Get new jobs by email
- ...impactful business operations while commissioning robust identity security solutions to stimulate confidence and ease of growth and... ...leader in identity security solutions, Infocentric is known for its personalized service, unique and creative approach, responsiveness...
- ...Full-time Work Setup: Hybrid About the Role As a Security Solutions Lead , you will spearhead both pre-sales and post-... ...lead a specialized team responsible for delivering technical consultations, solution architecture, and client enablement for Privileged...
- ...operations by delivering robust identity security solutions and cutting-edge business applications... .... Job Description: As a Technical Consultant at Infocentric Solutions Inc., you will... ...as needed. Qualifications: Overall IT Consulting experience of 6+ years, with...
- ...site as required) Type: Contractual Start Date: Immediate About the Role: We are seeking an experienced SAP Signavio Consultant to support end-to-end business process transformation initiatives. The ideal candidate will be responsible for driving process...
- ...required) Type: Contractual Start Date: Immediate About the Role: We are looking for a skilled SAP BusinessObjects (BOBJ) Consultant to support our enterprise reporting and analytics initiatives. The consultant will be responsible for building interactive...
- Position : IT STAFF Bachelor’s Degree in Computer Science, Computer Engineering, Information Technology or related field • Knowledgeable in Hardware Troubleshooting particular in Desktop/Laptop, printers, & routers. • Experienced in Installation of Microsoft OS...
- ...Technology graduate * With at least 1 year work experience in IT related works and provide technical assistance in hardware and software... ...peripherals. 3. Monitor and maintain network performance and security. 4. Assist in the deployment and management of servers,...
150000 Php
Discover your 100% YOU with us! Position: Senior IT Auditor and Cybersecurity Consultant Location: Eastwood, Quezon City Work setup & shift: Hybrid... ...Continuity / technology risk assessments, technical security related reviews, assess the effectiveness of processes/...- ...goals Collaborate with SAP functional consultants , technical leads , stakeholders ,... ...compliance with integration best practices, security standards, and governance protocols... ...Qualifications ~ Bachelor’s degree in IT, Computer Science, or a related field ~...
- ...What you´ll do Analyze emerging IT Cybersecurity laws and regulations, translating them into actionable requirements... ...evolving regulatory obligations Provide expert consultation on technical and information security matters, supporting the development, implementation,...
- ...About the Role: A financial services company is on the lookout for IT Security Head. Responsibilities: Ensure the effective management and administration of the companys security infrastructure and the protection of the company's computer network, systems...
- ...Responsible for securing data, network, and applications in system development or system implementations... ...and enforce security controls in IT and application systems. Ensures... ...services of the bank by: ● Providing security consulting services on information security related...
- Job Overview: The Security Manager is responsible for developing and overseeing the security operations of an organization. This role involves... ...departments, and emergency services. Work closely with HR, IT, and facilities management to align on safety and data...
- ...Schedule: Mondays - Fridays, Day Shift Base Salary: Php 100,000 - Php 120,000 Industry: IT Solutions About the Job: Join our client's team as a Cloud & Email Security Specialist and leverage your expertise to manage and optimize email security, WAF services,...
- ...This individual will be responsible for collaborating with our IT teams and business users to design and implement SAP FIORI authorizations... ...Fiori authorization. Define privileges and roles with HANA Security, Fiori Security, BI7 Security, ERP and CRM Security according to...
100000 Php
We are Hiring for IT Cloud Security Engineering | Earn up to Php 100,000 + Peripherals Provided | Online Process Only - At least 2-5 years’ experience as Security Engineer - Salary is range Php 80,000-100,000 (Negotiable) - Bachelor’s degree in IT or any related field...- Required Skills and Qualifications This role requires a strategic seller with strong technical acumen, capable of engaging with CIOs, leading presales discussions, and closing complex enterprise deals. The ideal candidate must have: Proven US & EU Sales Experience:...
- ...business and technical minds in cyber security. We are passionate champions for our clients... ...on hardware refresh before it reaches its EOL/EOS state • Process... ...Assurance, Tax, Strategy & transactions and Consulting services, we’re using the finance products...
60000 Php
System Administration (80%): Performs daily IT technical and network administrative support to all employees. 1. Server Management... .... • Manage server backups and restore operations. 2. System Security: • Implement and maintain security measures, such as firewalls,...- ...Head/Delivery Department Head and is a key resource in driving security design and reviews on applications, components, and services.... ...security coding, testing, and discovery techniques, and apply it pragmatically to our projects • Contributes to the visioning exercise...
- ...Identifying clients' needs and requirements and proposing suitable solutions. Providing clients with comprehensive product/service consultations and guiding their decision-making process. Upselling and cross-selling products/services to clients. Resolving complaints and...
- ...respected organization at the forefront of the identification and security technology industry. The Account Manager is responsible for... ...lamination systems. Duties and Responsibilities ➤ Learns product, its applications and linkages, and the market landscape. ➤...
30000 Php
A Security Officer's job description involves patrolling and monitoring premises, controlling access, and responding to emergencies to ensure the safety and security of people and property. They may also be responsible for operating security systems, conducting inspections...- ...Role Description and Responsibilities The Security Consultant will work with the wider Consulting team, responsible for the development and... ...security operations in alignment with business priorities and its tactical/strategic objectives · Perform reviews,...
- ...About Us: Top Asia is more than a consulting and outsourcing company. We are focused on people by building a strong camaraderie culture,... ...utmost professionalism. Candidate Profile: As a Data Encoder, it is important that you share our core values, has initiative,...
- ...About Us: Top Asia is more than a consulting and outsourcing company. We are FOCUSED on people by building a strong camaraderie culture,... ...and utmost professionalism. Candidate Profile: As HR staff, it is important to us that you share our core values, organized,...
- ...analysis / commercial planning, preferably within the FMCG sector or a consulting firm. ~High proficiency in data analysis tools (e.g., Excel,... ...your application, scrolling this page or clicking any part of it, you hereby acknowledge that you have read and understood our...
60000 Php
...traveler supplier ties outside of the United States. Known as one of the country's top travel companies. Position: Information Security Engineer Company Industry: Travel Industry Work Location: Makati Site, QC, Alabang, Cebu, and Bacolod Work Schedule: Flexible...- ...Responsibilities ~ Monitor organization’s networks for security breaches and investigate when one occurs ~ Use and maintain software... ...systems ~ Research the latest information technology (IT) security trends ~ Prepare reports that document general metrics...
- ...~ Working under supervision of a Senior consultant or working alone. ~ Production of high... ...of the curve, learn new skills and share it with the team. Keep on top of training requirements... ...applications, cloud infrastructure or secure code reviews is highly desirable ~...