Wyniki wyszukiwania: 554 oferty pracy
...Senior Information Security Architect, Group Architecture
Nordea
Nordea is a leading Nordic universal bank – we are a strong and personal... ..., authorization, firewall, IPS, or IDS to properly secure any technology solutions.
~ Solid understanding of security...
Zasugerowane
Elastyczny czas pracy
W godzinach popołudniowych
...Information Technology Security Specialist (ITSS)
Miejsce pracy: Gdańsk
Your responsibilities
supporting analyses and discussions on the adequateness of safety measures
initiating additional measures for Network Security, Cryptography, Identity and Access Management...
Zasugerowane
Praca zdalna
Telepraca
Elastyczny czas pracy
W godzinach popołudniowych
...Information Security Risk Management Coordinator (ISRMC)
Miejsce pracy: Gdańsk
Your responsibilities
coordinating, controlling and processing tasks, such as initiating, tracking and escalating activities or preparing management-oriented reports
carrying out...
Zasugerowane
Praca zdalna
Telepraca
Elastyczny czas pracy
W godzinach popołudniowych
10000 - 13000 zł
...project management experience
Minimum of 2 years knowledge of IT security principles, techniques, and technologies
Proven experience... ...selves and do their best work.
The Project Manager II, Information Security will manage and provide visibility into security...
Zasugerowane
Praca zdalna
Praca na pełen etat
...Expert Information Security (f/m/d) - 2nd Line of Defense
We’re flexible! We’re happy to receive applications in English or German.
Your tasks:
As Information Security Expert, you will be part of our Information Security Team and ECC´s 2nd Line of Defense. In...
Zasugerowane
Praca zdalna
Elastyczny czas pracy
W godzinach popołudniowych
...cloud team? We are now looking for aCloud Security Specialist to design robust security... ...controls for Cloud platform, ensuring a secure and resilient infrastructure.
Gain a... ...application no later than 08/05/2024. For more information, you’re welcome to contact Anand...
Zasugerowane
W godzinach popołudniowych
...Analityk Security Operations Center
Miejsce pracy: Gdańsk
Technologies we use
Expected
Active Directory
Splunk
Operating... ...services focused on client-facing vulnerability and security information event
~ management engagements.
~ Identify and remediate...
Zasugerowane
...Azure, PaloAlto, Fortigate
About the project, As a Network Security Specialist, you will be working for our client, a leading technology... ..., A college diploma or university degree in computer science, Information Technology, or related field, Understanding of Microsoft cloud...
Zasugerowane
Praca zdalna
Elastyczny czas pracy
11550 - 12180 zł
...~ A college diploma or university degree in computer science, Information Technology, or related field
~ Understanding of Microsoft cloud... ...with the possibility to work 75% remotely!
As a Network Security Specialist , you will be working for our client, a leading technology...
Zasugerowane
Praca na pełen etat
Praca zdalna
...and innovative world of cloud, data, AI, connectivity, software, digital engineering and platforms.
About the department:
The Security Testing team at Capgemini supports projects in the implementation and verification of security features of our clients' systems....
Zasugerowane
...Join the security team at a multinational leading energy company!
Work in a hybrid model... ...will contribute to maintaining a secure environment for both internal and external... ...with them* I agree to receive marketing information from ITDS Polska to the e-mail address provided...
Zasugerowane
...master’s degree in related discipline, experience in working for a Managed Security Services provider, understanding of cyber-attack techniques and vulnerabilities
University diploma in Information Technology, experience in IT Environment (especially in Identity and...
Zasugerowane
...najnowocześniejszych technologii, które kształtują świat przyszłości. Dla naszego Partnera, firmy z sektora finansowego, poszukujemy Security Administratora, który dołączy do działu bezpieczeństwa sieciowego i rozwiązań IT, zajmującego się utrzymaniem i rozwojem...
Zasugerowane
Praca hybrydowa
Umowa o pracę
...nowego? Dobrze się składa - mamy o czym rozmawiać!
Sprawdź, co czeka Cię w Scalo:
praca w projektach związanych z obszaru data security&access realizowanych dla linii lotniczych i branży turystycznej. Stos technologiczny: Snowflake Data Security, Data Loss...
Zasugerowane
Praca zdalna
...IT Security Engineer
Miejsce pracy: Gdańsk
Technologies we use
Operating system
Windows
Linux
About the project
As... ...security breaches. Your expertise will contribute to maintaining a secure environment for both internal and external stakeholders....
Zasugerowane
Praca zdalna
Elastyczny czas pracy
...OT Security Expert
Miejsce pracy: Gdańsk
Your responsibilities
design, deployment and configuration of network OT/OT infrastructure,
implementation and configuration of firewalls, routers and switches,
implementation of security policies, access and authentication...
Praca zdalna
Elastyczny czas pracy
...Security Administrator
Miejsce pracy: Gdańsk
Technologie, których używamy
Wymagane
SQL
Oracle
O projekcie
Alior Bank konsekwentnie pracuje na miano innowatora. Stały rozwój bankowości mobilnej i regularne wdrażanie najbardziej nowatorskich na rynku...
Praktyka/staż
Umowa
Praca zdalna
Elastyczny czas pracy
...Responsibilities:
Operational and infrastructural support with Web Proxies to protect company against Internet Access Security events
Confidence Implementing standard and normal changes, as well as
Advanced Troubleshooting in area FW/DNS/LB/PROXY security-related...
Requirements
Over 5 years of IT industry experience, with a focus on networking or security. Hands-on with Secure Web Gateway, Content/Malware Analysis, Apache Servers, or Linux SQUID preferred.
Practical Proxy Migration experience required.
Proficient in CLI console...
Praca hybrydowa
Praca na pełen etat
Umowa
Elastyczny czas pracy
...Responsibilities:
Operate IT security systems and services to support a high security level in IT environments
Proactively assess... ...standards are implemented in production systems to improve and ensure secure IT environments
Perform threat assessment and drive...