Állás elmentve
A hirdetést eltávolítottuk a mentett állásai közül.
Cyber security állások, munkák
13 db találat
Szűrés
-
Nagyvállalati és ipari IT rendszerek biztonsági követelményeinek kidolgozása és nyomon követése a rendszerek teljes életciklusa során IT biztonsági architect szerepkörben; IT biztonsági rendszerek fejlesztésének kezdeményezése, tervezése és a bevezetés koordinálása; IT biztonsági...ápr. 16.
-
IT biztonsági incidensek megoldásának támogatása, egyszerűbb incidensek kezelése Sérülékenység vizsgálatok kommunikációja, javítások egyeztetése az üzemeltetéssel Penetrációs tesztek koordinációjának támogatása az üzemeltetéssel Heti- havi jelentések készítése...ápr. 15.
-
Own the Security Architecture capability/discipline and ensure it is operational as desired Lead the efforts of defining, prototyping and developing security reference architecture, methodology, models and security controls in alignment with requirements from the architecture tea...ápr. 24.
-
our Security team. If you're ready to take on new challenges, contribute to a positive work... tool that can prevent cyber payment frauds. Analyse patterns of cyber threats to define the rules... . Liaise with the Lead Security and the Director of Customer Payments for strategic decisions. Work with... and their management as well as Security Managers to discuss threats, findings of analyses. You... and facilitation skills. Good understanding of the various cyber threats and their patterns...ápr. 24.
-
Design security aspects of cloud infrastructure, virtual private cloud, virtual private network, relational database services, auto scaling, and computing resources. Work with a team of Product DevOps/SecOps Engineers to architect and secure the infrastructure supporting the appl...ápr. 24.
-
Cyber security analyst Administer and operate MOL Group's Identity and Access Management (IAM... operation and adherence to security principles. University or college degree, or equivalent... professional experience. At least 3 years of experience in IT/Security. Understanding of IAM principles and... Identity Manager, PingFederate, SAP Identity Management, CyberArk Privileged Account Security... ; Full time work; Home office; Employee status; College; IT Consultant, Analyst, Auditor; IT Security...ápr. 22.
-
areas such as Consumer law, Regulation, Privacy, Fraud, Cyber Security, Lawful intercept, Trade controls...tegnap 22:25
-
Deeply understand data-communication techniques, routing protocol: BGP, OSPF, cyber security: firewall... schedule Troubleshooting; Ccna; Microsoft office; Excel; Visio CLOUD; NETWORK; SECURITY; FIREWALL...tegnap 15:00
-
Responsible for maintaining an inventory of BU cyber risk, vulnerability remediation status, policy violations, endpoint alerts, cybersecurity training, security exception requests, and security architecture for their respective service offerings. Responsible to ensure compliance...ápr. 21.
-
regulatory issues (e.g. related to network infrastructure, cyber-security / NIS2, infrastructure sharing... regulations Prepare, file, receive documents with the local telco, cyber-security regulators and...ápr. 21.
-
Offensive Security Professional - Threat-Led Penetration Testing (TLPT)
Legyen az első 5 jelentkező között!BudapestExecute Threat-Led Penetration Testing (TLPT) and Red Teaming operations across a variety of platforms, including web, network, mobile, and cloud environments. Simulate sophisticated cyber-attacks to identify and exploit vulnerabilities in systems, software, and network infrastru...ápr. 17. -
Candidate needs to be to be currently eligible to work in Hungary. Competencies: Cyber... Security - IAM Professional Services, Digital : Databricks Long-term, stable employment Exciting...ápr. 18.
-
developing designs and policies, to include working directly with technical and security SMEs. Document... information technology infrastructures regarding architecture, platforms, endpoints, and overall security... hunting tactics, techniques, and procedures. Knowledge of cyber-attack stages, including reconnaissance... exploitation and covering tracks. Experience integrating layered security using network security... security concepts to include vulnerability and patch management, security operations, incident...ápr. 17.