Get new jobs by email
- ...Europe #1 bug bounty platform, with offices in Paris, Singapore, Switzerland, Germany. We provide a disruptive approach to Cyber Security through Bug Bounty programs, by connecting more than 100,000+ Ethical Hackers worldwide with organisations to secure their exposed...
- ...Job Description Job Title: IT Security Engineer Main Purpose of the Job: IT Security Engineer is responsible for developing and implementing comprehensive IT risk strategies. Key duties include identifying and analyzing technology risks, recommending mitigation...
- ...Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Summary: As a Security Delivery Lead, you will oversee the implementation and delivery of Security Services projects. Your...
- ...together, let's shape the future of biological discovery. Position Description Develop, integrate, maintain, and support internal security operations tool stack. Administer Microsoft Sentinel: configure workspaces, manage data connectors, design log ingestion...
- ...Position Overview We're looking for a Security Architect who can strengthen our organization's security posture through strong technical expertise and effective stakeholder communication. This role involves assessing current controls, designing and improving security...
- The Security Analyst role will function as an Application Security Analyst for the Infor Landmark Product. This role is responsible for performing threat intelligence analyses, reporting and preventing potential security breaches, and creating and proposing comprehensive...
- ...Security Operations Analyst | Technology - Information Security Do you want to be part of a team helping re-invent the way knowledge professionals work How about a team that works every day to create a more transparent, just and inclusive future At Thomson Reuters,...
- ...The Role to Perform Lead and grow the company's enterprise security business by developing strategies, managing a high-performing team, and driving sales of key security solutions. You'll oversee market mapping, account planning, and partner engagement to achieve business...
- ...ready to share your perspective with the world, then you can make a real impact here. This is the Kroll's difference. Kroll's Security Operation's Center helps firm manage cybersecurity risks at every stage of preparedness by identifying vulnerabilities and readiness...
- ...Infocentric Solutions Inc. inspires and enables organizations to run impactful business operations while commissioning robust identity security solutions to stimulate confidence and ease of growth and expansion to enterprises around the globe. As a leader in identity...
- ...for Special Projects in reviewing, developing, and documenting security policies, procedures, and operational measures for the SPX Security... ...cascade to all stakeholders when needed. Monitor guard deployment and ensure agency compliance on screening, training...
- ...Position: Information Security Officer Job Type: Permanent Work Setup: Hybrid (1x a week) Shift Time: Night Location: Manila Job Summary: The Information Security Officer will be responsible for ensuring the confidentiality, integrity, and...
- ...Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...Deliver and manage security services across client environments to ensure protection, compliance, and operational resilience. Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications...
- ...Western Australia. This established firm delivers cutting-edge security solutions and advisory services to high-profile organizations,... ...Application Hardening: Tools such as Microsoft Defender Application Guard and Chrome Enterprise. Restrict Administrative Privileges:...
- ...Job Description The Network Security Analyst will be responsible for ensuring the security of our network infrastructure. This role involves monitoring, analyzing, and responding to security events, as well as implementing measures to protect our systems from potential...
- ...About Trustwave Trustwave is a leading cybersecurity and managed security services provider focused on threat detection and response. We uncover threats that others can't and respond quicker than others can to protect against the devastating impacts of cyberattacks...
- ...skilled and experienced Senior SOC Engineer to lead threat detection, incident response, and continuous monitoring efforts within our Security Operations Center. This role is critical to maintaining the confidentiality, integrity, and availability of our systems and data,...
- ...Job Scope: To manage all RX security assessments and play a key part in ensuring RX's security compliance optimization. Monitor assessments while ensuring that Reed Exhibitions internal systems are compliant with RELX and industry standards. Proactively manage the third...
- ...the firm's clients include mutual funds, ETFs, stock exchanges and membership associations. The Opportunity The Information Security Officer is a candidate who will be responsible for developing, implementing and maintaining our information security program, which...
- ...re looking for enthusiastic, driven individuals to join our dynamic work environment where fun meets results ! The Information Security Analyst plans and carries out security measures to protect our organization's computer networks and systems. Their responsibilities...
- The position is primarily responsible for implementing and monitoring cybersecurity compliance programs, security controls, and policies to ensure the organization meets regulatory and legal requirements. The position is also responsible for supporting audits, conducting...
- ...Deliver and manage security services across client environments to ensure protection, compliance, and operational resilience. PKI & Certificate Management Engineer Provide details: Full-time . Hybrid . Security Platform (PKI/CLM) Summary of the role: Own day-to-day...
- ...Build Stronger, Smarter Security for a Worldwide Network of Industry Experts At Emapta , we are at the forefront of global outsourcing, connecting businesses with elite, high-performing talent across borders. With 15 years of success and 10,000+ professionals...
- ...Site(s) Security Management Implements the companys and customers security and safety policies and procedures among employees contractors... ...fire services as and when re quired Supervises the security guard force management trainings and conducts regular security guard...
- ...Diploma or degree in Information Technology, Computer Science, or a related field. Minimum of 5 years of experience in the IT security sector, with a technical background in network engineering, particularly in firewall implementation and management. Familiarity...
- ...Our client is recognized for its innovation, cutting-edge technology, and strong commitment to security, integrity, and employee development. You'll be joining a collaborative global environment where continuous improvement, learning, and career growth are supported and...
- Role Description Functions of Network Security Firewall Engineer includes but not limited to overall management of global infrastructure from commissioning of new firewalls, management, standards and compliance, implementations, replacements (RMAs), code upgrades, firewall...
- ...bigger than ever. The opportunity to improve health on a global scale stands before us. Meet The Team The Dexcom Information Security organization protects Dexcom's patients, employees, and data across a rapidly expanding global footprint. We design, build, and...
- ...expertise and provide inputs as required Liaise with internal teams to resolve issues and minimise exposure. This would also include Securities Lending Trade desk. Maintains good working relationship with borrowers and collateral Tri-party agents. Act as a process...