Get new jobs by email
- ...liaison for internal and external stakeholders. Manage purchase orders and procurement of building materials and acquisitions. Coordinate with internal employees regarding any updates, concerns and feedbacks. Develop and implement quality control programs as...
- ...Role Overview ClinicMind is seeking a Social Media Coordinator to execute and manage our social media presence across priority platforms with a strong emphasis on brand authority demand generation support and engagement with healthcare decision-makers. This is a...
- ...tools, and features. The Web Developer ensures applications are secure, scalable, and responsive, while supporting innovation and... ...business and functional requirements into technical solutions Coordinate with Infrastructure/Technical teams to meet security, architecture...
- ...responsibilities, providing technical guidance, writing code for critical modules, and ensuring the quality, security, and scalability of applications. The Development Lead coordinates with business analysts, QA, and IT teams, and reports directly to the Head of IT. Key...
- ...manage risks to ensure delivery is on time Experience: A College or University degree and/or relevant work experience in Securities lending is required. Excellent oral and written communication skills are required Functional / Industry Knowledge is required...
- ...We are looking for a dedicated and detail-oriented Security Manager to lead safety and security operations at our hotel in Quezon... ...alarm systems Lead incident response, investigations, and coordination with local authorities when required Work closely with hotel...
- Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training... ...success through effective leadership and decision-making. - Coordinate with stakeholders to align project objectives. - Monitor project...
- ...vendors and partners for escalations and specialized support. Security & Compliance Configure and manage firewalls, VPNs, and... ...Officer (DPO) when needed, handling privacy requests and external coordination. Data Protection & Continuity Implement and maintain...
- ...Europe #1 bug bounty platform, with offices in Paris, Singapore, Switzerland, Germany. We provide a disruptive approach to Cyber Security through Bug Bounty programs, by connecting more than 100,000+ Ethical Hackers worldwide with organisations to secure their exposed...
- Security Engineer /SOC We are seeking a dynamic and skilled Security Engineer that protecting an organization's information systems by detecting, analyzing, and responding to cybersecurity threats. As a Security Engineer, monitor security alerts, investigate incidents...
- ...Job Description The Security Engineer develops, implements, and maintains SIEM and SOAR solutions to support various business processes. This includes assisting the Cyber Delivery Managers with customer deliverables. He/she designs, develops and implements secure...
- ...The Service Delivery Engineer supports the secure delivery of internal and external cybersecurity solutions and services by performing... ...the troubleshooting of technical issues during rollout and coordinate fixes with relevant teams. 5. Operational Handoff Support...
- ...Job Summary Responsible for securing data, networks, and applications across system development and implementation projects. Performs... ...to ensure that all systems meet security standards. Coordinates penetration testing, validates remediation, and supports continuous...
- The Security Analyst role will function as an Application Security Analyst for the Infor Landmark Product. This role is responsible for... ..., etc. * Perform first-level incidence response and coordination activities with development teams. * Work with the Security...
- ...About Your Role As a motivated Cyber Security Engineer who is joining our global security team under this newly created role... ...vulnerability assessments using vulnerability scanning tools to coordinate remediation efforts. Manage patch management processes to ensure...
- ...cybersecurity professional responsible for leading and managing the Security Operations Center (SOC). The SOC Lead ensures the... ...monitoring, detection, and incident response operations. They lead and coordinate the full lifecycle of Incident Management and Crisis Response,...
- ...Position: Information Security Officer Job Type: Permanent Work Setup: Hybrid (1x a week) Shift Time: Night Location... ...security incidents in a timely and effective manner. • Coordinate with other teams, such as IT and Compliance, to respond to...
- ...We are seeking a Security Engineer to design, implement, and maintain security controls that protect our systems, networks, and data. The ideal candidate will work closely with IT, DevOps, and engineering teams to identify risks, respond to incidents, and strengthen...
- ...incident response, and continuous monitoring efforts within our Security Operations Center. This role is critical to maintaining the... ...evolving cyber threats. Key Responsibilities : Lead and coordinate real-time monitoring, triage, and response to security incidents...
- ...software solutions. Provide technical assistance to team members. Participate in code reviews and maintain coding standards. Coordinate communication within the team and with other departments. Help identify and resolve project challenges. Basic...
- ...We're seeking an Information Security Analyst to join our Group Functions IT – Information Security Management and Business Resilience... ...will include managing security service requests, coordinating Information Risk Assessments (IRA) and Corrective Action Plans...
- ...implementing and monitoring cybersecurity compliance programs, security controls, and policies to ensure the organization meets... ...responsible for supporting audits, conducting risk assessments, and coordinating with internal and external stakeholders to uphold cybersecurity...
- ...About the Role As an Information Security Analyst, you will play a vital role in supporting the day-to-day operation and continuous... ...Access platform. Review, and escalate security incidents, coordinating with IT and vendors to ensure timely resolution. Support...
- ...Job Description Job Title: IT Security Engineer Main Purpose of the Job: IT Security Engineer is responsible for developing and implementing comprehensive IT risk strategies. Key duties include identifying and analyzing technology risks, recommending mitigation...
- ...contact the recruiter directly. Description As ICS Business Security Analyst, you will be working closely with WTW's Client teams... ...Services Assessor will be responsible for leading and coordinating the completion of requests assigned - that may come in the form...
- ...lives makes every day feel purposeful.' - Senior Developer, ASW Philippines. What You'll Do Assist in the maintenance of our security infrastructure and 3rd Party services. Works with different members of the cyber security team to identify, select, and...
- ...Company Description Graybox Security is a leading firm in information security, data privacy, and cybersecurity, dedicated to safeguarding organizations against evolving digital threats. By offering expert-driven consulting and managed security services, including Managed...
- ...membership associations. The Opportunity The Information Security Officer is a candidate who will be responsible for developing,... ...property, regulated data, and the company's reputation Coordinates the development of implementation of incident response plans and...
- ...work environment where fun meets results ! The Information Security Analyst plans and carries out security measures to protect our... ...consulting resource on network, information security issues and/or coordinate information security efforts with the internal Control Self-...
- ...plan, design, build, and monitor our networks and systems. You will be responsible for implementing, managing, and monitoring security measures to protect our systems, networks, and data from unauthorized access, cyber threats, and vulnerabilities. Job...