Jobs

Tech Lead at Giftify #vacancy #remote

Posted on:

Giftify is a FinTech/MarTech scale-up leader in turn-key Gift Card solutions for Shopping Centres and retailers across Europe. Our goal is to become the world leader in our industry. Through our Gift Card products, our passion is to bring efficient and innovative solutions to allow Shopping Centres and Retail Parks […]

Jobs

IT Associate Remote at Forbes Advisor #vacancy #remote

Posted on:

Job Description Forbes Marketplace, a dynamic and fully remote company with approximately 600 employees, is seeking an IT Associate to play a crucial role in maintaining and advancing our IT infrastructure, security, and operations. This position necessitates a versatile individual who can learn and administer a changing technology suite, ensure […]

Jobs

IT Security Engineer (Onsite – not remote position) at Tanner Medical Center #vacancy #remote

Posted on:

Job Description The IT Security Engineer develops and maintains enterprise-wide security architecture and strategies for all aspects of the security domain in alignment with the business strategy and goals. He she provides technical and security expertise to IT and business teams to understand technical constraints, identify security technology solutions, and […]

Jobs

REMOTE Azure Cloud Security Architect at Insight Global #vacancy #remote

Posted on:

Job Description Position Summary The successful candidate will operate primarily within our public Cloud environments to advise and assist with the establishment and enhancement of Cybersecurity postures. This position will be performing technical architecture for Cloud solutions protecting the business technology environments. The role will work closely with Cyber Solution […]

Jobs

Data Engineer (Remote) at Cisco #vacancy #remote

Posted on:

What You’ll Do [1] Cisco Extended Detection and Response (XDR) is a cloud-native security service that collects and correlates data across email, endpoints, servers, cloud workloads, and networks, enabling visibility and context into advanced threats. Threats can then be analyzed, prioritized, hunted, and remediated to prevent data loss and security […]