...solutions and practices. If you're ready to contribute to this mission, we invite you to join us in the position of:
Application Security Engineer
You can expect from us:
Private health insurance
Flexible working hours
Additional paid days off
Work...
...complexity, opening the door to new ways for leveraging the blockchain. Fireblocks’ platform and network provide the simplest and most secure way for companies to work with digital assets and it trusted by some of the largest financial institutions, banks, globally-recognized...
...Team at Databricks. The duties of the position involve performing security design reviews and red team engagements on new and existing... ...Expertise on programming languages such as Python or C++ for coding and secure code reviews.
Expertise with adversarial machine learning...
...designed around individual needs and carried out by global experts.
People are what make games great! We are currently seeking a Security Engineer. The ideal candidate will have extensive full-time application security experience in games. As a security engineer, you will...
...complexity, opening the door to new ways for leveraging the blockchain. Fireblocks’ platform and network provide the simplest and most secure way for companies to work with digital assets and it trusted by some of the largest financial institutions, banks, globally-recognized...
...to your application!
Job Description
Here's what you'll be doing if you choose to join the team:
Gain expertise in IT security requirements and defined internal security concepts based on ISO27001 and Bosch corporate IT Security regulations.
Cooperating, communicating...
...to help our clients around the world.
If you are confident in what you are doing, feel free to send us your resume.
Cyber Security Expert
For our client from the financial sector we are currently looking for a Security Expert focused on Firewall systems....
...The role
Were looking for an InformationSecurity GRC Managerto be a part of the team responsible for establishing Information Security governance and risk management compliant with applicable laws regulations and industry best practices in modern AI Cloud technology environment...
...optimized solutions and practices. If you're ready to contribute to this mission, we invite you to join us in the position of:
Cyber Security Specialist
You can expect from us:
Private health insurance
Flexible working hours
Additional paid days off...
Damovo is seeking a talented IT System Engineer / Security professional (m/f/d) to join our innovative Group IT team. As a leading provider of ICT solutions and services, Damovo places a strong emphasis on cybersecurity to protect our internal critical assets. This role focuses...
...Imunify360 Security Suite is a product of CloudLinux Inc., the maker of the #1 OS in security and stability for hosting providers. Imunify is an innovative security solution designed specifically for shared and VPS/Dedicated servers. The automated, easy-to-use solution with...
...Support users with general questions and technical support for a variety of problems internet and software-related;
· Physical security;
· IT On-boarding for new employees;
· Work as 1st and 2nd level support for users;
· Take direction...
...Effective communication and openness to teamwork.
We Offer:
- A challenging and interesting job where you can showcase your skills.
- Secure and motivating compensation tailored to your abilities and experience.
- Direct communication and quick decision-making for efficient...
...Effective communication and openness to teamwork.
We Offer:
- Challenging and interesting work where you can showcase your skills.
- Secure and motivating compensation tailored to your abilities and experience.
- Direct communication and quick decision-making for efficient...
...furnishings. Vacuum carpets and performs floor care duties (e.g., in guest rooms and hallway).
Follow all company and safety and security policies and procedures; report any maintenance problems, safety hazards, accidents, or injuries; complete safety training and...
Napravite profesionalnu radnu biografiju besplatno za 5 minuta
...Servers and databases Production and non-Production environments: ensure high levels of performance, availability, sustainability, and security.
• Configure and perform backup, restore, and data migration tasks.
• Day-to-day monitoring of the production service delivery...
...items, turning off lights, etc. Present physical and accurate check to guest and process payment.
Follow all company and safety and security policies and procedures; report accidents, injuries, and unsafe work conditions to manager; and complete safety training and...
...insight and business understanding.
High energy, self-motivated, persistent and ability to influence others.
Structured mindset to secure consistency and strong follow-ups with performance tracking.
Demonstrated ability to develop and maintain strong relationships with...
...Effective communication and openness to teamwork.
We Offer:
- A challenging and interesting job where you can showcase your skills.
- Secure and motivating compensation tailored to your abilities and experience.
- Direct communication and quick decision-making for efficient...
...and operations teams to enhance communication and efficiency.
Act as a bridge between different teams to streamline workflows.
Security and Compliance:
Implement security best practices in all aspects of the infrastructure.
Ensure compliance with industry standards...
...As CTO, you will be responsible for all aspects of our technology platform, including our app, website, integrations, operations, and security. You will also be a key member of our executive team, helping to shape our overall strategy and direction.
Your Role:
As the...
...Who are we?
Cyrex is a native security and software development company. We're focused on building the next generation of top-notch software for web, mobile, and native. Coupled with our extensive background in ethical hacking and cyber crime, we've established ourselves...
...aspects of their organization’s IT department, supporting all facets of the IT systems and services. Also responsible for ensuring the security and integrity of computer operations and systems development by the firm’s strategic plan and IT plan. Additionally, tasked with the...
...extensive full-time penetration testing experience in games. As a hands-on penetration tester, you will work together with the team securing world-class gaming titles. Your primary goal is to find vulnerabilities in game titles using our proprietary tooling.
Responsibilities...
...Write automated tests that demonstrate the quality of the application
Ensure compliance with coding standards, best practices, and security guidelines, and lead the adoption of best practices across the team
Stay up-to-date with industry trends and advancements, share...
...daily store’s administration routines (daily report, returns, credit/debit card, cards payments etc.) and through your role you will secure that all accounting transactions are correct, contributing that way to the efficiency of the Business.
You ensure correct and on time...
...stories for their feasibility and corresponding effort estimation.
Implementation of new and optimization of existing applications.
Securing own development activities through appropriate tests.
Close coordination with Application Architect and Application Owner....
...standards and goals.
Help the team to write production-ready code that accounts for testability, readability, reusability, edge cases, security, and errors.
Proactively communicate your team’s roadblocks to stakeholders and provide potential solutions.
Have the...
...implement infrastructure as code (IaC) and configuration management
Introduce automation to improve performance, scalability, and security, reducing manual effort
Design, develop and enhance Continuous Integration and Continuous Delivery pipelines to accelerate development...
...Management
POSITION SUMMARY
Check figures, postings, and documents for correct entry, mathematical accuracy, and proper codes. Organize, secure, and maintain all files, records, cash and cash equivalents in accordance with policies and procedures. Record, store, access, and/or...