%3Cp style=%22font-family:Verdana;%22%3E%3Cspan style=%22font-family:verdana, geneva, sans-serif;font-size:13px;%22%3E%3Cstrong%3EBuilding on our past. Ready for the future%3C/strong%3E%3C/span%3E%3C/p%3E%3Cp style=%22font-family:Verdana;%22%3E%3Cspan style=%22font-family:verdana, geneva, sans-serif;font-size:13px;%22%3EWorley is a global professional services company of energy, chemicals and resources experts. We partner with customers to deliver projects and create value over the life of their assets. We’re bridging two worlds, moving towards more sustainable energy sources, while helping to provide the energy, chemicals and resources needed now.%3C/span%3E%3C/p%3E%3Cp style=%22font-family:Verdana;%22%3E%3Cspan style=%22font-family:verdana, geneva, sans-serif;font-size:13px;%22%3E%3Cstrong%3EObjective:%3C/strong%3E%3C/span%3E%3C/p%3E%3Cp style=%22font-family:Verdana;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;font-size:10.0pt;%22%3E%3Cspan style=%22mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-language:AR-SA;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-fareast-language:EN-US;%22%3EOperational managers utilizing in-depth knowledge, advanced problem solving skills and an awareness of Worley priorities to translate strategic direction into tactical plans and implementation activities. Guided by functional practices, management precedents, and professional standards. Decisions are typically of a tactical variety. Able to develop conclusions from analyses and apply results to Worley business operations. Decisions are typically based on extensive business acumen and seasoning.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp style=%22font-family:Verdana;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;font-size:10.0pt;%22%3E%3Cspan style=%22mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-language:AR-SA;mso-fareast-font-family:%26quot;Times New Roman%26quot;;mso-fareast-language:EN-US;%22%3E%3Cstrong%3EResponsibilities:%3C/strong%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpFirst%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3E%3Cstrong%3EIdentity Governance Leadership%3C/strong%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3EDefine and execute the global identity governance strategy aligned with business, compliance, and security objectives.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3ELead identity lifecycle processes (joiner, mover, leaver) and oversee role-based and policy-based access models.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3EManage access certifications, segregation of duties (SoD) policies, and entitlement reviews.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3EAdminister and optimize identity governance platforms (e.g. Saviynt, Microsoft Entra).%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3EDrive automation and continuous improvement in IAM processes across global regions.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3E%3Cstrong%3EProject Office %26amp; Security Risk Management%3C/strong%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3EPerform %3Cstrong%3Edue diligence and risk assessments%3C/strong%3E from an information security perspective for:%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3EMajor projects and strategic initiatives.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:FR;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22 lang=%22FR%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:FR;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22 lang=%22FR%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:FR;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22 lang=%22FR%22%3EDivestitures, mergers, acquisitions, and joint ventures.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3EAct as a security advisor to business leaders, ensuring risks are identified, assessed, and mitigated during critical business activities.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3ECollaborate with IT, Legal, Compliance, and Risk functions to embed security controls into enterprise projects.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3EProvide governance and reporting to executive leadership on project-related security risks.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3E%3Cstrong%3ESpecial Projects %26amp; Emerging Initiatives%3C/strong%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3ESupport emerging programs such as %3Cstrong%3EAI/ML governance%3C/strong%3E, cloud security, and other transformational initiatives.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpMiddle%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3EPartner with enterprise architecture and technology teams to ensure security-by-design principles are applied.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpLast%22 style=%22mso-list:l0 level1 lfo1;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:%26quot;Verdana%26quot;,sans-serif;%22%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E-%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Verdana;mso-bidi-font-size:10.0pt;mso-fareast-font-family:Verdana;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3Cspan style=%22line-height:115%;mso-ansi-language:EN-US;mso-bidi-font-family:Calibri;mso-bidi-font-size:10.0pt;%22%3EManage ad-hoc global initiatives requiring strong security oversight and governance.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E
Requirements:
Bachelor’s degree in Computer Science, Information Security, Business, or related field or equivalent experience.
·Technical & Professional Skills
oStrong knowledge of IAM lifecycle management, RBAC, SoD, and compliance controls.
oUnderstanding of regulatory and risk frameworks (NIST, Essential 8, ISO 27001).
oStrong analytical, communication, and stakeholder management skills.
oAbility to manage multiple priorities across regions and business functions.
oProfessional certifications (CISSP, CISM, CISA, or IAM-related) are highly desirable.
Experience:
o5 years of experience in Identity & Access Management, Information Security, or Risk Management.
o3+ years in a leadership/managerial role with global scope.
oHands-on experience with leading identity governance solutions.
o Demonstrated experience conducting security due diligence for M&A, divestitures, or large-scale projects.
If you need any accessibility adjustments, please make sure to mention it in your application.
Moving forward together
We’re committed to building a diverse, inclusive and respectful workplace where everyone feels they belong, can bring themselves, and are heard. We provide equal employment opportunities to all qualified applicants and employees without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by law.
We want our people to be energized and empowered to drive sustainable impact. So, our focus is on a values-inspired culture that unlocks brilliance through belonging, connection and innovation.
And we're not just talking about it; we're doing it. We're reskilling our people, leveraging transferable skills, and supporting the transition of our workforce to become experts in today's low carbon energy infrastructure and technology.
Whatever your ambition, there’s a path for you here. And there’s no barrier to your potential career success. Join us to broaden your horizons, explore diverse opportunities, and be part of delivering sustainable change.
Diese Cookies sind für das Funktionieren der Website erforderlich und können in unseren Systemen nicht abgeschaltet werden. Sie können Ihren Browser so einstellen, dass er diese Cookies blockiert, aber dann könnten einige Teile der Website nicht funktionieren.
Sicherheit
Benutzererfahrung
Zielgruppenorientierte Cookies
Diese Cookies werden über unsere Website von unseren Werbepartnern gesetzt. Sie können von diesen Unternehmen verwendet werden, um ein Profil Ihrer Interessen zu erstellen und Ihnen an anderer Stelle relevante Werbung zu zeigen.
Google Analytics
Google Ads
Wir benutzen Cookies
🍪
Unsere Website verwendet Cookies und ähnliche Technologien, um Inhalte zu personalisieren, das Nutzererlebnis zu optimieren und Werbung zu indvidualisieren und auszuwerten. Indem Sie auf Okay klicken oder eine Option in den Cookie-Einstellungen aktivieren, stimmen Sie dem zu.
Die besten Remote-Jobs per E-Mail
Schliess dich über 5'000+ Personen an, die wöchentlich Benachrichtigungen über Remote-Jobs erhalten!