Receber novas ofertas de emprego por e-mail
- ...Qualifications : Technical Skills: Knowledge in Data Security topics General... ...cyber security risks and apply knowledge of security and data management to regulations Knowledge on development and process...
- ...field; Minimum of 5 years' professional experience in project management, preferably in technological and Infrastructure/Cybersecurity... ...leading and coordinating technical teams, with the ability to manage resources, conflicts, and priorities; Experience in the successful...
- ...operations related to the business. We are looking for a Security Risk Officer to work in this project in Porto (Hybrid) .... ...years of experience; - Proven experience in technology risk management within the banking or financial services industry; - Strong...
- ...decisions on the development of systems, procedures, and infrastructure based on information security; Evaluate, operationalize, and support the development of risk management processes through process mapping, risk identification, and control development; Support...
- ...Services Group The Associate Director: Security Architecture Security role presents a dynamic opportunity to ensure the secure operation of IQVIA global information technology... ...Security, IT Delivery, IT Program Management and other related areas Experience with...
- ...Product Manager - Security & User Management Mollie was founded in 2004 in Amsterdam with a simple but bold mission: to make payments effortless... ...and control. You will design and deliver a flexible secure and delightful multi-user management experience that scales with...
- ...About the job ~ The Security Review Management – Cyber Program Analyst’s mission is to ensure IT and Cyber risks are managed properly. It plays a key role in securing information systems. By monitoring, detecting, investigating, analyzing, and responding to security...
- ...information systems. We are hiring a Senior Security Engineer for a project in Almada or... ...experience with Cloud Security Posture Management (CSPM); - Application Security tools... ...(SCA, SAST, DAST); - Understanding of secure SDLC, DevSecOps, and security...
- ...We are looking for an Information Security Consultant to join one of the biggest companies... ...Executive Committee Members, business managers, and IT leaders. Led by the Information... ...Auditor/Implementer, ISO 27005 Risk Manager (preferred). ~ Fluent English....
- ...Join the yellow team as our new IT Security Engineer! Role: We’re looking for... ...and Atlassian suite (Jira, Confluence), secure core networking gear (Fortigate firewalls... ...perform vulnerability assessments, patch management, and penetration testing of SaaS infrastructure...
- ...Join the yellow team as our new Senior Security Engineer! Responsibilities: Act... ..., and DevOps teams to implement secure coding practices, remediate vulnerabilities... ...CI/CD pipelines; Lead vulnerability management efforts, partnering with technical teams...
- ...Objective: Integration into the team responsible for network and security infrastructure functions within Data Centers ensuring... ...resolution of complex incidents ensuring effective outcomes Management of relationships with vendors and manufacturers when...
- ...We are looking for an OT Cyber Security Engineer, to integrate the team of our client - a company in the energy sector. What will... ...into incident detection and response processes, vulnerability management, and system hardening; * Monitor evolving threats to industrial...
- ...We’re looking for bright Linux Security Engineers to join our team As a Linux Security... ...Linux Security Enhancement: Implement and manage Kernel hardening and access control... ...techniques and operating system features like secure boot, disk encryption, and sandboxing to...
- ...Cloud SIEM is a fast-growing security product that helps organizations detect and respond... ...to potential threats. The Security Case Management team is a new team within Cloud SIEM... ...efficiently and at scale. As the Engineering Manager, you'll build and lead this new team's...
- ...over 10 million patients worldwide. It’s time for a career you can be proud of. Join us. Specialist Information Security Engineer – Vulnerability Management Analyst LIVE What will you do: This role is focused on identifying, assessing, prioritizing...
- .... Role Overview: We are looking for an Information Security & Risk Consultant to join one of our biggest clients – an International... ...is to ensure, for the IT Risk Central activity, the audit management (control, oversight, reporting and follow-up) including the...
- Fundada em 2005, em Lisboa, a agap2IT é uma organização europeia na área dos Sistemas de Informação, Ciência e Tecnologia. A capacidade de intervir globalmente aliada à elevada experiência e know-how técnico, funcional e de negócio da equipa, garantem a excelência da resposta...
- ...We are looking for a Cyber Security Engineer, to integrate the team of our client - a company in the energy sector. This professional can be based in Lisbon or Oporto. What will be your main tasks and responsibilities? * Define Security Controls, implementing technical...
- ...Would you like to join the leading international intergovernmental organization? The Senior Project Manager is accountable for the end-to-end delivery of medium-scale, business-critical projects with firm deadlines, primarily within the C4ISR (Command, Control, Communications...
- ...up. Por isso, se quiseres fazer parte desta equipa e aceitar novos desafios, estamos à tua procura! Estamos à procura de IT Security Architect para a nossa equipa de Security Strategy & Architecture e acreditamos que seremos #betterwithyou! Contamos contigo para...
- ...intergovernmental organization The Vendor Management Officer is responsible for managing the... ...rules contractual obligations and security requirements throughout the vendor engagement... ...process. In addition the Vendor Manager supports the Smart Sourcing Manager in the...
- ...are seeking a Principal Engineer – Cyber Security to act as a senior technical authority... ..., risk, and compliance needs into secure-by-design solutions, combining deep technical... ...expertise in cyber security architecture, risk management, and secure engineering , ideally in...
- ...Procuramos um #TechTalent para desempenhar funções enquanto IAM Security Specialist num projeto de grande dimensão no setor retalho.... ...A DIA Implementar e gerir soluções de Identity and Access Management (IAM). Definir políticas e procedimentos de controlo de acesso...
- ...Job Title: Security Operations Engineer Location: Lisbon or Aveiro Portugal Work... ...engineering and DevOps teams promoting secure development practices incident response... ...Experience with Cloud Security Posture Management (CSPM) tools particularly Prisma Cloud;...
- ...tech wizardry. The position The Security Team is a small team but is expanding in... ...where we are all about exposing and managing risk and ensuring trust and safety in the... ...through automation throughout the entire Secure Software Development Life Cycle, vulnerability...
- ...FinTech simplifying global trading and cash management for businesses worldwide. We remove... ...globally with confidence. Our tailored, secure, and efficient solutions span FX and international... ...Sentinel as the company’s SIEM. ~ Manage the SOC function (whether internal or...
- ...and fun. As we like to say: Its not only what we do, its how we manage that truly make the difference.. If you're looking for... ...might be the next person to join WIRE IT. Role: Network & Security Administrator Location: Hybrid, Lisbon, Portugal...
- ...of the NIST Cyberprogram on the subject of Identity and Access Management (IAM) the mission will focus on two axes: The... ...lifecycle processes Ensure compliance of access management with security policies and regulations Analyze access anomalies and follow...
- ...Job Title: Cloud Security Engineer (IAM) Location: Lisbon or Aveiro, Portugal... ...with deep knowledge of identity, access management, container security, networking, and IAM... ...policies. ~ Strong understanding of secure SDLC practices, DevSecOps, Infrastructure...

