...IT and cybersecurity audit procedures and methodologies to review Defining scope of reviews and the internal audit plan for IT and cybersecurity Analysing IT plans, infrastructure, and systems to busi...
...security pioneer with over two decades of excellence, as we continue to shape the future of cybersecurity and redefine the intersection of networking and security. At Fortinet, our mission is to safeg...
...ity evaluations, and target operating model implementation approach Design and deliver scalable and compliant IAM processes, collaborating with technical architects and security teams Drive stakeholde...
...ité ;- Assurer une veille technologique et prospective ;- Gérer le plan de continuité de l'activité en tant que Responsable du Plan de Continuité de l'Activité (RPCA) ;- Endosser la responsabilité de ...
...ities with AI Good political, analytical and communication skills, with high attention to detail. Experience working with or in multi-national corporations Able to work with colleagues across departme...
...Security Professional (CISSP) GIAC Security Leadership Certification (GSLC) Certified Chief Information Security Officer (CCISO) Clearance Secret - IT-II (Tier 3) Non-Critical Sensitive Clearance with...
...security, internet, voice and other connectivity options, complemented by a suite of professional services and exceptional sales and support teams in local markets around the globe. We partner with ou...
...ity to negotiate complex multi‑year agreements. Experience working closely with legal and data security teams to ensure successful implementation of tech solutions. Deep industry knowledge with strong...
...ity with cloud native technologies such as Kubernetes, Docker containers & Snaps Familiarity with embedded and connected device technology and ecosystems Familiarity with networking technologies - eth...
...ity with software‑analysis techniques such as fuzzing, static analysis, code‑analysis tooling, reverse engineering, binary-analysis Familiarity with security mitigations in modern operating systems At...
...ity, integrity, and availability of the data. With your expertise in ICT and cybersecurity, you will contribute to the development and implementation of robust security measures and best practices. Yo...
...ith JLL’s recruitment process. We endeavour to keep your personal information secure with appropriate level of security and keep for as long as we need it for legitimate business or legal reasons. We ...
...ited by respect . Respect for all is what unites us. We promote diversity, inclusivity, equity, and acting with empathy and openness, both in our business and in our communities. Teams make “it” happe...
...it. About this Role: Design and implement high-quality embedded software for satellite systems, following best practices for modularity, maintainability, testability, and efficiency Develop and mainta...
...Security Services est la business unit de Sopra Steria dédiée aux activités d\'infrastructures, cloud et cybersécurité. Elle est un acteur clé du end-to-end de Sopra Steria. Forte de ses 3000 collabor...