Get new jobs by email
- A Security Officer's job description involves patrolling and monitoring premises, controlling access, and responding to emergencies to ensure the safety and security of people and property. They may also be responsible for operating security systems, conducting inspections...
- Safety Officer Requirements: * Has experience in Data Center, Tech Center * With COSH/BOSH/LCM/First Aid Training Willingness to Relocate: Project Location: Hann Reserve Job Specification: Oversee the overall safety management at site. Project Location: Cavite...
- ...States. Known as one of the country's top travel companies. Position: Information Security Engineer Company Industry: Travel Industry Work Location: Makati Site, QC, Alabang, Cebu, and Bacolod Work Schedule: Flexible Schedule, Rotational Shift Salary: Php 40,000-60...
- ...individual will be responsible for collaborating with our IT teams and business users to design and implement SAP FIORI authorizations.... ...Fiori authorization. Define privileges and roles with HANA Security, Fiori Security, BI7 Security, ERP and CRM Security according to...
- ...Responsible for securing data, network, and applications in system development or system implementations. Perform threat modeling, business and technical process analysis, application security and architecture reviews to evaluate, identify vulnerabilities and enforce security...
- ...Technology, Computer Science, or related fields. - At least 5 years of experience in IT networking and cybersecurity. - At least 5 years in a managerial role handling security and network teams. - Proficiency in Japanese (at least JLPT N3) and English is highly preferred...
- ...enjoy using technology to serve patients and give the highest level of care, all from... ...and Responsibilities Monitor patient's safety Obtains verbal report from the patient... ...standards. Maintains the privacy and security of all confidential and protected health...
- ...Provide first-line support for network-related issues and escalate more complex issues to higher-level engineers. Assist in... ...performance, including connection issues, bandwidth usage, and security vulnerabilities. Perform basic configuration tasks, such as...
- ...What you´ll do Analyze emerging IT Cybersecurity laws and regulations, translating them into actionable requirements in close collaboration... ...Provide expert consultation on technical and information security matters, supporting the development, implementation, and...
- ...About the Role: A financial services company is on the lookout for IT Security Head. Responsibilities: Ensure the effective management and administration of the companys security infrastructure and the protection of the company's computer network, systems...
- ...´ll do Conduct IT control testing to produce validated documents on IT control effectiveness Demonstrate timeliness, accuracy, and knowledge proficiency in IT control processes Develop knowledge on IT controls and Governance, Risk and Compliance procedures Participate...
- ...What you´ll do Conduct in-depth security assessments of IT systems, projects, and organizations to identify risks and improvement opportunities Provide expert consultation to business and IT stakeholders on applying information security and cybersecurity best practices...
- ...Founded and headquartered in Switzerland, Avaloq is continuously expanding its global footprint with around 2,500 colleagues in... ...their full potential. Job Description We are seeking a Security Data Engineer to drive the automation of our data pipelines, dashboards...
- ...We are seeking a detail-oriented and technically proficient Secure Code Engineer to help ensure our financial applications are developed and deployed securely. This role is ideal for someone with a strong programming background and a passion for software security, particularly...
480000 Php per year
...Pro Integrate with its operations and customers running in US, UK, India, APAC , Middle East and other parts of the Globe, provides... ...to find exploitable weaknesses. Developing and implementing security framework, policies, processes/procedures and guidelines. Maintaining...- ...The Senior Microsoft Security Architect will provide technical expertise in the secure design, implementation, and development of the firm's M365 environment. The architect will develop and implement policies to ensure the security and availability of the firm's M365 applications...
- ...global, diverse organization with a presence in over 100 countries and a workforce of more than 150,000 employees. Our mission is to... ...people live and work. Role Summary: The Presales Engineer - Security will support the Cybersecurity Services portfolio and...
- ...Role Outline Supports Technical Security operations center for NAMR Answering phone calls from NAMR retail branch personnel regarding... ...management Contracted Work Provides first line triage and assistance for either PIN (personal identification number) access...
- JOB TITLE : Human Resources and Organization Development Manager JOB DESCRIPTION : 1.... ...Relations Management 1.1.4. Employee Health and Safety Management 1.1.5. General HR... ...resource management information towards secure storage, efficient data retrieval and well...
- ...YOUR IMPACT ON THE BUSINESS The Information Security Officer will play a crucial role in supporting the Chief Information Security Officer... ...in ensuring the organization's information security practices and compliance with regulatory requirements. The role involves...
- ...service provider environment that strives for customer excellence and revels in being a part of constant innovation. Do you want to be... ...us to reach our goals. What would you do? Our Network Security Engineer is a part of a diverse and talented Cloud Networking...
- ...college graduate *Job Description: 1. Leads Daily Toolbox meeting and discussed with the team the following: • Ways to prevent injury... ...• Potential hazards on site before work starts and on the safety organization and fire precautions required. 2. Strictly implementing...
- About Us: We are seeking a reliable Security Officer. This position requires monitoring surveillance systems, responding to incidents, and ensuring the safety and security of our staff and visitors. Responsibilities include monitoring and surveillance, this often...
- ...The Security Data Loss Prevention Manager will oversee and manage the organization's data loss prevention strategies and technologies. This role is vital for safeguarding sensitive information from unauthorized access, loss, or misuse. It aims to protect and continuously...
- ...The Security Data Loss Prevention Engineer will be responsible for data loss prevention, as part of the global security engineering team monitoring the use and efficacy of current tooling and ensuring a continuous improvement program is in place. The role-holder will manage...
- ...Requirement Assessment: Conduct workshops with senior members of customer organizations to drive requirement assessments Customization and Integration: Design and implement customizations and integrations to meet specific client needs Build and Configuration: Lead the...
- Are you a Business Administration graduate aged 24-30? If you're skilled in Excel and familiar with accounting tasks, we want you on our team! Prior work experience is a plus, but your drive and potential matter most. Join us and grow in a supportive, dynamic work environment...
- ...services company that partners with select industries, clients and people to work on pioneering and industry-changing solutions via... ...with the team and client Job Summary Develop and enforce security plans and standards; ensures that network and system security...
- ...Responsibilities ~ Monitor organization’s networks for security breaches and investigate when one occurs ~ Use and maintain software, such as firewalls and data encryption programs, to protect sensitive information ~ Check for vulnerabilities in computer and...
- ...services company that partners with select industries, clients and people to work on pioneering and industry-changing solutions via... ...operation without being detected, in order to identify potential security weaknesses in the system. Collaborate with ITG developers by...