IAM Governance process and Stakeholder Mgmt. Senior Specialist (f/m/d)
... . Apply now Meet your CPIT Security team The purpose ofthe Corporate Processes and Information Technology organization (CPIT) is the ...
... . Apply now Meet your CPIT Security team The purpose ofthe Corporate Processes and Information Technology organization (CPIT) is the ...
... into our security framework.requisitos requirementsDegree in IT or Business Administration with specialisation in statistics, business intelligence, advanced data analytics Big data business project deployment and or Information technologyMinimum of ...
... .Requisition ID: 394347 | Work Area: Information Technology | Expected Travel: 0 - 10% | ... : May 20, 2024 Work Area: Information Technology Career Status: Professional Employment ...
... .Requisition ID: 394341 | Work Area: Information Technology | Expected Travel: 0 - 10% | ... : May 20, 2024 Work Area: Information Technology Career Status: Professional Employment ...
... ManagerAs Food and Beverage Manager, you will be responsible for ... working relationshipsComply with hotel security, fire regulations and all health and safety legislation What are we looking for?A Food and Beverage Manager serving Hilton brands is always ...
... German teams in development, security and quality assurance tasks. In your role as manager of our Portugal office, you ... to a governmental security clearance process and thus have ... in Computer Science, Information Technology, Engineering or other relevant ...
... bachelor master degree in information technology, cyber security or engineering and first professional ... of the art Cyber Security Technology´s ● Understanding of attack ... actions ● Knowledge of cyber security frameworks (e.g. ISO27001, NIST) ● ...
... Must-Have: Experience on Security Architect rolesKnowledge of certification and ... securityFamiliarity with workstation security, servers, MDM and ID managementProficient ... public and private cloud security mechanismsExperience in risk identification and ...
... , Implementation, Development and Maintenance of Information Systems. We have more than ... managing privileged access, cryptography and information security;Knowledge of Windows, Unix Linux ... at . We will use personal information that you have sent us ...
... different teams;Design and implement security architectures for software applications;Interact ... app lifecycle and validate it’s security posture;Developer at heart, not ... Familiarity with industry compliance and security standards including, NIST CSF, NIST ...