Get new jobs by email
- ...Consultant _IT Security & Risk Management Job Title: Consultant IT Security & Risk Management Experience: Must have Big 4 experience About the Role Our client is seeking an experienced consultant in IT Security and Risk Management for a short-term remote...
- A consulting firm is seeking an experienced Consultant in IT Security & Risk Management for a short-term remote engagement. The role will involve supporting risk management initiatives, performing security self-assessments, and creating analytics for stakeholders. Candidates...
- ...issues in compliance with company policies and procedures Recruit, manage, train and develop the kitchen team Comply with hotel security, fire regulations and all health and safety and food safety legislation Ensure maintenance, hygiene and hazard issues are dealt...
- ...environmentally aware Assist other departments wherever necessary and maintain good working relationships Comply with hotel security, fire regulations and all health and safety legislation What are we looking for? A Food and Beverage Manager serving Hilton...
- ...pre-commissioning and commissioning of network/cybersecurity devices. Optimize configurations to ensure compliance with industrial security standards (e.g., IEC 62443). 1.3. Commissioning Documentation and Reporting: Update network topologies, control system...
- ...and complex medical conditions. Deliver high‑quality medical consultations to patients Utilize telehealth tools (video, phone, secure messaging) to assess, diagnose, and manage patients. Ensure safe prescribing practices and appropriate use of digital monitoring...
- ...data whenever and wherever they need it. Veeam provides data resilience through data backup, data recovery, data portability, data security, and data intelligence. Based in Seattle, Veeam protects over 550,000 customers worldwide who trust Veeam to keep their businesses...
$2000 per year
...Contributing to upstream and neighboring open source projects Optimizing the distribution for performance, reliability, and security Debugging complex system‑level issues and delivering robust solutions Authoring and improving technical and community documentation...- ...activities, and seek credible sources or reviews to assess the trustworthiness of the company. Remember, your personal and financial security is paramount, and taking preventive measures is crucial to safeguarding your information from potential risks and unauthorized use...
- ...interaction to brief on customer visits and obtain feedback and direction Sales administration / Sales Team:Regular team interaction Key External Contacts and Purpose of Interaction: Customers :Communicating & Negotiating and securing sales deals #J-18808-Ljbffr...
- ...transformation across the globe. We give the world’s largest businesses, service providers, governments, and consumer brands the ability to securely deliver every app, anywhere—with confidence. We do this by working collaboratively in an innovative environment, helping each...
- ...brand reputations. Founded in 2017 from a cargo container in Bristol, UK, Immersive Labs has progressed to the global stage and has secured over €170 million of funding. “The speed at which Immersive Labs produces technical content is hugely impressive, and this...
- ...applicable privacy regulations, ensuring that personal data across Unifonic’s CPaaS, SaaS, and AI products is processed lawfully, securely, and transparently. The DPO acts as the independent privacy oversight function and advisor to management on data protection risks...
- ...intelligence of AI to enable everyone to accelerate the results that matter. By taking advantage of all structured and unstructured data — securing and protecting private information more effectively — Elastic’s complete, cloud-based solutions for search, security, and...
- ...be contributing to the technology stack, covering web development, API development, DB communication/ handshake, performance, and security measures You will help to make sure systems are operational, visible, and designed for auto-recovery in case of disaster Responsible...
- ...authorization to work in selected job location ? * Yes No Yes, I give WSO2 permission to use my personal data for recruitment purposes only. I would like to receive emails from WSO2 to learn about new releases, security announcements, and other updates. #J-18808-Ljbffr...
- ...brand reputations. Founded in 2017 from a cargo container in Bristol, UK, Immersive has progressed to the global stage and has secured over €170 million of funding. “The speed at which Immersive produces technical content is hugely impressive, and this turnaround...
- ...accordance with HIPAA regulations Maintain proficiency in utilizing the designated telehealth platform, including video conferencing, secure messaging, and electronic health records (EHR) integration Maintain complete, accurate, and timely electronic medical records...
- ...requirements and deliver fit‑for‑purpose data solutions Implement data quality checks and ensure the consistency, accuracy, and security of datasets Develop and manage data models and schemas to support analytics and reporting functions Optimize performance of...
$2000 per year
...connected devices and industrial PCs. Our newer edition of Ubuntu for IoT, called Ubuntu Core, represents the state of the art in security and resilience for high‑end appliances and equipment. Our customers include global brands in consumer and industrial electronics as...- ...operations. We provide hosting space, future-proof upgrades, and 24/7 support through our smart or remote hands, ensuring seamless, secure, and sustainable service. Our fully remote, round-the-clock management frees businesses from supervision hassles, setting new...
$2000 per year
...Technical Manager, Automotive and Industrial with a passion for open source and precision engineering. Today, Canonical is providing secure and reliable products to our industrial and automotive partners. Our solutions are bridging the gap between Open-Source innovation...- ...Proficiency in scripting and automation (e.g., Bash, Python, Ansible) for managing containerized environments Experience implementing security best practices for containers, including image security, network security, and access control Familiarity with logging,...
- ...IT stakeholders in Arabic and English. Design solution architectures aligned with customer business objectives, IT landscape, security, and compliance requirements. Prepare technical and functional proposals, solution architecture documents, compliance matrices,...
- ...reporting skills for incident logs, performance metrics, and network configurations. Strong communication skills for coordinating with security, system administration, application, and IT support teams. Ability to work under pressure and respond quickly to network-...
- ...About Delinea: Delinea is a pioneer in securing human and machine identities through intelligent, centralized authorization, empowering organizations to seamlessly govern their interactions across the modern enterprise. Leveraging AI-powered intelligence, Delinea’s leading...
- ...rabilités existantes, ainsi que connaître les principales vulnérabilités, comme celles présentes dans le top 10 OWASP. En tant que security champion vous accompagnerez nos clients dans une meilleure prise en compte de la sécurité au sein de leurs pratiques de dé...
- ...implementing Enterprise level APIs for large scale organizations using APIGEE. Extensive experience with APIGEE Policies related to Security, Throttling, Data Transformation…etc . Strong experience and knowledge of API Securities such as Basic Auth, oAuth2 flows, SSL...
- ...containerization and DevOps. Key responsibilities include deploying applications, providing technical support, troubleshooting, and implementing security best practices. The ideal candidate will have excellent scripting skills and strong collaboration abilities across teams....
- ...tracker. Identify and propose alternative solutions in case of supply chain issues or delays. Support negotiations with vendors to secure favorable terms, pricing, and delivery schedules. Maintain vendor relationships and ensure supplier performance aligns with...
