Job Title: Application Administrator, Intermediate- IT Job Summary The Intermediate Application Administrator position is responsible for 2nd level support of all assigned applications, this position will serve as a subject matter expe[...]
Developing tools to streamline operations as we scale to reduce operational load and improve our overall operational posture. Influencing & driving operational excellence and best practices within the organization.Identifying ways to i[...]
Description Join our dynamic Regulatory complaints team where your expertise will directly shape TELUS's relationship with Canada's telecommunications regulators and, most importantly, our customers. We're not just complaint handlers - we're
Other location
WHAT DO YOU NEED TO SUCCEED?Must have:Bachelor’s degree (or equivalent) in Computer Science, Information Security or related field, and 5+ years’ experience as a cyber intelligence analyst, incident responder, threat hunter, malwar[...]
Along with a competitive base salary and variable pay opportunities, we offer a wide array of initiatives that differentiate us as a people-first organization. On top of our regular paid vacation days, some examples include: $4,000 per[...]
Other locations
This individual is responsible for the preparation and testing of finished concrete products for routine testing and for the maintenance of assigned laboratory equipment. Reasonable accommodations may be made to enable qualified indivi[...]
Job SummaryJob DescriptionJob DescriptionWhat is the opportunity?Design Wealth Management Technology architecture (Solution Architecture). Partner with IT, Operations and business stakeholders to lead development of the end-to-end technical solution
DESCRIPTIONWe are building GenAI based shopping assistant for Amazon. We reimage Amazon Search with an interactive conversational experience that helps you find answers to product questions, perform product comparisons, receive personalized product
Conduct in-depth forensics analysis on compromised Windows/Linux/MacOS operating systems Correlate data from network logs and disk logs, developing threat intelligence based on the artifacts and indictors of compromise during investiga[...]