...itecture and source code of existing Neutron architecture within our OpenStack infrastructure, ensuring high availability, security and optimization.• Collaborate with product owners, security and inf...
...ité aux normes d'exploitation et aux règles d'exploitabilité, tests techniques.Mise en production : paramétrage des outils d'exploitation (surveillance, sauvegarde, automatisation d’exploitation...).C...
...ité SIEM & EDR : Superviser les outils SIEM (Security Information and Event Management) et EDR (Endpoint Detection and Response) pour détecter, analyser et répondre aux incidents de sécurité.Managemen...
...ité de ses solutions et son savoir-faire. Nous sommes à la recherche d’un(e) alternant(e) (durée 1 ou 2 ans) pour venir en soutien du Cybersecurity & Customer Security Manager. Procéder à l’évaluation...
...security & Customer Security Manager. Vous travaillerez également en étroite collaboration avec les équipes opérationnelles en Slovaquie. Vos missions : Etablir/Faire évoluer des rapports de sécurité ...
...ith a strong affinity for Cybersecurity and a pragmatic approach to PAM. The ideal candidate will have:At least 5 years in Cybersecurity, including 3+ years implementing or managing PAM solutions (e.g...
...security operations, audits, and incident response.HiRIST is hiring Cybersecurity Interns for a reputed IT client offering hands-on exposure to practical security workflows, tools, and challenges.✅ Wh...
...ith an ability to present complicated concepts clearly to different audiencesGood level of confidence with the tools and techniques of the trade including GitLab/Jenkins, CI pipelines, merge trains, b...
...itle - Lead ConsultantType - ContractLocation - RemoteKey Responsibilities:Define:Conduct client assessments to identify needs and opportunities.Advise on IT strategies aligned with business goals.Cre...
...ith a strong affinity for Cybersecurity and a pragmatic approach to PAM. The ideal candidate will have:At least 5 years in Cybersecurity, including 3+ years implementing or managing PAM solutions (e.g...
...ith integration tools like MuleSoft. Familiarity with Salesforce security models. Salesforce certifications (e.g., Salesforce Certified Application Architect, Salesforce Certified System Architect) ar...
...ith integration tools like MuleSoft. Familiarity with Salesforce security models. Salesforce certifications (e.g., Salesforce Certified Application Architect, Salesforce Certified System Architect) ar...
...ith a high quality of advisory and execution.We are present across 17 countries with committed, highly qualified teams. We leverage technology, data, sourcing, security and investment allocation in a ...
...ity with DevOps principles and CI/CD pipelines. Ability to work both independently and as part of a team. Our recruitment process consists in 4 interviews: 1 introductory call with the recruiter 1 tec...
...ity with DevOps principles and CI/CD pipelines. Ability to work both independently and as part of a team. Our recruitment process consists in 4 interviews: 1 introductory call with the recruiter 1 tec...