Få nye jobs på e-mail
- ...fast in a highly regulated industry. That combination means security isn't a side quest. It is essential to our mission. Lunar is revolutionizing... ...surface; including cloud and endpoint protection, enabling secure use of AI solutions, incident response, compliance, and...
- ...til rådgivning, der er anvendelig, troværdig og realistisk. Du vil arbejde på tværs af Lakesides tre aktivitetsområder - strategi, IT-arkitektur og projektstyring - med et naturligt tyngdepunkt i det rådgivende og strategiske arbejde. Opgaverne vil ofte være inden...
- ...Internal IT søger 3 Student Workers til vores lokationer i Fredericia, Silkeborg og Århus. Hvis du er interesseret i IT og har lyst til at yde god kundeservice, kunne du være den nye kollega på holdet. Om Internal IT Internal IT i Bankdata er fordelt på vores lokationer...
- ...Er du typen, der tager ejerskab for komplekse IT-miljøer og først slipper opgaven, når løsningen er gennemtænkt, implementeret og dokumenteret? Trives du med større tekniske opgaver, hvor arkitektur, sikkerhed og stabil drift går hånd i hånd – og hvor du får det samlede...
- ...IT SUPPORTER - REMOTE & ON-SITE SUPPORT AARHUS Vil du være med til at sikre stabil IT-drift og yde førsteklasses support til brugere i hverdagen? Vi søger en IT Supporter , der trives med både remote support og on-site support , og som har lyst til...
- ...hverdagen bedre for både undervisere og studerende på Aarhus Universitet. Dine arbejdsopgaver Supportere undervisere i brugen af IT i undervisningen (primært Brightspace) via telefon og skriftlige henvendelser - og gøre komplekse problemer forståelige og...
- ...Advansor is looking for an ERP Application Specialist for IT & Digitalization to be part of a strategic project transitioning... ...deliveries. Continuously assist in assessing and reducing IT security risks. Your Qualifications We imagine that you are a former...
- ...Truesec, where we help our customers design, implement, and operate secure and scalable identity solutions across complex hybrid and cloud environments. We work closely with our customers’ security, IT, and business teams, delivering IAM services spanning Identity...
- ...and compliance obligations. The Role As a Senior Strategic Security Advisor at Truesec, your purpose is to help our clients... ...at the forefront of fighting cybercrime instead of reading about it in the news. This is your chance to be part of an exciting journey...
- ...Advansor is looking for a PLM Application Specialist for IT & Digitalization to take responsibility for the maintenance and... ...Digitalization projects. Continuously assist in assessing and reducing IT security risks. Your Qualifications We imagine that you have...
- ...collaboration with our delivery teams and vendors. It is important for you to understand the... ...challenges and concerns within the IT security industry and recommend potential... ...company. Our vision is to contribute to a secure digital society. We offer our clients a wide...
- ...people's lives every day. And we need people like you to make it happen. We empower you to reach your potential with opportunities... ...the customers’ needs and providing value-based arguments to secure order intake in a competitive market. You will collaborate with...
- ...optimisation of technology solutions Collaborate with external IT partners and vendors Digitalisation & development Drive... ...Science Data Science or Artificial Intelligence Cyber Security or Computer Engineering Cand.it or Cand.merc.(IT) (or equivalent...
- ...Norwegian market, where you are given a unique opportunity to help secure our position as a market-leading supplier of sustainable CO2... ...frequent travel within your region is a vital part of the role, it is essential that you enjoy being on the road. You will report...
- ...Systemudvikling, rådgivning om digitalisering og GIS samt vores egne it-produkter, som vi tilpasser efter vores kunder konkrete behov... ...Interdisciplinary advice for projects with high demands for stable and secure power supply, as well as solutions for wastewater, drainage,...
- ...including focus on sourcing strategy, second sources and supply security . Cross-functional coordination with, firmware, software, mechanics... ...take responsibility not only for your own design – but for how it performs in the business context. You know when something is...
- ...software must work. Lives, livelihoods, and brand promise depend on it. In summer 2025 we sketched the first contours of our target... ...As Principal Solution Architect in Group Architecture & Security, you stand on the stage with the Head of Group Architecture & Security...
- ...international organisation? JYSK are in the middle of a significant IT transformation. Over the past few years, they have moved to a... ...or mental ability, ethnicity, and experience. Together, we secure our inclusive culture that encourages, supports, and celebrates the...
- ...working. We are profitable and growing. We have secured 60% target market share in Denmark, are... ...that is leaning heavily into AI through its defining scale-up phase. What You Will... ...will inherit a team of ~23 people and evolve it into a scalable system with clear...
- ...you want to become an expert in a growing security discipline within one of the leading... ...logic, you’ll play a key role in delivering secure and efficient identity management for our... ...fighting cybercrime instead of reading about it in the news. This is your chance to be...
- ...a Cloud Service Provider. If Cloud Native , to you, means “it only runs on Azure,” then this is not your calling. If Cloud... ...Where You'll Sit You will be working in Group Architecture & Security and collaborating across all of SOS. You will experience that you...
- ...~ Ability to translate business requirements into scalable, secure, and supportable D365 Commerce and D365 F&O solution designs... ...workshops, managing scope, and driving consensus among business, IT, and partners; communicates clearly with exec and operational audiences...
- ...Evidi is strengthening its corporate governance and hiring a Lead Group GRC Manager to... ...you will drive how governance, risk, and security are embedded into Evidi’s operating model.... ...Qualifications Bachelor’s degree in IT/computer science or equivalent experience....
- ...September 1st 2026 (or as agreed), with funding secured by a European Research Council (ERC) grant... ...visual information processing and its modulation. Your typical activities will... ...for postdocs at AU. You can read more about it here: At the Faculty of Natural Science...
- ...structures large volumes of data for law enforcement and national security organisations worldwide. These are not typical web applications... ...you're helping shape them. This is not a standard CRUD setup — it's a distributed platform with continuous data flows, multiple services...
- ...closely with development teams, operations, security specialists, product owners, leadership... ...a key architectural project, guiding it from initial analysis through to execution... ...Ability to translate business needs into secure, scalable technical solutions As a person...
- ...The position is available for a period of three years. Food security, climate change and loss of biodiversity represent three of today... ...of reference before the application deadline. Unfortunately, it is not possible to ensure that letters of reference received after...
- ...mentoring programme support to develop scientific networks and to secure interdisciplinary research at the highest level As part of the... ...of reference before the application deadline. Unfortunately, it is not possible to ensure that letters of reference received...
- ...About Columbus At Columbus, you will be joining a global IT consulting company with over 1,500 dedicated professionals. We are... ...transformation, present in 10 countries helping 1,100 customers secure their future by driving growth through data-driven insights and creating...
- ...Reboot Monkey is a global leader in IT solutions, specializing in data center management that simplifies your IT operations. We provide... .../7 support through our smart or remote hands, ensuring seamless, secure, and sustainable service. Our fully remote, round-the-clock...