based on ISO 27001:2013, ISAE 3402 & PCI-DSS. Development and maintenance of information security profiles aligned to client’s MSA and its geo and industry regulations Building information security culture by designing and delivering appropriate information security awareness program
-Security and safekeeping of building and rooms containing power system and interfaces -Security of all protective relay settings, software programs and spare parts associated with electrical system equipment -Ensure and check all of responsible commissioning activities are performed according to related Minimum Skills / Knowledge; -Excellent understanding of combined-cycle power systems; protection and ...
As an Application Developer for GWM Risk and Regulatory initiatives , you will provide high quality technology solutions that address business needs by contributing towards the below: · Participate in technical design, provide input to the design recommendations; incorporate security requirements
with particular attention towards safety, security and asset protection\. Accountable for managing the budget, capital expenditure projects, preventative maintenance and energy conservation\. Develops and implements strategies that will deliver products and services, which meet or exceed the needs
continuance of business functions during a disaster or other times of crisis. • To effectively coordinate with the Regional Security Director and other peers within the operational security risk management framework to communicate and mitigate identified security risks. • To provide country budget management
testing review • Participate in various business and compliance governance and oversight forums as required • Liaise with banking and securities regulators during exams and other inquiries • Develop and execute product specific AML training, as required Qualifications • Bachelor degree from a 4 year
head of EAA and will be accountable for the overall strategy and direction of the Operations teams supporting application security administration across all lines of business. Responsible for directing the Application Security operations organization and driving strategy for request processing and incident
to leverage economies of scale across the firm. Core Foundation Services (CFS) The GTI Core Foundation Services (CFS) team is responsible for delivering core infrastructure services (including server OS, directory, naming, security, monitoring, orchestration, software distribution, and configuration
expert in mainframe systems programming with specific expertise in scripting and programming skills such as REXX, PYTHON, PERL, or equivalent. The ideal candidate will also: · Demonstrate compliance to architectural design standards, risk management and security policies, data management policies ...
capabilities. Enable 20,000 developers to effectively build secure mobile applications by delivering a rich framework integrated into the IDE, core run-time services, continuous integration, automated builds and regressions tests, promotion of code through acceptance testing and finally deployment
and operational service for key Digital, Web, Middleware and Platform (UNIX) technologies. This includes the Digital Security suite of products, Web & Application Containers, Application Performance Management, Integration Technologies, Workload Automation, BPM, Informatica layers and core UNIX platform products
and portfolio technologies and solutions, engaging internal resources and stakeholders including Marketing, CA, Partners and Cisco business units. The Director is responsible for and measured against the revenue generated in addition to motivating and inspiring a cross-functional team of employees to achieve
- Act as a liason between the clients Information Security Team as early as possible in M&A activities. This will allow the Security Liaison to understand any gaps which may exist between the acquired company and client surrounding security policies, procedures, controls, etc. This will also allow
Act as a liason between the VMware Information Security Team as early as possible in M&A activities. This will allow the Security Liaison to understand any gaps which may exist between the acquired company and VMware surrounding security policies, procedures, controls, etc. This will also allow