Get new jobs by email
775000 $ per day
...relationships, proactively engaging with stakeholders, understanding their business context, and providing strategic guidance on security solutions. Business Alignment and Strategy: Align security initiatives with client business objectives, demonstrating a comprehensive...- ...The Sales Force Excellence (SFE) and Business Intelligence Manager is a strategic partner of the commercial teams who is responsible for ensuring that proper resources are allocated to the right customers aligned with the business strategy. The Sales Force Excellence...
- The Responsibilities: Business Requirements Gathering Collaborate with stakeholders, including leaders and subject matter experts, to understand problem statements, business objectives, challenges, and data-related needs Translate business requirements into clear...
- ...The Senior Cyber Security Engineer is a key technical leader within the company's security engineering organization and plays a central... .... Proactive Threat Hunting Conduct proactive, intelligence‑driven hunts across large datasets using advanced analytics, anomaly...
- ...About Sutherland Artificial Intelligence. Automation. Cloud engineering. Advanced analytics. For business leaders, these are key... ...email abuse mitigation. The ideal candidate has strong email security domain knowledge, hands on experience with Splunk, and proven...
- The IT Compliance Analyst is responsible for evaluating, monitoring, and maintaining IT General Controls (ITGCs) to ensure compliance with corporate policies and regulatory requirements. This role partners closely with system owners, control owners, and audit teams to...
775000 $ per day
...Engineer is a data specialist who leverages Microsoft’s Power BI platform to develop data-driven solutions that support business intelligence and strategic decision-making. This role involves transforming complex data into clear, actionable insights through interactive...775000 $ per day
...succeed in the digital age. The work: As an Artificial Intelligence (AI) Professional , you will work with cross‑functional teams... ...‑grade AI implementations with consideration for scalability, security, and responsible AI Staying current with emerging AI...- ...We are seeking a seasoned Senior MS SQL Database Security Administrator to lead the security strategy, configuration, and monitoring of Microsoft SQL Server environments. This role is responsible for ensuring the confidentiality, integrity, and availability of sensitive...
- ...Role Summary Our organization is looking for a Security Consultant to join our offensive security team. This role is dedicated to identifying and demonstrating vulnerabilities within client infrastructures before they can be exploited by external threats. By adopting...
- ...Experience in External, Web Application, API, and Cloud Penetration testing. • Experience of mobile applications, cloud infrastructure or secure code reviews is highly desirable • Experience with IT and cybersecurity strategy, policies, standards, procedures and controls...
- ...Develop expertise in the business operations and how data supports those operations in order to provide the most effective business intelligence solutions possible Identify gaps in data collection, the data model, and meta data for future enhancements Create simple...
- ...The Opportunity A leading global information assurance organization is seeking a dedicated Associate Security Analyst to join its specialized vulnerability research and triage team. This role offers a unique opportunity to act as a primary point of contact for...
- Avia Solutions Group (ASG) Global Services Philippines is looking for a BI Developer to contribute to the operations of Chapman Freeborn International . This position is based in the ASG Global Services Philippines office in BGC, Taguig, under a hybrid setup and...
- ...coaching, growth opportunities, and a great working environment to get them to world-class. Role Description As a Business Intelligence Analyst, you will be working closely with clients coming from different industries to process, analyze, and visualize data that...
- ...The Information Security Analyst will be a key player in protecting our organization's data and systems. This role involves monitoring security access, conducting vulnerability assessments, and responding to incidents in coordination with IT leadership. Experience with...
- ...well-rounded individual. We supply you with all the pieces you need to do your best work, unleashing your full potential to help you secure your future and lead a fulfilling career. And with Metrobank's strong heart for the community, you have the chance to give back and...
- ...such mobile applications and thick client, all in a stealthy operation without being detected, in order to identify potential security weaknesses in the system. Collaborate with ITG developers by communicating the back doors/security weaknesses identified and providing...
- ...engagements with distributed delivery mindset. • At least 12 years of experience in data engineering, analytics, or artificial intelligence related modelling in the industry • A university degree or Master’s degree in statistics, mathematics, computer science,...
- ...Service Solutions Inc. provides and optimizes business processes for our customers. Job Description Role Overview The Cloud Security Architect will lead and elevate our cloud security posture across the BU, with a strong emphasis on Microsoft Azure. The ideal...
- ...emphasis on business or equivalent in a relevant discipline. Minimum of 3 years of significant work experience in a business intelligence/reports and analytics role, previous employee benefits or insurance experience on a shared services operation is a plus Communicator...
- ...Overview Securities Operations Director to manage teams within their Wealth and Investment Management Operations, in Manila. We believe in the power of working together because great ideas can come from anyone. Through collaboration, any employee can have an impact...
- ...become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. SAP Security and Compliance Senior Consultant (EY GDS Consulting – GRC Technology) As part of our EY-GDS GRC Technology competency, you will...
- ...framework Must be a self-starter and loves to collaborate with the team and client Job Summary Develop and enforce security plans and standards; ensures that network and system security best practices are executed and implemented. Prepare the plans to...
- ...framework Must be a self-starter and loves to collaborate with the team and client Job Summary: Responsible for securing data, network, and applications in system development or system implementations. Perform threat modeling, business and technical process...
- ...Department: D&IT Location: Taguig City, Philippines Role: Permanent SAP Business Technology Platform (BTP) Security Architect Manager In this role, you will be designing and maintaining access model and governance related business processes...
GDS Consulting | Cyber Security - Strategy, Risk, Compliance and Resilience (SRCR) Senior Consultant
...even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (SRCR) – Technology Consulting – Senior As part of our EY Strategy, Risk, Compliance and Resilience (SRCR) Technology Consulting...- Job Summary We are looking for an Offensive Security Engineer to perform penetration testing and ethical hacking on networks, web and mobile applications, and internal systems. This role focuses on identifying vulnerabilities, simulating real-world attacks, and helping...
1500 Php
Job Title: Information Security & Risk Manager Work Arrangement: On-site Location: U/G Savya Financial Center, Pulse Street corner Anchor Street, Tandem Road, Arca South, Taguig, Metro Manila Employment Type: Full-time Salary: Php 135,000 - Php 175,000 (Negotiable...1500 Php
About the Role The Information Security & Risk Manager is responsible for protecting the organization’s information systems, networks, and data from cybersecurity threats. This role leads the development, implementation, and enforcement of information security policies...


