كلما زادت طلبات التقديم التي ترسلينها، زادت فرصك في الحصول على وظيفة!
إليك لمحة عن معدل نشاط الباحثات عن عمل خلال الشهر الماضي:
عدد الفرص التي تم تصفحها
عدد الطلبات التي تم تقديمها
استمري في التصفح والتقديم لزيادة فرصك في الحصول على وظيفة!
هل تبحثين عن جهات توظيف لها سجل مثبت في دعم وتمكين النساء؟
اضغطي هنا لاكتشاف الفرص المتاحة الآن!ندعوكِ للمشاركة في استطلاع مصمّم لمساعدة الباحثين على فهم أفضل الطرق لربط الباحثات عن عمل بالوظائف التي يبحثن عنها.
هل ترغبين في المشاركة؟
في حال تم اختياركِ، سنتواصل معكِ عبر البريد الإلكتروني لتزويدكِ بالتفاصيل والتعليمات الخاصة بالمشاركة.
ستحصلين على مبلغ 7 دولارات مقابل إجابتك على الاستطلاع.
A career in IBM Consulting is built on long-term client relationships and close collaboration worldwide. You'll work with leading companies across industries, helping them shape their hybrid cloud and AI journeys. With support from our strategic partners, robust IBM technology, and Red Hat, you'll have the tools to drive meaningful change and accelerate client impact. At IBM Consulting, curiosity fuels success. You'll be encouraged to challenge the norm, explore new ideas, and create innovative solutions that deliver real results. Our culture of growth and empathy focuses on your long-term career development while valuing your unique skills and experiences.
In this role, you'll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology.
As a Technical Consultant specializing in Data Security, you will help clients manage, customize, configure, and support data security solutions. Your expertise in data security technologies and methodologies will enable you to effectively integrate data security into the client's cybersecurity landscape. Your primary responsibilities will include: * Implement Data Security Solutions: Utilize tools to discover and classify data, protect data at rest and data in transit through encryption, and monitor database activities to prevent data leaks. * Define Data Security Policies: Refine policies for data security technologies to minimize data security risk exposure of client systems. * Provide Risk Insights: Offer insights to reduce and mitigate data security risks, contributing significantly to preventing data leakage and exfiltration from client systems. * Integrate Data Security: Effectively integrate data security into the client's cybersecurity landscape, ensuring comprehensive protection. * Support Client Systems: Deliver customized data security solutions to support client systems and minimize data security risk exposure.
* Data Security Technologies: Exposure to data security technologies and methodologies to effectively integrate data security into the client's cybersecurity landscape. * Data Protection Tools: Experience working with tools to discover and classify data, protect data at rest and data in transit through encryption, and monitor database activities. * Data Security Policy Development: Exposure to defining and refining policies for data security technologies to minimize data security risk exposure of client systems. * Risk Mitigation Strategies: Experience working with insights to reduce and mitigate data security risks, contributing significantly to preventing data leakage and exfiltration from client systems. * Cybersecurity Integration: Exposure to integrating data security into the client's cybersecurity landscape, ensuring comprehensive protection.
* Data Security Methodologies: Exposure to various data security methodologies, enabling effective integration of data security into the client's cybersecurity landscape, and ensuring comprehensive protection. * Advanced Encryption Techniques: Experience working with advanced encryption techniques to protect data at rest and in transit, and knowledge of tools to monitor database activities. * Cybersecurity Frameworks: Exposure to various cybersecurity frameworks, allowing for seamless integration of data security into the client's overall cybersecurity strategy.
لن يتم النظر في طلبك لهذة الوظيفة، وسيتم إزالته من البريد الوارد الخاص بصاحب العمل.