With more than 800 consultants working on six continents, Verinon offers tailored solutions to clients. We are specialists in systems-integration around document and content management, collaboration, business intelligence, data warehousing, conversions and interfaces/adapters coupled with a select pool of custom development areas to clients around the globe. We offer a mix of products as well as services around these products which are within our stated areas of specialty.
Our relationship with our clients varies anywhere from one specialist in a form of staff augmentation to full project rollouts for clients where we are developing and deploying across multiple continents. We focus on quality but are aggressive in our costs and timelines by bringing in a mix of delivery options ranging from on-site, off-site, off-shore as well as a mix of hybrid approaches. Our off-shore development teams have earned both an ISO-9001 certification and have been rated CMMi Level 3 capable. Our team is committed to progress where we are well down the path of our CMMi Level 5 validation which we on schedule to earn within the next twelve months.
We have been recognized as one of the fastest growing companies with a recognition that included inclusion into the 2007 group that qualified for the INC 500. Our approach is unique where we recruit both locally and globally for the best resources. Our specialists have origins from each of the habited continents. We embrace and practice diversity not for compliance but out of mere necessity of business.
Functions : IT
Industries : IT/Computers - Hardware, IT/Computers - Software
Skills/Roles I hire for: All IT Skills
level Hiring For: Junior Level, Mid Level, High Level, Top Management
The person filling the IT Security Senior Specialist role will join 3M’s Information Security,Risk & Compliance organization as part of a team focused on the ongoing development & operations of 3M’s global Cybersecurity Operation Center.
Our client, an enterprise Finance based Philippine company, with a multiverse IT transformation at the footprint. They are looking for Mid Level IT Security Officer who will be managing the Information Security Policies of the company.
This analyst will be a member of the IS Security Risk and Compliance team, reporting to the Manager of IS Security Risk and Compliance. This position is responsible for working with the risk assessment team to identify cyber risk enterprise wide
Migrates, updates and verifies data into various systems for use by all personnel and review data deficiencies or errors, correct any incompatibilities, check the output daily, you will generate reports
• Track and follow through all DFG IT Security projects/Initiatives and its delivery • Work closely with DFG IT Security key members and DFG IT COE partner and CIO to ensure all IT Security and Initiatives are aligned with DFG IT and IT Security COE
The SAP Manager is responsible to train and supervise the SAP BASIS Team whose objective is to maintain the SAP systems at optimal performance availability and efficiency. Responsible for managing the vendors, providing support to the environment.
Preferred Qualifications Job Description: This position will support the IT Compliance Department with the establishment and maintenance of all IT compliance programs within the company. Existing programs include SSAE 16 (SOC 1), SOC 2, PCI DSS, PAD
A Business Analyst will work with the end users and support team on managing requirements in relation to Microsoft Dynamics 365. Collaboration with the developers, quality assurance and project stakeholders to meet the desired project goals.
This analyst will be a member of the IS Threat Management team, reporting to the Cybersecurity Manager. This position will be responsible for various technical cybersecurity analyst functions, including vulnerability management.
• Responsible for the analysis and development of simple to complex systems; for the preparation of required documentations and schematic diagrams; for the coding of multiple, related program modules, scripts and/or procedures; for unit, module
The IT Manager responsible and accountable for the smooth running of our computer systems within the limits of requirements, specifications, costs and timelines. Supervise the implementation and maintenance of the company’s computing needs.
We are looking for a skilled Security Engineer to analyze software designs and implementations from a security perspective, and identify and resolve security issues. You will include the appropriate security analysis, defenses and countermeasures
Our client, a large local enterprise Banking company which currently undergoing an IT Digital Transformation. They are looking for Internal IT Auditor who has a relevant experience in creation of IT Audit plans, Risk management and lead by example.
Simple body text this will replace with orginal content