ITIL Expertise: Leverage ITIL Foundation or Practitioner certification and knowledge of Incident Management, CSI, and process design to support service delivery. Leadership in Triage Processes: Lead the design and management of triage [...]
Other locations
The Senior Project Manager oversees project planning, execution, and governance, ensuring delivery within scope, budget, and timeline while proactively managing risks and dependencies. This role builds strong relationships with executi[...]
Provide amazing customer and equipment support, from the depot and on-site Build positive relationships with customers in person and communicate well through email, and phone conversations Diagnose issues or technical problems that can[...]
Building and maintaining effective relationships with technology vendorsSourcing potential vendors and negotiating contract termsMonitoring vendor performance and ensuring contractual obligations are metConducting and reviewing vendor [...]
Could you be the Network Security Engineer in Toronto, ON we're looking for? Your future role Take on a new challenge and apply your engineering and cybersecurity expertise in a new cutting-edge field. You'll work alongside innovative,[...]
Position Summary...A Senior Infrastructure Specialist is responsible for maintaining the design and integrity of the internal Infrastructure platforms. They will provide expert technical assistance to team and consulting services to business area to
Ensure weekly EHR data updates for existing Vestrum panel physicians are complete and appropriately loaded into databases and their associated applicationsFor new panel members and new applications, standardize free-text and other unst[...]
NAVBLUE, an Airbus Company, is opening a new position within its Enterprise Hosting Department. The main objective of this entity is to define, provide and support the production environments used by all NAVBLUE's customers. It is divi[...]
Job Description - Data Analyst (YHZ-2025-7130-011776)The initial review of applications will begin on the "Apply by Date" indicated. Applications received after this date may not be considered. Exception: Some positions may remain post[...]
Conduct in-depth forensics analysis on compromised Windows/Linux/MacOS operating systems Correlate data from network logs and disk logs, developing threat intelligence based on the artifacts and indictors of compromise during investiga[...]