Rezultati pretrage: 8 oglasa za posao
...we need you to join us as a Vulnerability Management Engineer.
The Team:
Our Global... ...Identify and lead the appropriate measures to manage/remediate vulnerabilities and reduce... ...overall security operations
Familiar with industry standard security best practices and vulnerability...
Description
ActioNet has an immediate opportunity for a Change Management Analyst located in Pristina, Kosovo.ActioNet is an IT service provider and solutions integrator headquartered in Vienna, VA that works with the Federal Government and Department of Defense. In this...
...technical support for Celonis On-Premise and Cloud-based Execution Management System products. You will report directly to the Team Lead... ...What Celonis can offer you:
The unique opportunity to work with industry-leading process mining technology
Investment in your personal...
...you can build on a strong legacy and leading positions in both industrial and consumer businesses to reimagine and improve life every day... ...forklift fleet with superiors and persons in charge of forklift management
Properly uses production assets in terms of avoiding wastage...
...will be responsible for supporting a government critical infrastructure program.
As the GPA you will provide support to the program management office and assist with the governance process management.
Duties and Responsibilities
~Responsible for working to document...
...or other Javascript frameworks and monitoring tools like Datadog
What Celonis can offer you:
The unique opportunity to work with industry-leading process mining technology
Investment in your personal growth and skill development (clear career paths, internal mobility opportunities...
...At Henkel, you can build on a strong legacy and leading positions in both industrial and consumer businesses to reimagine and improve life every day. If you love challenging the status quo, join our community of over 50,000 pioneers around the globe. Our teams at Henkel Consumer...
...in cyber incident response needs.
~Experience using tools such as intrusion detection systems (IDS), security information and event management (SIEM) systems, antivirus software, forensic tools, and advanced networking knowledge.
~Strong attention to detail
~Ability to...