Get new jobs by email
- What you´ll do Conduct IT control testing to produce validated documents on IT control effectiveness Demonstrate timeliness, accuracy, and knowledge proficiency in IT control processes Develop knowledge on IT controls and Governance, Risk and Compliance procedures...
- ...What you´ll do Conduct in-depth security assessments of IT systems, projects, and organizations to identify risks and improvement opportunities Provide expert consultation to business and IT stakeholders on applying information security and cybersecurity best practices...
- A Security Officer's job description involves patrolling and monitoring premises, controlling access, and responding to emergencies to ensure the safety and security of people and property. They may also be responsible for operating security systems, conducting inspections...
- ...cybersecurity. - At least 5 years in a managerial role handling security and network teams. - Proficiency in Japanese (at least JLPT N3... ...: ・Ensure robust firewall and security measures to prevent cyber threats. ・Implement change management and incident response procedures...
- ...traveler supplier ties outside of the United States. Known as one of the country's top travel companies. Position: Information Security Engineer Company Industry: Travel Industry Work Location: Makati Site, QC, Alabang, Cebu, and Bacolod Work Schedule: Flexible...
- ...About the Role: A financial services company is on the lookout for IT Security Head. Responsibilities: Ensure the effective management and administration of the companys security infrastructure and the protection of the company's computer network, systems...
- ...and flexible work environment empowers our colleagues to reach their full potential. Job Description We are seeking a Security Data Engineer to drive the automation of our data pipelines, dashboards, and reporting infrastructure across a diverse set of...
- ...We are seeking a detail-oriented and technically proficient Secure Code Engineer to help ensure our financial applications are developed and deployed securely. This role is ideal for someone with a strong programming background and a passion for software security, particularly...
- ...The Senior Microsoft Security Architect will provide technical expertise in the secure design, implementation, and development of the firm's M365 environment. The architect will develop and implement policies to ensure the security and availability of the firm's M365...
480000 Php per year
...Conducting penetration testing, simulating an attack on the system to find exploitable weaknesses. Developing and implementing security framework, policies, processes/procedures and guidelines. Maintaining security subject-matter expertise and keep abreast of best...- ...YOUR IMPACT ON THE BUSINESS The Information Security Officer will play a crucial role in supporting the Chief Information Security Officer (CISO) or Information Security Head in ensuring the organization's information security practices and compliance with regulatory...
- ...Role Outline Supports Technical Security operations center for NAMR Answering phone calls from NAMR retail branch personnel regarding PIN (personal identification number) access or from NAMR technicians working on retail video camera service tickets NAMR Alarm...
- ...passionate about technology and its potential to transform the way people live and work. Role Summary: The Presales Engineer - Security will support the Cybersecurity Services portfolio and collaborate closely with product presales, delivery teams, and sales to...
- ...looking for authentic and accountable team players to collaborate with us to reach our goals. What would you do? Our Network Security Engineer is a part of a diverse and talented Cloud Networking team that works with a wide range of physical and logical...
- ...maintenance. Work on upgrades, migrations, and maintenance of the SAP Fiori authorization. Define privileges and roles with HANA Security, Fiori Security, BI7 Security, ERP and CRM Security according to SAP best practices. Facilitate the implementation of small to...
- ...obligations Provide expert consultation on technical and information security matters, supporting the development, implementation, and... ...Governance, Risk & Compliance team Support the third-party cyber risk management program to comply with legal supply chain risk...
- ...Responsible for securing data, network, and applications in system development or system implementations. Perform threat modeling, business and technical process analysis, application security and architecture reviews to evaluate, identify vulnerabilities and enforce...
- ...The Security Data Loss Prevention Manager will oversee and manage the organization's data loss prevention strategies and technologies. This role is vital for safeguarding sensitive information from unauthorized access, loss, or misuse. It aims to protect and continuously...
- ...The Security Data Loss Prevention Engineer will be responsible for data loss prevention, as part of the global security engineering team monitoring the use and efficacy of current tooling and ensuring a continuous improvement program is in place. The role-holder will...
- Our client is consulting company providing support to business across the globe. Responsibilities: Requirement Assessment: Conduct workshops with senior members of customer organizations to drive requirement assessments Customization and Integration...
30000 Php
About Us: We are seeking a reliable Security Officer. This position requires monitoring surveillance systems, responding to incidents, and ensuring the safety and security of our staff and visitors. Responsibilities include monitoring and surveillance, this often...- ...such mobile applications and thick client, all in a stealthy operation without being detected, in order to identify potential security weaknesses in the system. Collaborate with ITG developers by communicating the back doors/security weaknesses identified and providing...
- ...Responsibilities ~ Monitor organization’s networks for security breaches and investigate when one occurs ~ Use and maintain software, such as firewalls and data encryption programs, to protect sensitive information ~ Check for vulnerabilities in computer and...
- ...framework Must be a self-starter and loves to collaborate with the team and client Job Summary Develop and enforce security plans and standards; ensures that network and system security best practices are executed and implemented. Prepare the plans to...
- ...We are seeking a highly skilled and motivated Java and React Research Analyst with a strong focus on resolving security vulnerabilities. In this role, you will be responsible for conducting in-depth analysis of Java and React applications to identify and address potential...
- ...loves to collaborate with the team and client About the Role We are seeking a detail-oriented and technically proficient Secure Code Engineer to help ensure our financial applications are developed and deployed securely. This role is ideal for someone with a...
- ...routers, switches, and firewalls. Monitor and troubleshoot network performance, including connection issues, bandwidth usage, and security vulnerabilities. Perform basic configuration tasks, such as setting up IP addresses, subnets, and VLANs. Maintain...
25000 Php
QUALIFICATIONS ~Bachelor’s degree from an accredited college or university preferred ~Prior experience working in customer support or in a call center environment is preferred but not required ~Proficient in written and verbal English ~Basic technical skills—able to...- ...Office - Makati City Summary BlueVoyant is looking for a Security Operations Center (SOC) Manager to help our global customers manage... .... Ability to analyze event logs and recognize signs of cyber intrusions/attacks Ability to handle high pressure situations...
- ...proactive registration and enforcement. Manage licensing, trademark applications, and IP dispute matters. 8. Data Privacy and Cyber security Ensure compliance with the Data Privacy Act of the Philippines and applicable international laws such as GDPR. Draft...