Search Results: 1,919 职位空缺
Job Purpose
This position has an objective to
Drive the implementation of Group IT Governance and Cyber Security Strategy across the region by assisting the OG CISO.
Achieve and maintain IT compliance across the region as per group policies and IT standards an...
...erver system(s), supporting hardware/software, user accounts, and computer/telephone rooms. Train/instruct users in proper use and security of all systems. Troubleshoot/repair/resolve technical problems/issues related to computer hardware/software/LAN and WAN/internet. ...
POSITION SUMMARY
Plan and coordinate information technology-related equipment installations, moves, additions, changes, and system enhancements to improve reliability/performance. Enter commands and activate controls on computer and peripheral equipment. Resolve n...
...sponsibility:
Responsible for the full life cycle of internal IT projects.
With Work closely with business departments to unde... ...as Project management certificates, relevant IT network, server, security, etc. certificates are subject to limited consideration.
has ...
...experts on the team for resolution.
Compliance with corporate IT policies .
Qualifications:
~ Customer-oriented (both inter... ...to receive/respond to requests.
~ Understanding of Information Security fundamentals - Phishing defense, passwords, VPN, etc.
~ Oncall...
...to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, we build breakthroughs, together.
We win with inclusion
SAP's culture of inclusion, focus on health and well-...
1. Based on historical data and business experience, generate chains by analyzing risks To balance business development and security experience, design and implement risk control strategies for optimized social scenarios, and create a safe shopping environment 2. Collab...
1. Responsible for the management of platform store risks, establishment and improvement Store risk management system to ensure merchant content compliance 2. Discover, locate and solve various store risk problems through data analysis and mining 3. Conduct regular risk...
... person we are looking for to work as a Hilton Team Member. Because it's with Hilton where we never forget the reason we're here: to delight our guests, Team Members, and owners alike.
The Security Supervisor is responsible for the duties and activities of Security...
Roles & Responsibilities
1. Vulnerability risk convergence: building business An operational system with security risk convergence, implemented solutions to achieve vulnerability risk control goals able to complete solution review, problem discovery, exposure, and op...
Responsibilities
1. Leadership and management Security-related projects and activities ensure consistency with organizational goals, in... ...uirements 2. Work closely with cross-department teams, including IT, production research, legal, IC, internal audit and compliance d...
Roles & Responsibilities
1. App security incidents Emergency analysis and disposal, including but not limited to reverse analysis, deobfuscation, shelling, etc.
2. Development and maintenance of client vulnerability scanning system, including PC and mobile App (And...
...rson we are looking for to work as a Hilton Team Member. Because it's with Hilton where we never forget the reason we're here: to de... ...m Members, and owners alike.
What will I be doing
As the Security Officer, you will be responsible for performing the following ta...
...untries and use our expertise to sustain and enhance the fabric of everyday life. Because we believe every surface is an opportunity. It's what you'd expect from a pioneering and long-established paints company that's dedicated to providing sustainable solutions and pre...
Job description
Department: IT Support in China
Location: Beijing
Do you dream of a career within IT support China tea... ... execute IT asset management strategies to ensure compliance and security of assets.
. Responsible for recording and tracking IT assets...
...try, proactive and confident, with excellent communication and interpersonal skills
Possess fund qualification certificate and securities qualification certificate (could take the examination after onboarding)
Priority will be given to those who have a deep underst...
Responsibilities
1. Identify business security risks , promote business transformation and improve business security levels 2. Analyze black product attack methods, propose effective prevention and control strategies, and improve attack detection capabilities 3. Part...
Responsibilities
1. Responsible for mobile security technology research, as well as ByteDance's full range of App mobile security testing and security technology solution support 2. Responsible for original vulnerability mining, and tracking and analyzing 0day vulner...
... mobile games and plug-ins
2. Develop and launch plug-in detection solutions
3. Responsible for the development of mobile game security solutions and tools.
Qualifications
1. Familiar with arm assembly and capable of reverse analysis of mobile terminals
2. Ha...
Roles & Responsibilities
1. Responsible for innovative security Product research and development, provide reasonable architectural design and implement its core logic based on actual business needs
2. Responsible for the code design and implementation of business p...