Get new jobs by email
- ...optimizations. • Manage server backups and restore operations. 2. System Security: • Implement and maintain security measures, such as firewalls... ...stability and performance. • Assist with setting up VPNs and remote access configurations for users. 2. Network Monitoring: •...
- ...Job Overview: The Chief Information Security Officer works with other executives across different departments to design security systems and assets. The CISO’s main responsibility is creating and implementing an information security program that is designed to protect...
- ...significant traveler supplier ties outside of the United States. Known as one of the country's top travel companies. Position: Information Security Engineer Company Industry: Travel Industry Work Location: Makati Site, QC, Alabang, Cebu, and Bacolod Work Schedule:...
- ...YOUR IMPACT ON THE BUSINESS The Information Security Officer will play a crucial role in supporting the Chief Information Security Officer (CISO) or Information Security Head in ensuring the organization's information security practices and compliance with regulatory...
- A Security Officer's job description involves patrolling and monitoring premises, controlling access, and responding to emergencies to ensure the safety and security of people and property. They may also be responsible for operating security systems, conducting inspections...
- Information Security Department is looking for skilled professionals ready to take on new challenges in cybersecurity. If you're passionate about... ...of threats, check out our open roles: Offensive Security Officer - Certified in OSCP, CEH, GPEN, GWAPT, or equivalent -...
- ..., testing, and implementation of computer network security and protection technologies for company information and network systems and applications. Review and... ...new aspects of the security business . Officer candidates should expect to be working with all parts...
- ...and implement corrective action plans • Ensure alignment of security policies/standards with IT infrastructure frameworks (e.g., ISO... ...reporting as appropriate • Maintain current knowledge on information security topics and their applicability program requirements...
- Job Summary: - Develop tactical plans and programs for the establishment and maintenance of the Bank’s third party information security risk management framework and ensure alignment with the enterprise risk framework - Performs third party security, system security...
- ...performing operational/maintenance activities on Infrastructure Security Appliances not limited to only Panorama and Palo Alto... ...ability to do so Required Qualifications: ~ Any course – Information Technology, Computer Science, Computer Engineering (preferred)...
- ...Location: Work from Home Salary: $3,500 per month Job Description: Venture Smarter is seeking a highly organized and proactive Remote Office Manager to oversee daily administrative operations and support our remote teams. This role is ideal for someone with strong...
- ...Job Title: Information Security Engineer Job Description: The Information Security Engineer role is part of the security team responsible for safeguarding the enterprise infrastructure and information across domestic and international organizational holdings...
- ...Discover your 100% YOU with MicroSourcing! Position: Information Security Specialist for Information Security Group (ISG) Location: Eastwood, Libis, Quezon City Work setup & shift: Hybrid | Shifting Why join MicroSourcing Youu0027ll have:...
- Job Title: Chief Accountant Location: 4091 KALAYAAN AVE, TEJEROS, CITY OF MAKATI, NCR... ...point to another. From its Makati main office, the company has branches in Luzon. All... ...decisions through accurate financial information. Key Responsibilities: Accounting Management...
- The CFO is a strategic partner to the executive team, responsible for the overall financial stewardship of the company. This role ensures sound fiscal management, regulatory compliance, and strategic financial planning to support growth and sustainability. The position...
- ...Renewable Energy) About the Job: Join our client's team as a Chief Legal Officer (CLO) and take charge of ensuring legal compliance, managing... ...and rewarding career where happiness, pride, and financial security are achieved. We do this through thoughtful, people-centric...
- ...You'll Do Lead and manage the global DLP Program and the Security Engineering Team. Collaborate with business and technology... ...Continuously assess, update, and enhance the organization's information security management system. What We're Looking For ~ Bachelor...
- ...About the Role We are seeking an experienced Information Security Analyst II to join our cybersecurity team. In this advanced mid-level role, youll take ownership of complex security investigations, threat analysis, and incident response across a dynamic enterprise...
- ...We are in need of a strategic and results-driven Chief Financial Officer (CFO) to lead our financial operations and guide the company’s long-term financial planning and performance. The CFO will be responsible for overseeing all aspects of finance, including accounting...Remote job
- ...Delivery Department Head and is a key resource in driving security design and reviews on applications, components, and... ...skills • 3 years SDLC • Vulnerability, OWAS Other Details: Unit - Information Technology Group Rank: Junior Officer Level Location: BGC, Taguig
- ...Additional Information for COO role: Salary : 250k (willing to pay more if good - probably until 300k-350k) Benefits: Car Plan (50/50); 15 days VL, 15 Days SL., statutory benefits Work Set up & Schedule: Hybrid and Hyflex A g e requirements: 30-40 from what...
- We are Hiring for IT Cloud Security Engineering | Earn up to Php 100,000 + Peripherals Provided | Online Process Only - At least 2... ...systems application, data and infrastructure. • Safeguard company information, infrastructures, application and business processes for...
- ...Job Location: Makati City Corporate Title : Junior Officer to Manager Work Arrangement: Hybrid Our Internal... ...for: Graduate of BS Accountancy / BS Internal Auditing / Information Technology or any 4-year related course. Preferably Certified...
- ...As a Security Engineer, you will be responsible for designing, building, and protecting enterprise systems, applications, data, assets... ...day will involve applying security skills to safeguard information, infrastructures, applications, and business processes against...
- ...Roles and Responsibilities: Monitors and analyzes Security Information and Event Management (SIEM) to identify security issues for remediation. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant...
- ...Responsible for securing data, network, and applications in system development or system... ...security health of the application systems, information processing facilities and connected... ...-up skills ● Knowledge in using MS office tools such as PowerPoint, word, excel and...
- TASQ is currently hiring an MIS Specialist to join our team onsite in Pampanga, with an immediate start date. The initial pre-screening interview will be conducted via phone, so please ensure your phone line is available. **Benefits:** - Great Place to Work ...
- Salary: 120,000 - 150,000 Required Experience: -Valid PRC (Professional Regulation Commission) License -Active membership in the PRC Accredited Association of Geodetic Engineers -Bachelor’s degree in Engineering (not limited to Civil Engineering) -Minimum of 12 years...
- Required Experience: - Bachelor’s degree in: Information Technology, Computer Science, or related... ...5 years in a managerial role handling security and network teams. - Proficiency in... ...security protocols. - Proficiency in MS Office, Google Suites, and IT security tools....
- ...Responsibilities ~ Monitor organization’s networks for security breaches and investigate when one occurs ~ Use and maintain software... ...firewalls and data encryption programs, to protect sensitive information ~ Check for vulnerabilities in computer and network...