PREMIUM
... and authorization concepts Perform security reviews on system architecture –for technical diagrams – including ... what real Threats in IT Security and could define what needs to be done to protect systems, applications and infrastructure against such ...
www.adzuna.pl
PREMIUM
... design secure applications and systems, focusing on threat modeling, security patterns, and best practices Incident ... Technical Skills: Proficiency in security assessment tools and scanners (e. ... coding practices and security standards (e.g., OWASP, NIST) ...
www.adzuna.pl
PREMIUM
... Industrial Cyber Security Professional (GICSP) • Certified Information Security Manager (CISM) • Certified SCADA Security Architect (CSSA) • SC-200: Microsoft Security Operations Analyst • Certified Information Systems Security Professional (CISSP ...
www.adzuna.pl
PREMIUM
... response activities to ensure the security and resilience of our systems. Lead the design and development ...
www.adzuna.pl
PREMIUM
... , and integrations with third-party systems like ERP and billing systems. You ensure the CRM system meets data governance, security, and compliance standards. By collaborating ...
www.adzuna.pl
PREMIUM
... connected to AWS cloud, our systems, networks, and data against potential security threats. Responsibilities: Defining, implementing and ... , is looking for an IT Security Specialist. While Kolomolo is a ...
www.adzuna.pl
PREMIUM
... in securing hybrid environment-based systems and applications at every stage of the software development lifecycle, ensuring that the principles of Security by design and Security by default are followed, thereby integrating security into the DevOps and ...
www.adzuna.pl
PREMIUM
... before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to ... client information assets Our Information Security professionals enable EY to work ...
www.adzuna.pl
PREMIUM
... . Design and configuration of cloud security services, such as: security monitoring services (cloud monitoring tools Azure Monitor, Azure Sentinel, GCP Operations, etc.) and integrations with SIEM SOAR systems, cloud identity and access management ...
www.adzuna.pl
PREMIUM
... in mechatronic systems for vehicles, specializing in car parts. Job Description Translate business risks and constraints related to IT and Information Security into actionable technical ... Information Security Management System. The Successful Applicant Over five ...
www.adzuna.pl