...than 5 minutes.
We are hiring for:
Cowbell is hiring an Accountant, International to join our Finance team. In this role, you'll... ...accuracy and completeness of financial transac...
...internal and external stakeholders regarding financial matters. Research and interpret data to address inquiries.
Compliance and Tax Filings : Ensure adherence to rules, regulations, and timely tax filings. Collabor...
..., largely tactical, such as daily open-source intelligence (OSINT) alert management, reviews, updates, tracking, and prioritization, coupled with a daily internal proprietary report on what matters most on the threa...
...analysis, concept design for cyber security features and support for embedded software stack for our growing systems portfolio for the Heavy Truck market.
General Responsibilities
Lead security-related proje...
...1. Purpose of the job:
Cyber security is a top priority for AkzoNobel as for any global... ...cyberspace. Our objective is to protect our information and digital assets...
...identify trends and anomalies.
Stakeholder Communication:
Independently engage with internal and external stakeholders, including auditors, regarding financial matters. Research and interpret data to address inqu...
...Job Title - Information Security Specialist, AVP Location – Pune, India
Role Description:
The Cyber Hygiene department is part of the Chief Security Office in Deutsche Bank and responsible for detection and c...
...Job Description:
• Designated Information Security Head for the Organization
• Ensuring strategic alignment of information security in support of business objectives
• Direct and support organization in protec...
1. IT cyber security Framework (Policy design and implementation)
Develop policies and framework for maintaining cyber security (for... ...reporting mechanisms for measuring compliance and performan...
What You'll Do
The Cyber Security Authority delivers cyber security activities, aligning global cyber security risk reduction with local market business and technology priorities and in line with the global cyber security strategy to be implement...