Search Results: 989 vacancies
...Experience and education:
Substantial experience in internal communications, public relations or media.
University education in communications, media science, or related field.
Communication skills:
Excellent communication skills and ability to craft messages...
...Monitoring and safeguarding the log sources and security access
# Planning for disaster... ...security breach solutioning to end users,Internal stakeholders & external customers... ...understanding of broad cybersecurity risk management and Infrastructure security and a base level...
...Work with MRP System within EBS to develop Purchase Order timeframe.
# Act as a liaison to other Departments.
# Responsible for managing third party and intercompany orders and their timely procurement to allow for customer deliveries.
# Maintain data relevant to...
...University degree in a related field such as cybersecurity, risk management, engineering, or any related discipline.
Deep knowledge of security incident and event management methods and related regulatory frameworks, such as NIST, ISO 27001, or other standards.
Ability...
...Technical Author
Working Location: Brunssum, Netherlands
Security Clearance : NATO Secret
Language: High proficiency level... ...details of hardware and software installed for configuration management Working knowledge or experience with the Oracle logistics...
...administration as required;
Plan and co-ordinate implementation with developers, UNIX and .NET application support and other Data Management staff;
Design and write data loading and/or conversion scripts/stored procedures;
Build and test database backup/...
...related field.
Certified Public Accountant (CPA) or Certified Management Accountant (CMA) certification is an added advantage.
Experience:
At least five years of experience in the field of internal or financial auditing.
Previous experience in a recognized...
...degree in information technology, cybersecurity, or similar field. Recognized cybersecurity certifications such as CISSP, CEH, CompTIA Security+ are preferred.
Experience: Practical experience in the field of cybersecurity. Regular jobs may require two to five years of...
...checking and authenticating supporting documentation for students Process other relevant student forms and data entry into student management systems and data bases Check and monitor student data bases and student management systems for updates, data quality and data...
...Education and specialization:
He holds a bachelor's degree in medicine, followed by a specialized training period in internal medicine.
A specialty certificate or accreditation in the field of internal medicine.
Experience:
Previous experience working as an...
...University Education: Recent graduate students in majors such as business administration, supply chain management, marketing, or any major related to procurement and logistics.
Basic Knowledge: Good understanding of purchasing and supply chain processes, inventory...
...Science or related field, advanced certifications in information security such as CISSP, CISM, or CEH preferred.
Extensive IT... ...security concepts such as encryption, authentication, identity management, and access control.
Ability to provide technical consultations...
...A deep understanding of internal audit principles, procedures and relevant professional standards.
Ability to evaluate organizational system, procedures and processes to identify risks and potential improvements.
Extensive knowledge of accounting, financial reporting...
...school diploma; A university degree or professional training in security or business administration is preferred.
Strong knowledge... ...and principles, including preventative measures and emergency management.
Ability to analyze risks and develop effective security strategies...
Telehealth, fully remote Therapist / Counselor opportunity for part-time or Bonus Offered
Licensed Therapist / Counselor Details:
~100% remote work
~ High volume of regular client referrals
~ Therapy focused model with zero administrative work
~5-40 hrs per...
...qualifications:
Bachelor's degree in computer science, information security, computer engineering, or related field.
Recognized... ...work in vulnerability analysis, penetration testing, security management, and rapid incident response.
Technical knowledge:
Deep...
We believe infrastructure creates opportunity for Whether it s improving your commute, keeping the lights on, providing access to clean water or transforming skylines, our work helps people and communities
Requirements
Reliable transportation
Smartphone and personal...
...13. Mixes water and detergents or acids in containers to prepare cleaning solutions, according to specifications.
14. Notify managers concerning the need for major repairs or additions to building operating systems.
15. Requisition supplies and equipment needed...
...University degree in a related field such as cybersecurity, electronic security, computer science, or equivalent.
Practical experience in... ...and implementation of security procedures, security incident management, and security risk assessment.
Strong knowledge of...
...Hold a bachelor's degree in a related field such as computer science, computer engineering, or information security.
Extensive knowledge of IT security concepts and the various techniques used to protect systems and data.
A deep understanding of potential information...