Costs in line with the company process
• Security focal point in order to interface and coordinate various stakeholders (internal and external of CISO Area)
• Good knowledge of informationsecurity principles and good practices
• Good knowledge of...
AD), inclusa la configurazione di Conditional Access, Identity Protection e PIM.
• Endpoint Management: Configurazione e gestione di Microsoft Intune per il Mobile Device Management (MDM) e Mobile Application Management (MAM).
• Security & Compliance...
definition of the technical roadmap, ensuring that the system complies with software engineering standards for maintainability, reliability, scalability and security; supporting the team to ensure they can deliver on time, managing resources and removing...
delivers Order Entry' Inside Sales and Administration activities' as well as acting as one of the main pre- and after-sales customer contact points' responsible for managing fast and effective exchange of commercial information between Sales' Distributors...
consultants and specifiers in the Video Security Channel to promote the Hanwha brand, and to increase sales and demand for Hanwha security products.
• To achieve set objectives relating to all relevant sales and product quantity mix. This will involve the...
log aggregators' and regex. - Collaboration: Clear communication' teamwork skills' and experience with Git and agile development. - Security awareness: Understand access permissions' API tokens' and how to manage secrets in automation flows.
Additional...
Descrizione azienda
Software Inside S.r.l. è una Software House italiana che opera dal 2016 come società di consulenza nei settori Bancario & Finanza, Cyber Security, Telecomunicazioni, Energy & Utilities.
Ci collochiamo nel settore...
and the security of your data is a longstanding top priority for Amazon. Please consult our Privacy Notice (https://www.amazon.jobs/en/privacy_page) to know more about how we collect, use and transfer the personal data of our candidates.
Our inclusive...
feature stores - Security &, Compliance: OAuth2' OIDC' secrets management' zero-trust architecture' GDPR/PCI/SOC2 frameworks Additional Information How we work together: - An inclusive' friendly' and international environment (you'll be working with...