... , including IAM, vulnerability management, GRC, server and endpoint protection, and hands-on ... aspects of M&A activities and vendor management. Key Responsibilities: Manage and optimize ... Identity and Access Management systems. Conduct vulnerability
21 days ago