Get new jobs by email
- ...This position is part of the Global IT Risk & Security team and reports to the Global IT Risk & Security Manager. As an IT Risk & Security Architect, you will be responsible for delivering advanced security planning, consulting, and assessment services across both IT...
- ...Who you'll be working with: If you have a strong background in IT, computer science, or software engineering, and are analytical,... ...be responsible for the following: Designing and Implementing Secure Platforms: This involves collaborating with development and operations...
- ...employees distributing products and services to 117 countries/territories around the world. To learn more, visit What does an IT Security Analyst – Cyber Preparedness Sealed Air Shared Service (Philippines) Inc. is seeking a Cyber Resilience and Business Continuity...
- ...sustainable solutions beyond rubber,' the group sector draws on its long-standing knowledge of the industry and materials to open up... ...individual services. Job Description The Cybersecurity Consultant Security Operations Center works on a variety of topics within our...
- ...Job Title IT Security Risk and Compliance Analyst Job Description Summary Job Summary The IT Security Risk & Compliance Analyst is responsible for managing daily security operations, supporting cross-regional initiatives, and ensuring compliance with internal...
- ...JOB DESCRIPTION: The SAP User Admin and Security Analyst role is responsible for the provision of access for the primary Abbott Rapid... ...and Procedures pertaining to security of data the network and its applications proper account access and management and general...
- ...The Platform Security Manager function oversees technical security for cloud and on-prem systems, ensuring secure-by design implementation across applications and infrastructure. It manages access controls, enforces security standards, reviews tools, conducts testing,...
- ...Our mission is to make the world safer and more secure. And our core strength is the expertise of our people. We are committed to developing... ...all critical material is available, protected, and operating as it should be at all times. Information assurance is delivered...
- ...Job Description The Security Engineer develops, implements, and maintains SIEM and SOAR solutions to support various business processes... ...products, services and/or procedures Propose improvements to IT operational processes, procedure manuals, and documentation...
- ...Who you'll be working with: If you have a strong background in IT, computer science, or software engineering, and are analytical,... ...activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation...
- ...to do your best work, unleashing your full potential to help you secure your future and lead a fulfilling career. And with Metrobank's strong... ...configuration standards as well formulate, review and maintain IT security policies, technical standards, internal ISD procedures...
- ...Working under the direction of the Global Security leadership team and GDS RMS Global... ...such as Security, Technology, Facility and Admin, Talent team and other relevant teams •... ...moving environment • A team which has its foundation in the core values of trust, respect...
- ...We are seeking a Security Engineer to design, implement, and maintain security controls that protect our systems, networks, and data. The ideal candidate will work closely with IT, DevOps, and engineering teams to identify risks, respond to incidents, and strengthen...
- ...procurement and inventory control, record management, and workplace safety. Manage the Admin Team composed of Admin Assistant, Admin officer, receptionists, janitorial staff, and security services in overseeing the companys assets, equipment, and facilities. Organize...
- ...Cargosystems provides the most comprehensive range of integrated IT solutions and distribution services for the air cargo transport... ...solutions. These include applications designed to meet customs and security requirements, quality optimization, as well as e-freight and...
- ...Lease Abstraction expertise with at 1 to 3 years of experience. It would be wonderful if you've worked on Real estate commercial lease... ...process. We endeavour to keep your personal information secure with appropriate level of security and keep for as long as we need...
- ...Who You'll Be Working With: If you have a strong background in IT, computer science, or software engineering, and are analytical,... ...You'll Be Responsible For The Following: Lead end-to-end security architecture for platforms, applications, data, and infrastructure...
- ...visionary builders. In this role, you will work closely with other IT team members, users, and business leaders to plan, design, build... ...will be responsible for implementing, managing, and monitoring security measures to protect our systems, networks, and data from...
- ...Overview A growing jewelry retail brand based in BGC, known for its elegant handcrafted pieces and personalized client experience.... ...needed Qualifications At least 1–2 years experience in admin, marketing, or assistant roles Detail-oriented and highly organized...
- ...About Your Role As a motivated Cyber Security Engineer who is joining our global security team under this newly created role in our... ..., and processes. Provide guidance and training to IT and security teams on the secure use of systems and tools....
- ...Position: 6 months Non-negotiable skills: • BGP, Azure, Security Qualifications: • Bachelor's degree in Computer Science... ...Network Security Engineer, you will be a key member of our IT infrastructure team, responsible for designing, implementing, and...
- ...Cargosystems provides the most comprehensive range of integrated IT solutions and distribution services for the air cargo transport... ...solutions. These include applications designed to meet customs and security requirements, quality optimization, as well as e-freight and...
- ...Job Description Essential Job Functions: Assist in security assessments, audits, and vulnerability scans, providing detailed reports... ...plus. Required/Minimum Skillset Foundational knowledge of IT, Cloud, and industry security practices Familiarity and...
- ...to a relevant player in used auto loans industry. The Head of Secured Loans is tasked to build auto loan products that is competitive... ..., gets a fair chance at jobs, training, and promotions. When it comes to hiring, everyone gets a fair look. It doesn't matter where...
- ...environment that values diverse perspectives and experiences. As a Security Engineer, you will take on a key responsibility to improve the... ...Incident Detection and Response in AWS cloud and enterprise IT environments What you'll bring A minimum of 2 years of...
- ...Interactive Corp. pioneered digital entertainment in the Philippines. It introduced leading platforms BingoPlus and ArenaPlus, widely... ...Maintain records and prepare reports Provide general support to the Admin and Facilities team. Prepare reports, maintain records, and...
- ...Why this role ~ Love the buzz of turning noisy security data into sharp, automated defence At NCC Group, you'll help well-known brands... ...smart SOAR playbooks, and shaping XDR strategy that actually lands. It's hands-on, high-impact work with a team that backs...
- ...contact the recruiter directly. Description As ICS Business Security Analyst, you will be working closely with WTW's Client teams to... ...of all aspects of information security principles, policy and its application in business and technology areas Ability to...
- ...Administrator specializing in Microsoft Intune to manage, configure, and secure the organization's endpoint devices. The Endpoint Administrator... ...or other automation tools. Collaboration: Work closely with IT teams to ensure smooth integration of new services, applications,...
- ...Nation today! Key Responsibilities: Conduct red team operations including penetration testing, social engineering, and physical security assessments. Emulate threat actor behavior to test the effectiveness of GCash's detection and response capabilities....