Cybersecurity Specialist - Risk & Vulnerability Management At Capgemini Engineering, the world leader in engineering... in cybersecurity, with a strong focus on risk analysis, vulnerability management, and penetration testing. Solid knowledge of European...
focus on vulnerability management activities across systems and applications. The role involves executing security testing... actions using Vulnerability Management software, extracting and consolidating results, and ensuring effective communication...
modeling, risk assessment, and vulnerability management. Experience with integrating security best practices at every stage...Company Description Devoteam Cyber Trust is the Cybersecurity specialist arm of the Devoteam Group. With our 800...
innovation, supporting our mission To Serve Specialist IS Security Engineer At AMGEN, Technology isn’t just a support... WHAT YOU WILL DO As a Specialist IS Security Engineer at Amgen, you will be responsible for designing, implementing, and operating secure information...
, DevSecOps, Vulnerability Management, Python Scripting, Security Automation, SDLC Security, Cybersecurity, Application Security...CYBER SECURITY SPECIALIST/OPERATOR (ON-SITE PORTO) Portuguese company hires for on-site position 📍 Location: Porto...
, Office 365 and more Have hands-on experience managing security tools (EDR, IAM, MDM, SIEM, vulnerability management... we affectionately call "Bobbers." About You: We are looking for a talented IT Specialist to join our IT department in Lisbon...
management processes. Support the end-to-end vulnerability lifecycle, from identification and prioritisation to technical...) infrastructure architecture and hardening. IAM principles and solutions. Risk management lifecycle. Vulnerability management...
and applications using Vulnerability Management tools; Extract results from scans and share reports with technical teams; Collect..., or penetration testing; Interest in Cybersecurity and Vulnerability Management. Additional Information...
management processes. Support the end-to-end vulnerability lifecycle, from identification and prioritisation to technical... architecture and hardening. IAM principles and solutions. Risk management lifecycle. Vulnerability management lifecycle...