With more than 800 consultants working on six continents, Verinon offers tailored solutions to clients. We are specialists in systems-integration around document and content management, collaboration, business intelligence, data warehousing, conversions and interfaces/adapters coupled with a select pool of custom development areas to clients around the globe. We offer a mix of products as well as services around these products which are within our stated areas of specialty.
Our relationship with our clients varies anywhere from one specialist in a form of staff augmentation to full project rollouts for clients where we are developing and deploying across multiple continents. We focus on quality but are aggressive in our costs and timelines by bringing in a mix of delivery options ranging from on-site, off-site, off-shore as well as a mix of hybrid approaches. Our off-shore development teams have earned both an ISO-9001 certification and have been rated CMMi Level 3 capable. Our team is committed to progress where we are well down the path of our CMMi Level 5 validation which we on schedule to earn within the next twelve months.
We have been recognized as one of the fastest growing companies with a recognition that included inclusion into the 2007 group that qualified for the INC 500. Our approach is unique where we recruit both locally and globally for the best resources. Our specialists have origins from each of the habited continents. We embrace and practice diversity not for compliance but out of mere necessity of business.
Functions : IT
Industries : IT/Computers - Hardware, IT/Computers - Software
Skills/Roles I hire for: All IT Skills
level Hiring For: Junior Level, Mid Level, High Level, Top Management
Our client, an enterprise Finance based Philippine company, with a multiverse IT transformation at the footprint. They are looking for Mid Level IT Security Officer who will be managing the Information Security Policies of the company.
• The IT Security Specialist performs information security technology disciplines and practices to ensure the confidentiality, integrity and availability of information assets in accordance with established standards and procedures
• Track and follow through all DFG IT Security projects/Initiatives and its delivery • Work closely with DFG IT Security key members and DFG IT COE partner and CIO to ensure all IT Security and Initiatives are aligned with DFG IT and IT Security COE
The person filling the IT Security Senior Specialist role will join 3M’s Information Security,Risk & Compliance organization as part of a team focused on the ongoing development & operations of 3M’s global Cybersecurity Operation Center.
Job Description : Organization Background Global Identity and Access Management Administration (GIAM) Operations is an organization within Citi Information Security Office (CISO) with over 700 employees located across the globe. GIAM Operations mana
Preferred Qualifications Job Description: This position will support the IT Compliance Department with the establishment and maintenance of all IT compliance programs within the company. Existing programs include SSAE 16 (SOC 1), SOC 2, PCI DSS, PAD
This analyst will be a member of the IS Security Risk and Compliance team, reporting to the Manager of IS Security Risk and Compliance. This position is responsible for working with the risk assessment team to identify cyber risk enterprise wide
Looking Subject Matter Expert for Vulnerability and Penetration Testing Function
This analyst will be a member of the IS Threat Management team, reporting to the Cybersecurity Manager. This position will be responsible for various technical cybersecurity analyst functions, including vulnerability management.
Job Description : The Info Security Tech Sr Analyst is an intermediate level position responsible for leading efforts to prevent, monitor and respond to information/data breaches and cyber-attacks. The overall objective of this role is to ensure the
Job Description : The Info Sec Prof Senior Analyst is an intermediate level position responsible for leading efforts to prevent, monitor and respond to information/data breaches and cyber-attacks. The overall objective of this role is to ensure the
Performs research and analysis searching for indications of advanced threat actors existing on the network. Analyze available data sources, security tools, and threat trends and lead security monitoring and analysis techniques to identify attacks.
* Perform Security Assessment or audit of client environment based on industry standards like ISO 27001, PCI-DSS, NIST, Data Privacy * Provide recommendations to client based on the result of the security assessment with the goal of improving cl
Responsible for applying information security risk knowledge and expertise to assist with IT information security First Line of Defense activities to help strengthen company's information security posture and ensure regulatory compliance
Simple body text this will replace with orginal content