Get new jobs by email
- ...recruitment agency in the Philippines, is proud to partner with a leading tech company in the Philippines in their search for a Cyber Security Specialist based in Ortigas . Salary Range : ₱70,000 Work Setup : Onsite Shift Schedule : Day Shift Location...
- ...Role Summary: The Cyber Delivery Leader for KPMG Philippines will be responsible for leading and managing the delivery of cybersecurity... ...cross-functional collaboration, and ensuring the timely, secure, and high-quality execution of cybersecurity initiatives. This position...
- The Security Awareness Officer leads the companys security awareness and behavior-change initiatives, building a culture of cybersecurity across all teams. The role develops engaging content, manages phishing simulations, tracks training compliance, and partners with HR...
- ...response workflows and automation, while developing and maintain playbooks, scripts, and integrations within XSOAR to streamline security operations. This role will support complex operational security services and tools in the cloud within the defined timeframes and...
- ...The Senior Cyber Security Engineer is a key technical leader within the company's security engineering organization and plays a central role in transforming our traditional Security Operations Center into an AI driven, investigation centric threat response function....
- ...Senior Developer, ASW Philippines. What You'll Do Assist in the maintenance of our security infrastructure and 3rd Party services. Works with different members of the cyber security team to identify, select, and implement technical controls. Assist in...
- REQ14047 Analyst, Cyber Security Operations (Open) Position Summary The Analyst, Cyber Security Operations executes daily operations procedures as part of their daily task and responsibility. He / she conducts the detailed and repeatable execution of all security...
- ...assessments and penetration testing across applications, infrastructure, and cloud environments. The role focuses on identifying security weaknesses, assessing risks, and delivering clear, actionable reports. Key Responsibilities: 1) Conduct VAPT on: Web, mobile...
- ...executive business processes and address the full lifecycle of the security cooperation process, including Pre-Letter of Request (LOR)... ...PMW-101 requirements. Reporting to the Program Manager, the Cyber Security Analyst provides cybersecurity engineering and information...
- ...construction service provider whose primary focus is on complex specialist foundation engineering work in difficult ground conditions. Cyber Security Engineer (m/f/x) Job ID: req2236 For our subsidiary BAUER Foundations Philippines, Inc. in Quezon City, we are searching...
- ...Is this your next challenge in Cyber Security Analyst We are expanding and looking for a SOC Engineering Specialist to join our IT Security Team. This position is the Level 2 blue team for manage SIEM platform, cyber security investigations and incident handling....
- ...confident that we can achieve this goal. Job Description This role is responsible for leading the technical aspects of cyber security project deployments, ensuring on time, on scope, and on budget completion. He/she will be a champion of security best practices...
- ...planning: Gain insight into local laws and regulations, understand security and privacy requirements of local governments, regulators, and... ...such as firewall and penetration testing. Be familiar with cyber security and privacy protection laws and regulations. (e.g....
- This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Cyber Security Architect. In this role, you will have a significant impact by collaborating with product development and engineering teams to enhance security measures for...
- Intuition Machines uses AI/ML to build enterprise security products. We apply our research to systems that serve hundreds of millions of... ...low overhead, small teams, and rapid iteration. As a Senior Cyber Security Analyst, you will leverage your expertise in bot...
- ...making sure they are properly used according to the Information Security Policy. He/She proactively works with relevant business units... ...Periodically assess security tools/systems' adaptability to ever evolving cyber threat landscape Attend to ad hoc service requests involving...
- ...Bachelor's or master's degree in computer science, Information Security, or a related field. · 20+ years of experience in cybersecurity... ...programs for enterprise clients. · Strong understanding of cyber transformation (Identity & Access Management) Cyber threats, risk...
- ...Job Summary: The Security Governance and Assurance Analyst supports the roll out and implementation of the Information Security/Cyber Security Policies. He/she will work with the various Infosec representatives from the business groups and provide guidance on the procedures...
- Axos Business Center, Corp About This Job The VP of AI‑Driven Security Engineering is a senior leadership role reporting directly to the Chief Information Security Officer. This executive will drive Axos Bank's modernization of Security Operations through AI driven...
- ...Education Experience Responsibility . Conduct daily feasibility studies to assess the viability and effectiveness of potential security measures or initiatives. . Identify opportunities for process automation within the security operations function. . Perform...
- ...Knowledge Transfer for the implemented solutions. · Work with Security Governance Team to ensure compliance with Cybersecurity-related... ...tools and Penetration Testing tools; Experience in cyber security-related duties such as incident detection and response...
- ...Qualification: • A practical education within Information Technology • Have experience with Security Solutions and a good under-standing of Cyber Security (especial SIEM, EPP/EDR, NDR + hardening of M365 etc. • Have practical experience with SIEM systems and have...
- ...Implementation of other store administrative activities necessary to carry out the business such as but not limited to office organization, securing of government permits and Store report preparation and programs such as store safety. Qualifications: Must have...
- ...STRATEGIC STAFFING SOLUTIONS (S3) Position : Cyber Risk Analyst Work Set-Up : Hybrid (2x per week onsite) Office Location:... ...stakeholders—without needing to be the deepest functional expert in every security domain. Key job responsibilities Analyze security and...
- ...Responsibilities: Hunting Hunter is responsible for proactive monitoring the security logs to identify, isolate, and detect the threats. Investigating potential cyber threats. This includes monitoring network activity, analyzing security logs and alerts,...
- Title: Management Trainee - Batangas City Position Summary The Management Trainee is responsible on the creation of higher level... ...schedule and monitoring man-hours usage. Ensure safety and security program effectiveness, implement standard procedures and control...
- ...JOB OVERVIEW: The LF Logistics Management Trainee Programprovides a good opportunity for people with high potential to become our future managers. You will be part of a global organization with more than 27,000 dedicated employees operating in over 17 countries. As an...
- ...Monitoring users' engagement with and feedback on every post. Analyzing and reporting on the effects of publications. Maintaining a secure database of all login credentials. Remaining abreast of changes to all pertinent social media applications. Exploring the...
- ...Description: As a Management Trainee, he or she will undergo a comprehensive training program designed to provide him or her with a solid foundation in management principles, processes, and best practices. The MT will have the opportunity to gain practical experience...
- ...training program that will cover different programming languages. Upon successful completion of the training program, the trainees will be assigned to different projects involving application development, quality assurance testing, systems implementation,...