Get new jobs by email
- ...Qualifications: ~ Bachelor's Degree in Computer Science, Information Technology, or other relevant fields is an advantage ~3–5 years of experience in Information Security, Cybersecurity, or IT Operations ~ Experience in risk assessments, audits, compliance monitoring...
- ...rewarding careers in software development, product development, emerging technologies, and more for the right candidates. As Information Security Analyst, you will: The Information Security Analyst (SME) is responsible for protecting the organization’s information...
- ...The Product Information Coordinator is responsible for ensuring that the online catalog contains all available product, that the product information is accurate, and that the descriptions conform to company guidelines. You will also ensure that product information and...
- ...Role Overview A leading organization is seeking a Senior Security Analyst to support and strengthen its information security function. This role is responsible for protecting systems, ensuring regulatory compliance, managing security risks, and supporting incident...
- ...supporting People First. What can you expect in a Network Security Engineer role with TaskUs: Want to be part of a company that... ...Job Qualifications ~ Bachelor's degree in Computer Science, Information Technology, or related field. ~5-7 years extensive experience...Remote job
- ...candidates who are amenable to start as early as 4:00 AM Manila time About the Role We are looking for a detail-oriented Product Information Administrator to support the management of product, pricing, promotional, and master data across multiple systems. This role...
- ...ESSENTIAL JOB FUNCTIONS • Information Security Management: o Conduct regular security assessments and vulnerability scans to identify potential risks and weaknesses in our information systems. o Implement and maintain security controls to protect against unauthorized...
- ...Here's your chance to grow your career with the largest and leading independent fuel company in the country - join us as our next IT Security Specialist! What is this role about? This role is responsible for the full lifecycle of cybersecurity solutions, from...
- ...Job Description: Security Assurance: Conduct regular security assessments, including vulnerability scans, penetration tests,... ...Qualifications: Minimum of 5 years of experience in IT security, information assurance, or a related field. Strong understanding of...
- ...and global IT services environment . This role ensures stable, secure, and scalable IT systems that support business operations and... ..., policies, and governance Ensure compliance with information security, data privacy, and regulatory standards Manage incident...
- ...Solutions About the Job: Join our client's team as a Security Engineer specializing in Attack Surface Management and take on... ...Qualifications: Bachelor's Degree in Computer Science, Information Technology, or a related field. At least 8 years of working...
- ...supporting People First. The Director, Physical Safety and Security is responsible for developing, implementing, and overseeing... ...the highest level of integrity. Able to maintain secrecy of information. Approachable. Very responsive, especially in emergency...
- ...Engineer to join our team. The role requires expertise in cloud security, incident response, and vulnerability management, with hands-... ...requests, and root cause analysis. - Analyze logs, information, data, threat intelligence, and other sources as part of incident...
- ...About the Job: Join our client's team as a Cloud & Email Security Specialist and leverage your expertise to manage and optimize... ...Qualifications: Bachelor's Degree in Computer Science, Information Technology, or a related field. At least 8 years of working...
- ...Role Summary The Security Engineer manages enterprise cybersecurity operations, focusing on endpoint protection, identity security, threat detection, and vulnerability management. Key Responsibilities Monitor security alerts using Microsoft Defender security...
- ...Job description Candidate must possess at least a Bachelor's/College Degree , Computer Science/Information Technology, Engineering (Computer/Telecommunication), Finance/Accountancy/Banking, Business Studies/Administration/Management or equivalent. Strong PROJECT...
- ...playbooks, scripts, and integrations within XSOAR to streamline security operations. This role will support complex operational... ...requests, and root cause analysis related to XSOAR. Analyze logs, information, data, threat intelligence, and other sources as part of...
- ...The Information Technology (IT) Auditor performs the full audit cycle including risk management and control management over operations... ...internationally accepted control frameworks such as Information Security Management System (ISMS – ISO 27001), Cybersecurity and...
- ...installation Configuration and testing Performing operational and security qualification Developing documentation (AS-Built, Reference... ...Requirements Bachelor’s degree in Cybersecurity, Information Technology, Engineering, or related field. Advanced certifications...
- ...Responsibilities Strategic and Architectural Design: Develop OT security architectures aligned with the organization’s business goals... ...data diodes, intrusion detection systems (IDS), and Security Information and Event Management (SIEM) tailored for OT environments....
- ...The Information Security Analyst will be a key player in protecting our organization's data and systems. This role involves monitoring security access, conducting vulnerability assessments, and responding to incidents in coordination with IT leadership. Experience with...
- ...About the Company As an Information Security Analyst, you will be working collaboratively with CIS in managing cybersecurity risk management and compliance. You will have an opportunity to develop your skills across a broad range of technical, security, risks management...
- ...technical and legal teams and leads contract negotiations. ~ Secures position of relevant stakeholders (insurance, logistics,... ...and Safety, Asset Management, Continuity Management System and Information Management Systems policies, standards, procedures, and guidelines...
- ...GardaWorld family, one of the world’s largest privately-owned security and risk management organizations. Together, we deliver comprehensive... ..., professionalism, and discretion when handling sensitive information. ~ Strong IT literacy, including use of Microsoft...
- ...Job Title: Information Security Specialist (Compliance & Audit Focus) Job Summary We are seeking a detail-oriented Information Security Specialist to support compliance initiatives and certification audit projects. This role is primarily focused on Information...
- Job Summary We are seeking a Data Security Engineer to lead our data protection and data loss prevention (DLP) efforts. This role focuses... ...and operate Microsoft Purview DLP, data labeling, and information protection policies, or equivalent platforms. Define and enforce...
- ...career. What we’re looking for: Degree in Computer/Information Science, technical college, or equivalent work experience.... ...expert level technology and support experience for route/switch, security, wireless, etc. and maintains one or more professional level...
- ...submission to Regional office Resolves discrepancies of payroll information and/or documentation (e.g. time sheets, leave time, etc.) for... ...premises (includes head office & branches) maintenance & security Assists in coordinating special events such Townhall Meeting...
- ...IT solutions based on customer technical needs. You will secure Month-to-date or Year to date sales objectives on a per client... ...latest market trends and developments in the market and gather information on how to improve our service levels. You will monitor...
- ...tools, equipment, or machines. Enter and locate work-related information using computers. Operate power lift. Complete the life safety... ...motivating and coaching employees. Follow all company and safety and security policies and procedures; report maintenance problems, safety...

