Costs in line with the company process
• Security focal point in order to interface and coordinate various stakeholders (internal and external of CISO Area)
• Good knowledge of informationsecurity principles and good practices
• Good knowledge of...
Ensure device security (hardware and software)* Manage and access the company’s server room securely* Support internal compliance with IT standards and procedures## **What you bring*** Fluent in Italian and proficient in English (able to communicate with...
AD), inclusa la configurazione di Conditional Access, Identity Protection e PIM.
• Endpoint Management: Configurazione e gestione di Microsoft Intune per il Mobile Device Management (MDM) e Mobile Application Management (MAM).
• Security & Compliance...
apartmentVem Sistemi S.p.A.placeModenalanguageallibo.comevent_available
Le tue attività prevederanno: IT Risk Assessment
Disaster Recovery Plan
Business Impact Analysis
Cybersecurity Assessment
InformationSecurity Management System
Incident Response Plan
Definizione di processi, policy e procedure in ambito IT & Security Governance...
definition of the technical roadmap, ensuring that the system complies with software engineering standards for maintainability, reliability, scalability and security; supporting the team to ensure they can deliver on time, managing resources and removing...
delivers Order Entry' Inside Sales and Administration activities' as well as acting as one of the main pre- and after-sales customer contact points' responsible for managing fast and effective exchange of commercial information between Sales' Distributors...
feature stores - Security &, Compliance: OAuth2' OIDC' secrets management' zero-trust architecture' GDPR/PCI/SOC2 frameworks Additional Information How we work together: - An inclusive' friendly' and international environment (you'll be working with...
ownership from idea to deployment
• writing documentation only when needed' and focusing on what works.
• Strong technical troubleshooting: You can quickly find the cause of technical issues using logs' dev tools' or pattern matching.
• Security-aware mindset...
like Chrome DevTools' log aggregators' and regex. - Collaboration: Clear communication' teamwork skills' and experience with Git and agile development. - Security awareness: Understand access permissions' API tokens' and how to manage secrets...
information, resolving or referring billing disputes, correcting payment errors, revising fee and finance charges as appropriate, account maintenance, taking card' check or other orders, acting on lost or stolen cards/checks, and researching customer problems...