...Security Policies (ISP and ISMP) at all timesMicrosoft Business Solutions OverviewYour long-term future is every bit as important to our client as it is to you. That’s why their aim is to give you exp...
...Security operations (highly preferred for this position) Application security (including AI) Cloud security Red & purple teaming Cybersecurity risk assessments Cybersecurity strategy & transformations...
...security by design, souveraineté et conformité, culture cyber Rattaché à l’une de nos practices, tu interviendras sur des missions au sein de nos clients des secteurs de la finance, de l’énergie, du t...
...Security, and Risk to ensure regulatory and operational requirements are met. Represent engineering in discussions with customers, partners, and auditors. Drive cross‑domain architectural decisions, s...
...security firm in Paris is seeking a Consulting Director to oversee cybersecurity consulting services and lead a team of experts. The ideal candidate should have 10+ years in cybersecurity consulting, ...
...security, and government benefit issuance. We provide peace of mind to a great array of organizations and industries who know that they are getting the highest level of safety and security through tru...
...Security Number) as part of our recruitment process. Shift Technology does not accept unsolicited CVs from recruiters or employment agencies in response to the Shift Technology Careers page or a Shift...
...Security etc)Une entreprise en pleine croissance, qui valorise l’initiative et la créativité.Un parcours de formation personnalisé et de vraies perspectives d’évolution.Une vie d’entreprise rythmée pa...
...security infrastructure, we’re helping usher in the promise of AI. Innodata offers a powerful combination of both digital data solutions and easy-to-use, high-quality platforms.Our global workforce in...
...security reasons, work must be performed from homeA company laptop will be provided; no personal equipment is requiredCompensationMonthly fee (2,300 euros) Annual performance-based bonusThree-month pr...
...security controls. Oversee regional technology budgets, monitoring spend, forecasting requirements, and identifying efficiencies. Lead regional implementations and upgrades, ensuring controlled delive...
...security best practices in IoT or server environmentsGood communication skills, ideally public speaking experienceIoT / Embedded experience – from board and SoC, BMCs, bootloaders and firmware to OS, ...
...security) are properly captured, Traceability of requirements in documents,Compliance to such requirements is tracked and managed in configuration,Statements of Compliance can be generated as required...
...security company, specializing in DDI (DNS, DHCP, IP Address Management). Our Smart DDI approach offers enterprises and service providers a unique appliance-based solution to intelligently simplify an...
...Security)Messagerie JMS / KafkaTests automatisés (JUnit, Cucumber)Environnement Unix/Linux, bases de données SQL, HibernateOutils DevOps : GitLab, SonarQualifications Formation : Ingénieur Informatiqu...