Dobivajte nove poslove putem e-pošte
- ...remotely. The Mission At CyberSift, we don’t just monitor alerts; we build the filters that stop the noise. We are an AI-driven security firm sitting at the intersection of Machine Learning and Threat Intelligence. As a Security Analyst, you won't just be staring at...
- ...environment, this is your opportunity to make a real difference. Security and Resilience Expert You will Advise and support... ...crisis management Identify and monitor risks across IT, information security and third parties Develop and strengthen our...
- ...feel proud of the impact you make. If embedded systems and cybersecurity are where your passions meet - and the idea of shaping secure, high-reliability software solutions for clients in European market excites you - let’s start a conversation. We’d love to get to...
- ...MasterCard, Calm and MacPaw in 30+ countries since 2010 to deliver secure customer and technical support. We operate globally, supporting... ...solutions? Join our community as a Customer Support Consultant today and thrive in a multicultural and multilingual environment...
- ...Our client, a leading Software, Information and Communication Technologies company, operates internationally (Athens, Brussels, Luxembourg, Copenhagen, Stockholm, London, Nicosia, Hong-Kong, Valetta, etc). Our client is a renowned supplier of IT services to government...Rad od kuće
- ...with minimum customer input, we enable our customers to do more and to invest their time where it truly counts. As a Solution Consultant , you'll be the trusted advisor for our customers—guiding their journey from first introduction through project delivery and...
- ...line. Role Overview The Dynamics CRM Senior Consultant is a core team member of KPMG’s customer delivery of... ...all times The Employee is required to follow our client’s Information Security Policies (ISP and ISMP) at all times Perform Project responsibilities...
- ...rights, humanitarian action and peace and security. As such, UN Women is mandated to lead... ...scale. The objective of this consultancy is to support UN Women in the planning,... ...Example. Please visit this link for more information on UN Women’s Values and Competencies Framework...
- This is us At Avenga, we believe that human creativity empowers technology that matters. Operating globally, our 6000+ specialists provide a full spectrum of services, including business and tech advisory, enterprise solutions, CX, UX and Ul design, managed services, ...
- ...customers Working as a team to make sure continual improvement of our service The Employee is required to follow our client’s Information Security Policies (ISP and ISMP) at all times Microsoft Business Solutions Overview Your long-term future is every...
- ...Role Overview The Dynamics Power Platforms CE Consultant is a core team member of our client’s customer delivery of... ...trainings The Employee is required to follow our client’s Information Security Policies (ISP and ISMP) at all times. Microsoft...
- ...are strategic IT solutions designed to integrate all management information across an entire organization into a single, intuitive... ...SQL (Managed Instances & PaaS). Proven experience with Azure Security (NSG,ASG Sentinel, Security Centre, Defender, ACL, Azure Firewall...
- ...The Position: Local Consultants - 1 Specialist in institutional dialogue and 1 Specialist in violence prevention You will report... ...why it matters. • Principles of safety, privacy, trauma-informed support. Chapter 2: Forms of TFGBV • Detailed definitions...
- ...experienced Dynamics 365 F&O Functional Consultant to be a part of a dynamic D365... ...to relevant parties both formally and informally Identify practice development activities... ...required to follow the company’s Information Security Policies (ISP and ISMP) at all times...
- ...rights, humanitarian action and peace and security. UN Women has a three-pronged... ...interpreters, translator and proofreader consultants with expertise translating/interpreting... ...Example. Please visit this link for more information on UN Women’s Values and Competencies...

Kreirajte profesionalni životopis besplatno u 5 minuta
- ...recognized University with majors in computational (Computer Science, Information Technology etc.) discipline Minimum of 15+ yrs of proven... ...The Employee is required to follow our client’s Information Security Policies (ISP and ISMP) at all times. Microsoft...
- Our client is a Microsoft Gold Partner and leader in Microsoft software implementations for medium to large organisations, providing their clients with the ability to keep up with the ever-changing digital world by implementing Microsoft’s M365, Azure, Microsoft’s Enterprise...
- ...) software line. Role Overview The role of a Consultant 2 is to ensure clear and transparent communication across internal... ...your role, you have the responsibility of protecting all information that is shared with you in the course of your association...
- Our client’s Microsoft Business Solutions team is a Microsoft Gold Partner and leader in Microsoft software implementations for medium to large organisations, providing their clients with the ability to keep up with the ever-changing digital world by implementing Microsoft...
- ...Role Overview Our client is looking for a talented Custom Applications Senior Analyst Programmer to form part of the Consultancy Services team, eager to work in a fast-paced environment. Due to expansion, this fantastic opportunity has arisen. This role will...
- ...tooling costs within agreed budgets. Security Fundamentals Implement baseline... ...dependency scanning, patching. Ensure secure service-to-service communication patterns... ...Certification Security Certified Information Systems Security Professional (CISSP)...
- ...rights, humanitarian action and peace and security. UN Women, grounded in the vision of... ...implementing partners and external consultants, and overall partnership engagement and... ...supported activities and finances; Prepare information for the audit of programme and support...
- ...infrastructure and software that keep them fast, reliable, and secure. At Gcore, you’ll help design and deliver that foundation for... ...experience with billing or payment systems. Additional Information Benefits: At Gcore, we want you to do your best work and...
- ...centralized backend, prioritizing client-side verification and security. Responsibilities Collaborate with engineers to design,... ...most recognized and accepted cryptocurrencies. For more information on Dash, please visit To apply for this role, please submit...
- ..., your personal data will be processed lawfully, fairly, and securely. We collect and use your personal data solely for recruitment... ...at any time. We are committed to maintaining the confidentiality and security of your information throughout the recruitment process....Rad od kuće
- ...knowledge up to date; Actively contributing to discussions and consultations; A qualitatively correct (sub)file in accordance with the... ...; Correct completion of the work program; Promptly informing the audit manager of any issues; Maintaining intensive communication...
- ...ensuring the performance, scalability, security, and resilience of our mission-critical... ...Contribute to the design and implementation of secure, scalable PostgreSQL database... ...compliance adherence. Collaborate with Information Security and Compliance teams to support...
- ...Safety and Integrity team and build new security features to protect Wikipedia and our other... ..., and common pitfalls in developing secure web applications. You have a passion for... ...an individual with a disability, genetic information, or any other legally protected characteristics...
- ...effective design approach; Experience of consultancy roles in software delivery;... ...to relevant parties both formally and informally; Support practice development activities... ...required to follow our client’s Information Security Policies (ISP and ISMP) at all times;...
- ...GDPR, your personal data will be processed lawfully, fairly, and securely, and used solely for recruitment purposes, including sharing... ...at any time. We are committed to maintaining the confidentiality and security of your information throughout the recruitment process....Rad od kuće