You will be expected to take a lead role for your area of specialism and will be comfortable leading and directing engineers outsource partners and suppliers. You will need to represent the department in wider business discussions, and show clear traceability through standar...
We are looking for a Cyber Security Compliance Engineer, that be responsible to ensure the secure operation of the systems and communications by following Jaguar Landrover processes, procedures, and compliance requirements. You will be responsible for operating the information se...
As a Cyber Security Analyst your responsibilities will include, but not be limited to: Timely analysis of information systems to identify risks Identification, review and specification of security technologies needed to protect Jaguar Land Rover and customers Working with a range...
Substantial experience of applying a Cyber Security lifecycle within industry e.g Automotive, IT. Excellent team-working, organisation and communication skills. Self-motivated and able to work to a high standard with minimum supervision. Flexible approach. Analytical and proble...
Be a main contributor to hybrid powertrains and join PS-TC. As market leader in the development and manufacture of transmission control units we improve the efficiency of hybrid cars while offering a safe and comfortable driving experience. Our portfolio extends to all kinds of a...
units we improve the efficiency of hybrid cars while offering a safe and comfortable driving experience. Our portfolio extends to all kinds of automatic transmissions with customers on 3 continents, R&D locations in 3 countries and manufacturing plants in 9 locations. Budape...
Support the design, deployment and integration of new enabling technologies to achieve the defined security goals Operate and maintain security infrastructure, like Endpoint Security, Web Application Firewalls, Intrusion Detection and Protection systems, Privileged Access Control...
KPI-ok fejlesztése és koordinálása Automatizált riportok kidolgozása Kibervédelmi kontrolok bevezetése Munkavégzés az alábbi alkalmazásokban: Power BI, Smartsheet, Excel Visual Basic
-A releváns szabványok áttekintése -A rendszer- és szoftverarchitektúra alapján szoftvermodulok tervezése -Implementáció -Részvétel termékbiztonsági kockázatok kiértékelésében -Támogatás belső adatbázis készítéséhez a sebezhetőségekről
Perform detailed analyses and support Level1 team in daily operation Security monitoring and other security operation activities Generate reports for both technical and non-technical staff and stakeholders Use advanced analytic tools to determine emerging threat patterns and vuln...
? Coordinating cybersecurity activities for automotive products according to Bosch Security Engineering Process in customer projects ? Identifying the potential threats by analyzing the attack surface and assessing possible risks of our products on vehicle level ? Supporting the...
Lead the planning, creation and management of security architecture, components, policies and standards for all applicable platforms and environmentsYou will be involved in the following tasks Lead the planning, creation and management of security architecture, components, polici...
Perform audit and information security risk assessments by reviewing, documenting, evaluating, and testing general computer controls and application controls for any IT compliance works as financial audit support, SOX 404, Matrix, PCI DSS, ISO/IEC 27001 Support identifying areas....
Work on Security Awareness initiatives like Training, Phishing, Communication and Reporting Help to implement and coordinate a specialized Phishing program for our business Create operational and executive reports systems and processes Assistance with the deployment and main...
Evaluate, test, and implement a new Information Rights Management encryption technology. Work on the retirement and migration of data the old encryption solution to the new solution. Manage business continuity and user experience during a transition period.
változatos és színvonalas informatikai mérnöki munka Identity and Access Management (IAM) ill. Privileged Access Management (PAM) rendszerekkel kapcsolatban, nagyvállalati IT biztonsági megoldások koncepciójának megalkotása együttműködve az ügyfelekkel és a fejlesztéssel, részvét...
In this role, you will: Work to design and implement security projects to transform products within the CoreTech portfolio with a focus on Cloud, SDN, NFV and SASE. Ensure successful transition to the new standard FW and threat prevention technology A focus on automation & orches...
Design, build and promote our CyberArk solutions to the rest of the organization, next to the other tools of the HPC platform Follow up the market about security tools and share experiences. Follow up security recommendations (proactively and reactively) and minimize or mitigate....
The Responsibilities: Test customer firewall installations both in the implementation phase and as a support role during the life of the install. To manage the delivery of the security infrastructure and services to provide: identity and trust solutions, managed security services...
Work on Security Awareness initiatives like Training, Phishing, Communication and Reporting Help to implement and coordinate a specialized Phishing program for our business Create operational and executive reports systems and processes Assistance with the deployment and main...
Evaluate, test, and implement a new Information Rights Management encryption technology. Work on the retirement and migration of data the old encryption solution to the new solution. Manage business continuity and user experience during a transition period.
Conduct threat modelling regarding the required products / products? features Advise on security related matters regarding the web and mobile development practice / process / applied technics Develop and introduce security KPIs, measures to the development pipeline, provides figu...
The Responsibilities: Test customer firewall installations both in the implementation phase and as a support role during the life of the install. To manage the delivery of the security infrastructure and services to provide: identity and trust solutions, managed security services...
Design, build and promote our CyberArk solutions to the rest of the organization, next to the other tools of the HPC platform Follow up the market about security tools and share experiences. Follow up security recommendations (proactively and reactively) and minimize or mitigate....
Work to design and implement security projects to transform products within the CoreTech portfolio with a focus on Cloud, SDN, NFV and SASE. Ensure successful transition to the new standard FW and threat prevention technology A focus on automation & orchestration and furthering t...
* A termék biztonságával kapcsolatos kiberbiztonsági rendszerek fejlesztése és fejlesztésének támogatása * Kockázatok felmérésének és a sebezhetőségek feltárásának koordinálása * Feltárt kockázatok kezelésének menedzselése és a sebezhetőségek javításának támogatása * Kapcsolattar...
Conduct threat modelling regarding the required products / products? features Advise on security related matters regarding the web and mobile development practice / process / applied technics Develop and introduce security KPIs, measures to the development pipeline, provides figu...
Work on Security Awareness initiatives like Training, Phishing, Communication and Reporting Help to implement and coordinate a specialized Phishing program for our business Create operational and executive reports systems and processes Assistance with the deployment and main...
Evaluate, test, and implement a new Information Rights Management encryption technology. Work on the retirement and migration of data the old encryption solution to the new solution. Manage business continuity and user experience during a transition period.