Get new jobs by email
Search Results: 32 vacancies
- ...Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks. Troubleshooting security and network problems. Responding to all system and/or network security breaches....
- ...Slack Atlassian Docusign ProofPoint GlobalSign Assist in Knowledge Transfer for the implemented solutions. · Work with Security Governance Team to ensure compliance with Cybersecurity-related regulations and industry standards. Daily Operational Tasks...
- ...Atlassian g.) Docusign h.) ProofPoint. i.) GlobalSign Assist in Knowledge Transfer for the implemented solutions. Work with Security Governance Team to ensure compliance with Cybersecurity-related regulations and industry standards. Requirements Minimum...
- Responsibilities: ~ Develop regular and adhoc business dashboards, reports, MIS that will help the business, operations and compliance managers monitor their key performance indicators against goals. Visualize, analyze and provide data-driven insights to enable stakeholders...
- ...practices. # Work closely with business analysts and stakeholders to understand intricate... ...efforts to ensure the reliability, security, and quality of developed solutions.... ...Bachelor's degree in Computer Science, Information Technology, or a related field. Master's...
- ...# Collaborate closely with business analysts and stakeholders to understand intricate... ...testing efforts to ensure the reliability, security, and high quality of developed solutions... ...Bachelor's degree in Computer Science, Information Technology, or a related field. A master...
- ...lifecycle management processes. Ensure compliance with data privacy regulations and security practices. Collaboration - Collaborate with cross-functional teams including data scientists, analysts, software developers, and business stakeholders to understand data...
- ...optimal performance. Implement and manage access controls and security policies to protect sensitive data. Perform regular... ...teams, including data scientists, data engineers, and business analysts to understand their requirements and provide technical solutions...
- ...fixed lines and ensuring the stability and usage are compliant to security standards; Managing telephony routers and equipment and... ...; Good presentation skills; Graduate of a Degree in Information Technology or any related field; Experience with user...
- ...making necessary changes to optimize system performance. Security and Compliance: Cloud administrators ensure that cloud-based infrastructure... ...Requirements Bachelor’s degree in computer science, information technology, or a related field is required. Must have...
- ...cycles on lower and higher environments Manage user and security access Perform performance tuning utilizing Informatica BDM... ...Analysis of Various Development Alternatives to Applications, Information Systems and Modules Manage Informatica CDC and Kafka...
- - Maintaining accurate record of sales. - Coordinating and securing potential leads and clients. - Preparation and presentation to attract sales. QUALIFICATIONS: - Graduate of Marketing, Management, IT or related course. - Sales experience in IT products and/or...
- ...solutions. • Create process and end-user documentation. • Assure the quality of the automation (QA processes). • Work with Business Analysts, Scrum Masters, QA Analysts, Product Owners, and other cross-functional resources to define and deliver business impacting...
- ...processes • Developing high-performance applications by writing testable, reusable, and efficient code • Implementing effective security protocols, data protection measures, and storage solutions • Running diagnostic tests, repairing defects, and providing...
- ...support and fault resolution. Hands-on expertise in network migrations, proof-of-concept testing, and multi-vendor networking and security technologies. Work closely with project managers and internal teams, collaborating directly with customers to address their...
- ...effective APIs Test software to ensure responsiveness and efficiency Troubleshoot, debug and upgrade software Create security and data protection settings Write technical documentation Requirements Qualifications More than 5 years work...
- ...processes Developing high-performance applications by writing testable, reusable, and efficient code Implementing effective security protocols, data protection measures, and storage solutions Running diagnostic tests, repairing defects, and providing...
- ...Azure Strong Networking skills (LAN, WAN, TCP/IP, DNS & DHCP) Firewalls (Fortigate, Meraki, Sophos UTM preferred) Email Security Gateway/Anti Spam Remote Desktop Services (RDS) Experience with Connectwise, Labtech, and/or Solarwinds Orion (Desired)...
- ...(Laptops) Formulate and create Office 365 SharePoint sites for domain users and external client access Maintain a highly secure system through proper configuration and system access monitoring Troubleshoot and resolve issues with user access to cloud services...
- ...processes Developing high-performance applications by writing testable, reusable, and efficient code ~ Implementing effective security protocols, data protection measures, and storage solutions Running diagnostic tests, repairing defects, and providing...