Primarily, you act as a primary point of contact for application teams, prioritizing and triaging Open Source Security scan results, and communicating the needs of application teams to strategic security leadership. As the vital link b[...]
Previous experience with public and private cloud platforms such as AWS, Azure, GCP, OpenShift.What's in it for you? We thrive on the challenge to be our best, progressive thinking to keep growing, and working together to deliver trust[...]
Job DescriptionAs a Vulnerability Management Scanning Engineer, you will lead the efforts in implementing and supporting our scanning capabilities across IoT devices, cloud environments, and on-premise systems. The ideal candidate is p[...]
In return, we promise to provide support, opportunities and performance-led financial rewards at a workplace where you can shape the future, win as a team and grow with us.About the roleWe’re looking for an IT Business Analyst to joi[...]
Acts as a subject matter expert on relevant regulations and policies.Supports multiple, similar business units with moderate complexity & business transaction risk.Builds effective relationships with internal/external stakeholders.Ensu[...]
Serve as a senior adviser to the team, sharing best practices for creating and distributing multimedia content.Ensure all multimedia content adheres to accessibility standards (e.g., closed captioning, screen-reader-friendly formats).S[...]
Instead, we ask that as part of your application you complete the below Complete your PLUM Profile here and save as a screenshot. Complete short one-way video interview here Apply to the role and when the application asks for your resu[...]
The role of IT Audit Advisory is focused on four key functions: IT Audit Support, audit testing and control assessment Support (directly) all and a variety of Audit activities in the bank throughout the year, from both internal and ext[...]
Primarily, you act as a primary point of contact for application teams, prioritizing and triaging SAST Security scan results, and communicating the needs of application teams to strategic security leadership. As the vital link between [...]