praca: Ing

Filter results by:
Sortuj według: trafności - daty
Więcej opcji
  • Oferty przyjazne osobom niepełnosprawnym
    Oferty te pochodzą ze strony internetowej, firmy lub serwisu, które określają stanowiska pracy, które mogą zostać objęte przez osoby z określonym stopniem niepełnosprawności. Nie oznacza to w żaden sposób, że oferty bez tego oznaczenia nie są odpowiednie dla osób niepełnosprawnych.
Dodaj swoje CV - zajmie to tylko kilka sekund
Strona 1 - 543 ofert
Polska
  • You are a student or a graduate of a university.
  • You have an analytical aptitude.
  • You like a job that requires meticulousness and reliability.
Polska
  • Knowledge of ITSM tools (e. g.
  • At ING Tech Poland we follow the Agile approach, using flexible frameworks like Scrum and Kanban at our everyday work.
Polska
  • Minimum 2-5 years of total work experience, with a minimum of 6-18 months experience in AML-Transaction Monitoring, preferably in reputed financial services…
Polska
  • Very good knowledge of the recruitment tools supporting the search and selection of candidates,.
  • Recruitment experience in the area of IT and Risk,.
Polska
  • Very good knowledge of the recruitment tools supporting the search and selection of candidates,.
  • Recruitment experience in the area of IT and Risk,.
Polska
  • University degree in computer science or in a related field of study.
  • Experience in administrative work with Windows server systems.
Polska
  • Experience with TETA systems (Constellation, Web).
  • Knowledge of relational database systems and SQL language (preferred Oracle).
Polska
  • Developing and maintaining infrastructure in the field of Messaging,.
  • Solving incidents and problems according to the expected solution time for business…
Polska
  • Good knowledge of Windows and/or Unix/Linux would be plus.
  • Very good communication skills in english (both oral and written).
  • Ability to work in teams.
Polska
  • Very good knowledge of IT security issues at a technical level.
  • Very good knowledge of the mechanisms of vulnerabilities in applications such as SQL Injection,…