Get new jobs by email
- ...Responsibilities: Plans, conducts and manages cybersecurity and technology controls... ...maintains test procedures and plans for IT Security Controls, ensuring alignment with key... ...accommodation during the application process. All information shared during the accommodation request...
- ...quantifiable performance metrics. Lead complex security projects from initiation to closure. Proactively manage and mitigate project risks, identifying... ...Requirements: Bachelor's degree in Computer Science, Information Security, or a related field At least 3 years...
- ...company with a big dream: To forever change how diabetes is managed. To unlock information and insights that drive better health outcomes. Here we... ...before us. Meet The Team The Dexcom Information Security organization protects Dexcom's patients, employees, and data...
- ...Job Summary: The IT Info security Manager is responsible for developing, maintaining, and optimizing IT processes, policies, and documentation... ...Education: Bachelor's degree in any of the following: Information Technology (IT) or Information Systems - covers IT...
- ...Bachelor's Degree in Computer Science, Information Technology, or other relevant fields is... ...3–5 years of experience in Information Security, Cybersecurity, or IT Operations ~ Experience... ...~ Knowledge of Information Security Management Systems (ISMS) and auditing practices...
- ...The Information Security Analyst will be a key player in protecting our organization's data and systems. This role involves monitoring security... ...and regulatory requirements. Knowledge of vulnerability management tools (e.g., Nessus, Qualys) is a plus. Relevant...
- ...meaningful experience in any of the following fields: Information Security (any field) Information Technology (any field)... ...Assess requests to use external storage devices Project Management End to end project management to ensure that deliverables...
- ...We are looking for a Information Security Specialist to serve as the local Information Security representative for our Philippines operations , working closely with our global Information Security team. You will help translate global security standards into practical...
- ...As a Business Unit Security Officer (BUSO) within the Information Risk Management team under Global Wealth Asset Management (GWAM) Information Technology First Line of Defense, you will play a critical role in safeguarding the organization's IT environment. The Information...
- ...About the Company As an Information Security Analyst, you will be working collaboratively with CIS in managing cybersecurity risk management and compliance. You will have an opportunity to develop your skills across a broad range of technical, security, risks management...
- ...We're seeking an Information Security Analyst to join our Group Functions IT – Information Security Management and Business Resilience (GFT ISM & BR) team at MBPS. In this role, you will play a key part in delivering BUSO services and driving continuous security monitoring...
- ...position serves as a Project Lead for U.S. security initiatives and projects. #... ...and decision-making Provide project management expertise by offering training and guidelines... ...resources, and budget in order to support informed decision-making. # Ensure proper documentation...
- ...Education Bachelor's Degree of Information Technology or any related IT course. Qualifications Qualifications Proven... ...Java), including API integrations Familiarity with cloud security and IAM frameworks across Azure, AWS, and Google Cloud...
- ...We are seeking a Quality, Risk & Information Security Manager (Advisory) to lead end-to-end Quality, Risk Governance, and Information Security across advisory and technology engagements. What You'll Do Lead enterprise Quality across multiple accounts Drive...
- ...services. Monitor computer networks for security issues. Provide technical assistance... ...software to protect systems and information infrastructure, including firewalls and... ...software and understand information security management. Research security enhancements and...
80000 - 110000 $ per year
The Harris Corporate IT Team is seeking an Information Security Specialist to join our team! You will participate in evaluating, developing... ...will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management,...- ...Today’s world is fueled by vast amounts of information. Data is more valuable than ever before... ..., and everyone in EY Information Security has a critical role to play. Join a global... ..., supported by a strategic risk management approach and stringent compliance structures...
- ...Bachelor's degree in Computer Science, Info Security, or related field. Or relevant work... ...systems, Security Incident Even Management systems, Penetration Testing, Web Application... ...Professional certifications CISSP(Certified Information System Security Professional), CISM(...
84000 $ per year
...from cyber attacks. You'll be responsible for keeping an eye on security issues, figuring out what needs to be done, coming up with... ...Qualifications and Skills: • Bachelor's degree in computer science, information security, or related field • At least 3 years of experience...- ...As the world's most analyst-recognized and largest pure-play managed security services provider, LevelBlue elevates client outcomes that... ...security organization. Learn more at levelblue.com. The Information Security Advisor function provides a single point of contact...
- ...Job Title: Information Security Specialist (Compliance & Audit Focus) Job Summary We are seeking a detail-oriented Information Security... ...improvement of ISO 27001 and ISMS (Information Security Management System) frameworks. Participate in and support certification...
- ...working knowledge of Privileged Access Management. Hands on experience on CyberArk or Delinea... ...a thorough understanding of complex information systems and apply it to client... ...Management tool including SailPoint Identity Security Cloud Completed at least 1-2 implementations...
- ...and implement preventive or corrective actions when needed. Qualifications Bachelor's Degree or Equivalent Level in Information Technology, Computer Science, or any related field. With at least 3 to 6 years of experience in cybersecurity standards and best...
- ...Head of Cloud, Infrastructure & IT Security Key Responsibilities Cloud & Infrastructure... ...cost governance. Lead design and management of hybrid and cloud-native... ...Bachelor's degree in Computer Science, Information Technology, or related field (Master's...
- ...insurance makes it possible for people to manage their finances more effectively and... ...wider market. Job Overview The IT Security Engineer supports the implementation and... ...evaluation of security products by gathering information and helping with testing under...
- ...The job is based in Makati City, Philippines The Chief Information Security Officer serves as the process owner of all assurance activities... ...s information security policies. Working with executive management to determine acceptable levels of risk for the organization...
- ...Job Summary: The Information Security Compliance Analyst will support and execute our compliance, risk, and assurance activities across... ...implementation and maintenance of the Information Security Management System (ISMS) aligned with ISO 27001 (policies, procedures,...
- ...Job Title Associate Information Security Engineer Job Title Associate Information Security Engineer In This Job, You Will L1... ...addressing and resolving issues related to Identity Lifecycle Management. Integrations : Assist in the seamless integration of...
- ...operational/maintenance activities on Infrastructure Security Appliances not limited to only Panorama and Palo Alto firewalls Managing HA and upgrades on PALO ALTO devices... ...Preferred Qualification ~ Any course - Information Technology, Computer Science, Computer...
- ...structure to apply necessary controls to be assessed Perform and manage Security Assessment and remediation of identified findings as per... ...remediation activities Maintain current knowledge on information security topics and their applicability program requirements...