Search Results: 28 lediga tjänster
...The Cyber Security Operations Center is seeking individuals in a fastpaced environment focused on operational technology. The employee should perform monitoring and response including followup and escalation measures on security events and incidents.
Must possess the...
...course and college/university are best for them.
Key Responsibilities:
Manage and coordinate office activities and operations to secure efficiency and compliance with company policies.
Answer and direct phone calls and take and relay messages.
Organize and...
...Engine
Solidity smart contracts
As a senior fullstack engineer youll collaborate with us to:
Design and implement scalable and secure backend systems.
Develop engaging and responsive frontend user interfaces.
Integrate blockchain and NFC technologies for...
...servers
Collaborate with the development team to integrate IBM MQ into our applications and services
Manage access controls security configurations and authentication protocols for IBM MQ servers
Configure and manage IBM MQ objects including queues topics and...
...that ensure data quality and consistency.
Establish data governance policies and practices to manage data access quality and security throughout the project.
Support the development adoption and implementation of best practices in data management which includes...
...software and related components.
Perform database upgrades patches and migrations as required to ensure system stability and security.
Monitor and optimize database performance including tuning SQL queries optimizing storage and managing resources.
Implement...
...Configure test install and troubleshoot network switches (ArubaCisco) preferred.
Perform schedule updates network upgrades security configurations and installing patches or service packs.
Working with limited guidance and working with the site and enterprise...
...databases
Updating and maintaining accurate records
Verifying data for completeness and accuracy
Ensuring data integrity and security
Performing regular backups to ensure data preservation
Scanning and organizing documents
Resolving discrepancies in...
...in modelbased engineering.
Experience in the deployment of manufacturing execution systems to include automation techniques security and project management.
Experience in IT agile development practices.
#remotejobs #businessanalyst #SAP #aerospacejobs...
...any code development prior to deployment.
Regularly review cloud solutions with a pragmatic lens considering reliability cost security and future growth.
Responsibilities:
Handson experience in AWS technologies such as Lambda SQS SNS Step Function API Gateway...
...their business. With Propacity powered brokers, every potential buyer/seller will be able to search/transact real estate reliably, securely, and easily
Why join us?
We are one of India's fastest-growing Prop-Tech startups. We are a team of startup heroes,...
...RESTful AJAX JSON SQL JUnit and MavenExperience with Frameworks including Spring MVC Spring Batch Spring Boot Spring Integration Spring Security Hibernate MyBatis
Solid experience with the following technologies is a must HTML JavaScript CSS AJAX
Experience with Java...
...across multiple platforms. Our dedicated team at Coders Brain implements keeping the interest of enterprise and users in mind.
Secure We understand and treat your security with utmost importance. Hence we blend security and scalability in our implementation considering...
...experience within another industry you will also be considered.
B2B sales experience
A high performer with a track record of securing profitable new business.
Outstanding communication and networking skills across a variety of channels
Able to build a...
...global information technology company that provides high performance and industry focused solutions integrated with leading edge security to clients in government financial services and commercial markets. Their offerings include security software and services digital...
...physical data modeling designs relational database models and creates physical data models from logical data models.
Performs security recovery procedures.
Determines and implements database search strategies and storage requirements.
Maintains data...
...required;
Leading the project team and handle HR related issues.
The employee is required to follow our clients Information Security Policies (ISP and ISMP) at all times.
Microsoft Business Solutions Overview
Your longterm future is every bit as important...
...across multiple platforms. Our dedicated team at Coders Brain implements keeping the interest of enterprise and users in mind.
Secure We understand and treat your security with utmost importance. Hence we blend security and scalability in our implementation considering...
...Document Management & Workflow Automation Health Care Information Systems Enterprise Resource Planning Learning & Performance Management Security Systems Audiovisual Systems & Infrastructure ICT Infrastructure Cyber Security and Customer Relationship Management Solutions....
...this job posting. References must include: name title organization relationship to you email address (necessary field) and phone number. Depending on security software candidates are requested to monitor spam folders for further application communications from MMI....