...leading conglomerate based in the Philippines, with entities present across different industry sectors.
Job Description
Cyber Security Operations - Operational and management responsibilities in cloud security, application security, incident response & management...
50000 Php
...status and/or sexuality.
Team player, collaborative, and persuasive; able to work well with executives and non-executives.
• Open to consider CL10 internal applicants with bachelor’s degree in law and vast exposure in Cyber Security or coming from ASOC/CIRT/DLP teams.
In this role, your responsibilities will be:
• Providing security guidance or solutions during the development stages of software systems... ...cybersecurity and technology
• Providing standby support for cyber security incident response (CIRT)
• Defining, implementing,...
Position: Legal Cyber Security Specialist
Location: Mandaluyong City, Metro Manila
Responsibilities:
Apply legal expertise for cybersecurity contract assessment.
Collaborate with internal teams for legal compliance.
Exercise judgment for risk mitigation in line with...
We are seeking a Legal Cyber Security Specialist to join our team and provide expertise in the area of cyber security and data protection. The specialist will be responsible for conducting legal analysis related to cyber security incidents, advising on compliance with data...
...freedom.
About the role
As a Cybersecurity Specialist, you will play a crucial role in ensuring the security and integrity of our organization's information... ...from AWS security tools.
Escalate to the Cyber Security Manager for confirmed incidents.
Assist...
...escalate and collaborate on risk management.
Communicate legal insights to executives.
Collaborate cross-functionally for legal-security alignment.
Leverage 3+ years' law firm or in-house counsel experience.
Demonstrate subject-matter expertise in legal and...
250000 Php
Cyber Security Senior Manager
Summary
The Cyber Security Senior Manager will play a critical role in safeguarding our company's digital assets, customer data, and information systems. This position demands a highly skilled and experienced professional
capable of developing...
80000 Php
Requirements:
A degree holder in any Computer related course.
Has certifications from training in various computing & digital technologies.
Strong background in Cybersecurity.
IT consultancy, Product research, or technical related experience is required.
...
...Together, we forge the path to endless possibilities!
Simulating cyber targeted attacks using hackers’ techniques, tactics and... ...source code review when required
Prepare a report on identified security vulnerabilities, attack paths and possible recommendations to remediate...
...Cyber Security Operations Center Specialist
Security (Information & Communication Technology)
A specialist who monitors networks, computers, and applications looking for events and traffic indicators
that signal intrusion or indicators of compromise. Triages...
...Summary
A Cyber Security Consultant is an expert in the field of information technology security. Their job is to protect the company from bad actors or hackers, They work to make sure that networks are safe from external threats like hackers or crackers who want access...
...As a Senior Cyber Security Analyst,
You will safeguard our infrastructure and users, minimizing risks posed by cyber threats. You will... ...Azure compliant tools used by the business
Works with Network Specialist to manage and monitor VPN and firewall rules
Works with...
...Duties and responsibilities
Monitor the organization’s computer networks and systems to identify any violations and security breaches that need to be resolved.
Install and utilize software, such as firewalls and data encryption programs, to help protect the company...
...boundary, supporting infrastructure and applications).
Use cyber defense tools for continual monitoring and analysis of system activity... ...cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition...
...compliance with industry standards such as PCI DSS and ISO 27001, including conducting regular audits and assessments.
Network Security: Oversee the design and maintenance of network security systems and protocols to safeguard against unauthorized access, data breaches...
...Under general supervision, serves as part of the Security Operations Center (SOC) team and will be on the forefront of incident response utilizing the latest in network security technology while providing support to ULs internal network.
A global leader in applied...
TECHNICAL REQIUREMENTS:
● Strong capabilities to analyze complex security attacks and perform efficient incident triage.
● Solid... ...PRIMARY RESPONSIBILITIES:
● Detect, Analyze and classify cyber security incidents & threats via different logs sources across...
...The role is primarily responsible for providing SOC Tier 2 Security Incident analysis to ensure that Vestas Microsoft and other security... ...and McAfee-based security services are handled.
Enterprise Cyber Security Global Security Operations Center Security Operations...
...tactics, techniques, and procedures (TTPs) used by adversaries using open sources (public information such as GitHub, social media, security vendor reporting,, etc); closed sources (dark web and underground forums); and other proprietary sources using research tools...
...requirements.
⢠Review penetration testing & and vulnerability assessment reports and perform risk assessments to identify security gaps and recommend remedlation actions.
⢠collaborate with clients to create and maintain incident response plans, disaster...
...#JoinTheIdea.
Learn more: jti.com
Department: Cyber Security Center
Duty Post: Taguig City
Hiring Manager:... ...international corporation in a multicultural environment
~ Specialist in security technologies. Web based security technology and complex...
Sourcepass is a unique full-service information technology service with the most skilled and knowledgeable certified professionals working in the industry.
Our forward-thinking approach ensures that we have the vision to anticipate potential obstacles and challenges...
Cyber Security [ CIRT Forensic Inv Senior Analyst]
Location: Mandaluyong City, Metro Manila
Qualifications:
- Bachelor's degree in computer forensic or digital forensic or cyber security
- Industry Certificate in Multiple operating systems and /or network
-...
...computers, and applications looking for events and traffic indicators that signal intrusion or indicators of compromise. Triages security alerts and responds according to published protocols. He is responsible for evaluating security logs for new technologies, defining...
Start Date – Approx 15th March
Duration – 1 year, subject to extension for 3 years
• Detail JD – Expertise in cyber security frameworks such as ISO27001, NIST 800-53, NIST CSF, PCI-DSS, ISO22301, data privacy etc.
• Skilled in risk management, risk assessment and...
...Job Summary
The Cyber Security Engineer is an individual contributor role supporting the global program to actively identify and remediate network, system and application vulnerabilities across Qualfon infrastructure. This role is responsible across all the global...
• Oversee implementation of Cyber security controls according to Group policy and standards covering both technology and operation.
• Conducting Cyber Security related reviews for IT Function and share any exceptions with management such as Database Security Review,...
Demonstrates thorough knowledge and/or a proven record of success in:
• Performing vendor security assessments, including site assessments.
• Performing security control reviews across security domains, both physical and logical.
• Performing control reviews against...
...and serving as Manager for a minimum of 10 years or 5 years as Senior Manager, of recent relevant work experience in information security or information technology discipline, preferably in a business consulting role with a leading technology consultancy organization...