Search Results: 9,013 vacancies
...leading conglomerate based in the Philippines, with entities present across different industry sectors.
Job Description
Cyber Security Operations - Operational and management responsibilities in cloud security, application security, incident response & management...
250000 Php
Cyber Security Senior Manager
Summary
The Cyber Security Senior Manager will play a critical role in safeguarding our company's digital assets, customer data, and information systems. This position demands a highly skilled and experienced professional
capable of developing...
80000 Php
Requirements:
A degree holder in any Computer related course.
Has certifications from training in various computing & digital technologies.
Strong background in Cybersecurity.
IT consultancy, Product research, or technical related experience is required.
...
50000 Php
...status and/or sexuality.
Team player, collaborative, and persuasive; able to work well with executives and non-executives.
• Open to consider CL10 internal applicants with bachelor’s degree in law and vast exposure in Cyber Security or coming from ASOC/CIRT/DLP teams.
Position: Legal Cyber Security Specialist
Location: Mandaluyong City, Metro Manila
Responsibilities:
Apply legal expertise for cybersecurity contract assessment.
Collaborate with internal teams for legal compliance.
Exercise judgment for risk mitigation in line...
In this role, your responsibilities will be:
• Providing security guidance or solutions during the development stages of software systems... ...cybersecurity and technology
• Providing standby support for cyber security incident response (CIRT)
• Defining, implementing,...
...Duties and responsibilities
Monitor the organization’s computer networks and systems to identify any violations and security breaches that need to be resolved.
Install and utilize software, such as firewalls and data encryption programs, to help protect the company...
...boundary, supporting infrastructure and applications).
Use cyber defense tools for continual monitoring and analysis of system activity... ...cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition...
...compliance with industry standards such as PCI DSS and ISO 27001, including conducting regular audits and assessments.
Network Security: Oversee the design and maintenance of network security systems and protocols to safeguard against unauthorized access, data breaches...
...Under general supervision, serves as part of the Security Operations Center (SOC) team and will be on the forefront of incident response utilizing the latest in network security technology while providing support to ULs internal network.
A global leader in applied...
We are seeking a Legal Cyber Security Specialist to join our team and provide expertise in the area of cyber security and data protection. The specialist will be responsible for conducting legal analysis related to cyber security incidents, advising on compliance with...
TECHNICAL REQIUREMENTS:
● Strong capabilities to analyze complex security attacks and perform efficient incident triage.
● Solid... ...PRIMARY RESPONSIBILITIES:
● Detect, Analyze and classify cyber security incidents & threats via different logs sources across...
...Cybersecurity Specialist, you will play a crucial role in ensuring the security and integrity of our organization's information systems and... ...alerts received from AWS security tools.
Escalate to the Cyber Security Manager for confirmed incidents.
Assist in the...
...As a Senior Cyber Security Analyst,
You will safeguard our infrastructure and users, minimizing risks posed by cyber threats. You will promptly and effectively handle cyber attacks and data breaches, ensuring minimal recurrence of incidents.
Some of the things we...
...The role is primarily responsible for providing SOC Tier 2 Security Incident analysis to ensure that Vestas Microsoft and other security... ...and McAfee-based security services are handled.
Enterprise Cyber Security Global Security Operations Center Security Operations...
...tactics, techniques, and procedures (TTPs) used by adversaries using open sources (public information such as GitHub, social media, security vendor reporting,, etc); closed sources (dark web and underground forums); and other proprietary sources using research tools...
...escalate and collaborate on risk management.
Communicate legal insights to executives.
Collaborate cross-functionally for legal-security alignment.
Leverage 3+ years' law firm or in-house counsel experience.
Demonstrate subject-matter expertise in legal and...
...requirements.
⢠Review penetration testing & and vulnerability assessment reports and perform risk assessments to identify security gaps and recommend remedlation actions.
⢠collaborate with clients to create and maintain incident response plans, disaster...
...Company Description Secure-Centric is a technology company with a mission to replace value-added resellers with next-gen automation.... ...Role Description
This is a full-time remote role for a Cyber Security Appointment Setter at Secure-Centric. As an Appointment...
Sourcepass is a unique full-service information technology service with the most skilled and knowledgeable certified professionals working in the industry.
Our forward-thinking approach ensures that we have the vision to anticipate potential obstacles and challenges...