Resultados de la búsqueda: 26 vacantes
...This role is responsible for executing Cybersecurity M&A due diligence and leading cyber integration planning, coordination, and reporting while partnering across multiple Cyber, business, and technology cross function teams.
Requirements
~ Execute Cybersecurity...
Monitor and respond to alerts from key security technologies and other internal sources.
Tunes alerts, processing rules, maintenance jobs, etc. to minimize false positives and noise while ensuring relevant security information is captured and highlighted.
Develop...
Why join Stryker?
We are proud to be named one the World’s Best Workplaces and a Best Workplace for Diversity by Fortune Magazine! Learn more about our award-winning organization by visiting stryker.com
Our total rewards package offering includes bonuses, healthcare...
...An important and internationally recognized company is looking for a Senior Cyber Security Engineer, trained to: •Responsible for completing proof-of-concept evaluations for such data protection, classification and discovery toolsets, and subsequent implementation of the...
...designing, implementing, and managing the cibersecurity awareness programs to educate our employees and stakeholders about potential cyber threats and the importance of cybersecurity best practices.
Utilize creative approaches to make complex security topics...
...Cyber Security Architect are responsible for guiding the design and implementation of secure solutions and services across our business and IT support areas. Driving the successful configuration and implementation of security solutions to reduce risk to an acceptable level...
...As a cyber engineer, you will be responsible for developing and implementing security measures to safeguard computer systems, networks, and data against cyber threats. You will work closely with other IT professionals to design and deploy secure solutions.
Responsibilities...
...Program, conducting Phishing campaigns and other initiatives to educate and test the workforce, aiming to reduce susceptibility to cyber threats.
~Compile and analyze results from security initiatives, like Phishing campaigns, to identify trends, report on program effectiveness...
...patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely...
...patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely...
...management experience in a project management role.
~ Fundamental knowledge of broad technology solutions including but not limited to: Cyber Security, Infrastructure & Networking, HR/Payroll, ERP, Finance.
~ Experience with project management tools and methodology....
...patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely...
...'m the Manager of the Network Access Control team. I joined DHL IT Services in 2013, starting my career in a junior role within the Cyber Defense Center team. Eager for more hands-on experience with network security devices, I made the transition to the team tasked with...
...posts:
Please be aware of fraudulent job postings that are not affiliated with Fiserv. Fraudulent job postings may be used by cyber criminals to target your personally identifiable information and/or to steal money or financial information.
Any communications...
...build innovative and enterprise-level network security products and solutions, to protect online businesses from being interrupted by cyber attacks. We're a group of people passionate about challenging the status quo to solve the real world's cybersecurity problems...
...Cyber Security Analyst is responsible for the real-time identification and alerting of information security events that pose an immediate risk to Sysco’s employees, customers, suppliers, shareholders, partners, or business operations.
Requirements
Cybersecurity...
...addressed with relevancy, accuracy and in a timely manner.
Define protocols and maturing of 'playbooks' for operational response to cyber threats.
Operate autonomously to further investigate and escalate in accordance with policies, procedures, and defined...
...methodologies.
Fundamental understanding of core business technologies including but not limited to CRM, ERP, Infrastructure, Network, Cyber and HRIS.
Understanding of Cost, Budget Mgmt and Risk Mgmt including Forecasting.
Experience with developing and...
...EMEA).
Preferred Qualifications:
- Experience: 7-10 years of relevant experience in Operational and Technology Audit, Risk Management, Cyber Security Compliance or Security Engineering preferably within the technology sector (Social Media, eCommerce, Fintech etc.) and/or...
...security, and at least 3 years in architecture.
Requirements
- Expert knowledge of network access control, zero trust, network and cyber security
- Prior experience with relevant industry regulations and security standards for the Tech Industry
- Experience with...