[Applicants: Be among the first 25 applicants | Industry: IT Services and IT Consulting | Type: Full-time | Level: Mid-Senior level] Join Centorrino Technologies: Innovate, Grow, and Thrive with Us!At Centorrino…
Read full description
[Applicants: Be among the first 25 applicants | Industry: IT Services and IT Consulting | Type: Full-time | Level: Mid-Senior level] Join Centorrino Technologies: Innovate, Grow, and Thrive with Us!At Centorrino Technologies (CT), we’re more than ju
[Applicants: Be among the first 25 applicants | Industry: IT Services and IT Consulting | Type: Full-time | Level: Mid-Senior level] Join Centorrino Technologies: Innovate, Grow, and Thrive with Us!At Centorrino…
Read full description
[Applicants: Be among the first 25 applicants | Industry: IT Services and IT Consulting | Type: Full-time | Level: Mid-Senior level] Join Centorrino Technologies: Innovate, Grow, and Thrive with Us!At Centorrino Technologies (CT), we're more than ju
días — The Network Engineer plays a key role in maintaining reliable enterprise networks through effective incident response, configuration management, documentation, ...
[Applicants: Be among the first 25 applicants | Industry: IT Services and IT Consulting | Type: Contract | Level: Associate] Join Centorrino Technologies: Innovate, Grow, and Thrive with Us!At Centorrino Technologies…
Read full description
[Applicants: Be among the first 25 applicants | Industry: IT Services and IT Consulting | Type: Contract | Level: Associate] Join Centorrino Technologies: Innovate, Grow, and Thrive with Us!At Centorrino Technologies (CT), we're more than just tech—
Our Security Engineers act as a technical escalation point for the Security Analysts within their team. Ensure detection coverage aligns with MITRE ATT&CK, Essential Eight, Microsoft best practice and customer security…
Read full description
Our Security Engineers act as a technical escalation point for the Security Analysts within their team. Ensure detection coverage aligns with MITRE ATT&CK, Essential Eight, Microsoft best practice and customer security requirements.