E VULNERABILITY ASSESSMENT
• Metodologie di penetration testing
• Valutazione delle vulnerabilità
• Reporting e mitigazione
MOD. VI – ANALISI E RISPOSTA AGLI INCIDENTI
• Identificazione e classificazione degli incidenti
• Strumenti di SIEM (SecurityInformation...
Axiom Technologies is a Global IT Services partner supporting medium to large-scale enterprises. Please visit our website for more information about what we do at .
Job Overview:
We are looking for a highly skilled and hands-on Data Center & Smart...
DeepInspect's solution embodies simplification by transforming a complex problem into an easy solution. The idea stems from the need to guarantee security monitoring in order to protect critical infrastructures, and the industrial sector, in general...
ambientale (ISO 14001)
Conoscenza di base di InformationSecurity Management System (ISO 27001)
Disponibilità a trasferte occasionali in Europa (circa 1 volta al mese o ogni 2 mesi)
Iscrizione alle Categorie Protette (art.1 L.68/99) ALTRE...
consultants and specifiers in the Video Security Channel to promote the Hanwha brand, and to increase sales and demand for Hanwha security products.
• To achieve set objectives relating to all relevant sales and product quantity mix. This will involve the...
delivers Order Entry' Inside Sales and Administration activities' as well as acting as one of the main pre- and after-sales customer contact points' responsible for managing fast and effective exchange of commercial information between Sales' Distributors...
and InformationSecurity Management Systems, ICH GCP guidelines, applicable local and international legislation, including data protection legislation, as well as any amendments or updates the above
• In case of deviation from the approved protocol, ICH GCP...
feature stores - Security &, Compliance: OAuth2' OIDC' secrets management' zero-trust architecture' GDPR/PCI/SOC2 frameworks Additional Information How we work together: - An inclusive' friendly' and international environment (you'll be working with...
AD), inclusa la configurazione di Conditional Access, Identity Protection e PIM.
• Endpoint Management: Configurazione e gestione di Microsoft Intune per il Mobile Device Management (MDM) e Mobile Application Management (MAM).
• Security & Compliance...
ownership from idea to deployment
• writing documentation only when needed' and focusing on what works.
• Strong technical troubleshooting: You can quickly find the cause of technical issues using logs' dev tools' or pattern matching.
• Security-aware mindset...
like Chrome DevTools' log aggregators' and regex. - Collaboration: Clear communication' teamwork skills' and experience with Git and agile development. - Security awareness: Understand access permissions' API tokens' and how to manage secrets...