Get new jobs by email
- ...experience for yourself, and a better working world for all. Control & Risk Compliance Analyst (GDS Philippines) Today’s world is... ...is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 950...
- ...too. Join us and build an exceptional experience for yourself and a better working world for all. GDS Consulting SAP GRC Access Control Senior Consultant As part of our EY-GDS GRC Technology team youll contribute technically to GRC Technology SAP GRC client...
- ...Job Summary The User Access Management Associate/Specialist will play a vital role in managing user access within the eMP systems.... ...position entails handling access requests, ensuring compliance with security policies, and providing support related to user account...
- The Workforce Management Analyst (WFM Analyst) will be responsible for identifying, validating, and interpreting trends in large data sets related to defined workflows as well as effectively communicating proposed solutions to management. This person will work with the ...
- ...Responsible For The Following: Lead end-to-end security architecture for platforms, applications... ..., and design patterns for critical controls (segmentation/zero trust, identity, data... ...of: cloud/platform security, identity & access, data protection/crypto, network...
- ...AlgoSec). Administer web proxies (Forcepoint, Cisco WSA) and secure email gateways (Cisco ESA, Trellix). Configure, manage, and... ...NX) into security operations. Manage and optimize Network Access Control (NAC) using Forescout. Implement and maintain WAF solutions...
- ...Introduction The SWG and CASB Security Specialist will be responsible for designing,... ...and managing secure web gateway and cloud access security solutions to protect enterprise... ...integration with broader enterprise security controls. The specialist will work closely with...
- ...The Role: Cloud Security Architect to join our Enterprise Architecture team and help define how applications, platforms... ...reference designs, and guardrails that address security controls such as identity and access management, data classification and protection and...
- ...The Security Consultant role at NCC Group is focused on offensive security , identifying and demonstrating vulnerabilities in client... ...sharing, and technical excellence. At NCC Group, you'll have access to structured development opportunities, global mentorship, and...
- ...cooperation with our colleagues from the HQ security team in Sydney. You will also handle the... ...of cybersecurity technical controls and processes Perform configuration and... ...disability, and travel insurance, plus access to other discounted insurance options....
- ...We are seeking a Security Engineer to design, implement, and maintain security controls that protect our systems, networks, and data. The ideal candidate will work closely with IT, DevOps, and engineering teams to identify risks, respond to incidents, and strengthen...
- ...Job Summary: The Information Security Compliance Analyst will support and execute our... ...compliance activities for SOC 2, including control mapping, evidence collection, and periodic... ...(e.g., data handling controls, access controls, retention, and documentation support...
- ...minimise exposure. This would also include Securities Lending Trade desk. Maintains good... ...operate. Maintains risk management and control activities for the assigned group... ...organization is encouraged, senior leaders are accessible, and you can take pride in working for a...
- ...Work on projects that improve financial access for millions of customers. Step into a role that drives your growth. About Our... ...values expertise and excellence. Job Description As a Finance Controller, you will: Provide strategic leadership and management of all...
- ...Onboarding Specialists to gather necessary logs, access reports, and configuration files required... ...Reviews. 3. Documentation & Policy Control Aligns with Manager's responsibility... ...-controlled, up-to-date, and stored securely. Policy Development: Draft and update...
- ...COMPANY Singlife's purpose is to democratize access to meaningful financial protection. Our... ...the smartest technologies to put you in control of your finances, by providing tools and... ...market. Job Overview The IT Security Engineer supports the implementation and...
- ...variety drives excellence and innovation, strengthening our ability to lead in science and technology. We are committed to creating access and opportunities for all to develop and grow at your own pace. Join us in building a culture of inclusion and belonging that...
- The main purpose of the Credit Controller role is to handle the collections activities of large commercial accounts... ...charitable grants to community groups that help people access economic opportunities and build a secure future with financial independence. Colleagues can...
- ...Introduction We are seeking a highly skilled and experienced Cloud Security Consultant who will be responsible for the governance, strategy... ...: Track and report on key cloud security KPIs, metrics, and control effectiveness. Review and refine policies, standards, SOPs, and...
- ...Description As ICS Business Security Analyst, you will be working closely with WTW's Client teams to assist in responding to Client... ...related to our Information Security and Data Privacy programs and controls. In this position, the Business Security Services Assessor will...
- ...Join us in shaping exceptional client experiences and driving innovation at J.P. Morgan. As a Client Service Manager within the Access Support and Chase Connect team, you are responsible in managing a team of Access Support and Chase Connect managers across Manila and...
- ...You'll work at the intersection of cyber security, risk management, and operational resilience, supporting organizations as they respond... ...with ISO 27001, NIST Cybersecurity Framework, and/or CIS Controls ~ Client-facing consulting experience (internal stakeholders...
- ...KEY RESPONSIBILITIES You will: Assess supply chain security risk: Conduct third-party and supply chain security assessments, identifying... ...risk across complex supply networks. Test and validate controls: Support scenario-based exercises, tabletop simulations, and...
- ...HIRING…. We are looking for experience for Cyber Security Engineer to support our US team. Location: Hybrid /Taguig City, Philippines... ...to support centralized identity provisioning and role-based access control (RBAC). Drive automation initiatives to address...
- ...a relevant player in used auto loans industry. The Head of Secured Loans is tasked to build auto loan products that is competitive... ...performance-based bonus HMO on Day 1 / HMO with dependents Access to mental health coverage and wellness partners Wellness...
- ...The Platform Security Manager function oversees technical security for cloud and on-prem systems, ensuring secure-by design implementation across applications and infrastructure. It manages access controls, enforces security standards, reviews tools, conducts testing,...
- ...Job Summary: The IT Info security Manager is responsible for developing, maintaining, and optimizing IT processes, policies, and... ...standardize workflows, improve IT governance, and ensure clear and accessible documentation. Key Responsibilities: # Compliance &...
- .... • Experience of mobile applications, cloud infrastructure or secure code reviews is highly desirable • Experience with IT and cybersecurity strategy, policies, standards, procedures and controls • Experience working on projects with teams and individually....
- ...About the Company As an Information Security Analyst, you will be working collaboratively with CIS in managing cybersecurity risk management and compliance. You will have an opportunity to develop your skills across a broad range of technical, security, risks management...
- ...spans core management systems, messaging services, and eCargo solutions. These include applications designed to meet customs and security requirements, quality optimization, as well as e-freight and mobility needs. Our products and services are recognized globally under...