Get new jobs by email
- ...About The Role The Cybersecurity Manager acts as a strategic liaison between CISO, control owners and committee members and oversees cybersecurity governance activities, acting as the secretariat for critical committees (e.g., ISM Working Group, ISRMC), and facilitating...
- ...Job Description Essential Job Functions: Support the management of security initiatives under the direction of senior security personnel. Assist in implementing security policies and standards, collaborating with the security team. Monitor security events...
- ...Governance & Policy Managemen ~ tDevelop, maintain, and enforce cybersecurity policies, standards, and procedure ~ sEstablish control... ...compliance progra msStrong communication and stakeholder management skil ls Technical Knowle ~ dgeSecurity frameworks:...
- ...Minimum of 20 years in sales role At least 7 years in managing a team of sales Proven track record of meeting or exceeding... ...planning and ability to align sales goals with organizational cybersecurity strategy Excellent communication, relationship-building skills...
- ...Sales Group is to generate revenue by selling the company's cybersecurity products and services to customers. They are responsible for... ...targets and scaling enterprise-level accounts Experienced in managing sales team and collaborating with cybersecurity engineers and...
- ...by Jobgether on behalf of a partner company. We are currently looking for a Senior Project Manager - REMOTE. In this role, you will lead critical projects related to cybersecurity and risk management, ensuring their successful execution and alignment with regulatory...
- ...Job Expectations: Position Type: Experienced - Lead/Manager Employment Type: Full-Time Permanent (Direct Hire) Work Setup... ...About the Job: We are looking for an experienced Cybersecurity Manager to join our clients team and lead threat intelligence...
- ...Cybersecurity (Senior Associate–Manager Level) Role Overview The Cybersecurity professional will be responsible for monitoring, managing, and responding to security threats across the organization. This role supports day-to-day security operations and may lead teams...
- ...Customer-focused mindset and ownership attitude Flexibility to work in hybrid and shift environments Applicable Across IAM Platforms Such As Identity Governance, Access Management, and Directory Services platforms across cloud and enterprise environments....
- ...We are hiring Cybersecurity Engineers with expertise in Identity and Access Management (IAM) to support implementation, integration, and operations of enterprise identity security solutions. This role involves identity lifecycle management, access governance, provisioning...
- ...Job Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and... ...sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential...
- ...approaches for systems and applications to meet growing and evolving Cybersecurity trends Pilot and evaluate new technologies for... ...key risk indicators (KRIs) for all leaders Assist in alarm management capabilities Partner with various security teams to build...
- ...term Publication Date: 20 Jan 2026 Mission A skilled Cybersecurity Engineer is sought to support a metro project in the Philippines... ...(IT) systems, working under the guidance of the Cyber Manager based at the company's France headquarters. As this is not a full...
- ...Manulife is looking for a Cybersecurity Specialist with a passion for security policies and compliance standards to remediate security... ...Cybersecurity Specialist will report to the Director of Control Management and Governance and help remediate security findings. The role...
- ...Job Title Cybersecurity Intern Purpose of the role The Cybersecurity Intern will be part of the SOC (Security Operations Center... ...and follow-up on potential security risks detected Execute management & support personnel escalations Work with other members of...
- ...has been viewed 5283 times Job Description # CYBERSECURITY PROFESSIONAL Salary Grade : SG 19 (Php 51,357.00)... ...practices and regulatory requirements. Identify, assess, and manage potential cybersecurity risks and vulnerabilities in the...
- ...Engineering, Cyber Security, Forensics and/or equivalent work experience. ~2+ years of relevant work experience ~ Certification in cybersecurity (e.g. Security+, CCNA Cyber Ops, CCSP, GCIA, GCIH, CEH, CySA+, OSCP, etc.) Experience and knowledge conducting analysis of...
- ...Join a fast‑growing cybersecurity sales team with training & career growth. Drive end‑user sales across AU/NZ in a fast‑growing cybersecurity... ..., healthcare, mining, retail, and SMB. Job Description Manage assigned accounts: renewals, upselling, and new business...
- ...Growing together. Primary Responsibilities Implement and manage macOS security measures to protect against unauthorized access... ...to do so Required Qualifications ~ Bachelor's degree in Cybersecurity, Information Technology, or a related field ~7+ years of experience...
- ...career in our Cyber Crime and Breach Response practice, within Cybersecurity and Privacy services, will provide you with the opportunity... ...by applying advanced and strategic approaches to information management. We focus on assisting organisations manage vast amounts of electronic...
- ...~ Group life insurance OVERVIEW AND REPORTING RELATIONSHIP This analyst will be a member of the Threat Management team, reporting to the Cybersecurity Manager. This position will be responsible for various technical cybersecurity analyst functions, including vulnerability...
- ...stakeholders, including incident response teams, IT personnel, and management, to address high-priority and high-severity findings.... ...is a Plus - Possess relevant certifications in the field of cybersecurity, such as SANS GCFA (GIAC Certified Forensic Analyst), GNFA (GIAC...
- ...implementation, contributing to process improvement and people management within a unified 'One Globe' approach. The role emphasizes a... ...through joint visits during sales calls. Scope clients' Cybersecurity requirement from a technical and business perspective Reviews...
- ...experience. Information Security (InfoSec) - InfoSec prevents, detects, responds, and mitigates cybersecurity risk, protecting EY and client data, and our information management systems. The opportunity The Cyber & Investigative Services (CIS) Senior Cyber Incident...
- ...About the job Senior Cybersecurity Analyst Security isn't a department. Its a mission--and you'll help lead it. Hi! We're Smartsourcing... ..., and guide the business through threat monitoring, identity management, and incident response readiness. Where You'll Be: JEG...
- ...technologies with life insurance makes it possible for people to manage their finances more effectively and efficiently. Singlife is... ...to the wider market. Job Summary: The Head of Cybersecurity & Infrastructure is accountable for the end-to-end security, resilience...
- ...and anticipate opening a role that could be a great fit for Cybersecurity professionals. While the position isn't officially open yet,... ...including but not limited to SIEM (Security Information and Event Management), antivirus software, intrusion detection systems, and log...
- ...our commitment to diversity, inclusion and belonging. The Cybersecurity Governance Analyst is responsible for assessing information security... ...and engagement. This role also supports third-party risk management processes, responds to customer audit and evaluation requests...
- ...Functional Responsibilities Develop, implement, and maintain cybersecurity policies, standards, and procedures in alignment with... ...Controls, SOC 2, and regulatory obligations. Assist in the management of third-party risk assessments and vendor security evaluations...
- ...small company with a big dream: To forever change how diabetes is managed. To unlock information and insights that drive better health... ...team is a competitive group of individuals who work on these cybersecurity pillars: Cybersecurity Operations Center (SOC), Attack Surface...