Get new jobs by email
- ...JOB RESPONSIBILITIES: Security – In charge of Data Protection to safeguard sensitive business data System Performance Optimization – well-designed authorization to optimize compute efficiency by reducing unwanted processes and unauthorized data access. User...
- ...Job Summary: The IT Security Analyst with Fraud Management Experience is responsible for protecting the organization’s information systems and data from security threats, while also focusing on identifying, preventing, and managing fraud. This role involves conducting...
- ...Enterprise Platforms, Data Analytics & AI, Cybersecurity, Strategy Governance & Transformation. In a competitive landscape where security and compliance are non‑negotiable, we are strengthening our security governance capabilities by creating two positions of...
- ...The ideal candidate executes the overall security program of his assigned mall. To maintain a safe and secured environment for all the customers, employees, guests, and other personnel within the mall he is assigned in, as well as other business related structures, in...
- ...Operationalizing projects and automations ~ Serve as a highly technical security expert to bring security transformation to both new and legacy... ...environment ~ Develop agentic AI capabilities with Cyber Security training ~ Develop and maintain dashboards that...
- ...The Senior Cyber Security Engineer is a key technical leader within the company's security engineering organization and plays a central role in transforming our traditional Security Operations Center into an AI driven, investigation centric threat response function....
- REQ14047 Analyst, Cyber Security Operations (Open) Position Summary The Analyst, Cyber Security Operations executes daily operations procedures as part of their daily task and responsibility. He / she conducts the detailed and repeatable execution of all security...
- ...planning: Gain insight into local laws and regulations, understand security and privacy requirements of local governments, regulators, and... ...such as firewall and penetration testing. Be familiar with cyber security and privacy protection laws and regulations. (e.g....
- ...YOUR OPPORTUNITY Join Bacardi at the cutting edge of AI security, helping protect our expanding AI ecosystem from emerging threats... ...with senior security and data experts, shaping AI governance and cyber defence while gaining hands‑on experience across real AI risks...
- Axos Business Center, Corp About This Job The VP of AI‑Driven Security Engineering is a senior leadership role reporting directly to the Chief Information Security Officer. This executive will drive Axos Bank's modernization of Security Operations through AI driven...
- ...providing business outsourcing needs to its clients Position: Cyber Threat Analyst Company Industry: IT Company Work Location:... ...and evaluate cyber threat incident information to enhance client security. Monitor and stay up to date on emerging cyber threats and...
- ...Your potential has a place here with TTEC’s award-winning employment experience. As an Information Security Tools Engineer working remotely in Metro Manila Philippines, you’ll be a part of bringing humanity to business. #experienceTTEC Our employees have spoken. Our purpose...
- ...Qualifications: Bachelor’s Degree in Computer Engineering, ECE, or related course. Minimum 3–5 years of experience in network or security engineering. Strong troubleshooting skills and familiarity with VLANs, routing, VPN, and firewall policies. Understanding of...
- ...Intuition Machines uses AI/ML to build enterprise security products. We apply our research to systems that serve hundreds of millions... ...low overhead, small teams, and rapid iteration. As a Senior Cyber Security Analyst, you will leverage your expertise in bot detection...
- ...will engage in the design, development, and implementation of security solutions aimed at safeguarding digital assets and business operations... ..., and processes, ensuring robust protection against cyber threats, unauthorized access, and data breaches. You will also...
- ...activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation... ...blue team exercises with relevant intelligence. Monitor the cyber threat landscape for emerging tactics, techniques, and procedures...
- ...'re on a mission - to make the world a safer place by stopping cyber-attack breaches through our global Ethical Hackers' Network. Founded... ..., Germany. We provide a disruptive approach to Cyber Security through Bug Bounty programs, by connecting more than 100,000+ Ethical...
- ...Zone IT Solutions is seeking an experienced Security Consultant. In this role, you will provide expert advice and guidance on a range... ...and technologies. Requirements: Bachelor's degree in Cyber Security, Information Technology, or a related field, Proven...
- ...practices to continuously enhance the vulnerability management program Requirements Bachelor's degree in information technology, cyber security, or a related field. Prior experience in vulnerability management, programming, or a related technical role is highly...
- ...Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard... ...infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you will be...
- ...distributing products and services to 117 countries/territories around the world. To learn more, visit . What does an IT Security Analyst – Cyber Preparedness? Sealed Air Shared Service (Philippines) Inc. is seeking a Cyber Resilience and Business Continuity Analyst...
- Design, develop, and implement security solutions to safeguard digital assets and business operations. Integrate security controls into... ...enterprise systems, applications, and processes to protect against cyber threats, unauthorized access, and data breaches. Project...
775000 $ per day
...will engage in the design, development, and implementation of security solutions aimed at safeguarding digital assets and business operations... ..., and processes, ensuring robust protection against cyber threats, unauthorized access, and data breaches. You will also...- Information Security Governance & Operations Our Mission Our goal is for everyone to make bolder choices with their finances.... ...stakeholders in addressing security incidents, breaches and different cyber threats reported by the security operations team. Perform...
- ...better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Service line: Cyber Security - Position Title: Senior Incident Response Analyst At EY, we’re all in to shape your future with confidence. We’ll help...
775000 $ per day
...tech stack and certifications. We are seeking an experienced Cyber Threat Intelligence Analyst to join our dynamic and growing... ...identifying and mitigating cyber threats, enhancing the organization's security posture, and protecting critical assets. Responsibilities:...- Design, develop, and implement security solutions to safeguard digital assets and business operations. Integrate security controls into... ...enterprise systems, applications, and processes to protect against cyber threats, unauthorized access, and data breaches. Summary: As...
GDS Consulting | Cyber Security - Strategy, Risk, Compliance and Resilience (SRCR) Senior Consultant
...become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (SRCR) – Technology Consulting – Senior As part of our EY Strategy, Risk, Compliance and Resilience (SRCR) Technology...- ...Position: AI SECURITY EXPERT Salary rang e: up to ₱150,000 PHP (with the final offer subject to the client’s discretion based on... ..., production-ready systems that are robust against an evolving cyber threat landscape. Core Responsibilities Your focus will...
- ...Security Operations Analyst Are you passionate about defending global enterprises from evolving cyber threats? Do you thrive in fast-paced environments where every alert could be the next big incident, and where your analytical instincts make a real difference? If...



