Få nye jobs på e-mail
- ...Schur International søger til en nyoprettet stilling en dygtig og nysgerrig kollega, der med direkte reference til virksomhedens IT Security and Operation Manager skal stå i spidsen for Cyber Management. Området omfatter hele Schurs IT-infrastruktur både nationalt og...
- ...Do you want to contribute to protecting society against cyber threats? We are looking for an Identity Security Consultant to join the most supportive team in the Identity & Access Management domain, where your unique skills and perspectives will be valued. About...
- ...Your role will blend strategic planning with hands-on execution to deliver measurable impact. You will: ~ Drive Business Growth: Secure sustainable, profitable growth while expanding market share and strengthening customer partnerships. ~ Shape Sales Strategy:...
- ...the office at least two days per week, combined with days at our office in Vejle and at home. Key responsibilities You will secure a clear and forward-looking overview of resources, projects, and performance across Digital Services and ensure a smooth transition...
- ...Competitive compensation + performance-based bonus. K ey responsibilities Build and convert pipeline across the Nordics Secure new logos and scale revenue with focus on high-value accounts Lead long and complex multi-stakeholder sales cycles from first contact...
- ...Are you motivated by the opportunity to strengthen IT security in an international organisation Do you thrive in a role where you can... ...physical or mental ability ethnicity and experience. Together we secure our inclusive culture that encourages supports and celebrates the...
- ...occurs we handle it efficiently calmly and with a clear structure. You will guide stakeholders through the process keep an overview and secure solid follow-up. When operations run steadily your focus will shift to building and maintaining frameworks that strengthen our...
- ...tens of thousands of users every day. Now we’re looking for a Security Engineer to strengthen security across application,... ...end-users, admin/support tools, internal access) with usable, secure flows on web and mobile. Maintain and evolve our security standards...
- ...because real lives depend on it. Our Philosophy - For too long, security has been treated as a checkbox or a barrier. A process that... ...deep on our solutions running. Resilience Over Walls A secure system assumes that it has been compromised. It assumes that one...
- twoday er den førende partner inden for digital transformation i Nordeuropa med global tilstedeværelse. Med cirka 3.000 teknologieksperter samarbejder vi med nogle af de mest anerkendte private og offentlige organisationer for at levere banebrydende digitale løsninger...
- ...In Prevas we are expanding our Cyber Security group, which is part of our Linux team, with focus on analyzing, advising, implementing... ...like ARM Trustzone, Intel Security Essentials etc. Embedded secure boot concepts: Anchoring chain of trust in hardware both ARM...
- ...operations. We provide hosting space, future-proof upgrades, and 24/7 support through our smart or remote hands, ensuring seamless, secure, and sustainable service. Our fully remote, round-the-clock management frees businesses from supervision hassles, setting new...
- ...memory and neuromorphic computing. Exploring hardware-level security mechanisms based on the intrinsic stochasticity and non-... ...devices and circuits. Designing and evaluating energy-efficient, secure computing systems for AI and edge applications....
- ...knowledge. We support these high standards through teamwork mutual respect and a work culture based on trust that fosters stability and security for all of our employees. Our common goal is to implement outstanding and innovative projects worldwide. Remote Work : No...
- ...energy, power and renewables, chemical and advanced factory automation operate more sustainably while improving productivity, energy security and reliability. With global operations and a comprehensive portfolio of software and technology, we are helping...
- ...in Denmark. So, if you want to become an expert in a growing security discipline within one of the leading technologies, alongside a... ...custom provisioning logic, you’ll play a key role in delivering secure and efficient identity management for our clients. Typical...
- ...operation and maintenance of our offshore wind farm. Furthermore the work preparation and follow-up of all offshore activities as well as securing and coordination of the flow of goods and logistics belong to your area of responsibility. you will be a part of the operations...
- ...Digitalization strategy Lead or support delivery of IT and Digitalization projects. Continuously assist in assessing and reducing IT security risks. Your Qualifications We imagine that you have experience as a PLM Business Solution Architect or PLM Consultant...
- ...clients through the fog of cybersecurity threats, tools, frameworks and legislation requirements. You are someone who enjoys taking security strategy and making it work for the business, and are passionate about making a real difference for the organization. You...
- ...everyone no matter the age gender identity race sexual orientation physical or mental ability ethnicity and experience. Together we secure our inclusive culture that encourages supports and celebrates the diverse voices of our employees. Because a great mix of minds...
- ...and the business Are you passionate about creating robust processes that navigate complex regulations tax requirements and social security obligations across borders As a Mobility Manager you will play a role in safeguarding compliance while enabling smooth international...
- ...attitude, ownership and a can-do mindset are just as important as structure and numbers. Your journey starts here You will secure a stable and efficient flow of goods by optimizing our order portfolio, ensuring availability across 99+ stores and fast-track...
- ...such as Hackathons Exciting evolving technologies and the chance to shape BEUMERs future software development Stability and security in a family-owned company Your profile You are a software developer by nature language-agnostic and motivated by tools and new...
- ...leads, elevate customer experiences and strengthen their margins. The model is working. We are profitable and growing. We have secured 60% target market share in Denmark, are trusted by over 40 of the top 100 dealership groups in DACH, and are seeing 30% YoY growth...
- ...seeking a skilled Safety & Health Coordinator to drive our S&H activities. Our focus is on continuous improvement of our culture to secure that we meet our vision of Zero Accidents and Work-related Injuries. Your task will be to ensure that appropriate systems and...
- ...and standards to eliminate errors and duplicates. Comply with and help define data governance guidelines to ensure data is used securely and correctly. Collaborate with cross-functional teams, including supply chain and service organization, to align data...
- .... We support these high standards through teamwork mutual respect and a working culture based on trust that fosters stability and security for all of our employees. Our common goal is to implement outstanding and innovative projects worldwide. Remote Work : No...
- ...will become one of 60 experts working with an increasing range of industry leading subscription-based services in the areas of Cyber Security advanced Data analytics Equipment monitoring and Hotline. We serve our customers in the after sales market with innovative...
- ...invoice control Take part in projects both internally and externally Support the implementation of the Purchasing strategy Secure accuracy of Master Data on own materials Make sure the factory is provided with the correct supply using forecasting master data...
- ...no matter the age, gender identity, race, sexual orientation, physical or mental ability, ethnicity, and experience. Together, we secure our inclusive culture that encourages, supports, and celebrates the diverse voices of our employees. Because a great mix of minds,...

