Get new jobs by email
- Job Description: Managing day to day FM operations for the area Managing day to day lead time and success rate Coordinating with hubs within the area in overseeing FM operations Managing timely pickup based on seller preference with due diligence of achieving...
- Key Responsibilities: 1.Data Analysis and Reporting: Conduct in-depth data analysis to identify trends, patterns, and actionable insights. Generate comprehensive reports to communicate key performance indicators (KPIs) and operational metrics. 2.Process Mapping...
- ...ride-sharing, HiTech, FinTech, and HealthTech. The People First culture at TaskUs has enabled the company to expand its workforce... ...to supporting People First. What can you expect in a Security Compliance Associate role with TaskUs: Think of yourself as...
- ...ROLES IS IMPORTANT TO US: The IT Service Specialist is the first point of contact for all IT-related inquiries and issues reported... ...Align processes with ISO27001, CIS benchmarks, and internal security standards. Support audits by providing evidence of vulnerability...
- ...grow their wealth through blockchain technology. As one of the first crypto firms in the Philippine market, we feel a sense of duty... ...'d love to talk. General Responsibilities The Associate Security Engineer supports the organization's cyber defense and incident...
- ...Do you want to take the first step in making Filipinos' lives better everyday Here in GCash we want to stay at the forefront of the... ...activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation...
- ...CORE PROFILE Security Administrator is responsible for managing and administrating the organization's security tools and systems, ensuring proper monitoring, configuration, and maintenance. This role ensures that security tools are operational, properly configured, and...
- ...Under the guidance of the Senior Analyst, you will execute cyber security risk strategies, support supplier assessments, contribute to... ...OUR BEHAVIORS Own It Act With Urgency Foster a Customer-First Mindset Think Big and Execute Lead by Example Drive...
- ...Our mission is to make the world safer and more secure. And our core strength is the expertise of our people. We are committed to developing... ...Director. Please note that for training purposes, the first six months may require the applicant to do special hours to overlap...
- ...We are seeking a talented and imaginative Creative Designer to join our dynamic team! In this role, you will be producing digital-first assets (static, GIFs, and short-form videos 630s) tailored for Meta, TikTok, YouTube, and Google. This role focuses on execution and...
- ...About us: Staffviser is a people-first Employer of Record on a mission to help startups & companies find, deploy, and retain top employees from emerging markets. We support and empower our clients' employees through friendly management, career coaching, training opportunities...
- ...Responsibilities: Threat Modeling & Security Validation Conduct threat modeling and security reviews for distributed cloud-native... ...Engineering, DevOps, and Product teams to foster a security-first culture. Requirements: ~ Bachelor's degree in Computer...
- Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...Design, implement, configure, and maintain Palo Alto Networks firewalls and related security features (e.g., Panorama, Wildfire, Threat Prevention, URL Filtering, GlobalProtect). Administer and support F5 products, including BIG-IP LTM (Local Traffic Manager) and/or...
- ...Do you want to take the first step in making Filipinos' lives better everyday Here in GCash we want to stay at the forefront of the... ...including penetration testing, social engineering, and physical security assessments. Emulate threat actor behavior to test the effectiveness...
- Job Description: The Project Manager is responsible for the end-to-end planning, execution, and closing of projects, ensuring they are completed on time, within budget, and to the required scope and quality. This role involves leading cross-functional teams, managing...
- ...safe in the world of Cyber. With a key focus on engineering and automation, this role focuses on implementing strategic solutions to security problems, providing a secure environment for our customers and colleagues to operation in, without large operational overheads....
- ...good understanding of networking, RDP etc Understanding of ITIL processes Ability to work with multiple stake holders from Security, Operations, Application Owners and Service Providers on deployment activities and enhancing the IAM solution. Knowledge of Operating...
- ...technology, or similar ~1-2 years of experience in DLP monitoring, compliance, or IT audit. ~ Familiarity with DLP tools, M365 Security Center, or CASB platforms ~ Knowledge of SOC2 confidentiality and privacy requirements ~ Preferred certifications: CompTIA...
- ...This is a remote position. We are seeking a highly organized and dependable Security Administrator Intern to manage user access, credentials, and routine security operations across various business systems. The ideal candidate will have strong attention to detail...
- ...Job Description Conduct deep-dive analysis of operational data to identify improvement opportunities across first mile, middle mile, and last mile processes. Develop clear, structured recommendations and business cases to address operational and strategic challenges...
- ...The Platform Security Manager function oversees technical security for cloud and on-prem systems, ensuring secure-by design implementation across applications and infrastructure. It manages access controls, enforces security standards, reviews tools, conducts testing,...
- ...original work (plagiarism-free). Turnaround: 3–5 business days per first draft; 1–2 business days per revision round. Track delivery... .... Preferred Qualifications: ~1+ year experience in Cyber Security content writing ~3+ published samples demonstrating search...
- ...well-rounded individual. We supply you with all the pieces you need to do your best work, unleashing your full potential to help you secure your future and lead a fulfilling career. And with Metrobank's strong heart for the community, you have the chance to give back and...
- ...Job Description Department Safety & Security Office Employee Type Probationary The Security Manager is responsible for the overall mall security management. He/she will ensure that the mall customers are safe and delighted while shopping, dining, and...
- ...Network Security Engineers offer support for a wide variety of Network security-related devices. This includes, without being limited to Firewalls, Proxies, ISD/IPS, VPNs, Etc. Technologies include Cloud Providers (AWS, Azure, OCI), and vendors such as Palo Alto, Fortinet...
- ...Do you want to take the first step in making Filipinos' lives better everyday Here in GCash we want to stay at the forefront of the... ...You'll Be Responsible For The Following: Lead end-to-end security architecture for platforms, applications, data, and infrastructure...
- ...Weve amassed some of the best and brightest minds in cyber security who are passionate about protecting the digital world. Our team... ...24x7x365 SOC operations. This position involves acting as the first line of support for clients security concerns monitoring security...
- ...We're looking for an AI Security Lead to design and drive the security architecture and strategy that protects our AI technologies—both in-house developed and externally sourced. This role is critical in ensuring that every AI solution we build or use is secure, compliant...
- ...Qualifications ~5 years of total IT experience with 3 years of hands on experience in secure software environments or DevOps role ~ Proficiency in writing Python and PowerShell scripts , integrating data through REST and APIs, and implementing parsing (Logstash...