Get new jobs by email
- ...and undertakes delivery of the document controller discipline for client project, to ensure... ...efficient such that project personnel can access information they need. Supports and... ..., property, and real estate industry. Security, cyber security, data protection awareness...
- ...the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and... ...at Visa. Job Description Ecosystem Intelligence & Controls (EIC) is a Global Risk group that is tasked with the role of upholding...
- ...most innovative, convenient, reliable, and secure payments network, enabling individuals,... ...assessments of operational resilience. Access, study and report on the data to identify... ...resilience, ensuring appropriate controls are in place to mitigate potential disruptions...
- ...We're looking for an Information Security Analyst (Access Provisioning) to join our ETS Control and Governance team at MBPS. In this role, you are expected to define and maintain a standard access model for cloud resources, review and approve access requests every day...
- ...Furniture & Interiors, Industrial Machinery, Renewable Energy, Power, Security, Construction, Food, Oil & Gas, Hospitality, Livestock, Beauty,... ...training and learning, mentoring platforms and on-demand access to thousands of courses on LinkedIn Learning. When it’s time...
- ...supplied and internally generated information from unauthorized access, disclosure, modification, destruction, or interference.... ...Report any potential or committed non-conformity, observations, or security events or risks to immediate superior. Willingness to learn...
- ...the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and... ...the front line and an SME escalation point for VISA Operations Control Center (VOCC) for RaIS client escalations and incident Management...
- ...the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and... ...to identify non-compliant activity or trends. Tracking and control of Compliance actions plans as submitted by Clients and ensuring...
- ...Join the Royal Caribbean Group as part of a dynamic and growing Identity and Access Management team in Manila, Philippines. You'll work with cutting-edge technologies to enhance security and single sign-on (SSO) experiences for enterprise applications across our organization...
- ...compliant processing of payroll, while maintaining the integrity, security, and development of the HRIS. The manager will also be... ...functionality and data integration accuracy. KRA 3: Compliance & Controls (5%) · Maintain compliance with payroll-related legal requirements...
- ...and certifications. Summary: As a Security Engineer, you will engage in a variety of... ...Skill: Expert proficiency in Identity and Access Management (IAM) Operations. - Strong understanding... ...tools. - Knowledge of access control models and authentication mechanisms. -...
- ...using standard ingredient recipes and practice prudent portion control. • Check guests for proper identification, detect and act upon... ...beverage, food and other equipment, depositing cash drops and secure bank. • Complete checklists on product knowledge. • Know menu...
- ...the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and... ...component of ecosystem security within Visas Payment Ecosystem and Control (PERC) team. The successful candidate will serve in a critical...
- ...Description You follow cash handling procedures to ensure the security of money handling; You ensure check-out is effectively... ...strong customer serviced focus mindset; You can remain calm and controlled and able to provide solutions when faced with customers in...
- ...consultants for the timely and safe construction of towers, conductors, insulators, grounding systems, and access roads. ~ Ensure substation interfaces, protection and control systems, and grid interconnection are designed and implemented correctly. ~ Monitor project...
- ...the world through the most innovative, convenient, reliable, and secure payments network, enabling individuals, businesses, and... ...ecosystem compliance programs across Payment Ecosystem Risk and Controls (PERC) to ensure a consistent enforcement process across Visa’s...
- ...Must-Have · Configure and maintain native security components such as firewalls, network security groups, security lists, network access control lists (ACLs), and Web Application Firewalls (WAF). · Configuration of native security solution. · Design, deploy, and...
- ...Job Summary: Identity and Access Management (IAM) ensures that the right people and... ...English Communications. ● Familiar with security concepts and technologies in the wider... ...Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions...
- ...compliance with the company's information security and data privacy policies by performing... ...the appropriate information security controls. Represents Information Security in... ...Knowledgeable in securing Network, Identity Access, Cloud systems, Endpoint devices, web...
- ...the future, welcome to Nimbyx! Job Description As Lead Security Engineer , you'll be the driving force behind Nimbyx's cybersecurity... ...management, threat detection, incident response, and access control Mentor and coach junior security or IT engineers, building...
- ...! As a Systems Engineer in the Workforce Access Management team, you&aposll be responsible... ...Implementing Access Management Controls via Okta on new and existing Third-Party... ...Access Management technology to deliver a secure and frictionless experience for all employees...
- ...for the nation! G ka ba Join the G Nation today! Extract user access lists directly from systems, or coordinate with application,... ...Participate in process improvement initiatives and contribute to access control policy and procedure updates. Use tools such as Looker...
- ...We are seeking a highly organized and dependable Security Administrator to manage user access, credentials, and routine security operations across various... ...various systems. Maintain appropriate access controls based on user roles and department needs. Security...
- ...Strategic Leadership and Governance: Develop and Execute Security Strategy: Lead the formulation, implementation, and continuous... ...security policies, procedures, and standards (e.g., access control, data handling, incident response, remote work security) that...
- ...value-added recommendations to improve the control environment and operational efficiency.... ...related field, complemented by an Information Security certification such as CISSP, CRISC, or... ...to remove barriers to provide equal access to employment. A Human Resources representative...
- ...where fun meets results ! The Information Security Analyst plans and carries out security... ...in weekly Change Advisory Board (CAB), Control Self-Assessment (CSA) Board and Information... ..., security or services Report access privileges inappropriate to job duties to...
- ...OVERVIEW The Security Architect must gain understanding of the organization's technology and information systems, and define the architectural... ...description, embed security-by-design requirements and controls to the IT infrastructure, software, processes and operations....
- ...Description THIS ROLE The Cloud Security Specialist is responsible for ensuring... ...DO You design and implement security controls across cloud environments, with a focus... ...incidents. You enforce strong identity and access management policies across cloud...
95000 $ per hour
...Job Description As the IT Security Lead, you will be responsible for protecting the organization’s digital assets and ensuring a... ...Event Management (SIEM) Malware proxies Network and system access controls Firewalls Authentication mechanisms Enterprise monitoring...- Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Summary: As a Security Architect,...