Get new jobs by email
- ...Education Bachelor's Degree of Information Technology or any related IT course. Qualifications Qualifications Proven... ...Java), including API integrations Familiarity with cloud security and IAM frameworks across Azure, AWS, and Google Cloud...
- ...Engineering related courses Qualifications With relevant and meaningful experience in any of the following fields: Information Security (any field) Information Technology (any field) Telecommunications technology Information Systems Audit...
7000 - 8000 $
...competitive salary of $7,000 to $8,000 a month for our next IT Security Analyst! We're looking to hire an expert to help us keep our... ...Qualifications and Skills: • Bachelor's degree in computer science, information security, or related field • At least 3 years of experience...- ...The Information Security Analyst will be a key player in protecting our organization's data and systems. This role involves monitoring security access, conducting vulnerability assessments, and responding to incidents in coordination with IT leadership. Experience with...
- ...Based) Permanent WFH Professional Growth and Training Supportive Work Environment GENERAL DESCRIPTION The Information Security Analyst plays a vital role in reactively securing our client networks. The role is perfect for someone who enjoys working in...Remote job
- ...CORE PROFILE The Information Security Project Manager is responsible for tracking the progress of multiple security reviews being conducted for customer facing products, internal productivity and employee tools and technology upgrades. NATURE OF WORK The incumbent...
- ...deliverables. Demonstrate a thorough understanding of complex information systems and apply it to client situations. Create... ...of Identity and Access Management including SailPoint Identity Security Cloud and/or SailPoint Identity IQ. Should have completed at...
- ...networks, servers and services. Monitor computer networks for security issues. Provide technical assistance. Documentation and... ...security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption...
- Job Summary We are seeking a Data Security Engineer to lead our data protection and data loss prevention (DLP) efforts. This role focuses on... ...Configure and operate Microsoft Purview DLP, data labeling, and information protection policies, or equivalent platforms. Define and...
- ...Job Title: Information Security Specialist (Compliance & Audit Focus) Job Summary We are seeking a detail-oriented Information Security Specialist to support compliance initiatives and certification audit projects. This role is primarily focused on Information...
- ...deliverables. Demonstrate a thorough understanding of complex information systems and apply it to client situations. Create innovative... ...and Access Management tool including SailPoint Identity Security Cloud Completed at least 1-2 implementations as engineer or...
- ...Enablement and Solutions is looking for a motivated and creative information designer with a vision for scale in visual communication. We... ...brands in the industry! Scope of Work The Information Design Lead/Manager will provide timely and high-quality design support to...
- ...Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Summary... ...: - Required Skill: Expert proficiency in Security Information & Event Management (SIEM) Platform Operations. -...
- ...POSITION SUMMARY The Team Lead, IT Operations is responsible for providing advanced support for incidents and requests related... ...updates, upgrades, migrations, and outages Maintain IT and Information Security governance, compliance programs, frameworks, policies, and...
- ...to supporting People First. What can you expect in a Lead Network Security Engineer role with TaskUs: The Lead Network Security... ...Certifications: ~ Bachelor's degree in Computer Science, Information Technology, or related field. Work Location / Work Schedule...
- ...harmonization, application of state-of-the-art technologies, automation and process simplification. We are looking for an Information Security Specialist to join our Governance, Risk, and Compliance (GRC) team. In this role, you will be instrumental in strengthening...
- Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Summary... ...: - Required Skill: Expert proficiency in Security Information & Event Management (SIEM) Platform Operations. -...
- ...As a Manual Access Provisioning Specialist (Extended IAM & Security Responsibilities), you will play a critical role in ensuring secure... ...degree or equivalent experience ~4+ years of experience in Information Security with a focus on IAM ~ Hands-on experience in manual...
- ...GDS Philippines) Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and... ...is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 950 people...
- ...SOC Team Lead Infotrust is seeking a SOC Team Lead to guide and develop our Manila-based Security Operations Centre (SOC). This pivotal role ensures our SOC delivers exceptional... .... Ensure compliance with Infotrust's Information Security Management System and industry...
- ...Role Are you an expert in Linux virtual server management and website administration We're seeking a skilled, proactive Systems & Security Lead to manage our digital infrastructure, focusing on high website performance, critical administrative systems (Google Workspace),...
- ...Information Security Analyst (Sales Enablement Focus) Schedule: Monday–Friday, 9:00 AM–5:00 PM Eastern Time Apply here: Overview We're looking for a detail-oriented Security & Compliance Analyst to own and manage customer security questionnaires,...Remote job
- About the Role We are looking for a Security Architecture Lead focused on Data Protection and Microsoft Purview. This role owns the design... ...controls, not just implementation. You will define how DLP, information protection, and data governance should work across cloud,...
775000 $ per day
Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets).... ...security auditing and reporting tools. Additional Information: - The candidate should have minimum 7 years of experience...- ...Job Description: Monitor and analyze security related alerts through the various platforms. Conduct timely investigation of alerts, perform analysis and event triage. Produce and enhance routine security reports and metrics. Requirements: ~ Pursuing a Bachelor...
- ...emerging technologies, and more for the right candidates. As Information Security Analyst, you will: The Information Security Analyst (SME... ...stakeholders Awareness & Continuous Improvement Lead or support information security awareness and training programs...
- ...Job Summary: The Information Security and Data Privacy Legal Controls Officer shall be responsible for reviewing and approving contract terms relating to data privacy and information security and managing all contracts that the Office of the CISO and DPO is negotiating...
- ...certifications. Summary: You will embed security into the software delivery lifecycle and... ...validate remediation effectiveness. Lead threat modeling and secure design... ...gender identity or expression, genetic information, marital status, citizenship status or any...
- ...or has the foundation to become a Subject Matter Expert on information security, technology risk, and business continuity and disaster recovery... ...and John Hancock Manulife Financial Corporation is a leading international financial services provider, helping people make...
- ...Job Req Number: 109175 Time Type: Full Time Position Target: Manage operational IT security tasks and related supporting systems. Task and Responsibilities: Daily security incident handling Function as SPOC for IT security incidents Evaluation...
