... comply with enterprise and IT security policies, industry regulations and best ... You.Knowledge of common information security management frameworks, such as ISO , ... You.Knowledge of common information security management frameworks, such as ISO , ...
www.jobatus.es
... risk, Legal…) as well other Security Stakeholders (Group Security, Cyberdefense, etc.)MISSIONSYour missions as a Project Security Risk Analyst are to :• Identify and analyze ...
es.talent.com
... . Business value: position security as a market differentiator for ... Lines: The Sr. Business Security Analyst CSL reports into the Sr. Director Business Security Office Global Payroll & APAC.You’ll ... interpretation of ADP’s Security Program and how to best ...
es.talent.com
... influence and contribute to the security and resilience of our operations, ... laws and regulations related to security, including GDPR (and other relevant ... experience in cyber and information security , in a leadership role. You ...
es.jooble.org
... influence and contribute to the security and resilience of our operations, ... laws and regulations related to security, including GDPR (and other relevant ... experience in cyber and information security , in a leadership role . You ...
es.jooble.org
... at (OSI) Information Security Office? To continue growing at SmartWay we are looking for our next Business Continuity & Disaster Recovery Analyst – based Barcelona. This person will ... of Information Security and Cybersecurity; certification (e. g. ...
es.jooble.org
... IBM Mainframe Z Series-specific security standards and frameworks such as z OS Security, RACF, zSecure, etc.-Experience with ... . We leverage technology, data, sourcing, security and investment allocation in a ...
es.talent.com
... application ecosystems and their unique security considerations. Design detailed security architecture patterns for AWS, focusing ... to strengthen the organisation’s security posture. Have a data-driven approach to security, with the ability to conduct ...
es.talent.com
... to follow instructions, adhere to security procedures, and work effectively in ... inappropriate tattoos as determined by Security Manager and Human Resources.Must ...
es.talent.com
... planning, implementing, upgrading, or monitor security measures for the protection of ... teams to integrate and implement security best practices into cloud-based ... – AWS, GCP, Azure. Experience using security tools such as: Snyk, Insight ...
es.jooble.org