... problems through data-driven solutionCorporate Security ResponsibilityAll activities involving access to ( ... NAME) is responsible for information security and must: * Abide by (COMPANY NAME)s security policies and practices; * Ensure the ...
www.iagora.com
pResponsabilidades Principales: br· Participa en la elaboración e implementación de la política y procedimiento de salud, seguridad y medio ambiente aplicados en su país. br· Elaboración de Programas de Seguridad 319 99, 51 97 br· Identifica, evalúa y ...
www.iagora.com
pDescripción de la empresa:brbrEl grupo (COMPANY NAME) tiene la ambición de volverse la empresa de referencia de la transformación ecológica. Presente en los cinco continentes con cerca de 220.000 empleados, el Grupo diseña e implementa soluciones útiles y ...
www.iagora.com
... yoursThe OpportunityThe (COMPANY NAME) Cyber Security Internship is a program designed ... management program for (COMPANY NAME) security researchers? (COMPANY NAME) Security is looking for a dynamic ... (VOC). As a VOC Security Intern, you will analyze and ...
www.iagora.com
... languageExperience in Application Security practices (pentesting, security code review, AST products, research)Knowledge of Application Security industry standards, frameworks, and guidelines, ... if you have: Security Certifications (CISSP, CSSLP, CEH, OSCP, ...
www.itjobs.pt
... , Jenkins, and BambooProficient in translating security policies into practical, implementable security controls and techniques, ensuring software ... .Strong understanding of common information security standards, frameworks, and regulations, including ...
www.itjobs.pt
... be responsible for ensuring the security of our customers software applications. ... language. Previous experience in Application Security practices, including pentesting and security code review. Knowledge of AppSec ...
pt.talent.com
... Business Partners, Finance Leaders)brbrCorporate Security ResponsibilitybrbrAll activities involving access to ( ... NAME) is responsible for information security and must:br * Abide by (COMPANY NAME)s security policies and practices;br * Ensure ...
www.iagora.com
... , secure network virtualization, and cloud security technologies [e.g., CrowdStrike, Cisco ... cybersecurity, such as forensic analysis, security architecture, cloud security, or ethical hacking is highly ...
www.iagora.com
... Operations team, and Network & Security team to: Design and implement ... (PROD) environments. Ensuring security compliance and managing interdepartmental communication ... Awareness of quality and security standards, including vulnerability checks, static ...
pt.talent.com