Get new jobs by email
- ...Exciting Opportunity! We are seeking a skilled and professional Spa Therapist to join a luxury spa in Dubai, Unites Arab Emirates. The ideal candidate will be responsible for providing high-quality spa treatments, ensuring exceptional customer service, and creating...
- ...CORE PROFILE Security Administrator is responsible for managing and administrating the organization's security tools and systems, ensuring proper monitoring, configuration, and maintenance. This role ensures that security tools are operational, properly configured, and...
- ...Design, implement, configure, and maintain Palo Alto Networks firewalls and related security features (e.g., Panorama, Wildfire, Threat Prevention, URL Filtering, GlobalProtect). Administer and support F5 products, including BIG-IP LTM (Local Traffic Manager) and/or...
- ...safe in the world of Cyber. With a key focus on engineering and automation, this role focuses on implementing strategic solutions to security problems, providing a secure environment for our customers and colleagues to operation in, without large operational overheads....
- Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...This is a remote position. We are seeking a highly organized and dependable Security Administrator Intern to manage user access, credentials, and routine security operations across various business systems. The ideal candidate will have strong attention to detail...
- ...Job Description Department Safety & Security Office Employee Type Probationary The Security Manager is responsible for the overall mall security management. He/she will ensure that the mall customers are safe and delighted while shopping, dining, and...
- ...The Platform Security Manager function oversees technical security for cloud and on-prem systems, ensuring secure-by design implementation across applications and infrastructure. It manages access controls, enforces security standards, reviews tools, conducts testing,...
- ...technology, or similar ~1-2 years of experience in DLP monitoring, compliance, or IT audit. ~ Familiarity with DLP tools, M365 Security Center, or CASB platforms ~ Knowledge of SOC2 confidentiality and privacy requirements ~ Preferred certifications: CompTIA...
- ...workstream to help de-risk Vertiv's direct and indirect supply chain. Under the guidance of the Senior Analyst, you will execute cyber security risk strategies, support supplier assessments, contribute to risk remediation activities, and maintain ongoing adoption of ISO...
- ...We are looking for a dedicated and detail-oriented Security Manager to lead safety and security operations at our hotel in Quezon City. This full-time, on-site role plays a key part in ensuring a safe, secure, and welcoming environment for our guests and team members...
- ...Job Description The Security Engineer develops, implements, and maintains SIEM and SOAR solutions to support various business processes. This includes assisting the Cyber Delivery Managers with customer deliverables. He/she designs, develops and implements secure...
- Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...As a Security Analyst, you will be a key member of our Global Cybersecurity Team, helping to strengthen cybersecurity posture. This role involves monitoring tools and dashboards, identifying and mitigating security vulnerabilities, and collaborating with teams to address...
- ...Implement the overall security program for mall properties by overseeing and supervising CRS Supervisors and Representatives. Ensure a safe and secure environment for customers, employees, guests, and other personnel within the assigned mall and related business structures...
- ...requirements listed above About the Role We are seeking a Cybersecurity Analyst to support vulnerability management, security monitoring, and incident response across global systems. This role will investigate security alerts, manage vulnerabilities end-to...
- ...Network Security Engineers offer support for a wide variety of Network security-related devices. This includes, without being limited to Firewalls, Proxies, ISD/IPS, VPNs, Etc. Technologies include Cloud Providers (AWS, Azure, OCI), and vendors such as Palo Alto, Fortinet...
- ...thrive in a start-up environment. If this sounds like you, then we'd love to talk. General Responsibilities The Associate Security Engineer supports the organization's cyber defense and incident response operations by monitoring security alerts, assisting in...
- ...We're looking for an AI Security Lead to design and drive the security architecture and strategy that protects our AI technologies—both in-house developed and externally sourced. This role is critical in ensuring that every AI solution we build or use is secure, compliant...
- ...analysis to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation, and dissemination of intelligence. Collaborate with the Head...
- Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Summary: As a Security Delivery Lead, you will be responsible for overseeing the implementation and delivery of Security...
- ...well-rounded individual. We supply you with all the pieces you need to do your best work, unleashing your full potential to help you secure your future and lead a fulfilling career. And with Metrobank's strong heart for the community, you have the chance to give back and...
- ...The Information Security Governance Officer is responsible for monitoring and reviewing of information security systems logs and controls. Provide Information security solutions to ensure that the bank will be protected and comply with the internal and external information...
- ...Our mission is to make the world safer and more secure. And our core strength is the expertise of our people. We are committed to developing the future generation of cyber scientists, analysts and professionals. And we are always keen to hear from talented and experienced...
- ...Company Description Graybox Security is a leading firm in information security, data privacy, and cybersecurity, dedicated to safeguarding organizations against evolving digital threats. By offering expert-driven consulting and managed security services, including Managed...
- ...Europe #1 bug bounty platform, with offices in Paris, Singapore, Switzerland, Germany. We provide a disruptive approach to Cyber Security through Bug Bounty programs, by connecting more than 100,000+ Ethical Hackers worldwide with organisations to secure their exposed...
- Security Engineer /SOC We are seeking a dynamic and skilled Security Engineer that protecting an organization's information systems by detecting, analyzing, and responding to cybersecurity threats. As a Security Engineer, monitor security alerts, investigate incidents...
- ...Job Description Job Title: IT Security Engineer Main Purpose of the Job: IT Security Engineer is responsible for developing and implementing comprehensive IT risk strategies. Key duties include identifying and analyzing technology risks, recommending mitigation...
- ...About the Role The Senior IT Analyst (Security) will be responsible for reviewing, administering, tracking, and remediating potential security incidents. The ideal candidate is detail-oriented, passionate about system and network security, and thrives in a collaborative...
- ...determine gaps within configurations, deliver documentation with recommendations, and provide technology support to the overall Global Security mission. Responsibilities Create automated detection methodologies to discover suspicious and anomalous behaviors,...