Get new jobs by email
- ...We're looking for enthusiastic, driven individuals to join our dynamic work environment where fun meets results ! The Information Security Analyst plans and carries out security measures to protect our organization's computer networks and systems. Their...
- ...The Junior Cybersecurity Compliance Analyst is responsible for supporting the cyber... ...the Senior Analyst you will execute cyber security risk strategies support supplier assessments... ...threat developments and benchmarking to inform best practices. Support Third-Party Risk...
- ...As a Business Unit Security Officer (BUSO) within the Information Risk Management team under Global Wealth Asset Management (GWAM) Information Technology First Line of Defense you will play a critical role in safeguarding the organizations IT environment. This role involves...
- ...Overview The roles primary focus is protecting the Firms information security interests leveraging advanced security tools and... ...neutral certification(s) such as Microsoft Security Operations Analyst (SC-200) Microsoft Cybersecurity Architect (SC-100) CyberArk...
- ...Position Overview We're looking for a Security Architect who can strengthen our organization's security posture through strong technical... ...Bachelor's degree in any field; preferred in Information Security, Computer Science, or Software Engineering CISSP certification...
- ...Build Stronger, Smarter Security for a Worldwide Network of Industry Experts At Emapta , we are at the forefront of global... ...You'll Do in This Career Be part of our team as an Information Security Engineer , where you'll monitor and manage endpoint...
- ...Information Security Analyst (Sales Enablement Focus) Position Type: Full-time Location: Remote Apply here: About the Role We are seeking an Information Security Analyst (Sales Enablement Focus) to bridge the gap between our Information Security...
- ...make the world safe for exchanging digital information. What You'll Do Lead and Manage... ...PH Technical Lead for processing FedRAMP security cases for Incident Management with... ...Americas Region. Leverage a team of L1 SOC Analysts responsible for FedRAMP security alert...
- ...Trustwave Trustwave is a leading cybersecurity and managed security services provider focused on threat detection and response. We... ...solve new challenges every day. Learn more about us at . The Information Security Advisor function provides a single point of contact...
- ...companies, the firm's clients include mutual funds, ETFs, stock exchanges and membership associations. The Opportunity The Information Security Officer is a candidate who will be responsible for developing, implementing and maintaining our information security program...
- ...Position: Information Security Officer Job Type: Permanent Work Setup: Hybrid (1x a week) Shift Time: Night Location: Manila Job Summary: The Information Security Officer will be responsible for ensuring the confidentiality, integrity, and...
- ...agencies, schools, retail stores, hotels and many more. Position Overview: We are seeking a detail-oriented IT Auditor / Information Security Compliance Specialist with strong experience in information security and compliance frameworks, including ISO/IEC 27001 ,...
- ...Proven experience in citizen development, low-code/no-code platforms, and process automation. • Strong understanding of governance, security, and compliance in digital solution development. • Excellent facilitation, coaching, and communication skills. • Experience in...
- ...Philippines. What You'll Do Assist in the maintenance of our security infrastructure and 3rd Party services. Works with different... ...required by stakeholders. Assist in the creation of information security operations documentation. Auditing of access privileges...
- ...This is the Kroll's difference. Kroll's Security Operation's Center helps firm manage... ...of your career. Security Operations Analyst We are seeking candidates for a 24/7... ...analysis, while integrating the results and information needed to proactively protect the...
- ...Switzerland, Germany. We provide a disruptive approach to Cyber Security through Bug Bounty programs, by connecting more than 100,000+... ...professionals and are currently on the lookout for a Security Analyst (Full remote). In this role, you will be pivotal in handling vulnerability...
- The Virtual Chief Information Security Officer (vCISO) plays a critical role in providing strategic cybersecurity leadership and guidance to several of our small and medium-sized business (SMB) clients. This role involves delivering on-demand CISO services tailored to...
- ...landscape of tomorrow. Summary of This Role Evaluates tests recommends develops coordinates monitors and maintains information security policies procedures and systems including hardware firmware and software . Ensures that IS security architecture/designs plans...
- ...world for all. Control & Risk Compliance Analyst (GDS Philippines) Todays world is fueled by vast amounts of information. Data is more valuable than ever before.... ...doing business and everyone in EY Information Security has a critical role to play. Join a global...
- ...Security Operations Analyst | Technology - Information Security Do you want to be part of a team helping re-invent the way knowledge professionals work How about a team that works every day to create a more transparent, just and inclusive future At Thomson Reuters,...
- ...facilitate discussions and reach decisions Knowledge Excellent oral and written communication skills are required In-depth Securities Operations/ Industry Knowledge is required Highly flexible and adaptable to change Experience ~ A College or University...
- The Security Analyst role will function as an Application Security Analyst for the Infor Landmark Product. This role is responsible for performing... ...What You Will Need Required skills: * Experience in information security, threat analysis, and vulnerability assessment and...
- ...Job Description The Network Security Analyst will be responsible for ensuring the security of our network infrastructure. This role involves... ...Qualifications Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field Proven...
- ...Job Scope: To manage all RX security assessments and play a key part in ensuring RX's security compliance optimization. Monitor assessments... ...profile: Technical Skills: IT, compliance and/or information security background Ability to work across all levels of seniority...
- ...Were looking for an Information Security Manager Identity Access Management (IAM) Consultant to join our Group Functions IT Information Security and Business Resilience this role you are expected to apply identity access security risk knowledge and expertise to assist...
- ...What Information Security and Risk contributes to Cardinal Health Information Technology oversees the effective development delivery and... ...completes risk assessments. About the Role As a P2 Senior Analyst supporting the Cyber Threat Intelligence (CTI) team you will...
- ...big dream: To forever change how diabetes is managed. To unlock information and insights that drive better health outcomes. Here we are 25... ...before us. Meet the Team: The Dexcom Information Security organization protects Dexcoms patients employees and data across...
- ...Were looking for a Cloud Information Security Engineer to join our Enterprise Technology & Services this role you are expected to be part of the team which will work with different service areas within ETS and serve as a trusted partner and domain expert to the business...
- ...Were looking for an Information Risk Manager (RCSA) to join our Group Functions IT Information Security and Business Resilience this role you will be responsible for planning executing leading and completing Risk and Control Self-Assessments (RCSA) and continuous monitoring...
- ...Location MANILA SIX/NEO OFFICE Job Description The Senior Security Analyst plays a key role in proactively protecting networks,... ...posture of the company. Effectively communicate technical information to non-technical audiences and influence others to comply with...