...Security principles to craft tailored solutions across .NET, Java, and Digital platforms. Additional Information Our employees are known for making bold choices and delivering results. Work among hig...
...security operating models, modernize digital identity capabilities, lead programs to drive security culture change and transform security and compliance regimes to make them efficient, effective, sust...
...security in the Alliance for nearly one billion citizens. The NATO Communications and Information Agency (NCIA) is NATO's technology and cyber hub. We are a team of 3400 civilian and military staff, w...
...Security Architecture Specifications, Security Architecture Analysis, Security Requirements, Security Standards and Design Patterns, Reference Architectures, Security Strategies, threat-modeling and r...
...Information provided by applicants will be used for recruitment and other employment-related purposes. Applicants should read the Personal Information Collection Statement before submission of applic...
...manager)• The GRC Officer will join the governance and compliance sub-team• Focus on ISMS (Information Security Management System) processes and documentation (ISO 27001 & 27002)• Support exception ma...
...Security Architecture Specifications, Security Architecture Analysis, Security Requirements, Security Standards and Design Patterns, Reference Architectures, Security Strategies, threat-modeling and r...
...Security Awareness• Adhere to company policies related to data protection, confidentiality, and information security• Promote and practice a security-first mindset in all customer communications...
...Security Manager in payment security activities and compliance requirements.· Develop and maintain product knowledge in payment solutions and security, with a focus on continuous learning.· Collaborat...
...Manager to join our UniQue team.What will you be doing in this role?Elaborate, maintain, and enforce information system (IS) quality control procedures.Prepare and maintain quality plans and service l...
...security operating models, modernize digital identity capabilities, lead programs to drive security culture change and transform security and compliance regimes to make them efficient, effective, sust...
...Security).Those three aspects are fundamental - network and operating systems in the context of offensive security.EU Secret security clearance is pivotal for this role. Activities:- The ability to qu...
...security operating models, modernize digital identity capabilities, lead programs to drive security culture change and transform security and compliance regimes to make them efficient, effective, sust...
...Manager to join our UniQue team.What will you be doing in this role?Elaborate, maintain, and enforce information system (IS) quality control procedures.Prepare and maintain quality plans and service l...
...manager to plan activities, monitor progress, and ensure goals are met within scope, time, and budget. Information Architecture: Configure and document content types, metadata, permissions, and other ...