Get new jobs by email
- ...Reporting & Controles – Securities A colleague with the talent to take on something and make it happen, who is excited to help others to succeed and has the gift of always being a step ahead. In other words, you strive to bring fresh ideas and accept challenges...
- ...responsible in the day-to-day monitoring of SAP transactions and access issues, including other integrated systems and applications.... ...systems access revalidation process Attends to a) tickets and SAP Security issues by performing root cause analysis and resolution; and b)...
- ...too. Join us and build an exceptional experience for yourself, and a better working world for all. GDS Consulting SAP GRC Access Control Senior Consultant As part of our EY-GDS GRC Technology team, you’ll contribute technically to GRC Technology SAP GRC client...
- ...experience for yourself, and a better working world for all. Control & Risk Compliance Analyst (GDS Philippines) Today’s world is... ...is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 950...
- ...| Competitive base + benefits We are not your typical cyber security team. We are technically sharp, delivery focused and trusted across... ...organisations, and we are looking for an Identity and Access Management Specialist to own identity infrastructure at scale....
- ...Job Description: Act as the central coordinator for planning, implementing, and managing security measures across all hubs, including communication and data consolidation related to security incidents and cases. Prepare and present reports to management, highlighting...
- ...Job Description Responsible for processing user access requests, following established and documented desktop procedures. Responsibilities... ...and manage tight deadlines. Maintain confidentiality and security of sensitive information. Make sound, independent decisions...
- ...our team in the role of CSE - D - Processing - DEBT SECURITIES. Principal responsibilities Processor role... ...etc. Fresh Graduates are welcome to apply Basic control doctrines – segregation of duties, access management, escalations, checklists, reports to name...
- ...Job Summary: The Information Security and Data Privacy Legal Controls Officer shall be responsible for reviewing and approving contract terms relating to data privacy and information security and managing all contracts that the Office of the CISO and DPO is negotiating...
- ...on implementing strategic solutions to security problems, providing a secure environment... ...DevSecOps practices implementing security controls as code to policy-based controls across... ...Key Vault, and Networking (NSG, private access) Solid understanding of the Azure shared...
60000 - 70000 Php
...Solutions Inc. Job Title: IT - SAP Security Administrator Location: FLB Corporate... ...delivering secure, scalable, and compliant ERP access solutions. This position manages... ...understanding of SoD risks, mitigation controls, and sensitive access oversight Experience...- Information Security Governance & Operations Our Mission Our goal is for everyone to... ...delivery mistakes. Ensure security controls are executed according to the infrastructure... ...Vulnerability Management Identity Access Management / User Access Management / Privilege...
- ...SENIOR SECURITY ANALYST Work for our global clients and immerse in our rich and diverse... ...management, cloud environment controls, and user activity. Responsible to assist... ...controls to protect against unauthorized access, data breaches, and other security threats...
- Design, develop, and implement security solutions to safeguard digital assets and business operations. Integrate security controls into enterprise systems, applications, and processes... ...against cyber threats, unauthorized access, and data breaches. Project Role: GCC...
- ...SUMMARY The Endpoint Security Engineer serves as a technical escalation point responsible... ...complex endpoint, application, and access issues Manage endpoint lifecycle: provisioning... ...and Management (RMM) Application control / allow-listing platforms Perform first...
- ...seeking a seasoned Senior MS SQL Database Security Administrator to lead the security... ...Management Implement and manage security controls across all MS SQL Server instances.... ...and maintain encryption, auditing, and access controls. Enforce least privilege access...
- ...terms Ensure invoice delivery within cycle time SLA Quality Control & Compliance Perform self-review checks before invoice... ...require any accommodations to make our recruitment process more accessible for you. (Alter Domus Privacy notice can be reviewed via...
- ...~3–5 years of experience in Information Security, Cybersecurity, or IT Operations ~ Experience... ..., endpoint protection, identity and access management ~ Understanding of incident... ...security policies, procedures, and controls in line with ISO 27001, DPA, and other standards...
- The Workforce Management Analyst (WFM Analyst) will be responsible for identifying, validating, and interpreting trends in large data sets related to defined workflows as well as effectively communicating proposed solutions to management. This person will work with the ...
- ...Engineers with expertise in Identity and Access Management (IAM) to support... ..., and operations of enterprise identity security solutions. This role involves identity lifecycle... ...policies, certifications, and governance controls. Integrate IAM solutions with enterprise...
- ...Support Roles) Provide L2/L3 support for IAM platforms and resolve access and provisioning issues. Monitor IAM system health,... ...and integration support. Work closely with engineering and security teams to resolve escalations and improve platform performance....
- ...the following fields: Information Security (any field) Information Technology (... ...standards Assess Non-standard internet access requests Assess installation of non-... ...objectives First level quality control to ensure that relevant and up to date...
- ...Key Responsibilities: The Identity and Access Management (IAM) Engineer partners... ...implement and support robust identity and access control solutions. In this role, you will... ...and deliver hands-on support to maintain secure, compliant authentication and authorization...Remote job
- ...professional to join our team as Officer, Securities & Derivatives Intermediate Analyst -... ...physical and mental well-being including access to telehealth options, health advocates,... ...and escalating, managing and reporting control issues with transparency. As a successful...
- ...communities we serve. The Opportunity The Section Manager, Security, is a key leadership role responsible for developing,... ...risks. Oversee all day-to-day security operations, including access control, perimeter security, patrol schedules, and monitoring activities...
- Design, develop, and implement security solutions to safeguard digital assets and business operations. Integrate security controls into enterprise systems, applications, and processes... ...against cyber threats, unauthorized access, and data breaches. Summary: As a Security...
- ...per project. Ensures that past and current documents are complete, organized properly, catalogued, stored and shared for easy access by users. Ensures that client requirements such as submission of project folders right after acceptance activities are consistently...
- ...array of leading platforms. Our team is responsible for both security operations and strategic improvements, delivering the technology... ...policies and procedures, including security measures such as access control, logging, and incident response. Analyze network traffic...
- ...complexities of scale, compliance, and interoperability. Through our secure and innovative technologies, we help shape and empower the... ..., IDS/IPS, and monitoring systems Help implement secure access controls, role-based permissions (RBAC), and encryption standards...
- ...solutions and platforms Expertise in developing and enforcing access control policies and procedures Hands-on experience with... ...Java), including API integrations Familiarity with cloud security and IAM frameworks across Azure, AWS, and Google Cloud environments...