Job Description Under the general direction of the Manager, maintains the integrity of enterprise-wide local area networks and cyber security infrastructure. Participates in planning, developing, testing, implementation and support of technical solutions for company-wide data and voice communications. Works with vendors and service providers to ensure stability and reliability of […]
Search Results for: data-communication
Business Data Analyst III at Thermo Fisher Scientific #vacancy #remote
The presence of a Business Analyst in a Data Analytics team is indispensable, as they bridge the gap between technical expertise and business needs. They gather and translate requirements, interpret data in a business context, communicate insights effectively, mitigate risks, optimize processes, and measure the impact of analytics initiatives, ensuring […]
JuniorEmbedded Software Developer at Hitachi Energy #vacancy #remote
Your background You have a genuine interest in computers, programming and innovative technology as well as motivation to work for the world-leading technology pioneer. A bachelor’s or master’s degree within Embedded Systems, Computer Science, Data Communications is highly qualified. However, the most important thing is your interest. Understanding of C/C++ […]
Sr. Intelligence Analyst – Intelligence Customer Operations (Remote) at Aztec #vacancy #remote
#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since our inception, our market leading cloud-native platform has offered unparalleled protection against the most sophisticated cyberattacks. We’re looking for people with limitless passion, a relentless focus on innovation and a […]
IT Security Analyst II (Remote Eligible) at Busey Bank #vacancy #remote
Position Summary The IT Security Analyst II is responsible for coordinating scheduled disaster recovery and business continuity testing for all pertinent IT functions. This position assists the VP, GRC/Security Manager in implementing and documenting IT change management controls and verification processes. Additionally, this position will be executing the enterprise phishing […]