
Search by job, company or skills
Showing 10 jobs
Skills:
Microsoft Office, Procurement, Contract Management, Sharepoint, Third-Party Risk Management, Vendor Management, Risk Management
Skills:
revenue growth , regulatory frameworks, managed security services, cybersecurity solutions
Skills:
Ccsp, Prince2, Cism, Enterprise risk and compliance, ISO 27001 Lead Implementer Auditor, Cybersecurity strategy and governance, Identity infrastructure and cloud security, Regulatory frameworks, Pmp, Cissp, Security transformation and operating models, CRISC
Skills:
Data Analytics, Automation Tools, Confluence, Power Bi, Jira, FreshDesk, visualization tools, collaboration systems, IT application support, digital platform operations
Skills:
snowflake , Microsoft Sharepoint, Enterprise Solutions, Qlik, Data Governance, Salesforce, Compliance, AI-enabled Solutions, LinkedIn Solutions, Account Management, Business Development, outsystems
Skills:
Infrastructure Support, User Access Management, It Asset Management, It Operations, regional IT coordination, Access Control, IT governance support, endpoint management, ISO audit compliance documentation
Skills:
Jira, Jenkins, Confluence, Gitlab, Splunk, Api Management, Kubernetes, Blue Green deployments, cloud-native architecture, Canary releases, EKS, CI CD pipelines, event-driven architecture, observability tooling, Monday.com, Feature Flags
Skills:
software components , Servers, It Compliance, Digital Transformation, Cybersecurity, project management, storage environments, network systems
Skills:
containerization , Data Privacy, Rpa, Cybersecurity, Data Governance, Identity And Access Management, Agile Development, Api Management, It Operations, Transformation and programme project management, Application development and change, IT governance and risk management, Resilience, Third party management, AI governance, Cloud PaaS IaaS and SaaS, Data analytics capability
Skills:
Identity infrastructure and cloud security, Regulatory frameworks, Enterprise risk and compliance, Security transformation and operating models, Cybersecurity strategy and governance
