Get new jobs by email
60000 - 70000 Php
...Employment Agency: BSA Solutions Inc. Job Title: IT - SAP Security Administrator Location: FLB Corporate Center - Archbishop Reyes Ave, Cebu Business Park, Cebu City, Cebu 6000 Gross Monthly Salary: PHP 60,000 - PHP 70,000(depending on experience) Work Arrangement...775000 $ per day
...growing your own tech stack and certifications. Summary: As a Security Engineer, you will apply your security expertise to design,... ...Professional & Technical Skills: - Required Skill: Expert proficiency in SAP Security Vulnerability assessment. - Additional Good To Have...- ...team now! Work you'll do This role sits within the SAP team of Deloitte Southeast Asia, which encompasses the SAP... ...of 10+ years of post-qualification experience working with SAP Security by completed at least 8 end to end full life cycle of implementations...
- ...financial services, insurance, information technology, healthcare, retail and supply chain. We are currently looking to hire a SAP Security with S/4HANA FIORI Consultant. This is an exciting opportunity to expand your skill set, achieve job satisfaction and work-life...
- ...Title: SAP Security Consultant based in Deloitte Consulting Philippines Delivery Center Are you ready to unleash your potential At Deloitte, our purpose is to make an impact that matters for our clients, our people, and the communities we serve....
- ...EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. SAP Security and Compliance Senior Consultant (EY GDS Consulting – GRC Technology) As part of our EY-GDS GRC Technology competency, you...
- ...March 23, 2026 Department: D&IT Location: Taguig City, Philippines Role: Permanent SAP Business Technology Platform (BTP) Security Architect Manager In this role, you will be designing and maintaining access model and governance related...
- ...standards. Deliver timely invoices supporting revenue recognition and client satisfaction. Invoice Processing Generate invoices in SAP based on billing data submitted by LoB operations teams Validate data completeness and accuracy before invoice creation (client...
- ...ambitions. We are currently seeking an experienced professional to join our team in the role of CSE - D - Processing - DEBT SECURITIES. Principal responsibilities Processor role for Debt Securities Operation Daily checklist completion as part of daily...
- ...As a Security Operations Analyst, you will support governance, compliance, and security-related initiatives within the IT department. Serve as escalation point for alerts and vulnerabilities. Coordinate incident triage, vulnerability scanning, and remediation tracking...
- ...safe in the world of Cyber. With a key focus on engineering and automation, this role focuses on implementing strategic solutions to security problems, providing a secure environment for our customers and colleagues to operation in, without large operational overheads....
- ...Job title: SAP Developers Required skill: SAP ABAP Development Location: Cebu Job Description Responsibilities of the role will include: Follow security coding practices to ensure the application is free of common coding vulnerabilities using code reviews...
65000 - 90000 Php
...Employment Agency: BSA Solutions Inc. Job Title: IT - SAP Basis Administrator Location: FLB Corporate Center - Archbishop... ...SAP Basis Administrator supports the stability, performance, and security of the SAP landscape at Woodgrain. This role will help to manage...- ...The SAP Specialist – FICO plays a critical role in ensuring the seamless execution, optimization, and support of Financial Accounting... ..., go-live activities, and post-implementation support. Security, Controls & Compliance Define and maintain user roles and authorization...
- ...About the role Your primary focus will be BAU support for all SAP Application landscape in addition to designing & supporting SAP... ...Manage SAP environments within agreed tolerances Manage SAP Security within SAP applications including security role build, manage &...
- ...analysis to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation, and dissemination of intelligence. Collaborate with the Head...
- ...vulnerability management lifecycle from identification, remediation to reporting Active monitoring and detection of operational security risks in the organization Conduct technical investigations on security incidents and tools Liaise directly with users on...
- ...GyanSys seeking an experienced SAP Dataspere Consultant with at least 5 years of experience in SAP. The ideal candidate will have... ...replication tools (SDI, SDA). Understanding of data governance and security concepts. Qualifications: Candidate Profile must have...
- ...Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...workstream to help de-risk Vertiv's direct and indirect supply chain. Under the guidance of the Senior Analyst, you will execute cyber security risk strategies, support supplier assessments, contribute to risk remediation activities, and maintain ongoing adoption of ISO...
- ...Europe #1 bug bounty platform, with offices in Paris, Singapore, Switzerland, Germany. We provide a disruptive approach to Cyber Security through Bug Bounty programs, by connecting more than 100,000+ Ethical Hackers worldwide with organisations to secure their exposed...
- ...to continuously enhance the vulnerability management program Requirements Bachelor's degree in information technology, cyber security, or a related field. Prior experience in vulnerability management, programming, or a related technical role is highly desirable...
- ...Zone IT Solutions is seeking an experienced Security Consultant. In this role, you will provide expert advice and guidance on a range of security issues, helping to improve our clients' security posture and compliance. Requirements Responsibilities: Assess clients...
- The Opportunity The Security Engineer is pivotal in delivering, managing, and supporting security solutions that ensure our customers' environments are secure, efficient, and resilient. This role combines hands-on implementation, customer enablement, project leadership...
- ...organizations can innovate and advance their mission with confidence. As the world's most analyst-recognized and largest pure-play managed security services provider, LevelBlue elevates client outcomes that matter: stronger defense, faster response, and sustained business...
- ...modernize operations and drive innovation across our customer's entire IT estate using the latest technologies in cloud, applications, security, IT Outsourcing, business process outsourcing and modern workplace. Essential Job Functions Assist in managing a team...
- ...About Us Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks... ...Role Summary We are seeking a highly experienced Senior SAP FICO Consultant to lead the design, delivery, and optimization...
- ...Title: Senior SAP/WebI Developer Location: Philippines Remote Position Description: The Senior SAP/WebI Developer will play... ...report performance Ensure data accuracy, consistency, and security across BI layers Support migration, upgrades, and integration...
- ...Responsible for delivering end-to-end SAP Enterprise Asset Management (EAM) implementations, supporting business requirements, system configuration, testing, and post-go-live support. Key Responsibilities: Lead or support full lifecycle SAP EAM implementations (Explore...
- Design, develop, and implement security solutions to safeguard digital assets and business operations. Integrate security controls into enterprise systems, applications, and processes to protect against cyber threats, unauthorized access, and data breaches. Project...