Get new jobs by email
- ...supporting People First. What can you expect in a Identity Access Management (IAM) Analyst role with TaskUs: Think of yourself... ...established Service Level Agreements (SLA) with a primary focus on security and efficiency Contribute in IAM onboarding and offboarding...Remote job
- ...OVERVIEW The Security Architect must gain understanding of the organization's technology and information systems, and define the architectural... ...description, embed security-by-design requirements and controls to the IT infrastructure, software, processes and operations....
- ...Junior Information Security Analyst We are looking for a motivated and detail-oriented individual to join our team as a Junior Information... ...security frameworks such as MITRE, NIST, ISO 27001, or CIS Controls and experience with cloud security and DevSecOps practices...
- ...Junior Information Security Officer Support the day-to-day coordination and administration of the Information Security Management System... ...support project coordination across teams. Maintain version control and timely updates of ISMS documents and registers. Core...
- ...Job Description As the IT Security Lead, you will be responsible for protecting the organization’s digital assets and ensuring a... ...Event Management (SIEM) Malware proxies Network and system access controls Firewalls Authentication mechanisms Enterprise monitoring...
- ...Job Summary The Cloud Security Specialist is responsible for ensuring the security of... ...Implementation: Design and implement security controls for cloud environments especially Azure... ...Defender for Identity Identity & Access Management (IAM): Enforce strong...
- ...requirements and analyse costs in detail Advice immediate report of changes in forecast that could impact approved project expenditures Control and monitor project expenditure including verifying and checking of invoice and claims from suppliers, vendors and subcontractors...
- ...excites you? We are looking for a Security Engineer to strengthen our client's security... ..., implement, and maintain security controls. You will play a key role in ensuring our... ...corporate networks. Manage identity and access controls across SaaS tools and internal...
- ...supporting People First. Senior Network Security Engineer About TaskUs: TaskUs is a... ...upgrades following internal change control. You will identify opportunities for automation... .... TaskUs is committed to providing equal access to opportunities. If you need reasonable...
- ...dedication to supporting People First. What can you expect in a Security Compliance Manager role with TaskUs: Think of yourself as... ...as a business. TaskUs is committed to providing equal access to opportunities. If you need reasonable accommodations in any...Remote job
- ...Job Description: Security Assurance: Conduct regular security assessments, including vulnerability scans, penetration tests, and... ...Develop, implement, and maintain security policies, procedures, and controls to ensure compliance with industry standards and regulatory...
- ...Job Title: Patient Access - Medical Virtual Assistant Company: Neolytix Work Set up: Hybrid/Remote Employment Type: Full-time About this Position Tired of just doing a part of the job and not seeing the impact of your work? Here at Neolytix, we believe...
- ...the Job: Join our client's team as a Security Engineer specializing in Attack Surface... ...user accounts, enforcing least privilege access, and implementing multi-factor authentication... ..., analyst, auditor). Security Controls: Enforce least privilege access principles...
- ...your chance to grow your career with the largest and leading independent fuel company in the country - join us as our next Document Controller! What is this role about? The role is responsible for monitoring the documents/certificates of company and ships if all are...
- ...We are looking for a new Senior Credit Controller to join our International Finance Team based in the Philippines supporting with all our credit control activities across a portfolio of businesses in the UK Ireland and Crown Dependencies region. The ideal candidate will...
- ...About the Job: Join our client's team as a Cloud & Email Security Specialist and leverage your expertise to manage and optimize email... ...(CSPM), Cloud Workload Protection Platforms (CWPP), and Cloud Access Security Broker (CASB) services. If you're passionate about enhancing...
- ...People First. What can you expect in a Physical Safety and Security Manager role with TaskUs: The Physical Safety and... ...responsibility as a business. TaskUs is committed to providing equal access to opportunities. If you need reasonable accommodations in any...
- ...services company employing 62,900 colleagues across 90 countries. We strive to protect people and enhance lives, for example by controlling pests, and improving hygiene. We are experts in the fields we operate in, investing in training, science, innovation and...
- ...chance to grow your career with the largest and leading independent fuel company in the country - join us as our next OJT - Document Controller (Importation)! What is this role about? The OJT will assist the Importation Department in organizing, filing, and...
- ...Transition phase. Ensure that new or changed services are designed, built, tested, and transitioned into the live environment in a controlled and structured manner. Collaborate with Service Management teams (e.g., Change Management, Release Management, Configuration...
- ...exercise room within the hotel. Strategically located it offers easy access to offices like the Asian Development Bank and Philippine Stock... ...making. Ensures a strong accounting and operational control environment to safeguard assets improve operations and profitability...
- ...THIS ROLE The Cloud Security Specialist is responsible for ensuring the security of cloud... ...DO You design and implement security controls across cloud environments with a focus... .... You enforce strong identity and access management policies across cloud platforms...
- ...implementation of Environmental, Health, Safety, and Security (EHSS) policies and procedures at the... ...for waste management, air quality, noise control, and pollution prevention. Oversee the... ...Security Supervision Manage access control measures, incident reporting, and...
- ...to enable seamless integrations with third-party systems and headless architecture Apply advanced security measures such as data encryption role-based access control and automated vulnerability patching to safeguard websites Manage DevOps processes including automated...
- ...identifying, investigating, and responding to security alerts to help protect client... ...maintain documentation for cybersecurity controls and processes Contribute to internal... ...Learning and growth opportunities – access to training, annual salary reviews, internal...
- ...microlearning, and learning paths; ensure accessibility and localization where needed. Track... .... Govern content standards, version control, and vendor relationships; manage L&D... ...standards, and data privacy/security practices. Publish and maintain SOPs...
- ...Parameter Maintenance • Implements the controls instituted to ensure the integrity of Core... ...for UAT and Production Environments: Access Control • Grants the access rights to data/information according to the security categories defined by the Business/Product...
- ...practices. Provide guidance on maintaining security roles and permissions. Perform User... ...for SOX SOC2 ITGC and other company controls Troubleshooting : Identify and resolve... ...TaskUs is committed to providing equal access to opportunities. If you need...
- ...workflows that support HR operations. Due to access to confidential and sensitive employee... ..., and contributing to the consistent and secure delivery of people systems. As a HRIS... ...to data privacy concepts, access control, or audit support is a plus. Familiarity...Remote job
- ...detection, prevention, and mitigation for potential issues. Enforce security best practices across on-prem and cloud systems by conducting vulnerability assessments, managing identity and access controls, key management, and ensuring comprehensive logging and auditing....
