Get new jobs by email
- ...Requirements Educational Qualifications:High School diploma or equivalent Experience Level:02 years Skills and Competencies:Valid driver's license and clean driving record Qualities and Traits:Strong communication skills and reliability Responsibilities and...
- ...analysis to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation, and dissemination of intelligence. Collaborate with the Head...
- The Opportunity The Security Engineer is pivotal in delivering, managing, and supporting security solutions that ensure our customers' environments are secure, efficient, and resilient. This role combines hands-on implementation, customer enablement, project leadership...
- About Us As a world leading provider of integrated solutions for the alternative investment industry, Alter Domus (meaning 'The Other House' in Latin) is proud to be home to 90% of the top 30 asset managers in the private markets, and more than 6,000 professionals across...
- ...territories around the world. To learn more, visit What does an IT Security Analyst – Cyber Preparedness Sealed Air Shared Service (... ...private information during the application process, such as a Driver's License or Social Security Number. If you have any concerns...
- ...We are seeking a seasoned Senior MS SQL Database Security Administrator to lead the security strategy, configuration, and monitoring of Microsoft SQL Server environments. This role is responsible for ensuring the confidentiality, integrity, and availability of sensitive...
- ...Solutions Inc. provides and optimizes business processes for our customers. Job Description Role Overview The Cloud Security Architect will lead and elevate our cloud security posture across the BU, with a strong emphasis on Microsoft Azure. The ideal...
775000 $ per day
Review and integrate all application requirements, involving security requirements. Review and integrate the application security technical architecture requirements. Provide input into final decisions regarding application security. Summary: As an Application...- ...The Information Security Analyst will be a key player in protecting our organization's data and systems. This role involves monitoring security access, conducting vulnerability assessments, and responding to incidents in coordination with IT leadership. Experience with...
- ...Experience in External, Web Application, API, and Cloud Penetration testing. • Experience of mobile applications, cloud infrastructure or secure code reviews is highly desirable • Experience with IT and cybersecurity strategy, policies, standards, procedures and controls...
- ...JOB DESCRIPTION The Threat & Vulnerability Management Team (TVM) are within the SOC function managing vulnerabilities. The Security Operations Center (SOC) are responsible for protect, detect, response, and remediation of all security alerts. The L2 specialist...
- ...The Senior Cyber Security Engineer is a key technical leader within the company's security engineering organization and plays a central role in transforming our traditional Security Operations Center into an AI driven, investigation centric threat response function....
- ...The Security Consultant role at NCC Group is focused on offensive security , identifying and demonstrating vulnerabilities in client systems before they can be exploited by malicious actors. By providing an attacker's perspective, the consultant helps clients proactively...
- ...meaningful, and convenient financial solutions for the nation! G ka ba Join the G Nation today! We are looking for a Manager, Offensive Security Engineer to lead and execute advanced red team and offensive security operations. This role is for someone who thinks like an...
- ...Role Summary Our organization is looking for a Security Consultant to join our offensive security team. This role is dedicated to identifying and demonstrating vulnerabilities within client infrastructures before they can be exploited by external threats. By adopting...
- ...The Opportunity A leading global information assurance organization is seeking a dedicated Associate Security Analyst to join its specialized vulnerability research and triage team. This role offers a unique opportunity to act as a primary point of contact for...
- Key Responsibilities Ensure timely settlement of trades across APAC markets (primary focus: Australia). Perform pre-matching, fails investigation, and break clearance. Process fees and cash payments accurately. Monitor nostro and depot breaks and ensure timely...
- ...The Role: Cloud Security Architect to join our Enterprise Architecture team and help define how applications, platforms, and data are securely designed and protected in cloud environments. This role focuses on applying strong cloud security architecture principles...
- ...and take actions accordingly to neutralise or minimize the impact. The opportunity Working under the direction of the Global Security leadership team and GDS RMS Global Security team, the incumbent would be part of the Security and Travel Intelligence Centre. The...
- ...About the Company As an Information Security Analyst, you will be working collaboratively with CIS in managing cybersecurity risk management and compliance. You will have an opportunity to develop your skills across a broad range of technical, security, risks management...
- ...spans core management systems, messaging services, and eCargo solutions. These include applications designed to meet customs and security requirements, quality optimization, as well as e-freight and mobility needs. Our products and services are recognized globally under...
- ...investment. About Business Line/Function Global Market Securities Settlements team ensures that Security transactions (Bonds,... ...to the relevant groups and stakeholders as appropriate. Main drivers are client service quality, independent control, operational risk...
- ...Responsibilities: Insight and business planning: Gain insight into local laws and regulations, understand security and privacy requirements of local governments, regulators, and customers as well as loca industry best practices, and develop local business budgets and...
- ...culture focused on improving continuously and being better together. We work hard, we play hard, and we want you to join us! As the Security Operations Manager, you will be primarily responsible for overseeing, leading and evaluating the effectiveness of a workflow...
- ...to incorporate new data sources, implements changes that enhance risk models, and engages with internal teams. As part of the Security Development team, the role works with a broad set of software security tools (SAST, SCA, DAST, CSPM, and custom solutions) to streamline...
- ...ssl/tls protocols, and mastery of concepts related to proxy technology (functional scope and purpose, traffic intermediation and security stack..). Operational experience of SkyHigh and Bluecoat technologies appreciated. Load-balancing Strong familiarity of load...
- ...Reporting & Controles – Securities A colleague with the talent to take on something and make it happen, who is excited to help others to succeed and has the gift of always being a step ahead. In other words, you strive to bring fresh ideas and accept challenges...
- ...Why N-able At N-able, we're not just helping businesses be secure —we're redefining what it means to be cyber resilient. Our end-to-end platform blends AI-powered capabilities and flexible tech stacks, so customers can manage, secure, and recover with confidence. But...
- Application period is on-going
- ...The Security Architect for Network and Cloud will lead the design and development of the Firm's cloud network security solutions. You will oversee the operation and configuration of the Firm's cloud security toolsets. This will include the design and management of CNAPP...
