capability, keep up to date with required training (including information security) and communicate clearly and confidently...
discipline *Several years of hands-on experience in Identity and Access Management, Information Security, or governance roles... and technology landscapes. Working in close partnership with the KRITIS client’s IT, security, and business stakeholders...
to assess control design and operating effectiveness. Collaborate with key stakeholders (Security, Finance, Risk) to develop... skills and knowledge within the Security Controls team. Provide training and advisory support to control owners across the...
for any required integrations, workflows, or security consultants and configurations. Join kickoff calls to align on onboarding, implementation... status, ancestry, physical or mental disability, genetic information, veteran status, gender identity or expression, sexual...
Threat Protection technologies. As a member of our security practice, you will work for both Avanade and Accenture clients...’s security practice, you will be in a unique position to work for both Avanade and Accenture clients, ranging in size from medium...
implementation of 3rd party AI solutions, coordinating with Privacy, Security, Compliance, and other departments to move initiatives... for third-party solutions that will handle sensitive information. Vendor Management: Manage the end-to-end vendor lifecycle...
threat detection and incident correlation. Oversee configuration of E5 security tools, including Microsoft Information...Summary Avanade is looking for an experienced Data Security Architect to join our security practice. This is a client...
Additional information High visibility role with genuine scope to shape and influence Hybrid working model based in London – 2... Barclay Simpson, worldwide specialists in Cyber Security jobs: This job was posted by Barclay Simpson:...
. Protecting your privacy and the security of your data is a longstanding top priority for Amazon. Please consult our Privacy... or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact...
and build. Protecting your privacy and the security of your data is a longstanding top priority for Amazon. Please consult... interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed...
Security clearance and access requirements Reactive & Quoted Works Chase up jobs logged to close off and chase up costs... Delegating workload to admin team Helpdesk reporting; Adhoc reports required by the clients for specific information...
& telecommunications, information security, etc. Contribute to practice development, advise direct reports, and mentor junior TTS.... We are looking for someone with a background in IT/public cloud engineering, architecture, security, and/or strategy to join our Technology Transaction Services...
on your experience and skills. We value your passion to discover, invent, simplify and build. Protecting your privacy and the security... for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner....
. Protecting your privacy and the security of your data is a longstanding top priority for Amazon. Please consult our Privacy... or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact...
and ensure contracting compliance with service suppliers, legal team and physical security teams for continuous and consistent... regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital...
to our customers' objectives to create a lasting positive impact. We serve the Infrastructure; Nuclear, Security & Environmental.... Coordinates supply of technical information to the designer to allow the programme to progress. Reviews major changes...
and security of all personal information that we process in order to provide services to our clients. For specific information... on how FIS protects personal information online, please see the . Sourcing Model Recruitment at FIS works primarily...
to our customers' objectives to create a lasting positive impact. We serve the Infrastructure; Nuclear, Security & Environmental... veteran status, genetic information, and any other characteristic protected by federal, state or local law. We're creating...
, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications... of process improvement and efficiency. Proficiency in SFDC, CPQ, Microsoft Office Suite is preferred. Additional Information...
, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications... of process improvement and efficiency. Proficiency in SFDC, CPQ, Microsoft Office Suite is preferred. Additional Information...