...design ~ Apply rigorous Design for Manufacturing (DFM) and Design for Assembly (DFA) principles to ensure all robotic components are optimized for cost-effective production (e.g. CNC machining, inject... (jooble)
...design Apply rigorous Design for Manufacturing (DFM) and Design for Assembly (DFA) principles to ensure all robotic components are optimized for cost-effective production (e.g. CNC machining, injectio... (jooble)
...architecture Conditional access policies Log analysis Cloud Networking/Application Architecture – Knowledge domains: Cloud Application Firewall solutions Exposing internal applications to the internet... (jooble)
...architecture impact Drive alignment between AI initiatives, enterprise architecture, security, and compliance requirements Assess emerging AI technologies, LLM ecosystems, AI agents, and enterprise AI... (jooble)
...design principles throughout construction and technical installation activities Act as the single point of contact for all HSE matters — contractors, design offices, engineering teams and internal sta... (jooble)
...Design, build, document, maintain end-to-end data pipelines using Microsoft Fabric (Data Engineering, Data Factory, OneLake, Lakehouse, Warehouses) Develop ELT transformations using DBT (reusable mode... (jooble)
Looking to start a new challenge as a freelancer? Improve detection quality by reducing false positives and increasing fidelity Conduct malware analysis and forensic investigations Validate detections... (jooble)
...Architecture Solid/Expert knowledge of : Authentication and authorization IAM RBAC (Role Based Access Control) Scripting (batch, PowerShell…) CyberArk The main IT-Security principles and best practice... (jooble)
...Architecture Solid/Expert knowledge of : Authentication and authorization IAM RBAC (Role Based Access Control) Scripting (batch, PowerShell…) CyberArk The main IT-Security principles and best practice... (jooble)
...Architecture Solid/Expert knowledge of : Authentication and authorization IAM RBAC (Role Based Access Control) Scripting (batch, PowerShell…) CyberArk The main IT-Security principles and best practice... (jooble)
...Architecture Solid/Expert knowledge of : Authentication and authorization IAM RBAC (Role Based Access Control) Scripting (batch, PowerShell…) CyberArk The main IT-Security principles and best practice... (jooble)
...Architecture Solid/Expert knowledge of : Authentication and authorization IAM RBAC (Role Based Access Control) Scripting (batch, PowerShell…) CyberArk The main IT-Security principles and best practice... (jooble)
...Design of management systems and other tools: design of architecture, technical evaluation of alternatives offered on the market, conduct of proof of concept, testing in pre-production environment • I... (jooble)
...architecture decisions, technical direction and the adoption of new technologies. Key responsibilities Lead and contribute to the architecture, design and implementation of electronic hardware project... (jooble)
...design, change approvals, integrations and extensions Ensure compliance with enterprise architecture standards, data governance rules and security requirement Oversee the creation and maintenance of g... (jooble)