- ...Job Description: Act as the central coordinator for planning, implementing, and managing security measures across all hubs, including communication and data consolidation related to security incidents and cases. Prepare and present reports to management, highlighting...
- ...Management: Ensure Work Orders are properly filled with accurate Reason for Outage (RFO) and action taken data. Manage site issues such as access, rental, and electric bills, and escalate unresolved issues effectively. Maintenance: Manage facility equipment, spare...
- ...Job Summary: The Information Security and Data Privacy Legal Controls Officer shall be responsible for reviewing and approving contract terms relating to data privacy and information security and managing all contracts that the Office of the CISO and DPO is negotiating...
- ...in posting vacancies, selecting, and interviewing applicants. Globe's Diversity, Equity and Inclusion Policy Commitment can be accessed Make Your Passion Part of Your Profession. Attracting the best and brightest Talents is pivotal to our success. If you are ready...
- ...DESCRIPTION The Cloud, Identity and Data Security Operations Manager serves as both a... ...Microsoft 365 cloud services and Identity and Access Management for more than 25,000... ...Sarbanes-Oxley and identity management controls; perform regular access reviews and support...
- ...on implementing strategic solutions to security problems, providing a secure environment... ...DevSecOps practices implementing security controls as code to policy-based controls across... ...Key Vault, and Networking (NSG, private access) Solid understanding of the Azure shared...
- ...industry. It specializes in the distribution and marketing of pharmaceutical products, ensuring quality healthcare solutions are accessible to various markets. Job Description Key ResponsibilitiesMarket Access Strategy Develop and implement market access strategies...
- ...suppliers and third-party services, oversees equipment acceptance and compliance with standards, and drives timely resolution of site, access, and operational issues. The position also maintains accurate site and asset records, manages spares and tools, and supports...
- ...SENIOR SECURITY ANALYST Work for our global clients and immerse in our rich and diverse... ...management, cloud environment controls, and user activity. Responsible to assist... ...controls to protect against unauthorized access, data breaches, and other security threats...
- ...About the Role: Design, scope, and perform offensive security engagements from planning through execution and reporting Perform... ...( TCP/IP, DNS) ~ Authentication, authorization, and access control mechanisms ~ Hands-on experience with dynamic security testing...
- ...~3–5 years of experience in Information Security, Cybersecurity, or IT Operations ~ Experience... ..., endpoint protection, identity and access management ~ Understanding of incident... ...security policies, procedures, and controls in line with ISO 27001, DPA, and other standards...
- ...Hiring: Cloud Security Engineer We are looking for a Cloud Security Engineer to design, implement, and manage security controls across multi-cloud environments . This role has a strong... ...Implement Zero Trust and least-privilege access Architect and manage IAM...
- ...array of leading platforms. Our team is responsible for both security operations and strategic improvements, delivering the technology... ...policies and procedures, including security measures such as access control, logging, and incident response. Analyze network traffic...
- ...SUMMARY The Endpoint Security Engineer serves as a technical escalation point responsible... ...complex endpoint, application, and access issues Manage endpoint lifecycle: provisioning... ...and Management (RMM) Application control / allow-listing platforms Perform first...
- ...the following fields: Information Security (any field) Information Technology (... ...standards Assess Non-standard internet access requests Assess installation of non-... ...objectives First level quality control to ensure that relevant and up to date...
- ...communities we serve. The Opportunity The Section Manager, Security, is a key leadership role responsible for developing,... ...risks. Oversee all day-to-day security operations, including access control, perimeter security, patrol schedules, and monitoring activities...
- ...to reporting Active monitoring and detection of operational security risks in the organization Conduct technical investigations on... ...security awareness training Help in implementing the needed controls for different certification bodies such as ISO 27001 and SOC...
- ...The Information Security Governance Officer is responsible for monitoring and reviewing... ...of information security systems logs and controls. Provide Information security solutions... ...incidences Sets appropriate levels of access controls, which minimize information...
- ...JOB SUMMARY: The Document Controller is responsible for the administration, maintenance... ...accurate, current, properly versioned, and accessible across all business units. Working under... ...document files are organized, secure, properly backed up, and retrievable at...
- ...Company Summary Deltek is seeking an Offensive Security Engineer to join our Offensive Security team as part of Deltek's Threat... ...fundamentals ( TCP/IP, DNS) Authentication, authorization, and access control mechanisms Hands-on experience with dynamic security...
- ...responsible in the delivery, execution, quality control and completion of strategic Programs and... ...Build and Maintain an effective security and privacy governance practice with high... ...and Inclusion Policy Commitment can be accessed Make Your Passion Part of Your Profession...
- ...complexities of scale, compliance, and interoperability. Through our secure and innovative technologies, we help shape and empower the... ..., IDS/IPS, and monitoring systems Help implement secure access controls, role-based permissions (RBAC), and encryption standards...
- ...solutions and platforms Expertise in developing and enforcing access control policies and procedures Hands-on experience with... ...Java), including API integrations Familiarity with cloud security and IAM frameworks across Azure, AWS, and Google Cloud environments...
- ...expansion, we are on the lookout for a Network Security Engineer (IC2-G4) to join our growing... ...network team to implement security controls, defenses, and countermeasures to prevent... ...Solid understanding of Zero Trust Network Access Experience and practical knowledge of...
- ...business and we donate 50% of our profits to help everyone gain access to clean water and a toilet. As of June 2024, we've contributed... ...services. A bit about the role As our Resource Controller, you are the strategic partner who shapes how our teams work together...
- ...outsourcing/offshoring company, is in search of experienced Security Personnel to join our rapidly expanding team. As a member... ...any suspicious activities or security violations. Control and monitor access to the premises by checking identification, verifying credentials...
- ...General Duties Apply system security engineering principles to deliver real solutions premeditated to enhance the security position... ...security architectures, including firewalls, router ACLs (Access Control Lists), web content filters and Demilitarized Zones (DMZ)....
- ...MRP/SAP system For positions requiring access to technical data, Analog Devices, Inc. may... ...Department of Commerce - Bureau of Industry and Security and/or the U.S. Department of State - Directorate of Defense Trade Controls. As such, applicants for this position –...
- ...world's most analyst-recognized and largest pure-play managed security services provider, LevelBlue elevates client outcomes that matter... ...Respond to needs and questions of customers concerning their access to network resources through their managed device. Adhere to...
- ...projects around the world. We are seeking a detail‑oriented Document Controller to support project teams by ensuring accurate, compliant, and... ...and provide documents upon request Maintain controlled access to key business and project document registers Liaise with project...