Get new jobs by email
- ...Java and React Research Analyst with a strong focus on resolving security vulnerabilities. In this role, you will be responsible for... ...lifecycle. Remediation Planning: Work closely with developers to provide guidance on secure coding practices and assist in developing...
- ...Senior Developer & IT Security Specialist (Work From Home – US Time Zone) Location: Remote – Philippines Company: Doneverse (formerly Outsourced Doers) Are You a Developer Who Thrives on Building, Securing, and Optimizing Scalable Systems? Doneverse is looking...Remote job
- ...Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard... ...security assessments and audits to identify vulnerabilities. - Develop and implement security policies and procedures to safeguard...
- ...service requests and assess if request is compliant with company security policy and standards (e.g., Firewall, Endpoint Protection,... ...strategies. Work with relevant stakeholders and risk owners to develop standardized approach on processing tasks which aims to operationalize...
- ...Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard... ...problems for their immediate team and across multiple teams. - Develop and implement security policies and procedures to ensure...
- Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard... ...security assessments and audits to identify vulnerabilities. - Develop and implement security policies and procedures to safeguard...
- ...Job Description: Maintain Shopee's Safety Framework and Security Management System, including policies, training, documentation, CCTV... ...and overseas-to ensure compliance and effectiveness. Develop and deliver safety and security content, onboarding materials,...
- ...goal. Job Description Leads the design, implementation, and optimization of security capabilities. Builds reusable modules and self-service tooling to make it easier for developers and project teams to integrate and comply with security requirements. DUTIES...
- ...The roles primary focus is protecting the Firms information security interests leveraging advanced security tools and applications.... ...detect security incidents. Incident response and mitigation. Develop and document processes and procedures for responding to security...
- Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training... ...business stakeholders to ensure alignment on security objectives. - Develop and implement best practices for security operations to enhance...
- ...Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard... ...problems for their immediate team and across multiple teams. - Develop and implement security policies and procedures. - Conduct...
- Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard... ...problems for their immediate team and across multiple teams. - Develop and implement security policies and procedures to ensure...
- ...The Head of IT Security is a critical leadership role responsible for developing IT Security Standards and Procedures as well as implementing IT security strategy, initiatives and programs as aligned to the overall Information Security Strategy of the CISO Team. This...
- ...youre ready to share your perspective with the world then you can make a real impact here. This is the Krolls difference. Krolls Security Operations Center helps firm manage cybersecurity risks at every stage of preparedness by identifying vulnerabilities and...
- .... My Amazon Guy is looking for an experienced Automation Security Specialist to join our team! In this role you will be responsible... ...and efficiency. This position is primarily a developer role within the Security Department focusing on building and implementing...
- ...your own tech stack and certifications. Summary: As a Security Engineer, you will be responsible for applying security skills... ...and mitigating cyber threats. Roles & Responsibilities: - Develop and implement security solutions to protect enterprise systems,...
- Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard... ...problems for their immediate team and across multiple teams. - Develop and implement security policies and procedures to enhance the...
- ...Tribute is looking for a collaborative and motivated Senior Cyber Security Analyst for our Cloud Operations team. This is a key role in... ...'s overall security culture. Security Policy Development: Develop and update security policies, procedures, and guidelines to...
- ...Schedule and possible weekends work ~ At least 1 year of Technical writing experience (Technical writers who want to be trained in IT Security) ~- Familiarity in Threat Analysis and Threat Landscape - Familiarity with MITRE ATT&CK framework - Familiarity in OSINT...
- ...We're looking for a Cloud Information Security Engineer to join our Enterprise Technology & Services team at MBPS. In this role, you... .../John Hancock, we embrace our diversity. We strive to attract, develop and retain a workforce that is as diverse as the customers we serve...
- ...Job Title: Supervisor, Physical Security Job Description The supervisor will cover the following sites: Clark, Naga and Baguio Sites. Position is Critical for the success of Security Operations. Location: PHL Angeles City - SM City Clark BPO Bldg...
- Deliver and manage security services across client environments to ensure protection, compliance, and operational resilience.... ...problems for their immediate team and across multiple teams. - Develop and implement security policies and procedures to enhance the security...
- ...accurate and timely manner as per business requirements. The Developer will be responsible for designing, developing, and maintaining... ...data-driven content generation while maintaining compliance with security and industry standards. Responsibilities Design,...
- ...The Avaloq Security team is an international team of analysts senior and expert software engineers and architects. The Avaloq Security team develops and maintains central application security frameworks and tools for all companywide technology stacks and consults the business...
- ...Security Solution Specialist Demonstrate, design and support security solution deployments. Qualifications: • Bachelor’s in IT, Engineering or Criminology • Minimum 2 years security systems/technical security experience • Excellent communication skills –...
- ...The Senior Microsoft Security Architect will provide technical expertise in the secure design, implementation, and development of the firm's M365 environment. The architect will develop and implement policies to ensure the security and availability of the firm's M365...
- ...measures for complex systems and networks, incorporating product security strategies such as design principles and security architecture.... .../John Hancock, we embrace our diversity. We strive to attract, develop and retain a workforce that is as diverse as the customers we...
- ...Deliver and manage security services across client environments to ensure protection, compliance, and operational resilience. Summary... ...of security measures and recommend improvements. - Develop and maintain documentation related to security policies and procedures...
- ...practices to enhance service delivery. Professional & Technical Skills: - Required Skill: Expert proficiency in Network Security Operations. - Strong understanding of network protocols and security measures. - Experience with firewall management and intrusion...
- ...accelerate learning and understanding of the SOC and Information Security. The role will protect IT infrastructure from a range of cyber... ...range of data sets across multiple customer environments Develop and maintain a strong relationship with the client, IT and Information...
