...certificaciones de ciberseguridad avanzadas puede ser un activo. Algunas certificaciones relevantes incluyen Certified Information Systems Security Professional (CISSP), Certified Threat Intelligence Analyst (CTIA), Certified Intrusion Analyst (GCIA), y certificaciones...
Gestionar la estrategia de venta, planificación, ejecución y lanzamiento de productos, administrar marcas orientadas a productos de tecnología especialmente de la Unidad de Seguridad, ofreciendo una solución integral, dando soporte y servicio a nuestros clientes con...
...Safety, Security and Access Manager for Peru and Ecuador
Job Title: Safety, Security and Access Manager for Peru and Ecuador
Sector: Safety & Security
Employment Category: Fixed Term
Employment Type: Full-Time
Open to Expatriates: No...
...resolución de problemas.
Fuertes habilidades comunicativas y interpersonales.
Las certificaciones relevantes (por ejemplo, CompTIA Security+, CEH, GIAC) son una ventaja.
Idioma:
Hispanohablantes nativos
fluido en inglés.
Preferencias/Más :
Italiano....
...Microsoft Azure
Protocolos TCP/IP
Servicios TCP/IP (SFTP, NTP)
Conocimiento básico Networking
Plataforma:
~ IBM Secure File Transfer
Herramientas / Componentes que deben saber usar:
Jira
Jenkins
Bitbucket
Dockers
MQ
AzCopy...
...the needs of our clients. You will work closely with our development team to ensure that the solutions are scalable, reliable, and secure. You will also be responsible for defining the architecture and technical direction of the applications.
Responsibilities:...
...your job application. Information obtained will be kept separate from your name or job application. This information will be kept secure and confidential and will be used solely to evaluate our diversity and inclusion efforts.
Te invitamos a completar esta encuesta...
...Relocation? N
Position Type Non-Management
POSITION SUMMARY
Check figures, postings, and documents for accuracy. Organize, secure, and maintain all files, records, cash and cash equivalents in accordance with policies and procedures. Record, store, access, and/...
...Conservation International protects nature for the benefit of humanity. Through science, policy, fieldwork, and finance, we spotlight and secure the most important places in nature for the climate, biodiversity, and for people. With offices in 30 countries and projects in...
...and implement exceptional technical solutions, with little to no guidance
Utilize best practices for Pega development, QA, and security
Work in an agile environment that values frequent releases and fast feedback from stakeholders
Work with a team of peers...
...conditional offer of employment.
Conditions for employment include but are not limited to medical examinations, and permission to secure a visa to work and reside in-country.
Throughout all these stages, we will be with you through every stage of the hiring process...
...performing capacity analysis, addressing incidents and changes, managing infrastructure risks by configuring GPOs, managing updates and security certificates.
How a day to day would look like in this role.
Execute changes in agree with customer policies.
Delivery of...
...financing to connect producers and consumers, using our deep understanding of the markets we serve to make supply more efficient, secure and sustainable.
We are accelerating our investments in renewable energy, including hydrogen, ammonia and other low-carbon energy...
...serving 40+ industries, from auto dealerships like Ford to hotels like Hilton. Our MS5 SmartBox is the IoT device that keeps keys secure and operations smooth by allowing organizations to remotely manage and hand off physical keys to their employees, guests, and customers...
...conditional offer of employment.
Conditions for employment include but are not limited to medical examinations, and permission to secure a visa to work and reside in-country.
Throughout all these stages, we will be with you through every stage of the hiring process...
...conditional offer of employment.
Conditions for employment include but are not limited to medical examinations, and permission to secure a visa to work and reside in-country.
Throughout all these stages, we will be with you through every stage of the hiring process...
...closely with development teams, product owners, and other architecture teams in the company to ensure that our system is scalable, secure, and maintainable.
Your Responsibilities:
Manage a team of software and data architects.
Work with stakeholders to determine...
...and release processes.
Testing and examining code written by others and analyzing results.
Ensuring that systems are safe and secure against cybersecurity threats.
Identifying technical problems and developing software updates and ‘fixes’.
Working with...
...resolution of network issues.
• Perform network maintenance and system upgrades, including service packs, patches, hotfixes, and security configurations.
• Monitor and analyze network performance to identify and resolve bottlenecks, optimize network efficiency,...
...leadership role as the technical sales specialist driving Data Center Offering in Ecuador, Bolivia, Paraguay, Uruguay and Venezuela
Secures input from all necessary solution stakeholders within the customer; adapts solutions, as necessary, to ensure appropriate support....
...stability.
Experience in closing large deals in Peru.
Sales experience selling to Service Providers
Selling enterprise network security products and services.
Experience in managed tools such as Sales Force
Experience developing and working with Business...
...behavior, working closely with data scientists and engineers to resolve them.
Conduct functional, regression, performance, and security testing as needed.
Drive the adoption of automated testing tools and frameworks to increase testing efficiency and coverage....
...request reasonable accommodations by emailing ****@*****.***.
Note that the information you provide will stay confidential and will be stored securely. It will not be seen by those involved in making decisions as part of the recruitment process.
#J-18808-Ljbffr
...conditional offer of employment.
Conditions for employment include but are not limited to medical examinations, and permission to secure a visa to work and reside in-country.
Throughout all these stages, we will be with you through every stage of the hiring process...
...is responsible for the overall administration of our SQL Server Environment including SQL Server installation and configuration, security, database maintenance, query tuning and optimization, database migration, code reviews and deployments, debugging, as well as configuration...
...Position status: This opportunity is for a secured role that is due to commence in May subject to approval. If you would like to be considered as we progress with this position, please click to apply.
The Opportunity
As the United Kingdom Delivery Team (UKDT...
...expression, gender identity or any other characteristic protected by law.
Candidates for Moody's Corporation may be asked to disclose securities holdings pursuant to Moody’s Policy for Securities Trading and the requirements of the position. Employment is contingent upon...
...such as Stylus or Less
Basic understanding of front-end technologies, such as HTML5, and CSS3
Understanding accessibility and security compliance
User authentication and authorization between multiple systems, servers, and environments
Integration of multiple...
...conditional offer of employment.
Conditions for employment include but are not limited to medical examinations, and permission to secure a visa to work and reside in-country.
Throughout all these stages, we will be with you through every stage of the hiring process...
...oral and written communication skills, both in Spanish and English.
~ Deep technical knowledge on computer networks and Internet security
~ At least 3 years of experience working on a pre-sales position (carrying a quota) for a networking or security vendor.
~...