Get new jobs by email
- ...Java and React Research Analyst with a strong focus on resolving security vulnerabilities. In this role, you will be responsible for... ...lifecycle. Remediation Planning: Work closely with developers to provide guidance on secure coding practices and assist in developing...
- ...The Security Manager oversees and organizes security operations across all facilities and projects serviced by 1RE. This includes developing and implementing strategic security policies and procedures to ensure compliance with security standards and guidelines for Luzon...
- ...As a key member of the Security Operations team, the Automation and Detection Engineer will support our Security Operation automation... ...Perform offensive adversary attacks to test current content and develop new content. Deliver KPIs to measure the effectiveness of automation...
- ...The Security Specialist will be responsible for all issues related to the security and protection of all team members, facilities, vital... ...as directed by the HSSE Manager. Assist the HSSE Manager to develop, review, and implement the Security Management Plan and...
- ...belonging. JOB DESCRIPTION The Cybersecurity Governance Analyst is responsible for assessing information security risks across the organization's environments, developing policies and system hardening standards to address those risks, and collaborating with IT and business...
- ...configure, and maintain Palo Alto Networks firewalls and related security features (e.g., Panorama, Wildfire, Threat Prevention, URL... ...various security platforms. Conduct vulnerability assessments Develop and implement security policies, standards, and procedures to...
- ...About the Role The role of this position is to support the Security Manager in ensuring the effective protection of ATI's port facilities... ...Inc. (ATI) is a Philippine Stock Exchange-listed operator, developer, and investor of ports and terminals. It is ranked among the...
- ...teams to implement fixes and mitigations. Patch Management Develop and maintain patching schedules for operating systems and... ...Align processes with ISO27001, CIS benchmarks, and internal security standards. Support audits by providing evidence of vulnerability...
- ...Senior Security Engineer Location: Taguig Work Setup: Onsite Working Hours: Mid Shift Budget: Php 80,000 – Php 100,000 Qualifications... ...and SIEM experience (Sentinel, ELK, or similar) Ability to develop PowerShell and Python scripts, integrate data via APIs/REST,...
- ...CORE PROFILE Security Administrator is responsible for managing and administrating the organization's security tools and systems, ensuring proper monitoring, configuration, and maintenance. This role ensures that security tools are operational, properly configured, and...
- ...Department Security Operations Employee Type Probationary Job Responsibilities Responsible for monitoring activities within the company premises to ensure the safety and security of guests, employees, and company property. The role provides visible security...
- ...within TaskUs. Join our team today and experience firsthand our dedication to supporting People First. What can you expect in a Security Compliance Associate role with TaskUs: Think of yourself as someone who provides a pivotal role in the oversight and...
- ...do your best work, unleashing your full potential to help you secure your future and lead a fulfilling career. And with Metrobank's... ...a meaningful life is within your reach! Job Summary: Develop and enforce security plans and standards; ensures that application...
- ...organizations can innovate and advance their mission with confidence. As the world's most analyst-recognized and largest pure-play managed security services provider, LevelBlue elevates client outcomes that matter: stronger defense, faster response, and sustained business...
- Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard... ...problems for their immediate team and across multiple teams. - Develop and implement security policies and procedures to ensure...
- ...Description This is a full-time, on-site role for an IT Security Ops Analyst, located in Las Piñas. The IT Security Ops Analyst... ...monitoring security systems, managing incidents, assessing risks, developing strategies to mitigate vulnerabilities, and ensuring adherence...
- ...Job Purpose The Information Security Specialist develops and drives effective cyber risk assessment and IT security compliance programs involving activities such as designing, reviewing and developing security systems, processes/procedures, and policies, establishing...
- ...Job Summary: As an Offensive Security Engineer , will act as an elite adversary simulator, leading full-scope red team and purple team... ...and help tune rules/alerts based on observed attack paths · Develop and maintain custom offensive tooling (Python, Go, PowerShell,...
- ...Key Responsibilities: Develop, integrate, maintain, and support internal security operations tool stack. Administer Microsoft Sentinel: configure workspaces, manage data connectors, design log ingestion pipelines, set up analytics rules, and write KQL queries and...
- ...vulnerability management lifecycle from identification, remediation to reporting Active monitoring and detection of operational security risks in the organization Conduct technical investigations on security incidents and tools Liaise directly with users on...
- ...The Security Risk and Intelligence Analyst will oversee security threats and risks impacting the organization on both global and local... ...that could affect company personnel, assets or operations. Develop actionable insights and recommendations from gathered open-source...
- ...safe in the world of Cyber. With a key focus on engineering and automation, this role focuses on implementing strategic solutions to security problems, providing a secure environment for our customers and colleagues to operation in, without large operational overheads....
- ...are excited to announce a pivotal opportunity for an OT Cyber Security Specialist role to join our esteemed Orica GBS team in our... ...Security Requirements by conducting Business Impact Assessments, developing Service Continuity Management plans, and creating standardized...
- ...Under the guidance of the Senior Analyst, you will execute cyber security risk strategies, support supplier assessments, contribute to... ...operational impact. Research industry trends, threat developments, and benchmarking to inform best practices. Support Third-Party...
- ...Reporting Relationship The position of IT Specialist (Information Security) is assigned to the Cybersecurity & Compliance Unit within the... ...security solutions, processes, and tools for ADB as it develops its digital and future strategies and takes part in planning initiatives...
- ...do your best work, unleashing your full potential to help you secure your future and lead a fulfilling career. And with Metrobank's... ...and defines endpoint system security standards and requirements. Develops and enforces security plans and standards; ensures that network...
- ...technology, or similar ~1-2 years of experience in DLP monitoring, compliance, or IT audit. ~ Familiarity with DLP tools, M365 Security Center, or CASB platforms ~ Knowledge of SOC2 confidentiality and privacy requirements ~ Preferred certifications: CompTIA...
- ...The role provides expertise on monitoring security systems, detecting threats, responding to security incidents, implementing and enforcing... ...remediations needed. Policy Development and Enforcement: Develop and implement IT security policies, procedures, and guidelines...
- ...commitment to employees, customers, partners and communities globally. About The Opportunity We are seeking a highly motivated Cloud Security Engineer to enhance and protect our cloud environments across AWS and Azure. This role is responsible for proactively identifying...
- ...computers, and applications looking for events and traffic indicators that signal intrusion or indicators of compromise. Triages security alerts and responds according to published protocols. He is responsible for evaluating security logs for new technologies, defining...