nell'esplorazione delle tecnologie e del panorama della sicurezza IT.
• Conoscenza dei fondamentali della Cyber Threat Intelligence, preferibile esperienza nell’applicazione di frameworks di CTI quali: MITRE ATT&CK, Diamond model, Pyramid of pain, Analysis of...
team.
The persons will be in charge of technical activities such as:
• Identify security risks within organizations and complex systems/architectures, in particular onboard vessels;
• Perform vulnerability assessments and penetration tests in IT/OT...
Ensure architecture is scalable, secure, and cost-effective.
2. Collaboration and Implementation:
Collaborate with IT, security, and development teams to implement cloud strategies.
Work with stakeholders to gather requirements and translate them into...
design, architecture, development, and deployment) or IT technical sales is desirable. Knowledge of Cyber Security, Predictive Maintenance, Sustainability and Manufacturing Digital Applications are a plus.
Benefits
Locally, you can count on...
develop novel learning techniques and apply them to possibly two different domains. On one side, bio-inspired learning approaches can be applied to cognitive radio networks thus allowing adaptive methods for analysis
and decision to evolve under specific...
database
• Plan and implement backup and recovery of the Oracle database
• Control migrations of programs' database changes' reference data changes and menu changes through the development life cycle
• Implement and enforce security for all Oracle Databases...