Search Results: 105 vacancies
...Daily Cybersec Ticket Management
Vulnerability Assessment and Pen Testing Exercise.
Assist in requirements analysis and solutions... ...Knowledge Transfer for the implemented solutions. · Work with Security Governance Team to ensure compliance with Cybersecurity-related...
...Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.
Troubleshooting security and network problems.
Responding to all system and/or network security breaches....
...The Governance, Risk and Compliance Lead will be responsible for developing and maintaining the information security policies, processes, programs, and project plans. In order to support and maintain the Information Security Management System (ISMS) being established across...
...This role will lead the JG Summit Holdings, Inc. IT Infrastructure and Communications group and will be responsible and accountable for... ..., performance, and capacity, in a cost effective and secure manner.
Oversee the development of desktop services and management...
...We're looking for a Multimedia and Culture Intern to help us create cool stuff for our culture programs and events. You'll work with us to create posters, videos, and graphics that showcase our company's values and make our workplace awesome.
Responsibilities:...
...WHAT IS THE JOB LIKE?
• Develop and implement a comprehensive learning and development strategy aligned with the organization's goals and objectives.
• Identify training needs through collaboration with department heads, HR, and performance appraisal systems.
•...
...Job description
Can conduct system gap analysis and identify measures to address the gaps between existing and proposed system
Can assess business requirements and translate these IT needs into a system design specification
Can design implementation plan...
...Data Architecture Design - Design, develop and implement data architectures that align with business needs and growth plans. Define... ...processes. Ensure compliance with data privacy regulations and security practices.
Collaboration - Collaborate with cross-functional...
...office as a member of larger team that spans Australia, New Zealand and the Philippines, working with and being supported by almost 160... ...Firewalls (Fortigate, Meraki, Sophos UTM preferred)
Email Security Gateway/Anti Spam
Remote Desktop Services (RDS)...
...Ensuring Network uptime and managing telco escalations;
Maintaining SLA on the availability of Network Infrastructure;... ...fixed lines and ensuring the stability and usage are compliant to security standards;
Managing telephony routers and equipment and ensuring...
...employ just over a thousand team members across five countries and we want to employ over 5,000 people by 2027, if not sooner.... ...understanding of cybersecurity principles and practices, including secure coding techniques, data protection, and authentication mechanisms...
...Office 365 services as appropriate for our business
Manage and monitor Office 365 services and desktop support (Laptops)
Formulate... ...domain users and external client access
Maintain a highly secure system through proper configuration and system access monitoring...
...startup with a mission to enable service teams to collect, analyze, and publish customer satisfaction feedback.
Measuring and... ..., ensuring high availability, cost-effectiveness, and top-notch security and performance. You'll play a crucial role in shaping our culture...
...for various business processes
Developing high-performance applications by writing testable, reusable, and efficient code
Implementing effective security protocols, data protection measures, and storage solutions
Running diagnostic tests, repairing defects...
...experience with Intune MDM (Endpoint Manager), MAM, Autopilot, and Endpoint Protection technologies. The right candidate will join... ...and mobile devices for the conglomerate, ensuring compliance with security and hardening standards, while safeguarding end-user productivity...
...Ensuring optimal performance of the database and responsiveness to front-end requests
Collaborating with other developers on... ...testable, reusable, and efficient
code
~ Implementing effective security protocols, data protection measures, and storage
solutions...
...for various business processes
Developing high-performance applications by writing testable, reusable, and efficient code
Implementing effective security protocols, data protection measures, and storage solutions
Running diagnostic tests, repairing defects...
...We are seeking a highly experienced and talented Senior Appian Developer to lead the design, development, and implementation of complex... ...# Lead comprehensive testing efforts to ensure the reliability, security, and quality of developed solutions.
# Create detailed...
...# Provide technical leadership and guidance in designing and implementing complex OutSystems-based solutions that align with business... ...# Lead comprehensive testing efforts to ensure the reliability, security, and high quality of developed solutions.
# Create detailed...
...Position Summary
Provide first-level IT support to team members and handle the resulting incidents or service requests using the... ...capabilities, our multi-shore, multi-language programs offer safe, secure infrastructure, value-based pricing, skills-based resources and...