Requirements Comprehensive knowledge of Oracle’s User Security features. Demonstrated experience in implementing a user security model. Experience handling security tasks within large-scale ERP systems, particularly Oracle ERP. Adaptable and efficient team player. Outstanding communication skills, both oral and written, with the capability to explain complex security concepts to non-technical audiences. […]
Search Results for: Access control systems
Lead Cyber Security Analyst (Remote) at CareFirst #vacancy #remote
Resp & Qualifications PURPOSE: To ensure the organization’s data remains protected from inappropriate access, disclosure and/or damage. To advocate for and execute the processes and practices of the Cybersecurity team while supporting business and customer needs. ESSENTIAL FUNCTIONS: Leads the team in regular assessments of network and system security for […]
System Administrator at GetResponse #vacancy #remote
Description We are currently looking for a System Administrato r to join our team and maintain, monitor, and develop GetResponse’s infrastructure. As one of our System Administrators, you will be responsible for hardware – from rack servers through the network physical servers, as well as software – maintaining operating systems, […]
Navigation Software Engineer C++ at Aptiv Services Poland S.A. #vacancy #remote
We are currently looking for candidates to boost our group developing core, global algorithmic building blocks for driver assistance and drive automation SW products. Join us now and become a member of teams owning the overall development of our technology components with duties spanning from innovation to release. We are now building […]
Full-Stack Developer at Lingaro #vacancy #remote
Tasks: Server-side development: designing, developing, and maintaining the server-side logic of web applications. Implementing scalable and efficient server-side components and APIs. Database management: working with relational and/or NoSQL databases to store and retrieve data efficiently. Designing and optimizing database schemas for performance and scalability. API Integration: integrating third-party APIs and […]
IT Governance Analyst Remote at NORC #vacancy #remote
IT Governance Analyst Remote Job no: 502305 Work type: Regular Full-Time Location: Chicago 55 East Monroe Street, IL Capability Area: IT Security JOB DESCRIPTION: NORC at the University of Chicago seeks an IT Governance Analyst to join our growing Information Technology Department. The successful candidate will be responsible for the […]
Information Privacy Manager at HEROCODERS SPÓŁKA Z OGRANICZONĄ ODPOWIEDZIALNOŚCIĄ #vacancy #remote
Optional, Jira, Confluence About the project, We are looking for a well-organized Information Privacy Manager to manage our privacy strategy, policies, and compliance with privacy regulations. As a fully remote SaaS company, we store data outside and use online services for daily work., , If you are looking for a […]
SAP Governance, Risk & Compliance Manager with English at Infosys Poland Sp. z o.o. #vacancy #remote
Expected, SAP GRC Your responsibilities, Monitor the SAP environments for applicable compliance, including Segregation of Duties and Sensitive transactions, Audit to detect deviations of established procedures, role mapping, unauthorized changes to the SAP security and report findings to management, Audit support – contact with external auditors, Execution of ITGC controls, […]
Security Lead Engineer at RELOUT sp. z o.o. #vacancy #remote
Expected, AWS, Linux, Docker, Serverless Optional, Python, TypeScript, Node.js Operating system, Linux About the project, We are currently looking for a Security Lead Engineer, willing to join a project for our strategic client – one of the largest manufacturing companies from Sweden, offering IoT solutions and assets management. In this […]
Information Security Engineering Team Lead at GR8 Tech #vacancy #remote
Expected, Terraform, Ansible, AWS, Docker, Kubernetes About the project, This role is responsible for overseeing the implementation and maintenance of security policies, procedures, and tools to protect the network, cloud and data center infrastructure, endpoints, and overall data of the company. This includes defining the security objectives, standards, and best […]