Get new jobs by email
- ...Build Stronger, Smarter Security for a Worldwide Network of Industry Experts At Emapta , we are at the forefront... ...ll Do in This Career Be part of our team as an Information Security Engineer , where you'll monitor and manage endpoint security, respond...
- ...maintenance activities on Infrastructure Security Appliances not limited to only Panorama... ...HA and upgrades on PALO ALTO devices Engineer would be working on daily Deployment or... ...Preferred Qualification ~ Any course - Information Technology, Computer Science, Computer Engineering...
- ...performing operational/maintenance activities on Infrastructure Security Appliances not limited to only Panorama and Palo Alto firewalls. Managing HA & upgrades on PALO ALTO devices Engineer would be working on daily Deployment/Changes Managing Break/Fix Incidents...
- ...Position Summary As an IT Security Engineer, you will support in the design and implementation of comprehensive security strategies to protect... ...in Computer Science, Technical, Education, Engineering, Information Security, Business, Information Technology, or related...
- ...Senior Analyst, you will execute cyber security risk strategies, support supplier assessments... ...developments, and benchmarking to inform best practices. Support Third-Party Risk... ...'s degree in computer science, Computer Engineering, Information Technology, or equivalent....
- ...Typically, 5+ years of relevant work experience in industry, with a minimum of 3 years in a similar role Proven experience in information security / digital identity Proficiencies in security technologies and risk assessment A continuous learner that stays abreast...
- ...system as the primary tool for monitoring information flows and implementing policies. Administer and maintain information security and anti-virus protection tools.... ...Requirements: Bachelor's Degree in Computer Engineering, Computer Science or other IT-related courses...
- ...As a Business Unit Security Officer (BUSO) within the Information Risk Management team under Global Wealth Asset Management (GWAM) Information Technology... ...DevOps environments and collaborate with developers, engineers, and support teams to help implement those requirements...
- ...Position Overview We're looking for a Security Architect who can strengthen our organization's security... ...Bachelor's degree in any field; preferred in Information Security, Computer Science, or Software Engineering CISSP certification is highly preferred ; other...
- ...world's most analyst-recognized and largest pure-play managed security services provider, LevelBlue elevates client outcomes that matter... ...security organization. Learn more at levelblue.com. The Information Security Advisor function provides a single point of contact for...
- ...About the role Report directly to Cybersecurity Head and support all information security initiatives and activities. Responsibilities Administering the day-to-day security operations including review of security incidents and identifying vulnerabilities from...
- ...About the Role As an Information Security Analyst, you will play a vital role in supporting the day-to-day operation and continuous improvement of the organisation's security environment. This role focuses on monitoring, maintaining, and optimising security tools...
- ...vendors and partners for escalations and specialized support. Security & Compliance Configure and manage firewalls, VPNs, and... ...troubleshooting). Minimum Qualifications Bachelor's degree in Information Technology, Computer Science, or related field (or equivalent...
- Job Overview The Vendor Third-Party Advisor is responsible to collaborate with a variety of Cardinal Health business units to discover new vendors being considered for use within Cardinal Health and evaluate the risk of that relationship. This position will be required...
- ...We're looking for an Information Security Manager, Identity Access Management (IAM) Consultant to join our Group Functions IT Information... ...degree in Computer Science, Information Technology, Software Engineering, Business Administration, or relevant educational and...
- ...The Information Security Manager evaluates technology environments through control testing, compliance assessments, identifies key gaps and recommends actions for remediation. Partners with other teams for cybersecurity controls assessment and tests effectiveness of...
- ...companies, the firm's clients include mutual funds, ETFs, stock exchanges and membership associations. The Opportunity The Information Security Officer is a candidate who will be responsible for developing, implementing and maintaining our information security program...
- ...services. We're looking for enthusiastic, driven individuals to join our dynamic work environment where fun meets results ! The Information Security Analyst plans and carries out security measures to protect our organization's computer networks and systems. Their...
- ...providers and applications providers. Job Title: Junior Information Security Analyst We are looking for a motivated and detail-... ...experience in information technology as a systems admin or engineer Ability to work independently and collaboratively within...
- ...change how diabetes is managed. To unlock information and insights that drive better health... ...The Team The Dexcom Information Security organization protects Dexcom's patients... ...Security Operations (SecOps), Security Engineering, and Product Security. The Senior Manager...
- ...Position: Information Security Officer Job Type: Permanent Work Setup: Hybrid (1x a week) Shift Time: Night Location: Manila Job Summary: The Information Security Officer will be responsible for ensuring the confidentiality, integrity, and...
- ...Your Role As an IT & Security Associate , you will be part of our IT & Security Group that supports all business operations of the... ...environments. You be mentored by a Team Lead and will work with Senior Engineers who will provide guidance, motivation, and support throughout...
- ...Job Description – IT Security Manager Role Overview We are seeking a Security Manager with strong technical expertise and leadership skills to oversee the administration, operation, and maintenance of enterprise security solutions. This role ensures the enforcement...
- ...will challenge and equip you to become engineered to do good in whatever path you take. By... ...the world safe for exchanging digital information. What You'll Do Lead and Manage FedRAMP... ...Technical Lead for processing FedRAMP security cases for Incident Management with...
- ...Role Purpose The Analyst IT Information Security is responsible for engaging in business process reviews and providing recommendations to ensure processes, systems and documentation meet changing business conditions and/or requirements. The Analyst IT Information Security...
- ...GDS Philippines) Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and... ...is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 950 people...
- As an Information Security Risk Manager you are responsible for helping ensure that SBC's Information Security policies and procedures align with all relevant regulation and company values. S/He helps to facilitate the wider team's understanding of their compliance responsibilities...
- ...Job Description Essential Job Functions: Assist in security assessments, audits, and vulnerability scans, providing detailed reports... ...into security strategy and risk management processes. Stay informed about security trends and best practices. Contribute to...
- ...how you can make a difference in the lives of individuals, families and communities around the world. Job Description: Information Security Specialist will be responsible for managing the different aspects of information security including infrastructure and...
- ...Cloak Technologies is seeking a motivated and detail-oriented Information Security Intern (Penetration Testing) to join our InfoSec team. The... ..., and APIs under the guidance of senior security engineers. Vulnerability Assessment: ~ Identify, analyze, and...