Get new jobs by email
- ...Engineering, Information Technology, Cybersecurity, Program/Financial Management, Logistics, and Data Analytics. At INDUS, we believe in the... ...-101 requirements. Reporting to the Program Manager, the Cyber Security Analyst provides cybersecurity engineering and...
- ...leading tech company in the Philippines in their search for a Cyber Security Specialist based in Ortigas . Salary Range : ₱70... ...damage. Communicate with stakeholders, including senior management, and external partners, to provide updates on the status of security...
- ...Role Summary: The Cyber Delivery Leader for KPMG Philippines will be responsible for leading and managing the delivery of cybersecurity solutions and services in alignment with KPMG's global strategies. The role includes driving delivery excellence, fostering cross-functional...
- ...on behalf of a partner company. We are currently looking for a Cyber Security Architect. In this role, you will have a significant impact... ...threats. Assist in creating Incident and Vulnerability Management Plans. Participate in product security incident response teams...
- ...Is this your next challenge in Cyber Security Analyst We are expanding and looking for a SOC Engineering Specialist to join our IT Security Team. This position is the Level 2 blue team for manage SIEM platform, cyber security investigations and incident handling....
- ...You'll Do Assist in the maintenance of our security infrastructure and 3rd Party services. Works with different members of the cyber security team to identify, select, and implement technical controls. Assist in Business and Stakeholder security queries. Work...
- ...risks to immediate superior. Job Requirements and Credentials: ● B.S. equivalent in computer science, information systems, or cyber intelligence ● Two (2) years professional experience ● Technical proficiency in Cyber Threat Intelligence and Threat...
- ...our Pune/Bangalore office and willing to work on shifts. The ideal candidate will: At least 12 months of Privileged Access Management domain experience Act as a lead and work stream participant on small- to medium-sized projects A quick learner and...
- ...make the world safe for exchanging digital information. The Cyber Incident Response Coordinator's overall responsibility is to... ...minimize damage. Communicate with stakeholders, including senior management, and external partners, to provide updates on the status of...
- ...tech stack and certifications. We are seeking an experienced Cyber Threat Intelligence Analyst to join our dynamic and growing... ...actionable intelligence to support incident response, vulnerability management, and other cybersecurity initiatives. Develop and maintain...
- Job Summary HMO on Day 1 Receive promising perks and rewards Experience travel opportunities Get recognized for what you do Achieve work-life balance Improve exponentially with enhanced learning Responsibilities The DLP & Data Protection Analyst ...
- ...Job Summary: The Security Governance and Assurance Analyst supports the roll out and implementation of the Information Security/Cyber Security Policies. He/she will work with the various Infosec representatives from the business groups and provide guidance on the procedures...
- ...selected candidate will be responsible for generating comprehensive cyber threat reports for both internal stakeholders and clients/... ...from various paths to growth: progress as an expert, advance to a management position, try your hand in another department, relocate abroad,...
- ...The STAR intern deployed in our Cyber Security Team will be immersed in an enhanced student workforce curriculum, which will enable... ...day-to-day activities Enhance your creativity and project management skills through process improvements and efficiency tools...
- ..., self‑healing response mechanisms, and AI‑augmented analyst workflows across all security domains. Leadership & Organization Management Lead, scale, and mature the offshore Manila cybersecurity engineering organization—spanning Application Security, SecOps Engineering...
- ...of successfully delivering complex cybersecurity programs for enterprise clients. · Strong understanding of cyber transformation (Identity & Access Management) Cyber threats, risk management, Privacy, Third Party Risk Management, security frameworks (e.g., NIST, ISO...
- ...confidence. As the world's most analyst-recognized and largest pure-play managed security services provider, LevelBlue elevates client outcomes... ...position will cover the following shift: EMEA/ AMS shift A Cyber Threat Engineer is a member of the Threat Detection and Response...
- ...technical expertise across Azure, networking, firewalls, identity management, and automation within a large-scale enterprise environment.... ...gained from working within large-scale enterprises where robust cyber security measures are paramount. Your background should include...
- ...and security risks Conduct audits, assessments, and policy updates Work with engineering to enforce secure coding standards Manage IAM, encryption, and data protection controls Evaluate third-party tools and SDKs for compliance and security impact Support...
- ...We are excited to announce a pivotal opportunity for an OT Cyber Security Specialist role to join our esteemed Orica GBS team in... ...conducting Business Impact Assessments, developing Service Continuity Management plans, and creating standardized documentation templates for...
- ...collaborative work environment that empowers you to excel. Kroll’s Cyber Risk team works on over 2,000 cases a year, including some of... ...and resources to deliver global, end-to-end cyber risk management, supporting organizations through every step of their journey toward...
- ...Chartered has established a world class 1st line Information and Cyber Security ('ICS') capability to support the Businesses,... ...for Cyber Skills Development Forum Responsibilities Data management and analysis ~ Support all data-related activities for Culture...
- ...inspired by a team of the brightest business and technical minds in cyber security. We are passionate champions for our clients and know... ...Prepare detailed incident reports and executive summaries for management and stakeholders. • Participate and/or lead incident...
- ...reports on technical subject matter (e.g., malware, infrastructure, or cyber threats) in a clear, concise, and logical format. ● Self-starting and self-motivated with disciplined time management and the ability to thrive in a collaborative, globally distributed environment...
- ...low overhead, small teams, and rapid iteration. As a Senior Cyber Security Analyst, you will leverage your expertise in bot detection... ...Hands-on SQL proficiency is a must-have Knowledge of managing, securing and preparing production web environments with tools...
- Why Join Us Check Point Infinity External Risk Management, otherwise known as Cyberint, continuously reduces external cyber risk by managing and mitigating an array of external cyber security threats with one unified solution. We are looking for a Cyber Threat Intelligence...
- ...inspired by a team of the brightest business and technical minds in cyber security. We are passionate champions for our clients and know... ...skilled and experienced Cybersecurity Engineering & Operations Manager to join our team. The ideal candidate will have a strong...
1500 $
RESPONSIBILITIES: Command and Database Management Drip Campaigns and Social Media Recruiting Appointment Setting Scripts Market Share Scripts Co-broke Scripts Merger Scripts Lead Follow up Events and Invitation Scripts Productivity Coaching Scripts New Licensee...- ...this Position Join Henkel's global cybersecurity team and play a pivotal role in safeguarding our digital environment. As a Senior Cyber Defense Analyst, you will be part of a 24/7/365 SOC, responsible for advanced threat detection, incident analysis, and proactive threat...
65000 - 80000 Php
...development pathway Essential Requirements: ~3+ years of experience in cybersecurity, SOC, incident response, or vulnerability management ~ Experience with tools such as CrowdStrike, Microsoft Defender, Tenable, Zscaler, Azure AD, KnowBe4 , or similar. ~ Ability...