... Description Position Summary: The data security analyst will play a leading role ... in driving information security analysis, vulnerability remediation and performing ... business enabler to provide information security risk analysis and strategic ...
27 days ago
... Applications.Configure and maintain Workday security roles, domains, and policies. Implement ... security best practices and ensure compliance ...
13 days ago
... . Incident response: Lead investigations of security events, perform root cause analysis ...
23 days ago
Description: Responsibilities: Lead and oversee the Cybersecurity Operations team, ensuring effective management of analysts, incident responders, and vulnerability specialists. Implement and monitor threat detection and response tools, including ...
11 days ago
... Google Cloud Platform services, cloud architecture frameworks, security best practices, and enterprise ... -grade application/platform modernization. Key ResponsibilitiesCloud Architecture ...
25 days ago
... team and own the strategy, architecture, and delivery of our data ... data. Your priorities are speed, security, and stability-in that order ...
12 days ago
... against approved architectures, and adhering to existing standards around security, automation, and ...
21 days ago
... against approved architectures, and adhering to existing standards around security, automation, and ...
21 days ago
... managing and enhancing the organization s Security Operations Center (SOC) and ... , investigate, and respond to security incidents while driving continuous improvements ... processes, and team capabilities. The Security Operations Lead (Onshore) ensures alignment ...
28 days ago
... designs and improvement of software architecture design processes and procedures. Collaborate ...
11 days ago
... Java Spring Boot using microservices architecture. Experience with NodeJS, JavaScript, TypeScript ...
20 days ago
... deep technical expertise in workstation architecture, including network protocols, proxy/firewall ...
25 days ago
... deep technical expertise in workstation architecture, including network protocols, proxy/firewall ...
26 days ago
... in Linux/Android embedded systems architecture, virtualization, and hardware-software integration ...
26 days ago
... and risk analysis Design software architecture and modules
27 days ago
... environments while partnering with infrastructure, security, and application teams to ensure ...
20 hours ago
... standard in cloud-native cyber security and threat hunting, processing Trillions ...
12 days ago
... , with a strong focus on stability, security, and speed. This is a high ...
13 days ago
... meet our scalability, performance, and security requireme
18 days ago
... -based solutions while ensuring scalability, security, and operational excellence. The ideal ...
18 days ago
- 1
- 2