Get new jobs by email
- ...ideal candidate will: At least 12 months of Privileged Access Management domain experience Act as a lead and work stream participant... ...processes Ability to work with multiple stake holders from Security, Operations, Application Owners and Service Providers on...
- ...technology, or similar ~1-2 years of experience in DLP monitoring, compliance, or IT audit. ~ Familiarity with DLP tools, M365 Security Center, or CASB platforms ~ Knowledge of SOC2 confidentiality and privacy requirements ~ Preferred certifications: CompTIA...
- ...Cybersecurity Engineer will be responsible for strengthening the security posture of the platform by identifying vulnerabilities,... ...Work with engineering to enforce secure coding standards Manage IAM, encryption, and data protection controls Evaluate third...
- ...To accomplish all assigned tasks by the management in a timely and effective manner as deemed... ...Evaluate the effectiveness of existing security controls and provide recommendations for improvements. Simulate real-world cyber-attacks to identify potential weaknesses....
- ...We are excited to announce a pivotal opportunity for an OT Cyber Security Specialist role to join our esteemed Orica GBS team in our Manila... ...Business Impact Assessments, developing Service Continuity Management plans, and creating standardized documentation templates for...
- ...experience in cybersecurity, SOC, incident response, or vulnerability management ~ Experience with tools such as CrowdStrike, Microsoft... ...a Cybersecurity Analyst to support vulnerability management, security monitoring, and incident response across global systems. This...
- ...HIRING…. We are looking for experience for Cyber Security Engineer to support our US team. Location: Hybrid /Taguig City, Philippines... ...implementation of a strategic Certificate Lifecycle Management (CLM) program in a complex enterprise environment. Design...
- ...The STAR intern deployed in our Cyber Security Team will be immersed in an enhanced student workforce curriculum, which will enable... ...day-to-day activities Enhance your creativity and project management skills through process improvements and efficiency tools Improve...
- ...We are seeking a detail‑oriented Cyber Security Analyst to operate and optimize our endpoint, secure web gateway/ZTNA, and email security... ...rates, blocked threats, and policy efficacy. Incident Management & Compliance Own incident lifecycle: identification, classification...
- ...Not offered / Not required Reports To: Content Lead / SEO Manager Role Purpose: Produce 6-8 SEO-optimized articles per month... ...-in. Preferred Qualifications: ~1+ year experience in Cyber Security content writing ~3+ published samples demonstrating search...
- The position is primarily responsible for implementing and monitoring cybersecurity compliance programs, security controls, and policies to ensure the organization meets regulatory and legal requirements. The position is also responsible for supporting audits, conducting...
- ...Is this your next challenge in Cyber Security Analyst We are expanding and looking for a SOC Engineering Specialist to join our IT Security Team. This position is the Level 2 blue team for manage SIEM platform, cyber security investigations and incident handling....
- ...CyberOne CyberOne is a pure-play Microsoft security partner dedicated to helping enterprises... ...Title: Presales Associate – Microsoft & Cyber Security Solutions Location: Remote... ...UK presales team to align priorities and manage workload ~ Ensure presales outputs...
- ...coordination Daily Cybersec Ticket Management Vulnerability Assessment and Pen Testing... ...implemented solutions. · Work with Security Governance Team to ensure compliance... ...Penetration Testing tools; Experience in cyber security-related duties such as incident...
- ...inspired by a team of the brightest business and technical minds in cyber security. We are passionate champions for our clients and know from... ...and experienced Cybersecurity Engineering & Operations Manager to join our team. The ideal candidate will have a strong background...
- ...organization to implement on enhance network security system from Group requirements and... ...of response team to handle network and cyber security issues. The incumbent will also... ...Security Key Responsibilities: • Provide management oversight to all IT security operation...
- ...within Information Technology • Have experience with Security Solutions and a good under-standing of Cyber Security (especial SIEM, EPP/EDR, NDR + hardening of... ...of the implementations in Cyber Defence Center on managed SIEM services, vulnerability management, hardening...
- HIRING…. We are looking for experience Cyber Security Analyst to support our US team via remote. Location: Remote Employment Type... ..., findings, and steps taken for remediation Access Management & Automation: Manage the onboarding and offboarding of team...Remote job
- Apply security skills to design, build and protect enterprise systems, applications, data,... ...applications, and business processes against cyber threats. Summary: As a Security... ...Expected to be an SME. - Collaborate and manage the team to perform. - Responsible for team...
- ...The Security Manager oversees and organizes security operations across all facilities and projects serviced by 1RE. This includes developing and implementing strategic security policies and procedures to ensure compliance with security standards and guidelines for Luzon...
- Apply security skills to design, build and protect enterprise systems, applications, data... ...applications, and business processes against cyber threats. Summary: As a Security... ...proficiency in Application Vulnerability Management Operations. - Strong understanding of security...
- ...Machines uses AI/ML to build enterprise security products. We apply our research to systems... ...teams, and rapid iteration. As a Senior Cyber Security Analyst, you will leverage your... ...is a must-have. Knowledge of managing, securing and preparing production web environments...
- Deliver and manage security services across client environments to ensure protection, compliance, and operational resilience. Project Role... ...infrastructures, applications, and business processes against cyber threats. Must have Skills : Web Application Firewall (WAF) Job...
- Apply security skills to design, build and protect enterprise systems, applications, data... ...applications, and business processes against cyber threats. Job Posting Title:... ...as SIEM (Security Information and Event Management), endpoint security solutions, network...
- ...About the Role The role of this position is to support the Security Manager in ensuring the effective protection of ATI's port facilities, personnel, and assets. The Assistant Security Manager will assist in overseeing security operations, implementing policies and...
- Apply security skills to design, build and protect enterprise systems, applications, data... ...applications, and business processes against cyber threats. Summary: As a... ...in Splunk Security Information and Event Management (SIEM) Operations. - Additional Good To...
- ...able At N-able, we're not just helping businesses be secure —we're redefining what it means to be cyber resilient. Our end-to-end platform blends AI-powered... ...and flexible tech stacks, so customers can manage, secure, and recover with confidence. But the real power...
- ...Job Description Department Safety & Security Office Employee Type Probationary The Security Manager is responsible for the overall mall security management. He/she will ensure that the mall customers are safe and delighted while shopping, dining, and enjoying...
- ...of such subject matter include malware developments, offensive security tools, vulnerability exploits, cloud security, and mobile security... ...● B.S. equivalent in computer science, information systems, or cyber intelligence ● Two (2) years professional experience ●...
- Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard... ...infrastructures, applications, and business processes against cyber threats. Job Posting: Android Malware Reverse Engineer...
