erogati per diversi clienti cerchiamo una figura di
ITSecurityAnalyst
La figura avrà la responsabilità della gestione di attività di incident managemet di secondo livello e threat hunting.
In particolare, sarà in grado di analizzare in maniera...
guidelines and relevant legal and regulatory requirements.
• Manage the security P&L for assigned site(s), assist management with financial analysis and contribute to financial decisions for security requirements.
• Must be able to travel between local...
Per conto di importante cliente nel settore della Cyber Security, tra i primi vendor ad essere quotati in borsa, si ricerca una figura di Cyber Security Manager per un importante progetto consulenziale sul Piemonte da remoto.
La società è una SpA...
Data Center Security Specialist, Data Center Security
Job ID: 3030404 | Amazon Asia-Pacific Resources Private Limited (Singapore)
AWS Infrastructure Services owns the design, planning, delivery, and operation of all AWS global infrastructure...
nell'esplorazione delle tecnologie e del panorama della sicurezza IT.
• Conoscenza dei fondamentali della Cyber Threat Intelligence, preferibile esperienza nell’applicazione di frameworks di CTI quali: MITRE ATT&CK, Diamond model, Pyramid of pain, Analysis of...
Overview
Sr. Process Analyst, EU Central Operations – Job ID: 2980014 | Amazon Road Transport Spain, S.L.U.
Central Operations refers to a new approach in Amazon Logistics to define a scalable solution to run the increasingly complex and growing...
operativi (Windows/Linux) e linguaggi di scripting (es. Python, Bash, PowerShell); - Interesse per la Cybersecurity, in particolare penetration testing, malware analysis e sicurezza informatica; - Attitudine al lavoro in team, buone capacità comunicative...
in conduct Business Impact Analysis (BIA) to identify and classify critical IT services and systems.
BASIC QUALIFICATIONS
• Degree in Computer Science, IT, Engineering, related technical field or equivalent combination of education and relevant work...
performance, and automated schema migrations.
• Security & compliance: Embed security best practices (OWASP Top 10, least privilege IAM, shift‐left testing) into every stage of the SDLC.
• Collaborative design: Participate in technical design discussions...
and we’re looking for talented people who want to help.
You’ll join a diverse team of software, hardware, and network engineers, supply chain specialists, security experts, operations managers, and other vital roles. You’ll collaborate with people across...
customers (system integrators, end-user)
• Must have a knowledge of the market, main channels and potential customers within the electronic security market, IT & Networking.
• Previous experience working for a CCTV manufacturer would be beneficial, but not...
Do you want to be part of creating a safer world? Without thinking about it, you meet us in your everyday life – at home, in transit, and at work. We are at the airport, where you commute, where you work, play and shop. Diverse in our offering, our...
security infrastructure, we’re helping usher in the promise of AI. Innodata offers a powerful combination of both digital data solutions and easy-to-use, high-quality platforms.
Our global workforce includes over 5,000 employees in the United States...
obligations connected to it, through manual, electronic and informatic means and will be guaranteed within privacy and security standards as indicated in the full privacy policy. In order to ensure and respect the principles of publicity, transparency...
in conduct Business Impact Analysis (BIA) to identify and classify critical IT services and systems.
BASIC QUALIFICATIONS
• Degree in Computer Science, IT, Engineering, related technical field or equivalent combination of education and relevant work...