...the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies... ...from the U.S. Department of Commerce - Bureau of Industry and Security and/or the U.S. Department of State - Directorate of Defense Trade...
...the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies... ...from the U.S. Department of Commerce - Bureau of Industry and Security and/or the U.S. Department of State - Directorate of Defense Trade...
...the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies... ...from the U.S. Department of Commerce - Bureau of Industry and Security and/or the U.S. Department of State - Directorate of Defense Trade...
50000 Php
...Developers may be responsible for providing support to end-users, helping them troubleshoot issues, and answering their questions.
Security and Compliance :
Developers must be aware of security best practices and vulnerabilities. They should write secure code and...
...and use of the ICT department
• Be responsible for the ICT process operation and maintenance
• Be responsible of ICT information security management (KIA identification management, violation handling, publicize, exam, etc.) and ICT compliance management (risk...
...Programming (OOP) concepts applied in Python
• Familiarity on source code control systems
• Familiarity on code quality, performance and security
• Knowledgeable on DB and DC occupational pension schemes and how it translates to pension calculation and letter configuration...
130000 Php
Job Description:
Engineering Graduate / Postgraduate (BTech, BE, MCA, etc.) with minimum 5 years of
experience in Cyber security domain.
Minimum 3 years of design, implementation & configuration experience in PAM (Privileged
Access Management) domain primarily...
30000 Php
...policies and procedures to support the company’s targets.
Keep sensitive and important information confidential and ensure financial security.
QUALIFICATIONS:
•Bachelor's Degree holder in Accountancy
•At least 2-3 years of supervisory experience
•Preferably CPA...
130000 Php
Job Description:
Engineering Graduate / Postgraduate (BTech, BE, MCA, etc.) with minimum 5 years of
experience in Cyber security domain.
Minimum 3 years of design, implementation & configuration experience in IAM (Identity Access
Management) domain primarily in...
45000 Php
...deliver the required return (i.e., lease management)
6. Manage and preserve the value of the company’s real estate portfolio (i.e., security, maintenance, payment of real property taxes and other government compliances)
7. Provides the Leadership Team with a concise...
...LWC), and data migration using Data Loader. Additionally, the candidate should have extensive
experience with Conga (Apttus) Intelligent Workflow Approval process and CLM product implementation.
Work Arrangement: Digital First/ WFH
Key Responsibilities:
•Utilize...
130000 Php
Key Responsibilities:
1. User and Security Management
2. Report Development and Deployment
3. Server Maintenance and Monitoring
4. Backup and Recovery
5. Training and Support
Qualifications:
Bachelor’s or Master’s Degree in Computer Science and/or...
...Identify and evaluate business opportunities for product/brand growth using market research, analysis, and competitive market intelligence
QUALIFICATIONS
The candidate must possess the following:
Graduate of Marketing or related course.
At least 5 years relevant...
...and individual clients
To introduce, promote, and offer MRACC products to potential clients during sales events and trade shows
To secure documents that facilitate the accreditation of corporate accounts and proper approval for loan borrowers
To act as primary point...
80000 Php
...Perks You'll Enjoy
Competitive salary of up to 80,000 PHP.
Comprehensive benefits include paid training, HMO, and 13th-month pay.
Enjoy government-mandated benefits to secure your future.
Ready to Elevate Your Career?
Hit the "Apply Now" button to get started.
...proactive self-starter. Resilience is a must.
Ability to identify the impact of each activity and adjust priorities accordingly
Intelligent, numerate and able to quickly grasp complex issues.
Excellent problem solving and organisational skills
Excellent...
...project management expertise
Understand and use modern communication software and systems
Understand basics of e-health, data security and related topics
Up-to-date knowledge of IT and digitalization
Tasks performed regularly which form the essential...
...DTI Risk Management and Fresenius Medical Care Enterprise Risk Management processes. The individual will help drive critical cyber security risk management initiatives across the enterprise.
PRINCIPAL DUTIES AND RESPONSIBILITIES:
Conduct IT risk assessments, using...
...visitors by greeting, welcoming, and directing them to the relevant personnel or department appropriately. ○ Monitors logbook for security purposes. ○ Maintains telecommunications system.● Inventory of consumables (socks, liners, bandages) from incoming shipments ○ Purchasing...
...visitors by greeting, welcoming, and directing them to the relevant personnel or department appropriately. ○ Monitors logbook for security purposes. ○ Maintains telecommunications system.● Inventory of consumables (socks, liners, bandages) from incoming shipments ○ Purchasing...