...security, data privacy, cyber, and operational risk controls. Chair or actively participate in architecture boards, technical working groups, and relevant governance bodies. Drive collaboration with b...
...security requirementsRequired Skills & QualificationsExcellent English proficiency (written and spoken)Strong attention to detail and analytical skillsComfortable working independently in a remote/pro...
...security, data privacy, responsible AI, and operational risk. Maintain documentation for product operations, change logs, compliance reviews, and lifecycle management. Work with IT risk and security t...
...Security vendors and technologies.Understand the principles of cybersecurity and the technologies used to ensure it at the enterprise level.Hands-on knowledge of information security threats, vulnerab...
...security, responsible AI, and data governance policies. Maintain platform documentation, architectural diagrams, and best practices. Develop platform roadmaps aligned with the AI capability map and st...
...Security, and SRE teams Provide architectural guidance and mentorship to SRE and Level 2 operations teams, including transition-to-support and advanced troubleshooting Technical Excellence Drive adopt...
...Security LiaisonMaintain and update guest lists and tracking spreadsheetsCollect, verify, and manage passport copies and required documentationLiaise with security and trusted third parties to ensure ...
...security, data privacy, cyber, and operational risk controls. Chair or actively participate in architecture boards, technical working groups, and relevant governance bodies. Drive collaboration with b...
...Security et de nos experts, vous participerez activement au déploiement des solutions et projets de nos clients depuis la conception jusqu’ à la mise en œuvre, ainsi que l’accompagnement.Vos missions ...
...Security, and Risk to ensure regulatory and operational requirements are met. Represent engineering in discussions with customers, partners, and auditors. Drive cross‑domain architectural decisions, s...
...security patching level, incident/problem management, availability and performance of database service, automation of workloads and database workflows...),Identify, troubleshoot and lead the implement...
...Security vendors and technologies.Understand the principles of cybersecurity and the technologies used to ensure it at the enterprise level.Hands-on knowledge of information security threats, vulnerab...
...Security, etc.)Réaliser les préqualifications téléphoniques afin d’évaluer l’adéquation des candidats avec les besoins des équipesTrier les CV entrants et répondre aux candidaturesInteragir avec les t...
...Security. Responsabilités Participer aux différentes phases des projets IAM (Identity & Access Management), depuis la définition des besoins jusqu’au maintien en condition opérationnelle des solutions...