Dobivajte nove poslove putem e-pošte
- ...million monthly active users and over $20 billion in digital assets secured through our platform, we’re building a powerful gateway to Web3... ...workloads, and service-to-service communication. Secure system design: Solid understanding of secure API design, authentication...
- ...RESPONSIBILITIES Enforce the Groups information security strategy policies standards and frameworks across the Marlink Cyber company... ...commercial teams on information security requirements to enable secure and compliant business growth. Coordinate with Group...
- ...everyday payments faster and more effortless. No forms, no nonsense. Just freedom at your fingertips. We are looking for a QA & Security Engineer with 3–5 years of experience to join our team. In this role, you will ensure the quality, performance, and security of...
- ...remotely. The Mission At CyberSift, we don’t just monitor alerts; we build the filters that stop the noise. We are an AI-driven security firm sitting at the intersection of Machine Learning and Threat Intelligence. As a Security Analyst, you won't just be staring at...
- ...Were looking for an experienced DevOps Engineer to join our growing team! If youre passionate about building secure scalable cloud infrastructure and taking ownership of high-performance systems in a B2B environment we want to hear from you. Tasks Maintain improve...
- ...regionalnih sistem integratora u isporuci i implementaciji suvremenih informacijskih rješenja i tehnologija širi svoj Networking i Security tim i zapošljavamo kolegu ili kolegicu na poziciji: Želiš biti dio našeg tima u kojem zajedno gradimo tvoju karijeru i...
- ...crew areas. 2. He/She shall complete the familiarization form of Chapter 2 according to the established procedures. 3. The Security Guard shall have an understanding of the Safety and Quality Management Program including responsibilities related to the Emergency...
- ...and innovation that sets us apart. Were looking for a Senior Security Engineer to play a critical hands-on role in engineering... ...data environments. This role is focused on detection and response secure-by-default engineering automation and close collaboration with...
- ...opportunities for professional development. In a traditional data center, security is mainly focused on who has access to the network. Once on a... ...implemented, cloud-based solutions are considered more secure than in a traditional data center. Span is a reliable and...
- ...At ReversingLabs, our software supply chain security and threat intelligence solutions have become essential to advancing cybersecurity... ...responsible for the SaaS platform that makes sure all code is secure and protected from threats and unverified third-party libraries...
- ...The Youth Security Officer will be charged with enforcing onboard security policies and regulations in general and as they pertain to... ...the Youth and Teen Activities Coordinators to provide safe and secure venues for teens-only activities and events. Alcohol and Gambling...
- ...WE ARE HIRING: Senior Specialist in Security Technologies (m/ž) Želiš li se razvijati u jednom od najdinamičnijih područja IT-a? Rastuća ovisnost o informacijskim sustavima, računalnim mrežama i distribuiranim uslugama kao što su računarstvo u oblaku čini organizacije...
- ...KING ICT proširuje i ojačava Cyber Security tim ! Kao jedna od vodećih tehnoloških kompanija s međunarodnim dosegom i dugogodišnjim iskustvom u cyber security-u zapošljavamo više kolegica ili kolega na poziciji: Želiš biti dio tima u kojem zajedno gradimo...
- KING ICT proširuje i ojačava tim za razvoj poslovanja za mrežu i mrežnu sigurnost ! Kao jedna od vodećih tehnoloških kompanija s međunarodnim dosegom i dugogodišnjim iskustvom u isporuci rješenja i usluga za mrežu i mrežnu sigurnost, zapošljavamo više kolegica ili...
- ...Guard Center, is a leading, real-time security workforce management software designed to automate security operations and back office management, used by security guards, managers and site supervisors to monitor the performance and activities of guards and patrol teams...Rad od kuće
- ...safely and assisting with guest transfers and parking. Supporting other departments and maintaining smooth communication with the security team. Ensuring all equipment and vehicles are well-maintained and reporting issues. We’re looking for someone who is:...

Kreirajte profesionalni životopis besplatno u 5 minuta
- ...and Eviden for products. European number one in cybersecurity, cloud and high performance computing, Atos Group is committed to a secure and decarbonized future and provides tailored AI-powered, end-to-end solutions for all industries. Atos Group is the brand under which...
- ...standards: Occupy the hotel lobby and other public areas Represent the Night Manager, when absent Act in accordance with all security and emergency procedures and manage the instigation of these, as required Ensure that all Guest complaints are managed,...
- ...Manage infrastructure and tooling costs within agreed budgets. Security Fundamentals Implement baseline security controls: IAM, secret management, dependency scanning, patching. Ensure secure service-to-service communication patterns (authentication/...
- ...you will play a pivotal part in ensuring smooth technical operations, effective communication between teams, and maintaining the security of our internal systems. Key Responsibilities Issue Investigation and Reporting: Investigate, assess, and report technical...
- ...infrastructure foundations, with a strong focus on AWS multi-account governance, IAM security controls, and Infrastructure as Code automation. This role plays a critical part in building secure, scalable cloud platforms that power our global payment solutions, while working...
- ...knowledge of hotel products, services, pricing and policies, as well as knowledge of the local area Act in accordance with all security and emergency procedures and manage the instigation of these, as required Compile adequate handover to Early staff / Duty Manager...
- ...nalogu poslodavca, - briga o urednosti i higijeni skladišnog prostora i radne opreme. Poslodavac Poslodavac: SECURE VALUE ADDED LOGISTICS d.o.o. za međunarodno otpremništvo Kontakt: mobitel: (***) ***-**** e-mailom: ****@*****.***....
36 000 € godišnje
...telephony systems and VoIP solutions · Incident Change Management Handle BAU activities incidents changes RCA using ITSM tools · Security Compliance Implement security standards and ensure compliance with organizational policies · Vendor Coordination Work with third...- ...and Eviden for products. European number one in cybersecurity, cloud and high performance computing, Atos Group is committed to a secure and decarbonized future and provides tailored AI-powered, end-to-end solutions for all industries. Atos Group is the brand under which...
- ...Walaris designs and develops AI-driven, software-defined, and hardware-enabled autonomous systems for defense and security applications. Our software platform uses artificial intelligence, sensor fusion, and edge computing to provide real-time situational awareness for...
- ...changes in production, implementing automation and guardrails to make workflows predictable and low-risk. Integrate practical security improvements into tooling and workflows, ensuring deployment scripts are safe and removing risky manual steps. Work closely with...
- ...in a team that uses modern coding practices and operates without a centralized backend, prioritizing client-side verification and security. Responsibilities Collaborate with engineers to design, implement, and ship new wallet features. Implement wallet features...
- ...opportunity focused on infrastructure, automation, and observability, playing a critical role in enabling reliable, scalable, and secure data systems. You’ll work closely with data engineers and senior technical stakeholders to design, implement, and operate the foundations...
- ...Walaris designs and develops AI-driven, software-defined, and hardware-enabled autonomous systems for defense and security applications. Our software platform uses artificial intelligence, sensor fusion, and edge computing to provide real-time situational awareness for...
