... Compliance (GRC) requirements across all IT OT areas. Additionally, youll provide technical leadership in the overall Cyber Defense by ensuring Security Design & Architecture, Security Operations, Incident Response, Forensics, Penetration ...
au.talent.com
... to Develop Strategy Lead analysis of the business future-state capabilities and Digital & IT environment to detect critical gaps ... drive the business towards its targeted outcomes Lead analysis of the IT environment to detect critical deficiencies ...
au.talent.com
... of experience in a similar security, or network security role. 3+ years of network ... . Qualifications Desirable: Bachelor Degree of IT (Security preferred). Security vendor certification: Cisco, Fortinet, Checkpoint ...
au.talent.com
... , and models guiding technology decisions. Lead analysis of the current technology ... . Understanding of applications, computing, and security architectures. Knowledge of IT service management (ITSM) and Information ...
au.talent.com
... crude oil and natural gas. It operates through the following segments: ... malicious activity to enhance cyber security operations as well as profiling ... threat intelligence platform and optimizing its integration with other cybersecurity systems. ...
au.talent.com
... detailed IT process and control design walkthroughs, and meticulous testing of controls from a SOX standard is necessary. Capability to prepare preliminary findings, analyze alternative approaches, and demonstrate the ability to make presentations or lead ...
au.talent.com
... and proactive professional to lead our aviation security screening team across Darwin International ... experience in the aviation security industry, or experience in a ... to obtain an Aviation Security Identification Card (criminal history clearance) ...
au.talent.com
... software File services including NTFS security, DFSN and DFSR. Understanding and exposure to Cyber Security principles. More about the role ... on-call roster. What’s in it for you At NEC, we ...
au.talent.com
... , efficiency, system sustainability, scalability, and security within agreed time and budget ... with Engineering Managers and Technical Leads to drive the effort in ... , desktop, and smart speakers. Whether it is staying informed of the ...
au.talent.com
... software File services including NTFS security, DFSN and DFSR. Understanding and exposure to Cyber Security principles. More about the role ... on-call roster. What’s in it for you At NEC, we ...
au.talent.com