Get new jobs by email
- ...independent fuel company in the country - join us as our next IT Security Specialist! What is this role about? This role is... ...protection, SIEM/SOAR, identity access management, and threat intelligence Experience with security configuration, monitoring, and incident...
- ...Role Overview A leading organization is seeking a Senior Security Analyst to support and strengthen its information security function. This role is responsible for protecting systems, ensuring regulatory compliance, managing security risks, and supporting incident...
- ...TaskUs. Join our team today and experience firsthand our dedication to supporting People First. What can you expect in a Network Security Engineer role with TaskUs: Want to be part of a company that is changing the game for some of the world's most notable brands...Remote job
- ...ESSENTIAL JOB FUNCTIONS • Information Security Management: o Conduct regular security assessments and vulnerability scans to identify potential risks and weaknesses in our information systems. o Implement and maintain security controls to protect against unauthorized...
- The BI Developer designs, develops, and maintains data models, dashboards, and reporting systems. This role works closely with business stakeholders to translate data requirements into actionable insights and ensures data accuracy, performance, and usability. Key Responsibilities...
- ...Job Description: Security Assurance: Conduct regular security assessments, including vulnerability scans, penetration tests, and risk assessments to identify and mitigate security risks. Develop, implement, and maintain security policies, procedures, and controls...
- ...playbooks, scripts, and integrations within XSOAR to streamline security operations. This role will support complex operational... ...related to XSOAR. Analyze logs, information, data, threat intelligence, and other sources as part of incident detection, investigation...
- ...Engineer to join our team. The role requires expertise in cloud security, incident response, and vulnerability management, with hands-... ...cause analysis. - Analyze logs, information, data, threat intelligence, and other sources as part of incident detection, investigation...
- Highly analytical data geek who enjoys coding for data analysis Strong in quantitative analysis Positive, people oriented, and energetic Analytical, creative and innovative in solving problems Strong written and oral communications Degrees that represents...
- ..., Day Shift Base Salary: Php 100,000 - Php 120,000 Industry: IT Solutions About the Job: Join our client's team as a Security Engineer specializing in Attack Surface Management and take on the critical task of safeguarding our systems. You'll be responsible...
- ...Base Salary: Php 100,000 - Php 120,000 Industry: IT Solutions About the Job: Join our client's team as a Cloud & Email Security Specialist and leverage your expertise to manage and optimize email security, WAF services, and digital certificates. You will be...
- ...Role Summary The Security Engineer manages enterprise cybersecurity operations, focusing on endpoint protection, identity security, threat detection, and vulnerability management. Key Responsibilities Monitor security alerts using Microsoft Defender security...
- ...in Computer Science, Information Technology, or other relevant fields is an advantage ~3–5 years of experience in Information Security, Cybersecurity, or IT Operations ~ Experience in risk assessments, audits, compliance monitoring, and vendor evaluations ~ Knowledge...
- ...careers in software development, product development, emerging technologies, and more for the right candidates. As Information Security Analyst, you will: The Information Security Analyst (SME) is responsible for protecting the organization’s information assets...
- ...Integrator with deep expertise in cloud, data, AI, cybersecurity, and intelligent edge, we guide organisations through complex digital decisions... ...level technology and support experience for route/switch, security, wireless, etc. and maintains one or more professional level...
- ...to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation, and dissemination of intelligence. Collaborate with the Head of...
- ...people. Operating as trusted partners to our clients, we deliver intelligent solutions through a combination of technical expertise and... ...sec This role requires demonstratable experience in building secure, scalable and automated environments, with a strong focus on...
- ...for a specific job. Roles held by colleagues who have joined through Autism at Work have included cyber security, cloud, database, data science, artificial intelligence, recruiter, communications specialist, quality management, and pre-sales specialist. Employment...
- ...Integrator with deep expertise in cloud, data, AI, cybersecurity, and intelligent edge, we guide organisations through complex digital decisions... ...to the network that will improve the quality, performance, security, and reliability of the network. Creates and maintains...
- ...with value framework Serve as a trusted advisor, ensuring secure, reliable, and flexible cloud environments for mission-critical... ...application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company...
- ...GardaWorld family, one of the world’s largest privately-owned security and risk management organizations. Together, we deliver comprehensive... ...risk analysis, maritime security analysis, digital threat intelligence, real-time monitoring and reporting. This is an exciting...
- ...people. Operating as trusted partners to our clients, we deliver intelligent solutions through a combination of technical expertise and... ...~ Architect and deploy Cisco Meraki solutions including MX security appliances, MS switching, and MR wireless for new and existing...
- ...operations and mobility services firm. We create and operate intelligent infrastructure and buildings that both respond to the climate... ...and in the AWS cloud platform IT infrastructure & software security Disaster recovery & High availability processes Other tools...
- ...people. Operating as trusted partners to our clients, we deliver intelligent solutions through a combination of technical expertise and... ...would be preferred Background experience Strong Risk & Security awareness Strong verbal and written communication skills....
- ...Integrator with deep expertise in cloud, data, AI, cybersecurity, and intelligent edge, we guide organisations through complex digital decisions... ...to the network that will improve the quality, performance, security, and reliability of the network. Creates and maintains...
- ...We are seeking a Senior SOC Team Lead to oversee a 24/7 Security Operations Center responsible for detecting, investigating, and... ...impacting SOC technologies and integrations. 5. Threat Intelligence & Proactive Hunting Lead threat intelligence collection...
- ...team as a Senior SOC Analyst and play a key role in embedding security at every phase of system, application, and infrastructure development... ...across all platforms. From incident response to threat intelligence, you'll be at the forefront of defending against cyber threats...
- ...achievement of the company’s revenue, volume, and margin objectives by securing institutional fuel and lubricant supply agreements within the... ...and long-term supply agreements.; # Conduct market intelligence and competitive analysis supporting strategic decision-making...
- ...efficiency Ensure compliance with data governance, quality, and security standards Requirements Education Bachelor’s degree in... ...at least 7 years of experience in data analytics, business intelligence, or consulting Proven experience in providing analytics...
- ...experience. Your Role And Responsibilities As a Associate Security Consultant, you'll unleash your exceptional technical prowess... ...in one or more of the following security domains: Security Intelligence & Operations Consulting (SIOC); Data Security; Identity & Access...

