Resultados de la búsqueda: 9 vacantes
...to live and connect with what matters most, wherever you are, doing it better than any other company.
What's the role?
The Information Security Officer helps to keep LLA safe, learning skills and knowledge in many areas of cyber security and information security,...
...Education
Bachelor's Degree in Computer Engineering or Computer Science
Bachelor's Degree from an accredited University/College in Information Systems or related fields
Experience
8+ years of experience in Security Engineering with SIEM, EDR/XDR, Firewall and WAF...
...Division.
Administer, implement, and monitor network security measures for the protection of computer systems, networks, and information for Evertec.
Identify and define system security requirements where needed & create and document SOP and protocols.
Configure...
...observations and recommendations to enhance the internal control environment.
Education
Bachelor's Degree in Computer Science or Information Systems
Experience
~At least 3-5 years of experience in internal or external auditing of information technology,...
...processing, and technological solutions for businesses.
The Cybersecurity Risk & Incident Response Specialist is responsible for the information security analysis, incident monitoring, and response, as well as maintenance and configuration of information security tools....
...accommodations to all applicants throughout the application process.
Employees will act in accordance with the organization’s information security policies, to include but not limited to protecting assets from unauthorized access, disclosure, modification, destruction...
As a Lead Telecommunications Engineer in our Electric Grid Infrastructure Services business unit, you will:
Engage in fast-paced utility client projects to plan, engineer & design communications solutions to address operational requirements & emerging trends including...
Senior Backend Engineer Remote
ID5 enables addressable and measurable advertising to support the growth of the digital economy and provide free and safe access to content and services.Technical changes, signal loss, and increasingly more stringent data protection regulations...
...appropriate and to initiate recovery procedures when appropriate.
• Lead audit process to discuss the Crisis Management Program information with internal and external auditors.
• Ensure maintenance of the crisis members and plans through annual reviews and team...