Get new jobs by email
- ...Consultant _IT Security & Risk Management Job Title: Consultant IT Security & Risk Management Experience: Must have Big 4 experience About the Role Our client is seeking an experienced consultant in IT Security and Risk Management for a short-term remote...
- A consulting firm is seeking an experienced Consultant in IT Security & Risk Management for a short-term remote engagement. The role will involve supporting risk management initiatives, performing security self-assessments, and creating analytics for stakeholders. Candidates...
- ...issues in compliance with company policies and procedures Recruit, manage, train and develop the kitchen team Comply with hotel security, fire regulations and all health and safety and food safety legislation Ensure maintenance, hygiene and hazard issues are dealt...
- .... Job Summary The Regional Sales Manager is a significant driver of company revenue and growth. As an experienced and dynamic sales... ...the desire to solve critical challenges facing our customer’s secure environment, so you’re prepared to connect them with a solution...
- ...environmentally aware Assist other departments wherever necessary and maintain good working relationships Comply with hotel security, fire regulations and all health and safety legislation What are we looking for? A Food and Beverage Manager serving Hilton...
- ...pre-commissioning and commissioning of network/cybersecurity devices. Optimize configurations to ensure compliance with industrial security standards (e.g., IEC 62443). 1.3. Commissioning Documentation and Reporting: Update network topologies, control system...
- ...startup environment. ~ Executive level relationship management. ~ Ability to understand the “bigger picture” and the business drivers around IT. BONUS POINTS FOR EXPERIENCE WITH THE FOLLOWING: Industry specific experience. Experience implementing MEDDPICC...
- ...in language/culture, training/education/instruction, IT, cyber security, and intelligence (analysts, CI, HUMINT, SIGINT, etc.). We are... ...ADDITIONAL REQUIREMENTS Must possess a valid U.S. Driver’s License Possess a valid U.S. Passport (preferred) Must be...
- ...and complex medical conditions. Deliver high‑quality medical consultations to patients Utilize telehealth tools (video, phone, secure messaging) to assess, diagnose, and manage patients. Ensure safe prescribing practices and appropriate use of digital monitoring...
- ...data whenever and wherever they need it. Veeam provides data resilience through data backup, data recovery, data portability, data security, and data intelligence. Based in Seattle, Veeam protects over 550,000 customers worldwide who trust Veeam to keep their businesses...
- ...interaction to brief on customer visits and obtain feedback and direction Sales administration / Sales Team:Regular team interaction Key External Contacts and Purpose of Interaction: Customers :Communicating & Negotiating and securing sales deals #J-18808-Ljbffr...
- ...transformation across the globe. We give the world’s largest businesses, service providers, governments, and consumer brands the ability to securely deliver every app, anywhere—with confidence. We do this by working collaboratively in an innovative environment, helping each...
- ...brand reputations. Founded in 2017 from a cargo container in Bristol, UK, Immersive Labs has progressed to the global stage and has secured over €170 million of funding. “The speed at which Immersive Labs produces technical content is hugely impressive, and this...
- ...applicable privacy regulations, ensuring that personal data across Unifonic’s CPaaS, SaaS, and AI products is processed lawfully, securely, and transparently. The DPO acts as the independent privacy oversight function and advisor to management on data protection risks...
- ...intelligence of AI to enable everyone to accelerate the results that matter. By taking advantage of all structured and unstructured data — securing and protecting private information more effectively — Elastic’s complete, cloud-based solutions for search, security, and...
- ...brand reputations. Founded in 2017 from a cargo container in Bristol, UK, Immersive has progressed to the global stage and has secured over €170 million of funding. “The speed at which Immersive produces technical content is hugely impressive, and this turnaround...
- ...be contributing to the technology stack, covering web development, API development, DB communication/ handshake, performance, and security measures You will help to make sure systems are operational, visible, and designed for auto-recovery in case of disaster Responsible...
- ...authorization to work in selected job location ? * Yes No Yes, I give WSO2 permission to use my personal data for recruitment purposes only. I would like to receive emails from WSO2 to learn about new releases, security announcements, and other updates. #J-18808-Ljbffr...
- ...accordance with HIPAA regulations Maintain proficiency in utilizing the designated telehealth platform, including video conferencing, secure messaging, and electronic health records (EHR) integration Maintain complete, accurate, and timely electronic medical records...
$2000 per year
...Technical Manager, Automotive and Industrial with a passion for open source and precision engineering. Today, Canonical is providing secure and reliable products to our industrial and automotive partners. Our solutions are bridging the gap between Open-Source innovation...- ...requirements and deliver fit‑for‑purpose data solutions Implement data quality checks and ensure the consistency, accuracy, and security of datasets Develop and manage data models and schemas to support analytics and reporting functions Optimize performance of...
$2000 per year
...connected devices and industrial PCs. Our newer edition of Ubuntu for IoT, called Ubuntu Core, represents the state of the art in security and resilience for high‑end appliances and equipment. Our customers include global brands in consumer and industrial electronics as...- ...operations. We provide hosting space, future-proof upgrades, and 24/7 support through our smart or remote hands, ensuring seamless, secure, and sustainable service. Our fully remote, round-the-clock management frees businesses from supervision hassles, setting new...
- ...IT stakeholders in Arabic and English. Design solution architectures aligned with customer business objectives, IT landscape, security, and compliance requirements. Prepare technical and functional proposals, solution architecture documents, compliance matrices,...
- ...Proficiency in scripting and automation (e.g., Bash, Python, Ansible) for managing containerized environments Experience implementing security best practices for containers, including image security, network security, and access control Familiarity with logging,...
- ...reporting skills for incident logs, performance metrics, and network configurations. Strong communication skills for coordinating with security, system administration, application, and IT support teams. Ability to work under pressure and respond quickly to network-...
- ...rabilités existantes, ainsi que connaître les principales vulnérabilités, comme celles présentes dans le top 10 OWASP. En tant que security champion vous accompagnerez nos clients dans une meilleure prise en compte de la sécurité au sein de leurs pratiques de dé...
- ...About Delinea: Delinea is a pioneer in securing human and machine identities through intelligent, centralized authorization, empowering organizations to seamlessly govern their interactions across the modern enterprise. Leveraging AI-powered intelligence, Delinea’s leading...
- ...containerization and DevOps. Key responsibilities include deploying applications, providing technical support, troubleshooting, and implementing security best practices. The ideal candidate will have excellent scripting skills and strong collaboration abilities across teams....
- ...implementing Enterprise level APIs for large scale organizations using APIGEE. Extensive experience with APIGEE Policies related to Security, Throttling, Data Transformation…etc . Strong experience and knowledge of API Securities such as Basic Auth, oAuth2 flows, SSL...
