Get new jobs by email
- ...As a Security Operations Analyst, you will support governance, compliance, and security-related initiatives within the IT department. Serve as escalation point for alerts and vulnerabilities. Coordinate incident triage, vulnerability scanning, and remediation tracking...
- ...analysis to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation, and dissemination of intelligence. Collaborate with the Head...
- ...Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...safe in the world of Cyber. With a key focus on engineering and automation, this role focuses on implementing strategic solutions to security problems, providing a secure environment for our customers and colleagues to operation in, without large operational overheads....
- ...to continuously enhance the vulnerability management program Requirements Bachelor's degree in information technology, cyber security, or a related field. Prior experience in vulnerability management, programming, or a related technical role is highly desirable...
- ...Europe #1 bug bounty platform, with offices in Paris, Singapore, Switzerland, Germany. We provide a disruptive approach to Cyber Security through Bug Bounty programs, by connecting more than 100,000+ Ethical Hackers worldwide with organisations to secure their exposed...
- The Opportunity The Security Engineer is pivotal in delivering, managing, and supporting security solutions that ensure our customers' environments are secure, efficient, and resilient. This role combines hands-on implementation, customer enablement, project leadership...
- ...Zone IT Solutions is seeking an experienced Security Consultant. In this role, you will provide expert advice and guidance on a range of security issues, helping to improve our clients' security posture and compliance. Requirements Responsibilities: Assess clients...
- ...vulnerability management lifecycle from identification, remediation to reporting Active monitoring and detection of operational security risks in the organization Conduct technical investigations on security incidents and tools Liaise directly with users on...
- ...workstream to help de-risk Vertiv's direct and indirect supply chain. Under the guidance of the Senior Analyst, you will execute cyber security risk strategies, support supplier assessments, contribute to risk remediation activities, and maintain ongoing adoption of ISO...
- Design, develop, and implement security solutions to safeguard digital assets and business operations. Integrate security controls into enterprise systems, applications, and processes to protect against cyber threats, unauthorized access, and data breaches. Project...
- ...our team today and experience firsthand our dedication to supporting People First. What can you expect in a Senior Network Security Engineer role with TaskUs: Want to be part of a company that is changing the game for some of the world's most notable brands...
- Information Security Governance & Operations Our Mission Our goal is for everyone to make bolder choices with their finances. To get there, we're creating an all-in-one ecosystem of financial services for today's generation of goal-getters. That feat takes extraordinary...
- ...organizations can innovate and advance their mission with confidence. As the world's most analyst-recognized and largest pure-play managed security services provider, LevelBlue elevates client outcomes that matter: stronger defense, faster response, and sustained business...
- ...About the Role: Design, scope, and perform offensive security engagements from planning through execution and reporting Perform application penetration testing against mobile, Web, API, and on premise applications to identify security vulnerabilities Conduct...
- ...enthusiasm. Our work environment represents a culture of dedication, stability, and teamwork. As the business expands, we seek to hire a Security Receptionist to join our growing company. Job Responsibilities: Enforce company policies and regulations to ensure...
- ...SUMMARY The Endpoint Security Engineer serves as a technical escalation point responsible for advanced endpoint support, identity administration, and day-to-day operation of security tooling across client environments. This role requires independent execution, strong...
- ...หรือของทีม เรามีบทบาทที่พร้อมจะพัฒนาทักษะของคุณและพาคุณก้าวไปในระดับที่สูงขึ้น รายละเอียดของงาน: Job Description Support Security Manager in the management of the Aviation Security Program in accordance with the Local Authorities/Regulators and UPS standards...
- About Us As a world leading provider of integrated solutions for the alternative investment industry, Alter Domus (meaning 'The Other House' in Latin) is proud to be home to 90% of the top 30 asset managers in the private markets, and more than 6,000 professionals across...
- ...The Role: Cloud Security Architect to join our Enterprise Architecture team and help define how applications, platforms, and data are securely designed and protected in cloud environments. This role focuses on applying strong cloud security architecture principles...
- ...We are looking for a Senior / Lead Post-Sales Engineer with a strong Network and Security background to lead the implementation and delivery of enterprise IT solutions. This role is ideal for a hands-on technical expert who can also provide leadership, mentoring,...
- ...Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Summary: As a Security Delivery Lead, you will oversee the implementation and delivery of Security Services projects. Your...
- ...About The Job The primary role of Security Operations Officer is to ensure strong physical security posture in NCR office sites to protect HC employees and company assets through efficient implementation of security-related policies, operation of security systems equipment...
- ...Responsibilities The overall duty of a Security Guard is to protect a companys property, employees and visitors. Here are some of their typical daily responsibilities that you can include in a job description: Patrolling and monitoring activities on the companys...
- ...Job Description: Responsible for security management in Shopee warehouse, ensuring the safety of company assets and personnel. . Develop and implement comprehensive security policies and procedures in compliance with laws and regulations and Shopee regional's security...
- ...We are seeking a seasoned Senior MS SQL Database Security Administrator to lead the security strategy, configuration, and monitoring of Microsoft SQL Server environments. This role is responsible for ensuring the confidentiality, integrity, and availability of sensitive...
- ...We are looking for a Information Security Specialist to serve as the local Information Security representative for our Philippines operations , working closely with our global Information Security team. You will help translate global security standards into practical...
- ...SENIOR SECURITY ANALYST Work for our global clients and immerse in our rich and diverse company culture where you can thrive, grow and just be aweSOme! Apply now and discover the Satellite Office Candidate Experience – recognized as one of BEST among BPO companies...
- ...special room rates and other perks. Join us now and enjoy the Hilton experience for yourself. What will I be doing? As the Security Supervisor, you will be responsible for performing the following tasks to the highest standards: Maintain the order and safety...
- Design, develop, and implement security solutions to safeguard digital assets and business operations. Integrate security controls into enterprise systems, applications, and processes to protect against cyber threats, unauthorized access, and data breaches. Summary:...