... , processes, and technology to support the program. Identify and mitigate security issues, vulnerabilities, and misconfigurations related ... identify and implement technology or process improvements that mature our security services. Maintain an expert-level ...
pl.jooble.org
... Cyber Incident Management team and Security teams across Aviva to perform ... from the area of IT Security, technologies, tools and techniques used for ... learn more about the information security landscape Review and triage experience ...
pl.jooble.org
... with business processes, operations, information security programs, and technology projects. Expertise in SharePoint 2019 ...
pl.jooble.org
... high-quality technologies and services that spark enthusiasm and enrich people’s lives. Our promise to our associates is rock-solid: we grow together, we enjoy our work, and we inspire each other. Job Description The Project Security Manager (PSecM ...
pl.jooble.org
... 5 years of relevant Information Technology Security experience or 7 years of relevant Information Technology Security experience, Strong foundational knowledge of ...
pl.jooble.org
... Coordinate the preparation of information technology contingency plans to respond to information security breaches, violations, and incidents Maintain ...
pl.jooble.org
... : Minimum 5 years of Information Technology and 3 year of Security experience, Foundational knowledge of all security domains and controls (ISO 27001 ...
pl.jooble.org
... processes, operations, information security programs, and technology projects. CISA We offer: Private ... , which involve security policies and technologies to control and monitor access to sensitive technology resources within an organization. Experience ...
www.goldenline.pl
... attacks, etc. Understanding networking (IP, routing, DNS), operating systems, and cybersecurity technologies. Familiarity with network protocols, sytems (Linux, Windows), intrusion detection systems (IDS), and other security tools. Proficiency in at ...
pl.talent.com
... attacks, etc. Understanding networking (IP, routing, DNS), operating systems, and cybersecurity technologies. Familiarity with network protocols, sytems (Linux, Windows), intrusion detection systems (IDS), and other security tools. Proficiency in at ...
pl.jooble.org