Get new jobs by email
- ...As a Security Operations Analyst, you will support governance, compliance, and security-related initiatives within the IT department. Serve as escalation point for alerts and vulnerabilities. Coordinate incident triage, vulnerability scanning, and remediation tracking...
- ...broad array of leading platforms. Our team is responsible for both security operations and strategic improvements, delivering the... ...business units operate securely. We are seeking a Security Analyst with a strong focus on endpoint security and device management...
- ...aquaculture & LNG Stolt-Nielsen's fast growing IT Security team is looking for an Operational IT Security Analyst . Stolt-Nielsen Limited (SNL) is the... ...practical experience in cybersecurity or related field (internships/entry-level roles acceptable), with exposure to...
- ...in Computer Science, Information Technology, or other relevant fields is an advantage ~3–5 years of experience in Information Security, Cybersecurity, or IT Operations ~ Experience in risk assessments, audits, compliance monitoring, and vendor evaluations ~ Knowledge...
- ...The Information Security Analyst will be a key player in protecting our organization's data and systems. This role involves monitoring security access, conducting vulnerability assessments, and responding to incidents in coordination with IT leadership. Experience with...
- ...Primary Details Time Type: Full time Worker Type: Employee The purpose of this role is to be a key member of the Global Security Operations team, responsible for performing advanced analysis on cyber threats using proactive and reactive methods to prevent...
- ...Information Security Management: Conduct regular security assessments and vulnerability scans to identify potential risks and weaknesses in our information systems. Implement and maintain security controls to protect against unauthorized access, data breaches, and...
- ...lives makes every day feel purposeful.' - Senior Developer, ASW Philippines. What You'll Do Assist in the maintenance of our security infrastructure and 3rd Party services. Works with different members of the cyber security team to identify, select, and...
- ...Palo Alto NGFW Support firewall policy administration (security rules, NAT, objects, zones). Review and analyze logs (Traffic... ...years of experience in network/security operations (or equivalent internship/lab experience). ~ Strong fundamentals in TCP/IP, DNS,...
- ...Security Analyst – Assurance Effectively manage the firm responsibilities to ensure we meet our obligations with regards to compliance of security assurance activities within the National Information Technology Security Office. Key accountabilities Ensure security...
- ...lasting resilience so organizations can innovate and advance their mission with confidence. As the world's most analyst-recognized and largest pure-play managed security services provider, LevelBlue elevates client outcomes that matter: stronger defense, faster response, and...
- ...About Delinea Delinea is a pioneer in securing human and machine identities through intelligent, centralized authorization, empowering... ...today to help us achieve our mission. Security Operations Analyst Summary Delinea's Cybersecurity organization is seeking a skilled...
- ...Information Technology Location(s) Makati City - National Capital Region - Philippines About The Role As a Data Security Analyst within CBRE's Global Data Protection team, you will support the organization's efforts to safeguard sensitive and confidential...
- ...executive business processes and address the full lifecycle of the security cooperation process, including Pre-Letter of Request (LOR)... ...requirements. Reporting to the Program Manager, the Cyber Security Analyst provides cybersecurity engineering and information assurance...
- ...a real impact here. This is the Kroll's difference. Kroll's Security Operation's Center helps firm manage cybersecurity risks at every... ...'ll maximize the value of your career. Security Operations Analyst We are seeking candidates for a 24/7 security operations...
- ...We're seeking an Information Security Analyst to join our Group Functions IT – Information Security Management and Business Resilience (GFT ISM & BR) team at MBPS. In this role, you will play a key part in delivering BUSO services and driving continuous security monitoring...
- ...Key Job Duties And Responsibilities Oversee all production networks, servers and services. Monitor computer networks for security issues. Provide technical assistance. Documentation and reporting in particular on security breaches and damage assessment....
- ...About the Company As an Information Security Analyst, you will be working collaboratively with CIS in managing cybersecurity risk management and compliance. You will have an opportunity to develop your skills across a broad range of technical, security, risks management...
- REQ14047 Analyst, Cyber Security Operations (Open) Position Summary The Analyst, Cyber Security Operations executes daily operations procedures as part of their daily task and responsibility. He / she conducts the detailed and repeatable execution of all security...
- ...Connecting. Growing together. Primary Responsibilities Work with business partners and assist them in the interpretation of security policies, standards and associated guideline Assist end users in navigating the Policy Exception process Process Policy Exceptions...
- ...As a Business Unit Security Officer (BUSO) within the Information Risk Management team under Global Wealth Asset Management (GWAM) Information... ...the organization's IT environment. The Information Security Analyst involves conducting risk assessments for new and existing...
- ...Trading partners, Implementations agents, other CS reps, Ops, and Engineering. OPPORTUNITY: The Opportunity: As a Lead Security Analyst, you will primarily be responsible in providing tactical direction, mentoring and escalation support to Senior Security...
- ...information systems and data by monitoring, developing, and managing security processes in alignment with governance requirements.... ...and Experience: Minimum 2 years in a security operations or analyst role. Familiar with security standards such as ISO 27001, NIST...
- ...Description: Assists in securing and monitoring the company's IT Assets. To monitor if there are threats or attacks to any... ...on-premise environments. Assists the Information Security Analyst and other members of the Information Technology Department to analyze...
- ...with an emphasis in parcel shipping technology. Position Overview We are seeking a detail-oriented and experienced Security Compliance Analyst to support and maintain our SOC 2 compliance program. This role is ideal for a mid-level professional who thrives in fast...
- ...Title: Security Questionnaire & Compliance Analyst (Junior) Schedule: MondayFriday 9:00 AM5:00 PM Eastern Time Apply here: looking for a detail... ...GRC Risk Compliance IT Audit or a related field (internships and project work count). ~ Exposure to security concepts...
- ...Description: Duties and Responsibilities: Thomson Reuters 4-5 week internship program offers meaningful work experience where interns will get the exposure and immersion on the work done in the assigned business units To be eligible for the internship...
- ...JOB DESCRIPTION The Threat & Vulnerability Management Team (TVM) are within the SOC function managing vulnerabilities. The Security Operations Center (SOC) are responsible for protect, detect, response, and remediation of all security alerts. The L2 specialist...
- ...In this role, you will use your knowledge of industry best practices, good judgement, and problem-solving skills to execute security operations and incident response. You will be on the front lines of cyber defense for one of the largest retail organizations in the...
- ...I am looking for a Senior SOC analyst able to join my client team and become an instrumental figure in the exciting realm of sports betting... ...Main Responsibilities: - Monitor, analyze, and respond to security alerts from SIEM, EDR, and related security tools. -...