BOOLEAN STRING RESULTS
Description | String | Industry |
---|---|---|
ETL Developer | "SQL Server DBA", "Developer", "Etl Developer", "Data Analyst" +Skills:XML, SQL, Database Administration, Microsoft SQL Server, SharePoint, SQL Server Reporting Services (SSRS), Quality Assurance, Database Design, Crystal Reports, Software Documentation, Extract, Transform, Load (ETL), , PostgreSQL, Active Server Pages (ASP), PHP, FTP, Secure File Transfer Protocol (SFTP), Pretty Good Privacy (PGP), Unix, Linux +Skill:XML OR SQL OR Database Administration OR Microsoft SQL Server OR SharePoint OR SQL Server Reporting Services (SSRS) OR Quality Assurance OR Database Design OR Crystal Reports OR Software Documentation OR Extract, Transform, Load (ETL) OR OR PostgreSQL OR Active Server Pages (ASP) OR PHP OR FTP OR Secure File Transfer Protocol (SFTP) OR Pretty Good Privacy (PGP) OR Unix OR Linux | Information Technology & Services |
Security Engineer | "(security AND ("network security" OR encryption OR authentication OR cryptography OR "security compliance" OR "information security" OR "computer security" OR cybersecurity OR "cyber security") AND (malware OR antivirus OR worm OR trojan OR spam OR phishing OR fraud OR exploit OR vulnerability OR pki OR ids OR ips OR "access control" OR audit OR policy OR dlp OR "data loss protection" OR compliance OR cissp OR pci OR risk OR privacy OR identity OR forensics OR intrusion OR attack OR ddos))" | Information Technology & Services |
Data Privacy Consultant | (“Data Privacy Consultant” OR “Data Privacy SME” OR “ Data Privacy Specialist”) AND (CIPM OR CIPT OR CIPP/E OR CISM OR CISSP OR HCISSP) AND (IAPP OR ISACA OR ISC) | Computer & Network Security |
Securing Engineer | Cyber and security AND ("network security" OR encryption OR authentication OR cryptography OR "compliance" OR "information security" OR "computer security" OR cybersecurity OR "cyber security" or INFOSEC) AND (malware OR antivirus OR worm OR trojan OR spam OR phishing OR fraud OR exploit OR vulnerability OR pki OR ids OR ips OR "access control" OR audit OR policy OR dlp OR "data loss protection" OR compliance OR cissp OR pci OR risk OR privacy OR identity OR forensics OR intrusion OR attack OR ddos or DLP) | Computer & Network Security |