Get new jobs by email
- ...knowledge and transactions in markets. Job Description As an Admin Executive, you will support in all office-related administrative... ...functions when required Manage of office logistics including its maintenance, office space or move, storage arrangement and other...
- ...sustainable energy solutions and take on an important role in our Cyber Security team? The team is composed of professionals from diverse... ...bringing unique perspectives and approaches to problem‑solving. It includes specialists across multiple domains of cybersecurity,...
- ...Stackdriver Debugger: Debugging and profiling applications Security: • Identity and Access Management (IAM): Roles, permissions,... ...other teams to automate the lifecycle of their respective internal IT products and services, and evangelizing good software...
- ...JOB RESPONSIBILITIES: Security – In charge of Data Protection to safeguard sensitive business data System Performance Optimization – well-designed authorization to optimize compute efficiency by reducing unwanted processes and unauthorized data access. User...
- ...JOB RESPONSIBILITIES: Resolves day to day technical IT concerns reported through SMITH Software installation and maintenance... ...support. With experience in Microsoft, SAP, AutoCAD, antivirus, security software installation, PC hardware and network troubleshooting....
- ...that span core banking systems, digital transformation, enterprise IT, and advanced analytics—helping organizations improve... ...Governance & Transformation. In a competitive landscape where security and compliance are non‑negotiable, we are strengthening our security...
- ...Job Summary: The role is to support the IT Services Division in implementing Process Compliance Quality Assurance, Risk Management, Internal & External Audit Support and other Key IT General Controls. Responsibilities: Conducting internal IT Compliance...
- ...? A holder of a degree in Accountancy, Computer Science or Information Technology At least 3 year experience in Internal Audit/ IT Audit Licensed /professional certifications such as CPA, CIA, CISA, CFE – an advantage Must have general knowledge in the use of...
- ...This is a business and client facing role that ensures a seamless IT Service Management, helping business growth and creating value... ...operation. Driving Effectiveness of Compliance & Information Security as part of Service Delivery of client processes. – Shoulder responsibility...
- ...Assist the Chief Audit Executive in the preparation of Annual IT Audit Plan. Carry out IT audit engagements in accordance with... ...working experience in the related field and/or IT audit and IT security. Audit experience on the following areas: Data Privacy, Information...
- ...to work as a Hilton Team Member. Because it’s with Hilton where we never forget the reason... ...of office lock up and information security. • Perform payroll processing and month... ...in / out of the HR office, assist with the admin procedures for employee confirmation, promotion...
- ...patterns, staff productivity, attrition rates, and resource allocation. It will also include data entry and reporting which will be reviewed... ..., this role will also provide back up support for Operations Admin Coordinator in tracking and reporting employee attendance for the...
- ...Skills & Experience Strong working knowledge of ~ Google Admin Console ~ Google Drive permissions and ownership ~ Google... ...sensitive information for the purpose of recruitment and employment may it be internal to Cobden & Carter International and/or to its...
- ...employees distributing products and services to 117 countries/territories around the world. To learn more, visit . What does an IT Security Analyst – Cyber Preparedness? Sealed Air Shared Service (Philippines) Inc. is seeking a Cyber Resilience and Business...
- ...to continuously enhance the vulnerability management program Requirements Bachelor's degree in information technology, cyber security, or a related field. Prior experience in vulnerability management, programming, or a related technical role is highly desirable...
- ...Operations Center Manila is part of Vestas Global Plant Engineering. It is responsible for monitoring SCADA servers worldwide, ensuring... ...resolving issues For instance, knowledge of Information Security and Risk Management For instance, Certification in ITIL v4...
- Responsibilities Enhance your collaboration and interpersonal skills when working with different business units Harness your knowledge in Network Monitoring, Network Cabling and Network Administration Be exposed in Cisco Network Device Administration and Management...
- ...is to connect the world through the most creative, reliable and secure payment network - enabling individuals, businesses, and economies... ...skills in: project management, and presentation/training in complex IT environments. The candidate should be familiar with SaaS...
- ...with TTEC’s award-winning employment experience. As an Information Security Tools Engineer working remotely in Metro Manila Philippines, you... ...our Great Place to Work® certification in the Philippines says it all! What You’ll Do Maintaining our Security Tools to...
- ...the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and... ...the regulatory and strategic compliance objectives of Visa and its clients with respect to the Visa International By-Laws, Visa Core...
- ...and Risk investigations, which are provided to ensure the safety, security, and integrity of the payment system and to support Visa clients... ...maintaining relationships with Clients and other entities as it relates to the responsibilities of the Rules and Compliance team...
- ...task lists to team members Ensure keys are issued in line with security procedures Log and store all lost property after each shift;... ...is communicated to Housekeepers Carry out administrative and IT duties Organise and control extra duties and special tasks...
- ...Here's your chance to grow your career with the largest and leading independent fuel company in the country - join us as our next IT Security Specialist! What is this role about? This role is responsible for the full lifecycle of cybersecurity solutions, from...
- ...includes compliance with the Company's Financial Guidelines while securing active engagement with stakeholders. The group also acts as a... ...sustainable, green energy future. BEWARE - RECRUITMENT FRAUD It has come to our attention that there are a number of fraudulent...
- ...Job Title: IT Security Policy and Compliance Coordinator (Contract) Contract Duration : 6 month contract Start date : April 1 Department: Information Technology / Information Security Position Summary The IT Security & Privacy Policy Coordinator...
- ...smoothly even when technical problems happen. Problem solving: The ability to analyze issues and find solutions is critical for all IT roles POS software proficiency: - Experience with the specific POS system being used, including transaction processing and sales...
- ...Job Req Number: 108982 Time Type: Full Time Task & Responsibilities: Daily security incident handling Function as SPOC for IT security incidents Evaluation of technical threats and risks Escalation of security threats, risks and incidents Support...
- ...Responsibilities ~ Monitor organization’s networks for security breaches and investigate when one occurs ~ Use and maintain software... ...systems ~ Research the latest information technology (IT) security trends ~ Prepare reports that document general metrics...
- ...and marketing & vacation preferences ensuring confidentiality and security of sensitive data. • Uses appropriate internal systems to... ...shift period, notwithstanding scheduled breaks and lunches) It is the policy of the Company to ensure equal employment and promotion...
- ...Job Description: Security Assurance: Conduct regular security assessments, including vulnerability scans, penetration tests, and... ...against cyber threats and vulnerabilities. Collaborate with IT and development teams to integrate security into system design,...



