Search Results: 10 vacancies
...platforms to meet the ever-evolving threat landscape, we want you to be part of Teradyne's journey!
As an Identity and Access Management Specialist, you'll play a crucial role in shaping and safeguarding our environment against cyber threats. You'll focus on improving...
...reviewing manufacturers’ specifications, preparing bids, awarding contracts for specialized equipment, purchasing, construction management, security system design, installation, and record documents.
Supervises the initial design or renovation of office and industrial...
...ensuring issues/exceptions are well-defined, root causes investigated, and concise remediation plans are discussed and agreed upon with management
• Documenting control processes in flowcharts and narrative format by performing process walkthroughs with process owners
•...
...customer inquiries ranging from hardware, software applications and operating systems following a multi-tiered approach. This includes managing the daily workload through an incident tracking system.
Resolve customer and field reported faults, queries, and complaints at...
...using Vision software
Verify the design of the device profile
Monitor the performance of the Vision profile in production
Manage field escalation and implement continuous improvement of Vision profile
Be an active member of the extended design team by providing...
...presentations. Prepare post earnings call analysis summarizing the analysts’ commentary.
Perform ad hoc reporting and analysis for Senior Management, including peer benchmarking and risk/opportunity analysis
Basic Qualifications & Skills
Strong analytical skills and...
...a strong communicator to describe a material plan that supports the customer and describe the costs and risks to do so to Senior Management.
Responsibilities
• Establish inventory strategies that support business objectives of on time delivery while minimizing excess...
...review, and summarize test results. Report anomalies into defect tracking system. Suggest solutions to identified product problems
Manage multiple tasks and align those tasks with the company's business priorities
Participate in process improvements; support other...
...to network security, ensuring successful implementation and integration with existing infrastructure.
~ Support, implement, and manage advanced network security solutions, with a primary focus on the Palo Alto stack and other industry-leading technologies.
~ Configure...
...Assessment.
Knowledge on Axonious, Rapid7, Pentera, Exabeam or similar SIEM, Vulnerability Assessment and Cybersecurity Asset Management tools
In-depth knowledge of common vulnerabilities and exposure (CVE) databases and vulnerability assessment tools.
Strong...