Wyniki wyszukiwania: 188 ofert pracy
...translate science and research into groundbreaking therapies and diagnostics.Do you want to make a big difference in IT as an IT Security Engineer? Do you want a role with a global impact? If so, join us!What You Will DoAs an IT Security Engineer, you will be part of...
Zasugerowane
Praca na pełen etat
Praca zdalna
...We are looking for a person to build and maintain security systems for the infrastructure and applications of Allegro - one of the largest... ...by several million users every day. Contribute to ensuring a secure environment.
We Are Looking For People Who:
Have hands-on...
Zasugerowane
Praca hybrydowa
W godzinach popołudniowych
95 - 125 zł / stawka godzinowa
...We are looking for a Security Specialist to be part of cybersecurity team based in Poland, having a global impact on security aspects... ...on internal IT projects, conducting risk assessments, ensuring secure infrastructure, modern architecture and best security practices...
Zasugerowane
Praca na pełen etat
Umowa
Telepraca
Administracja i rozwój systemów bezpieczeństwa
Wdrażanie zmian w zakresie bezpieczeństwa IT oraz wspieranie IT podczas tego procesu
Prowadzenie projektów z zakresu cyberbezpieczeństwa on-premise i cloud
Organizowanie zdalnych spotkań dotyczących oceny ryzyka i...
Zasugerowane
Praca hybrydowa
Praca zdalna
Ciekawy zawód
...Osoba zatrudniona na tym stanowisku będzie odpowiedzialna za:
Konfigurowanie i utrzymanie rozwiązań z zakresu Network Security dla klientów,
Aktywne rozwiązywaniem incydentów i problemów po stronie klienta,
Ocenę, planowanie i wdrażanie zmian po stronie klienta...
Zasugerowane
Praktyka/staż
Umowa
...Site Name: Poznan Business Garden Pastelowa
Posted Date: Apr 10 2024
Our Cyber Security organisation enables GSK to take on some of the biggest healthcare challenges in the world by protecting our business, customers, and patients from cyber risks. We are investing...
Zasugerowane
Elastyczny czas pracy
...single day.
About the Role
With the ever-increasing cyber-security threat, and our obligations to comply with PCI and GDPR rules... ...in two or more of the following: Network protocols and secure network design; Operating system internals and hardening (e.g....
Zasugerowane
PayU
Praca na pełen etat
Praca na pół etatu
Umowa
...Zscaler ZIA/ZPA/ZDX, including traffic forwarding using GRE tunnels, Azure AD Authentication, Access Policies and migrating from legacy security products to Zscaler.
Hands on experience with one of the following cloud network security technologies (or equivalent)...
Zasugerowane
Umowa
...all over the world from modern threats. We do this through a Co-security approach born from first-hand knowledge that no one can solve... ...trying to spot areas of improvement to make their organization more secure from cyber attacks.
In this role you will be working side-by...
Zasugerowane
...Business Garden Pastelowa
Posted Date: Feb 22 2024
Our Cyber Security organisation enables GSK to take on some of the biggest... ...providing recommended changes or enhancements to ensure alignment with secure by design principles.
Provide cloud security consultancy to...
Zasugerowane
Elastyczny czas pracy
...nowego? Dobrze się składa - mamy o czym rozmawiać!
Sprawdź, co czeka Cię w Scalo:
praca w projektach związanych z obszaru data security&access realizowanych dla linii lotniczych i branży turystycznej. Stos technologiczny: Snowflake Data Security, Data Loss...
Zasugerowane
Praca zdalna
...IT Security Specialist - Vulnerability Management at Skanska SA / Pracuj w IT Ogłoszenie archiwalne, może być już nieaktualne. IT Security Specialist - Vulnerability Management
Lokalizacja:Poznań
Ogłoszenie Bezpośrednie
Szczegóły oferty:
You will be...
Zasugerowane
Elastyczny czas pracy
...Praktyki | Junior Consultant - Cyber Security - Program Cyber ****@*****.***
Miejsce pracy: Poznań
Technologie, których używamy
System operacyjny
~ Windows
O projekcie
Czym jest program?
Jeśli chcesz zgłębić tajniki testów penetracyjnych, walczyć z cyberprzestępczością...
Zasugerowane
Praktyka/staż
Płatne praktyki
Podróż służbowa
...seeking a highly skilled and experienced Head of Information Security to lead our security initiatives and safeguard our payment systems... ...at PayU. Together, we will continue to set the standard for secure and efficient financial transactions in the ever-evolving digital...
Zasugerowane
PayU
Praca hybrydowa
Elastyczny czas pracy
16000 - 20000 zł
...designers, and product managers, to gather requirements and define technical specifications.
~Ensure the scalability, reliability, and security of backend systems to handle a large user base and high traffic loads.
~Optimize performance and efficiency of backend components...
Zasugerowane
Praca hybrydowa
2 razy w tygodniu
...local and global online payment methods while streamlining payment security and leveraging the latest in payment routing and optimization... ...e-commerce revenue while offering customers a smooth and secure online payment experience.
A message from Daniel Cohen, PayU...
PayU
...efficient code that meets the highest standards of web development practices.
Ensuring the website is fast, scalable, reliable, and secure. We strive for 100 on the lighthouse.
Testing the product thoroughly to identify and fix any issues before launch.
Monitoring...
Elastyczny czas pracy
...people; they, in turn, deliver the impeccable service demanded by our customers, who reward us with the profitability necessary to secure our future. The essential element in making the People-Service-Profit philosophy such a positive force for the company is where we...
Praca stała
Praca na pełen etat
...departments, internal and external auditors as well as other accounting departments.
• Provide support to colleagues in other units and secure knowledge transfer on an appropriate level.
• Be an active part of continuous improvement initiatives.
• Support the transition...
Gotówka
Umowa
Elastyczny czas pracy
...support group
Assists new employees in setting up their workstations and providing basic IT training on software applications, security protocols, and best practices.
Keeps track of IT assets such as computers, laptops, mobile devices, and software licenses to ensure...