#, . NET, React, Redux, SQL, ...
pl.talent.com
Join us, and transform application security with cutting-edge solutions Krakow- ... institution focusing on enhancing application security through comprehensive security scans and vulnerability management. This ...
pl.talent.com
... and ensuring the integrity, security, and availability of database services. ... and maintenance of database security measures, including access controls and ... techniques. Experience with database security, backup, recovery, and replication strategies. ...
pl.talent.com
... is designed to offer comprehensive security solutions for both private and ... system performance and ensures high security and data protection standards. Additionally, ... . A strong background in cryptography, security, or encryption is highly desirable ...
pl.talent.com
... DevOps and Agile methodologies. Cloud security best practices and certifications. Experience ... ensure system health and performance. Security: Collaborate with external auditors to implement and maintain security best practices, including access controls, ...
pl.talent.com
... , Vulnerability Management, SSE, Security Awareness Zarządzanie incydentami bezpieczeństwa IT ... PKI, Vulnerability Management, SSE, Security Awareness Znajomość standardów ISO 27001, ... (np. CEH, CISSP, Security+, CISM) Wiedza w obszarze bezpieczeństwa ...
pl.talent.com