7 Empregos para Arquitetura Da Informação - Brasil

Arquitetura Segurança da Informação - Open Finance - 127283

Barueri, São Paulo GFT Group

Publicado há 22 dias atrás

Trabalho visualizado

Toque novamente para fechar

Descrição Do Trabalho

O que buscamos:

Profissional de nível Arquitetura que atue com (Open Finance).

Atuar no desenho, avaliação e validação de soluções de Segurança da Informação para a jornada de Open Finance, garantindo conformidade com regulamentações do Banco Central, padrões de interoperabilidade e requisitos de privacidade.

Desenvolver e manter arquiteturas seguras para APIs e integrações do Open Finance, alinhadas ao OpenID Financial-grade API (FAPI) e Open Banking Brasil.

Conduzir modelagem de ameaças e definição de requisitos de segurança em integrações entre instituições participantes.

Garantir conformidade com normas Bacen, LGPD, PCI-DSS e padrões de segurança de APIs.

Apoiar testes de segurança (SAST, DAST, API Security Testing) antes da entrada em produção.

Participar de fóruns técnicos de interoperabilidade e segurança.

Requisitos e qualificações;

  • Experiência em arquitetura de segurança para APIs, OAuth 2.0, mTLS e certificação digital;
  • Conhecimento em OpenID Connect, FAPI, Brasil API Standards;
  • Domínio de frameworks como SABSA, NIST CSF e OWASP ASVS.

Diferenciais:

  • Certificações OpenID Foundation, API Security ou CISM/CISSP;
  • Experiência prévia em implementação de Open Finance no Brasil.
Descrição comportamental:

Procuramos uma pessoa que:

  • Goste de trabalhar em equipe e seja colaborativa em suas atribuições;
  • Tenha coragem para se desafiar e ir além, abraçando novas oportunidades de crescimento;
  • Transforme ideias em soluções criativas e busque qualidade em toda sua rotina;
  • Tenha habilidades de resolução de problemas ;
  • Possua habilidade e se sinta confortável para trabalhar de forma independente e gerenciar o próprio tempo ;
  • Tenha interesse em lidar com situações adversas e inovadoras no âmbito tecnológico.

Big enough to deliver – small enough to care.

#VempraGFT

#VamosVoarJuntos

#ProudToBeGFT

#J-18808-Ljbffr
Desculpe, este trabalho não está disponível em sua região

Engenheiro de Tecnologia da Informação - Arquitetura de Soluções

beBeeQualidade

Hoje

Trabalho visualizado

Toque novamente para fechar

Descrição Do Trabalho

Arquiteta de Soluções Senior

Desenvolva a arquitetura dos sistemas backend com foco em escalabilidade, manutenibilidade e testabilidade.

Desculpe, este trabalho não está disponível em sua região

Especialista em Arquitetura de Segurança da Informação

São Paulo, São Paulo XP, Inc.

Publicado há 6 dias atrás

Trabalho visualizado

Toque novamente para fechar

Descrição Do Trabalho

Overview

Especialista em Arquitetura de Segurança da Informação – São Paulo, SP.

A XP Inc. é uma das maiores instituições financeiras independente do Brasil, dona das marcas XP, Rico, Clear, XP Educação, InfoMoney, entre outras. Com mais de 4,6 milhões de clientes ativos e um valor superior a R$ 1,1 trilhão de ativos sob custódia, há 24 anos vem transformando o mercado financeiro para melhorar a vida das pessoas.

Com uma cultura marcante guiada por quatro valores - Sonho Grande, Espírito Empreendedor, Foco no Cliente e Mente Aberta - a XP Inc. está sempre em busca dos melhores talentos que têm ambição de fazer o impossível.

Sobre a Oportunidade

Estamos em busca de um(a) Especialista em Arquitetura de Segurança da Informação para fortalecer nosso time e atuar na proteção de projetos estratégicos de alto impacto. Neste papel, você será responsável por definir requisitos de segurança, avaliar e recomendar controles técnicos e processuais, além de garantir que novas soluções e iniciativas estejam alinhadas às melhores práticas e normas de segurança. Se você é apaixonado por cyber security, gosta de atuar de forma estratégica e colaborativa, e quer fazer parte de um ambiente dinâmico, inovador e desafiador, essa é a oportunidade perfeita para você!

  • Vivência em projetos de segurança desde a sua concepção;
  • Conhecimento sólido em segurança em Azure Cloud;
  • Conhecimento sólido em redes de computadores de alta complexidade;
  • Capacidade de traduzir requisitos de segurança em soluções práticas e eficientes;
Diferenciais
  • Vivência em projetos de segurança no mercado financeiro;
  • Conhecimento em arquitetura de segurança envolvendo inteligência artificial;
  • Experiência com auditoria da SOX (Sarbanes-Oxley Act) e PQO (Programa de Qualificação Operacional);
  • Inglês avançado para comunicação com parceiros e fornecedores.
Desafios e Impacto
  • Definir padrões, diretrizes e requisitos de segurança para novos projetos, produtos e serviços;
  • Realizar análises de risco e apoiar na priorização de medidas de mitigação;
  • Garantir segurança desde a concepção (Security by Design) em soluções on-premises e em nuvem;
  • Colaborar com times de tecnologia e negócios para alinhar segurança com viabilidade técnica;
  • Apoiar na implementação de hardening e boas práticas de configuração segura;
  • Manter-se atualizado sobre tendências, ameaças e novas tecnologias de segurança;
Processo de seleção
  • Triagem inicial: Análise do currículo para verificar a adequação às qualificações e requisitos da vaga.
  • Testes gerais: Avaliação do alinhamento cultural com o teste da Mindsight e teste de raciocínio lógico da Predictive Index.
  • Entrevista com a equipe de Recrutamento: Discussão sobre as expectativas em relação à vaga e aos objetivos profissionais.
  • Avaliação técnica: Entrevista focada nas habilidades específicas necessárias para a função.
  • Entrevista com a liderança/stakeholders: Discussão sobre sua visão e como você pode contribuir para a equipe e a empresa.
  • Oferta: Apresentação da proposta de trabalho, incluindo detalhes sobre remuneração e benefícios.
Benefícios

Saúde e bem-estar:

  • Plano de saúde sem coparticipação (inclusive, para dependentes)
  • iFood Benefícios (VA e VR flexível)
  • Licença parental: maternidade de 6 meses e paternidade de 20 dias
  • Auxílio Creche

Vida Financeira

  • Assessoria de Investimentos
  • Cartão XP Visa Infinite sem anuidade
  • Crédito (consignado, home equity, CCB Imobiliário, etc.)
Modelo de Trabalho

O nosso modelo de trabalho varia de acordo com a função, podendo ser totalmente presencial para frentes de negócio e mais flexível para outras equipes. Seguimos um modelo com mais frequência presencial, mas sempre guiado por flexibilidade e autonomia com a responsabilidade da nossa cultura empreendedora.

Aqui na XP Inc., valorizamos as interações pessoais e acreditamos no uso do escritório como uma ferramenta para potencializar nossas relações no trabalho.

Candidatar a esta vaga

Este texto descreve o formulário de candidatura com diversas perguntas e informações solicitadas para o processo seletivo.

Observação: Este conteúdo inclui perguntas sobre localização, formação, datas de início e término, perfil no LinkedIn, CPF, disponibilidade de trabalho presencial/híbrido, experiência em segurança, conhecimento em Azure Cloud, redes de computadores, IA em arquitetura de segurança, fluência em inglês, identidade de gênero, raça/etnia, deficiência, entre outros, bem como informações de discriminação, privacidade de dados e acessibilidade.

#J-18808-Ljbffr
Desculpe, este trabalho não está disponível em sua região

ANALISTA DE SEGURANÇA DA INFORMAÇÃO SENIOR (Arquitetura / Projetos)

São Paulo, São Paulo TOTVS

Publicado há 8 dias atrás

Trabalho visualizado

Toque novamente para fechar

Descrição Do Trabalho

ANALISTA DE SEGURANÇA DA INFORMAÇÃO SENIOR (Arquitetura / Projetos)

Garantir a eficiência e efetividade dos controles de segurança para os clientes TOTVS hospedados em Cloud. Referência técnica da equipe de segurança.

Responsabilidades e atribuições
  • Perfil hands-on técnico e generalista, atuará no time de arquitetura sendo responsável por planejar e atuar nos projetos de segurança da informação de Cloud. Definir as diretrizes de segurança que as demais áreas de Cloud devem seguir em seus projetos, apontando os riscos e implementando os controles mitigatórios garantindo a evolução contínua.
  • Atuará fortemente com demais colaboradores em equipe multidisciplinar (redes, hardware e virtualização, devops/automações, banco de dados, storage, backup, OS, desenvolvedores, e nuvens públicas), permeando por discussões técnicas de arquitetura, relacionamento com fornecedores e clientes internos.
  • RESPONSABILIDADES
  • Direcionar tecnicamente, os demais membros da equipe de segurança, com visão multidisciplinar nos principais domínios de segurança.
  • Promover um ambiente mais seguro em Cloud, abordando com visão macro (generalista) e holística todas as disciplinas de segurança da informação no ambiente;
  • Implementar novas soluções de segurança da informação testando, planejando, executando, apoiando e acompanhando as atividades necessárias;
  • Facilitar o melhor aproveitamento das soluções implementadas documentando, orientando e acompanhando a equipe de operações que mantém as soluções no ar
  • Propor inovação dos processos e ferramentas tecnológicas de segurança da informação;
  • Estabelecer os controles de segurança da informação que devem ser seguidos pelas demais áreas da TOTVS CLOUD definindo as premissas conceituais e tecnológicas comuns a todas as áreas;
  • Assistir as demais áreas de Cloud, avaliando possíveis brechas de segurança em seus projetos e processos;
Requisitos e qualificações
  • Arquitetura de redes, modelo TCP/IP e SDN;
  • Arquitetura de sistemas operacionais Windows e Linux;
  • Conceitos de gestão de acessos tais como AAA, MFA, RBAC, IdP e protocolos de autenticação (SAML, OAuth, Open ID Connect e LDAP);
  • Conceitos de criptografia;
  • Modelagem de ameaças e conhecimento na anatomia de ataques cibernéticos;
  • Domínio em soluções tecnológicas de SegInfo, alguns exemplos: IPS, SIEM/SOAR, DLP, FWNG, EDR, Allowlisting, PSM, Anti DDoS, Hardening, Zero Trust, WAF, DAM, FIM, etc;
  • Arquitetura de softwares e bancos de dados;
  • Conceitos de multi-tenância, modelo de responsabilidade compartilhada e de entrega de serviços (IaaS, PaaS e SaaS);
  • Serviços de nuvem pública (Ex: AWS, Azure e GCP);
  • Ferramentas de scan de vulnerabilidades (infra e aplicação);
  • Familiaridade com scripts / linguagens de programação (ex: Powershell, Python, bash);
  • Capacidade analítica para resolução de problemas;
  • Visão holística para entendimento do negócio como um todo;
  • Ser comunicativo e demonstrar clareza de objetivos;
  • Planejamento e gestão de projetos;
  • Autodidata;
  • Trabalho em equipe e boa comunicação;
Formação
  • Graduação nas áreas de Ciências da Computação ou afins;
  • Desejável certificações de segurança da informação (Ex: CompTIA Security+, CEH, CCSK, etc);

#J-18808-Ljbffr
Desculpe, este trabalho não está disponível em sua região

Arquitetura em Segurança da Informação - Open Finance - 127283

GFT Technologies

Publicado há 2 dias atrás

Trabalho visualizado

Toque novamente para fechar

Descrição Do Trabalho

Arquitetura em Segurança da Informação - Open Finance

Profissional de nível Arquitetura que atue com (Open Finance) .

Atuar no desenho, avaliação e validação de soluções de Segurança da Informação para a jornada de Open Finance, garantindo conformidade com regulamentações do Banco Central, padrões de interoperabilidade e requisitos de privacidade.

Desenvolver e manter arquiteturas seguras para APIs e integrações do Open Finance, alinhadas ao OpenID Financial-grade API (FAPI) e Open Banking Brasil.

Conduzir modelagem de ameaças e definição de requisitos de segurança em integrações entre instituições participantes.

Garantir conformidade com normas Bacen, LGPD, PCI-DSS e padrões de segurança de APIs.

Apoiar testes de segurança (SAST, DAST, API Security Testing) antes da entrada em produção.

Participar de fóruns técnicos de interoperabilidade e segurança.

Requisitos e qualificações;

  • Experiência em arquitetura de segurança para APIs, OAuth 2.0, mTLS e certificação digital;
  • Conhecimento em OpenID Connect, FAPI, Brasil API Standards;
  • Domínio de frameworks como SABSA, NIST CSF e OWASP ASVS.

Diferenciais:

  • Certificações OpenID Foundation, API Security ou CISM/CISSP;
  • Experiência prévia em implementação de Open Finance no Brasil.

Descrição comportamental:

Procuramos uma pessoa que:

  • Goste de trabalhar em equipe e seja colaborativa em suas atribuições;
  • Tenha coragem para se desafiar e ir além, abraçando novas oportunidades de crescimento;
  • Transforme ideias em soluções criativas e busque qualidade em toda sua rotina;
  • Tenha habilidades de resolução de problemas;
  • Possua habilidade e se sinta confortável para trabalhar de forma independente e gerenciar o próprio tempo;
  • Tenha interesse em lidar com situações adversas e inovadoras no âmbito tecnológico.

#J-18808-Ljbffr
Desculpe, este trabalho não está disponível em sua região

Arquitetura de Segurança da Informação - Exp. Seg. Financeiro

GFT Technologies

Publicado há 16 dias atrás

Trabalho visualizado

Toque novamente para fechar

Descrição Do Trabalho

Arquitetura de Segurança da Informação - Exp. Seg. Financeiro Talent Acquisition | Tech Recruiter | Embaixadora GFT | Consultora de Recolocação Tech

Com mais de 35 anos de mercado e localizada em 16 países, a GFT emprega mais de 10.000 pessoas ao redor do mundo sendo 3.000 pessoas no Brasil.

Aqui, a diversidade, a igualdade e a inclusão estão no centro e garantir um ambiente de trabalho seguro para todas as pessoas faz parte de quem somos.

Promovemos uma cultura de desenvolvimento e crescimento pautadas no nosso pilar de Continuous Scaled Learning porque acreditamos o uso inteligente da tecnologia é a chave para o sucesso nesse mundo digital.

Profissional de nível Arquitetura que atue com Segurança da Informação.

Requisitos e Qualificações:

Atuar no desenho, avaliação e validação de soluções de Segurança da Informação para a jornada de Open Finance, garantindo conformidade com regulamentações do Banco Central, padrões de interoperabilidade e requisitos de privacidade.

Desenvolver e manter arquiteturas seguras para APIs e integrações do Open Finance, alinhadas ao OpenID Financial-grade API (FAPI) e Open Banking Brasil. Conduzir modelagem de ameaças e definição de requisitos de segurança em integrações entre instituições participantes. Garantir conformidade com normas Bacen, LGPD, PCI-DSS e padrões de segurança de APIs. Apoiar testes de segurança (SAST, DAST, API Security Testing) antes da entrada em produção. Participar de fóruns técnicos de interoperabilidade e segurança.

Experiência em arquitetura de segurança para APIs, OAuth 2.0, mTLS e certificação digital;

Conhecimento em OpenID Connect, FAPI, Brasil API Standards;

Domínio de frameworks como SABSA, NIST CSF e OWASP ASVS.

Diferenciais:

Certificações OpenID Foundation, API Security ou CISM/CISSP. Experiência prévia em implementação de Open Finance no Brasil.

Descrição comportamental:

Procuramos uma pessoa que:

  • Goste de trabalhar em equipe e seja colaborativa em suas atribuições;
  • Tenha coragem para se desafiar e ir além, abraçando novas oportunidades de crescimento;
  • Transforme ideias em soluções criativas e busque qualidade em toda sua rotina;
  • Tenha habilidades de resolução de problemas ;
  • Possua habilidade e se sinta confortável para trabalhar de forma independente e gerenciar o próprio tempo ;
  • Tenha interesse em lidar com situações adversas e inovadoras no âmbito tecnológico.

O que oferecemos:

  • Cartão multi-benefícios – você escolhe como e onde utilizar;
  • Bolsas de Estudos para cursos de Graduação, Pós, MBA e Idiomas;
  • Programas de incentivo à Certificações;
  • Horário de trabalho flexível;
  • Plano personalizado de carreira e possibilidade de carreira internacional;
  • Salários competitivos;
  • Avaliação de desempenho anual com possibilidade de bonificação;
  • Previdência Privada;
  • Assistência Médica;
  • Assistência Odontológica;
CAS | Analista de Segurança da Informação JR Analista de Cybersecurity e Prevenção a Fraude Analista de Segurança da Informação - ISO 27001 e Assessments Analista de Segurança da Informação Pleno CAS | Coordenação de Segurança da Informação - SOC Analista de Cibersegurança SR (Proteção de Borda e PKI) CAS | Analista de Estratégia e Governança de Segurança da Informação (Preferencialmente para mulheres) Analista Segurança da Informação Pleno | Parceiros de Segurança da Informação Analista de Segurança da Informação Pleno Especialista de Segurança da Informação (Governança)

#J-18808-Ljbffr
Desculpe, este trabalho não está disponível em sua região

Especialista em Segurança da Informação (Projetos, Arquitetura e Pré-venda) Brazil (BR) - São Paulo/

São Paulo, São Paulo HUNT IT - Recrutamento Especializado para TI

Publicado há 16 dias atrás

Trabalho visualizado

Toque novamente para fechar

Descrição Do Trabalho

Telefone

E-mail

Nerdin Vagas de TI asks for your consent to use your personal data to:
  • Personalised advertising and content, advertising and content measurement, audience research and services development
  • Store and/or access information on a device

Data preferences

You can choose how your personal data is used. Vendors want your permission to do the following:

Store and/or access information on a device

Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you).

Create profiles for personalised advertising

Information about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities.

Use profiles to select personalised advertising

Advertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects.

Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.

Use profiles to select personalised content

Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects. This can for example be used to adapt the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests.

Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns.

Measure content performance

Information regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you.

Understand audiences through statistics or combinations of data from different sources

Reports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents).

Develop and improve services

Information about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers.

Use limited data to select content

Content presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type, or which content you are (or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).

Ensure security, prevent and detect fraud, and fix errors

Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example, regarding advertising, ad clicks by bots), and ensure systems and processes work properly and securely. It can also be used to correct any problems you, the publisher or the advertiser may encounter in the delivery of content and ads and in your interaction with them.

Deliver and present advertising and content

Certain information (like an IP address or device capabilities) is used to ensure the technical compatibility of the content or advertising, and to facilitate the transmission of the content or ad to your device.

The choices you make regarding the purposes and entities listed in this notice are saved and made available to those entities in the form of digital signals (such as a string of characters). This is necessary in order to enable both this service and those entities to respect such choices.

Match and combine data from other data sources

Information about your activity on this service may be matched and combined with other information relating to you and originating from various sources (for instance your activity on a separate online service, your use of a loyalty card in-store, or your answers to a survey), in support of the purposes explained in this notice.

In support of the purposes explained in this notice, your device might be considered as likely linked to other devices that belong to you or your household (for instance because you are logged in to the same service on both your phone and your computer, or because you may use the same Internet connection on both devices).

Identify devices based on information transmitted automatically

With your acceptance, your precise location (within a radius of less than 500 metres) may be used in support of the purposes explained in this notice.

You can choose your data preferences. This site or app wants your permission to do the following:

Site or app

Store and/or access information on a device

Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you).

Create profiles for personalised advertising

Information about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities.

Use profiles to select personalised advertising

Advertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects.

Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.

Use profiles to select personalised content

Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects. This can for example be used to adapt the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests.

Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns.

Information regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you.

Understand audiences through statistics or combinations of data from different sources

Reports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents).

Information about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers.

How this consent management platform (CMP) works:

CMP privacy choices

Storage, duration, and usage details

The choices you make with this CMP regarding the purposes and entities will affect how personalized advertising is presented to you. We need to store these choices to respect them on future visits, and they are stored differently based on the type of site or app you're using:

  • For sites , your choices are saved in a cookie named “FCCDCF” for a maximum duration of 390 days.
  • For apps , your choices are saved in device storage prefixed by “IABTCF_”. Your choices will be invalidated after 390 days and overwritten once you make new privacy choices on this app.
  • For accelerated mobile page (AMP) sites , your choices are saved in local storage prefixed by “amp-store”. Your choices will be invalidated after 390 days and overwritten once you make new privacy choices on this site.

Vendors can use your data to provide services. Declining a vendor can stop them from using the data you shared.

Exponential Interactive, Inc d/b/a VDX.tv

Data collected and processed: IP addresses, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data, Precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device identifiers, Non-precise location data, Precise location data, Users’ profiles

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Non-precise location data, Users’ profiles

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data, Precise location data

Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device identifiers, Precise location data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Privacy choices

Data collected and processed: IP addresses, Device identifiers, Non-precise location data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data, Precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Non-precise location data, Precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device identifiers, Authentication-derived identifiers, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Integral Ad Science (incorporating ADmantX)

Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Precise location data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, User-provided data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Non-precise location data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Probabilistic identifiers, Non-precise location data

Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, Non-precise location data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Precise location data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, User-provided data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device identifiers, Browsing and interaction data, User-provided data, Users’ profiles, Privacy choices

Adobe Audience Manager, Adobe Experience Platform

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data, Precise location data, Privacy choices

Data collected and processed: IP addresses, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics

Data collected and processed: Device characteristics, Browsing and interaction data

Data collected and processed: Browsing and interaction data

Data collected and processed: IP addresses

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices

Data collected and processed: IP addresses, Device identifiers, Privacy choices

Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, Non-precise location data, Privacy choices

Data collected and processed: IP addresses

Data collected and processed: IP addresses, Device identifiers

Data collected and processed: IP addresses, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Privacy choices

Marketing Science Consulting Group, Inc. #J-18808-Ljbffr
Desculpe, este trabalho não está disponível em sua região
Seja o primeiro a saber

Sobre o mais recente Arquitetura da informação Empregos em Brasil !

Locais próximos

Outros empregos perto de mim

Indústria

  1. workAdministrativo
  2. ecoAgricultura e Florestas
  3. schoolAprendizagem e Estágios
  4. apartmentArquitetura
  5. paletteArtes e Entretenimento
  6. paletteAssistência Médica
  7. diversity_3Assistência Social
  8. diversity_3Atendimento ao Cliente
  9. flight_takeoffAviação
  10. account_balanceBanca e Finanças
  11. spaBeleza e Bem-Estar
  12. shopping_bagBens de grande consumo (FMCG)
  13. restaurantCatering
  14. point_of_saleComercial e Vendas
  15. shopping_cartCompras
  16. constructionConstrução
  17. supervisor_accountConsultoria de Gestão
  18. person_searchConsultoria de Recrutamento
  19. person_searchContábil
  20. brushCriativo e Digital
  21. currency_bitcoinCriptomoedas e Blockchain
  22. child_friendlyCuidados Infantis
  23. shopping_cartE-commerce e Redes Sociais
  24. schoolEducação e Ensino
  25. boltEnergia
  26. medical_servicesEnfermagem
  27. foundationEngenharia Civil
  28. electrical_servicesEngenharia Eletrotécnica
  29. precision_manufacturingEngenharia Industrial
  30. buildEngenharia Mecânica
  31. scienceEngenharia Química
  32. biotechFarmacêutico
  33. gavelFunção Pública
  34. gavelGerenciamento
  35. gavelGerenciamento de Projetos
  36. gavelHotelaria e Turismo
  37. smart_toyIA e Tecnologias Emergentes
  38. home_workImobiliário
  39. handymanInstalação e Manutenção
  40. gavelJurídico
  41. gavelLazer e Esportes
  42. clean_handsLimpeza e Saneamento
  43. inventory_2Logística e Armazenamento
  44. inventory_2Manufatura e Produção
  45. campaignMarketing
  46. local_hospitalMedicina
  47. local_hospitalMídia e Relações Públicas
  48. constructionMineração
  49. medical_servicesOdontologia
  50. sciencePesquisa e Desenvolvimento
  51. local_gas_stationPetróleo e Gás
  52. emoji_eventsRecém-Formados
  53. groupsRecursos Humanos
  54. securitySegurança da Informação
  55. local_policeSegurança Pública
  56. policySeguros
  57. diversity_3Serviços Sociais
  58. directions_carSetor Automotivo
  59. wifiTelecomunicações
  60. psychologyTerapia
  61. codeTI e Software
  62. local_shippingTransporte
  63. local_shippingVarejo
  64. petsVeterinária
Ver tudo Arquitetura da informação Empregos