Get new jobs by email
775000 $ per day
...'s certified practitioners, and Accenture will support you in growing your own tech stack and certifications. Summary: As a Security Engineer, you will apply your security expertise to design, build, and protect enterprise systems, applications, data, assets, and...- ...Role Purpose ~ Safeguard the Firm's information systems and data by monitoring, developing, and managing security processes in alignment with governance requirements. Collaborate with internal and regional/global teams to implement strategic security initiatives....
- ...and take actions accordingly to neutralise or minimize the impact. The opportunity Working under the direction of the Global Security leadership team and GDS RMS Global Security team, the incumbent would be part of the Security and Travel Intelligence Centre. The...
- ...In this role you will join IBM Consulting via our world class Associate Program for university hires. As an Associate at IBM Consulting... .... Your Role And Responsibilities As a Associate Security Consultant, you'll unleash your exceptional technical prowess...
775000 $ per day
...Job Summary: Working in the Information Security group as part of the Client Data Protection Opportunity Support team based in the Philippines the Security Delivery Associate Manager will manage requirements specified in security contracts, as well as work with Accenture...- ...exceptional experience for yourself, and a better working world for all. Role name and description Senior Associate – Facilities, Safety and Security Rank 65 / Grade 3 Under the guidance of the WES Leader – the Senior Associate for Facilities, Safety and...
- ...We are seeking a seasoned Senior MS SQL Database Security Administrator to lead the security strategy, configuration, and monitoring... ...) Microsoft Certified: Azure Database Administrator Associate Certified Information Systems Security Professional (CISSP)...
- Information Security Governance & Operations Our Mission Our goal is for everyone to make bolder choices with their finances.... ...Architect – Professional AWS Certified Solutions Architect – Associate AWS Certified Security Specialty CompTIA Security + About...
- ...To develop, implement, maintain and support IT network security solutions. Roles and Responsibilities: Act as the technical lead... ...complex technical detail and tradeoffs to non-technical associates. Good communication and interpersonal skills Proactive attitude...
- ...together. Primary Responsibilities: Work with business partners and assist them in the interpretation of security policies, standards and associated guideline Assist end users in navigating the Policy Exception process Process Policy Exceptions, assess risk...
- ...• Clear, well defined and transparent career progression from Associate to Senior levels. • Continued and tailored career development... ...• Experience of mobile applications, cloud infrastructure or secure code reviews is highly desirable • Experience with IT and...
- ...As a Security Operations Analyst, you will support governance, compliance, and security-related initiatives within the IT department. Serve as escalation point for alerts and vulnerabilities. Coordinate incident triage, vulnerability scanning, and remediation tracking...
- ...safe in the world of Cyber. With a key focus on engineering and automation, this role focuses on implementing strategic solutions to security problems, providing a secure environment for our customers and colleagues to operation in, without large operational overheads....
- Position Overview Work Hours: 3PM - 12AM or 4PM - 1AM (Mid shift) Overview Bonds and ECM/ETF Settlements perform a unique and critical process of New/Primary Issuance deal management which involves being in touch with trading/trade support team before...
- ...The Information Security Governance Officer is responsible for monitoring and reviewing of information security systems logs and controls... ...contact and/or membership with related professional associations, specialist security forums and other IT security organizations...
- ...analysis to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation, and dissemination of intelligence. Collaborate with the Head...
- ...As a Business Unit Security Officer (BUSO) within the Information Risk Management team under Global Wealth Asset Management (GWAM) Information... .... Track and manage identified information risk issues and associated corrective action plans (CAPs), ensuring timely resolution and...
- ...Europe #1 bug bounty platform, with offices in Paris, Singapore, Switzerland, Germany. We provide a disruptive approach to Cyber Security through Bug Bounty programs, by connecting more than 100,000+ Ethical Hackers worldwide with organisations to secure their exposed...
- ...Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...vulnerability management lifecycle from identification, remediation to reporting Active monitoring and detection of operational security risks in the organization Conduct technical investigations on security incidents and tools Liaise directly with users on...
- ...Zone IT Solutions is seeking an experienced Security Consultant. In this role, you will provide expert advice and guidance on a range of security issues, helping to improve our clients' security posture and compliance. Requirements Responsibilities: Assess clients...
- ...to continuously enhance the vulnerability management program Requirements Bachelor's degree in information technology, cyber security, or a related field. Prior experience in vulnerability management, programming, or a related technical role is highly desirable...
- ...workstream to help de-risk Vertiv's direct and indirect supply chain. Under the guidance of the Senior Analyst, you will execute cyber security risk strategies, support supplier assessments, contribute to risk remediation activities, and maintain ongoing adoption of ISO...
- The Opportunity The Security Engineer is pivotal in delivering, managing, and supporting security solutions that ensure our customers' environments are secure, efficient, and resilient. This role combines hands-on implementation, customer enablement, project leadership...
- ...strategic, and people-focused solutions. We are expanding our security and cloud infrastructure practice and seek a certified Security... ...) Required: Microsoft Certified: Azure Security Engineer Associate (AZ-500) OR equivalent cloud security certification demonstrating...
- ...executive business processes and address the full lifecycle of the security cooperation process, including Pre-Letter of Request (LOR)... ...RDT&E phase of the acquisition lifecycle. Identify risks associated with the design, development, and implementation of cybersecurity...
- ...Transactions solutions and maintain, improve and innovate the associated modules throughout all software layers, from customer-specific... ...core development for each of our clients. As a member of the Securities Operations team, you will be part of a dynamic team of...
- ...About the Role: Design, scope, and perform offensive security engagements from planning through execution and reporting Perform application penetration testing against mobile, Web, API, and on premise applications to identify security vulnerabilities Conduct...
- ...Description Wrist Service Center is looking for a Data Security Lead who will be responsible for defining, owning, and... ...classification, data protection considerations, and emerging risks associated with AI-enabled environments. What you'll be doing: Data...
- ...organizations can innovate and advance their mission with confidence. As the world's most analyst-recognized and largest pure-play managed security services provider, LevelBlue elevates client outcomes that matter: stronger defense, faster response, and sustained business...
