Get new jobs by email
- ...CORE PROFILE Security Administrator is responsible for managing and administrating the organization's security tools and systems, ensuring proper monitoring, configuration, and maintenance. This role ensures that security tools are operational, properly configured, and...
- Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...Design, implement, configure, and maintain Palo Alto Networks firewalls and related security features (e.g., Panorama, Wildfire, Threat Prevention, URL Filtering, GlobalProtect). Administer and support F5 products, including BIG-IP LTM (Local Traffic Manager) and/or...
- ...safe in the world of Cyber. With a key focus on engineering and automation, this role focuses on implementing strategic solutions to security problems, providing a secure environment for our customers and colleagues to operation in, without large operational overheads....
- ...technology, or similar ~1-2 years of experience in DLP monitoring, compliance, or IT audit. ~ Familiarity with DLP tools, M365 Security Center, or CASB platforms ~ Knowledge of SOC2 confidentiality and privacy requirements ~ Preferred certifications: CompTIA...
- ...well-rounded individual. We supply you with all the pieces you need to do your best work, unleashing your full potential to help you secure your future and lead a fulfilling career. And with Metrobank's strong heart for the community, you have the chance to give back and...
- ...This is a remote position. We are seeking a highly organized and dependable Security Administrator Intern to manage user access, credentials, and routine security operations across various business systems. The ideal candidate will have strong attention to detail...
- ...Job Description Department Safety & Security Office Employee Type Probationary The Security Manager is responsible for the overall mall security management. He/she will ensure that the mall customers are safe and delighted while shopping, dining, and...
- ...patching policies and regulatory requirements. Governance & Compliance Align processes with ISO27001, CIS benchmarks, and internal security standards. Support audits by providing evidence of vulnerability and patch management activities. Maintain and update...
- ...The Platform Security Manager function oversees technical security for cloud and on-prem systems, ensuring secure-by design implementation across applications and infrastructure. It manages access controls, enforces security standards, reviews tools, conducts testing,...
- ...Network Security Engineers offer support for a wide variety of Network security-related devices. This includes, without being limited to Firewalls, Proxies, ISD/IPS, VPNs, Etc. Technologies include Cloud Providers (AWS, Azure, OCI), and vendors such as Palo Alto, Fortinet...
- ...We're looking for an AI Security Lead to design and drive the security architecture and strategy that protects our AI technologies—both in-house developed and externally sourced. This role is critical in ensuring that every AI solution we build or use is secure, compliant...
- ...As a Security Analyst, you will be a key member of our Global Cybersecurity Team, helping to strengthen cybersecurity posture. This role involves monitoring tools and dashboards, identifying and mitigating security vulnerabilities, and collaborating with teams to address...
- ...requirements listed above About the Role We are seeking a Cybersecurity Analyst to support vulnerability management, security monitoring, and incident response across global systems. This role will investigate security alerts, manage vulnerabilities end-to...
- ...workstream to help de-risk Vertiv's direct and indirect supply chain. Under the guidance of the Senior Analyst, you will execute cyber security risk strategies, support supplier assessments, contribute to risk remediation activities, and maintain ongoing adoption of ISO...
- Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...thrive in a start-up environment. If this sounds like you, then we'd love to talk. General Responsibilities The Associate Security Engineer supports the organization's cyber defense and incident response operations by monitoring security alerts, assisting in...
- ...analysis to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation, and dissemination of intelligence. Collaborate with the Head...
- ...We are looking for a dedicated and detail-oriented Security Manager to lead safety and security operations at our hotel in Quezon City. This full-time, on-site role plays a key part in ensuring a safe, secure, and welcoming environment for our guests and team members...
- ...Job Description The Security Engineer develops, implements, and maintains SIEM and SOAR solutions to support various business processes. This includes assisting the Cyber Delivery Managers with customer deliverables. He/she designs, develops and implements secure...
- ...Implement the overall security program for mall properties by overseeing and supervising CRS Supervisors and Representatives. Ensure a safe and secure environment for customers, employees, guests, and other personnel within the assigned mall and related business structures...
- Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Summary: As a Security Delivery Lead, you will be responsible for overseeing the implementation and delivery of Security...
- ...Our mission is to make the world safer and more secure. And our core strength is the expertise of our people. We are committed to developing the future generation of cyber scientists, analysts and professionals. And we are always keen to hear from talented and experienced...
- ...Company Description Graybox Security is a leading firm in information security, data privacy, and cybersecurity, dedicated to safeguarding organizations against evolving digital threats. By offering expert-driven consulting and managed security services, including Managed...
- ...well-rounded individual. We supply you with all the pieces you need to do your best work, unleashing your full potential to help you secure your future and lead a fulfilling career. And with Metrobank's strong heart for the community, you have the chance to give back and...
- ...The Information Security Governance Officer is responsible for monitoring and reviewing of information security systems logs and controls. Provide Information security solutions to ensure that the bank will be protected and comply with the internal and external information...
- ...About the Role The Senior IT Analyst (Security) will be responsible for reviewing, administering, tracking, and remediating potential security incidents. The ideal candidate is detail-oriented, passionate about system and network security, and thrives in a collaborative...
- ...employees distributing products and services to 117 countries/territories around the world. To learn more, visit . What does an IT Security Analyst – Cyber Preparedness? Sealed Air Shared Service (Philippines) Inc. is seeking a Cyber Resilience and Business Continuity...
- ...known for their cutting-edge work in technology, digital transformation, and enterprise solutions. Job Title – AI Application Security Architect Location – Remote in Philippines Role Type – Contract, 6–12 months Must Have Skills: Strong background in...
- ...Responsibilities: Threat Modeling & Security Validation Conduct threat modeling and security reviews for distributed cloud-native systems. Perform security code reviews, static/dynamic analysis (SAST/DAST), and dependency scanning. Participate in incident...