7 Empregos para Arquitetura Da Informação - Brasil
Arquitetura Segurança da Informação - Open Finance - 127283
Publicado há 22 dias atrás
Trabalho visualizado
Descrição Do Trabalho
O que buscamos:
Profissional de nível Arquitetura que atue com (Open Finance).
Atuar no desenho, avaliação e validação de soluções de Segurança da Informação para a jornada de Open Finance, garantindo conformidade com regulamentações do Banco Central, padrões de interoperabilidade e requisitos de privacidade.
Desenvolver e manter arquiteturas seguras para APIs e integrações do Open Finance, alinhadas ao OpenID Financial-grade API (FAPI) e Open Banking Brasil.
Conduzir modelagem de ameaças e definição de requisitos de segurança em integrações entre instituições participantes.
Garantir conformidade com normas Bacen, LGPD, PCI-DSS e padrões de segurança de APIs.
Apoiar testes de segurança (SAST, DAST, API Security Testing) antes da entrada em produção.
Participar de fóruns técnicos de interoperabilidade e segurança.
Requisitos e qualificações;
- Experiência em arquitetura de segurança para APIs, OAuth 2.0, mTLS e certificação digital;
- Conhecimento em OpenID Connect, FAPI, Brasil API Standards;
- Domínio de frameworks como SABSA, NIST CSF e OWASP ASVS.
Diferenciais:
- Certificações OpenID Foundation, API Security ou CISM/CISSP;
- Experiência prévia em implementação de Open Finance no Brasil.
Procuramos uma pessoa que:
- Goste de trabalhar em equipe e seja colaborativa em suas atribuições;
- Tenha coragem para se desafiar e ir além, abraçando novas oportunidades de crescimento;
- Transforme ideias em soluções criativas e busque qualidade em toda sua rotina;
- Tenha habilidades de resolução de problemas ;
- Possua habilidade e se sinta confortável para trabalhar de forma independente e gerenciar o próprio tempo ;
- Tenha interesse em lidar com situações adversas e inovadoras no âmbito tecnológico.
Big enough to deliver – small enough to care.
#VempraGFT
#VamosVoarJuntos
#ProudToBeGFT
#J-18808-LjbffrEngenheiro de Tecnologia da Informação - Arquitetura de Soluções
Hoje
Trabalho visualizado
Descrição Do Trabalho
Desenvolva a arquitetura dos sistemas backend com foco em escalabilidade, manutenibilidade e testabilidade.
Especialista em Arquitetura de Segurança da Informação
Publicado há 6 dias atrás
Trabalho visualizado
Descrição Do Trabalho
Overview
Especialista em Arquitetura de Segurança da Informação – São Paulo, SP.
A XP Inc. é uma das maiores instituições financeiras independente do Brasil, dona das marcas XP, Rico, Clear, XP Educação, InfoMoney, entre outras. Com mais de 4,6 milhões de clientes ativos e um valor superior a R$ 1,1 trilhão de ativos sob custódia, há 24 anos vem transformando o mercado financeiro para melhorar a vida das pessoas.
Com uma cultura marcante guiada por quatro valores - Sonho Grande, Espírito Empreendedor, Foco no Cliente e Mente Aberta - a XP Inc. está sempre em busca dos melhores talentos que têm ambição de fazer o impossível.
Sobre a OportunidadeEstamos em busca de um(a) Especialista em Arquitetura de Segurança da Informação para fortalecer nosso time e atuar na proteção de projetos estratégicos de alto impacto. Neste papel, você será responsável por definir requisitos de segurança, avaliar e recomendar controles técnicos e processuais, além de garantir que novas soluções e iniciativas estejam alinhadas às melhores práticas e normas de segurança. Se você é apaixonado por cyber security, gosta de atuar de forma estratégica e colaborativa, e quer fazer parte de um ambiente dinâmico, inovador e desafiador, essa é a oportunidade perfeita para você!
- Vivência em projetos de segurança desde a sua concepção;
- Conhecimento sólido em segurança em Azure Cloud;
- Conhecimento sólido em redes de computadores de alta complexidade;
- Capacidade de traduzir requisitos de segurança em soluções práticas e eficientes;
- Vivência em projetos de segurança no mercado financeiro;
- Conhecimento em arquitetura de segurança envolvendo inteligência artificial;
- Experiência com auditoria da SOX (Sarbanes-Oxley Act) e PQO (Programa de Qualificação Operacional);
- Inglês avançado para comunicação com parceiros e fornecedores.
- Definir padrões, diretrizes e requisitos de segurança para novos projetos, produtos e serviços;
- Realizar análises de risco e apoiar na priorização de medidas de mitigação;
- Garantir segurança desde a concepção (Security by Design) em soluções on-premises e em nuvem;
- Colaborar com times de tecnologia e negócios para alinhar segurança com viabilidade técnica;
- Apoiar na implementação de hardening e boas práticas de configuração segura;
- Manter-se atualizado sobre tendências, ameaças e novas tecnologias de segurança;
- Triagem inicial: Análise do currículo para verificar a adequação às qualificações e requisitos da vaga.
- Testes gerais: Avaliação do alinhamento cultural com o teste da Mindsight e teste de raciocínio lógico da Predictive Index.
- Entrevista com a equipe de Recrutamento: Discussão sobre as expectativas em relação à vaga e aos objetivos profissionais.
- Avaliação técnica: Entrevista focada nas habilidades específicas necessárias para a função.
- Entrevista com a liderança/stakeholders: Discussão sobre sua visão e como você pode contribuir para a equipe e a empresa.
- Oferta: Apresentação da proposta de trabalho, incluindo detalhes sobre remuneração e benefícios.
Saúde e bem-estar:
- Plano de saúde sem coparticipação (inclusive, para dependentes)
- iFood Benefícios (VA e VR flexível)
- Licença parental: maternidade de 6 meses e paternidade de 20 dias
- Auxílio Creche
Vida Financeira
- Assessoria de Investimentos
- Cartão XP Visa Infinite sem anuidade
- Crédito (consignado, home equity, CCB Imobiliário, etc.)
O nosso modelo de trabalho varia de acordo com a função, podendo ser totalmente presencial para frentes de negócio e mais flexível para outras equipes. Seguimos um modelo com mais frequência presencial, mas sempre guiado por flexibilidade e autonomia com a responsabilidade da nossa cultura empreendedora.
Aqui na XP Inc., valorizamos as interações pessoais e acreditamos no uso do escritório como uma ferramenta para potencializar nossas relações no trabalho.
Candidatar a esta vagaEste texto descreve o formulário de candidatura com diversas perguntas e informações solicitadas para o processo seletivo.
Observação: Este conteúdo inclui perguntas sobre localização, formação, datas de início e término, perfil no LinkedIn, CPF, disponibilidade de trabalho presencial/híbrido, experiência em segurança, conhecimento em Azure Cloud, redes de computadores, IA em arquitetura de segurança, fluência em inglês, identidade de gênero, raça/etnia, deficiência, entre outros, bem como informações de discriminação, privacidade de dados e acessibilidade.
#J-18808-LjbffrANALISTA DE SEGURANÇA DA INFORMAÇÃO SENIOR (Arquitetura / Projetos)
Publicado há 8 dias atrás
Trabalho visualizado
Descrição Do Trabalho
ANALISTA DE SEGURANÇA DA INFORMAÇÃO SENIOR (Arquitetura / Projetos)
Garantir a eficiência e efetividade dos controles de segurança para os clientes TOTVS hospedados em Cloud. Referência técnica da equipe de segurança.
Responsabilidades e atribuições- Perfil hands-on técnico e generalista, atuará no time de arquitetura sendo responsável por planejar e atuar nos projetos de segurança da informação de Cloud. Definir as diretrizes de segurança que as demais áreas de Cloud devem seguir em seus projetos, apontando os riscos e implementando os controles mitigatórios garantindo a evolução contínua.
- Atuará fortemente com demais colaboradores em equipe multidisciplinar (redes, hardware e virtualização, devops/automações, banco de dados, storage, backup, OS, desenvolvedores, e nuvens públicas), permeando por discussões técnicas de arquitetura, relacionamento com fornecedores e clientes internos.
- RESPONSABILIDADES
- Direcionar tecnicamente, os demais membros da equipe de segurança, com visão multidisciplinar nos principais domínios de segurança.
- Promover um ambiente mais seguro em Cloud, abordando com visão macro (generalista) e holística todas as disciplinas de segurança da informação no ambiente;
- Implementar novas soluções de segurança da informação testando, planejando, executando, apoiando e acompanhando as atividades necessárias;
- Facilitar o melhor aproveitamento das soluções implementadas documentando, orientando e acompanhando a equipe de operações que mantém as soluções no ar
- Propor inovação dos processos e ferramentas tecnológicas de segurança da informação;
- Estabelecer os controles de segurança da informação que devem ser seguidos pelas demais áreas da TOTVS CLOUD definindo as premissas conceituais e tecnológicas comuns a todas as áreas;
- Assistir as demais áreas de Cloud, avaliando possíveis brechas de segurança em seus projetos e processos;
- Arquitetura de redes, modelo TCP/IP e SDN;
- Arquitetura de sistemas operacionais Windows e Linux;
- Conceitos de gestão de acessos tais como AAA, MFA, RBAC, IdP e protocolos de autenticação (SAML, OAuth, Open ID Connect e LDAP);
- Conceitos de criptografia;
- Modelagem de ameaças e conhecimento na anatomia de ataques cibernéticos;
- Domínio em soluções tecnológicas de SegInfo, alguns exemplos: IPS, SIEM/SOAR, DLP, FWNG, EDR, Allowlisting, PSM, Anti DDoS, Hardening, Zero Trust, WAF, DAM, FIM, etc;
- Arquitetura de softwares e bancos de dados;
- Conceitos de multi-tenância, modelo de responsabilidade compartilhada e de entrega de serviços (IaaS, PaaS e SaaS);
- Serviços de nuvem pública (Ex: AWS, Azure e GCP);
- Ferramentas de scan de vulnerabilidades (infra e aplicação);
- Familiaridade com scripts / linguagens de programação (ex: Powershell, Python, bash);
- Capacidade analítica para resolução de problemas;
- Visão holística para entendimento do negócio como um todo;
- Ser comunicativo e demonstrar clareza de objetivos;
- Planejamento e gestão de projetos;
- Autodidata;
- Trabalho em equipe e boa comunicação;
- Graduação nas áreas de Ciências da Computação ou afins;
- Desejável certificações de segurança da informação (Ex: CompTIA Security+, CEH, CCSK, etc);
Arquitetura em Segurança da Informação - Open Finance - 127283
Publicado há 2 dias atrás
Trabalho visualizado
Descrição Do Trabalho
Arquitetura em Segurança da Informação - Open Finance
Profissional de nível Arquitetura que atue com (Open Finance) .
Atuar no desenho, avaliação e validação de soluções de Segurança da Informação para a jornada de Open Finance, garantindo conformidade com regulamentações do Banco Central, padrões de interoperabilidade e requisitos de privacidade.
Desenvolver e manter arquiteturas seguras para APIs e integrações do Open Finance, alinhadas ao OpenID Financial-grade API (FAPI) e Open Banking Brasil.
Conduzir modelagem de ameaças e definição de requisitos de segurança em integrações entre instituições participantes.
Garantir conformidade com normas Bacen, LGPD, PCI-DSS e padrões de segurança de APIs.
Apoiar testes de segurança (SAST, DAST, API Security Testing) antes da entrada em produção.
Participar de fóruns técnicos de interoperabilidade e segurança.
Requisitos e qualificações;
- Experiência em arquitetura de segurança para APIs, OAuth 2.0, mTLS e certificação digital;
- Conhecimento em OpenID Connect, FAPI, Brasil API Standards;
- Domínio de frameworks como SABSA, NIST CSF e OWASP ASVS.
Diferenciais:
- Certificações OpenID Foundation, API Security ou CISM/CISSP;
- Experiência prévia em implementação de Open Finance no Brasil.
Descrição comportamental:
Procuramos uma pessoa que:
- Goste de trabalhar em equipe e seja colaborativa em suas atribuições;
- Tenha coragem para se desafiar e ir além, abraçando novas oportunidades de crescimento;
- Transforme ideias em soluções criativas e busque qualidade em toda sua rotina;
- Tenha habilidades de resolução de problemas;
- Possua habilidade e se sinta confortável para trabalhar de forma independente e gerenciar o próprio tempo;
- Tenha interesse em lidar com situações adversas e inovadoras no âmbito tecnológico.
Arquitetura de Segurança da Informação - Exp. Seg. Financeiro
Publicado há 16 dias atrás
Trabalho visualizado
Descrição Do Trabalho
Arquitetura de Segurança da Informação - Exp. Seg. Financeiro Talent Acquisition | Tech Recruiter | Embaixadora GFT | Consultora de Recolocação Tech
Com mais de 35 anos de mercado e localizada em 16 países, a GFT emprega mais de 10.000 pessoas ao redor do mundo sendo 3.000 pessoas no Brasil.
Aqui, a diversidade, a igualdade e a inclusão estão no centro e garantir um ambiente de trabalho seguro para todas as pessoas faz parte de quem somos.
Promovemos uma cultura de desenvolvimento e crescimento pautadas no nosso pilar de Continuous Scaled Learning porque acreditamos o uso inteligente da tecnologia é a chave para o sucesso nesse mundo digital.
Profissional de nível Arquitetura que atue com Segurança da Informação.
Requisitos e Qualificações:
Atuar no desenho, avaliação e validação de soluções de Segurança da Informação para a jornada de Open Finance, garantindo conformidade com regulamentações do Banco Central, padrões de interoperabilidade e requisitos de privacidade.
Desenvolver e manter arquiteturas seguras para APIs e integrações do Open Finance, alinhadas ao OpenID Financial-grade API (FAPI) e Open Banking Brasil. Conduzir modelagem de ameaças e definição de requisitos de segurança em integrações entre instituições participantes. Garantir conformidade com normas Bacen, LGPD, PCI-DSS e padrões de segurança de APIs. Apoiar testes de segurança (SAST, DAST, API Security Testing) antes da entrada em produção. Participar de fóruns técnicos de interoperabilidade e segurança.
Experiência em arquitetura de segurança para APIs, OAuth 2.0, mTLS e certificação digital;
Conhecimento em OpenID Connect, FAPI, Brasil API Standards;
Domínio de frameworks como SABSA, NIST CSF e OWASP ASVS.
Diferenciais:
Certificações OpenID Foundation, API Security ou CISM/CISSP. Experiência prévia em implementação de Open Finance no Brasil.
Descrição comportamental:
Procuramos uma pessoa que:
- Goste de trabalhar em equipe e seja colaborativa em suas atribuições;
- Tenha coragem para se desafiar e ir além, abraçando novas oportunidades de crescimento;
- Transforme ideias em soluções criativas e busque qualidade em toda sua rotina;
- Tenha habilidades de resolução de problemas ;
- Possua habilidade e se sinta confortável para trabalhar de forma independente e gerenciar o próprio tempo ;
- Tenha interesse em lidar com situações adversas e inovadoras no âmbito tecnológico.
O que oferecemos:
- Cartão multi-benefícios – você escolhe como e onde utilizar;
- Bolsas de Estudos para cursos de Graduação, Pós, MBA e Idiomas;
- Programas de incentivo à Certificações;
- Horário de trabalho flexível;
- Plano personalizado de carreira e possibilidade de carreira internacional;
- Salários competitivos;
- Avaliação de desempenho anual com possibilidade de bonificação;
- Previdência Privada;
- Assistência Médica;
- Assistência Odontológica;
Especialista em Segurança da Informação (Projetos, Arquitetura e Pré-venda) Brazil (BR) - São Paulo/
Publicado há 16 dias atrás
Trabalho visualizado
Descrição Do Trabalho
Telefone
- Personalised advertising and content, advertising and content measurement, audience research and services development
- Store and/or access information on a device
Data preferences
You can choose how your personal data is used. Vendors want your permission to do the following:
Store and/or access information on a deviceAdvertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you).
Create profiles for personalised advertisingInformation about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities.
Use profiles to select personalised advertisingAdvertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects.
Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.
Use profiles to select personalised contentContent presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects. This can for example be used to adapt the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests.
Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns.
Measure content performanceInformation regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you.
Understand audiences through statistics or combinations of data from different sourcesReports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents).
Develop and improve servicesInformation about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers.
Use limited data to select contentContent presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type, or which content you are (or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errorsYour data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example, regarding advertising, ad clicks by bots), and ensure systems and processes work properly and securely. It can also be used to correct any problems you, the publisher or the advertiser may encounter in the delivery of content and ads and in your interaction with them.
Deliver and present advertising and contentCertain information (like an IP address or device capabilities) is used to ensure the technical compatibility of the content or advertising, and to facilitate the transmission of the content or ad to your device.
The choices you make regarding the purposes and entities listed in this notice are saved and made available to those entities in the form of digital signals (such as a string of characters). This is necessary in order to enable both this service and those entities to respect such choices.
Match and combine data from other data sourcesInformation about your activity on this service may be matched and combined with other information relating to you and originating from various sources (for instance your activity on a separate online service, your use of a loyalty card in-store, or your answers to a survey), in support of the purposes explained in this notice.
In support of the purposes explained in this notice, your device might be considered as likely linked to other devices that belong to you or your household (for instance because you are logged in to the same service on both your phone and your computer, or because you may use the same Internet connection on both devices).
Identify devices based on information transmitted automaticallyWith your acceptance, your precise location (within a radius of less than 500 metres) may be used in support of the purposes explained in this notice.
You can choose your data preferences. This site or app wants your permission to do the following:
Site or app
Store and/or access information on a deviceAdvertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you).
Create profiles for personalised advertisingInformation about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities.
Use profiles to select personalised advertisingAdvertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects.
Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.
Use profiles to select personalised contentContent presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects. This can for example be used to adapt the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests.
Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns.
Information regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you.
Understand audiences through statistics or combinations of data from different sourcesReports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents).
Information about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers.
How this consent management platform (CMP) works:
CMP privacy choices
Storage, duration, and usage detailsThe choices you make with this CMP regarding the purposes and entities will affect how personalized advertising is presented to you. We need to store these choices to respect them on future visits, and they are stored differently based on the type of site or app you're using:
- For sites , your choices are saved in a cookie named “FCCDCF” for a maximum duration of 390 days.
- For apps , your choices are saved in device storage prefixed by “IABTCF_”. Your choices will be invalidated after 390 days and overwritten once you make new privacy choices on this app.
- For accelerated mobile page (AMP) sites , your choices are saved in local storage prefixed by “amp-store”. Your choices will be invalidated after 390 days and overwritten once you make new privacy choices on this site.
Vendors can use your data to provide services. Declining a vendor can stop them from using the data you shared.
Exponential Interactive, Inc d/b/a VDX.tvData collected and processed: IP addresses, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data, Precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device identifiers, Non-precise location data, Precise location data, Users’ profiles
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Non-precise location data, Users’ profiles
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data, Precise location data
Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device identifiers, Precise location data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Privacy choices
Data collected and processed: IP addresses, Device identifiers, Non-precise location data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data, Precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Non-precise location data, Precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device identifiers, Authentication-derived identifiers, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Integral Ad Science (incorporating ADmantX)Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, User-provided data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Non-precise location data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Probabilistic identifiers, Non-precise location data
Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, Non-precise location data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Precise location data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, User-provided data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device identifiers, Browsing and interaction data, User-provided data, Users’ profiles, Privacy choices
Adobe Audience Manager, Adobe Experience PlatformData collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data, Precise location data, Privacy choices
Data collected and processed: IP addresses, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Authentication-derived identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Non-precise location data
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics
Data collected and processed: Device characteristics, Browsing and interaction data
Data collected and processed: Browsing and interaction data
Data collected and processed: IP addresses
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Device identifiers, Probabilistic identifiers, Authentication-derived identifiers, Browsing and interaction data, User-provided data, Non-precise location data, Users’ profiles, Privacy choices
Data collected and processed: IP addresses, Device identifiers, Privacy choices
Data collected and processed: IP addresses, Device characteristics, Browsing and interaction data, Non-precise location data, Privacy choices
Data collected and processed: IP addresses
Data collected and processed: IP addresses, Device identifiers
Data collected and processed: IP addresses, Device identifiers, Probabilistic identifiers, Browsing and interaction data, Non-precise location data, Privacy choices
Marketing Science Consulting Group, Inc. #J-18808-LjbffrSeja o primeiro a saber
Sobre o mais recente Arquitetura da informação Empregos em Brasil !