Get new jobs by email
- ...analysis to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation, and dissemination of intelligence. Collaborate with the Head...
- The Opportunity The Security Engineer is pivotal in delivering, managing, and supporting security solutions that ensure our customers' environments are secure, efficient, and resilient. This role combines hands-on implementation, customer enablement, project leadership...
- About Us As a world leading provider of integrated solutions for the alternative investment industry, Alter Domus (meaning 'The Other House' in Latin) is proud to be home to 90% of the top 30 asset managers in the private markets, and more than 6,000 professionals across...
- ...We are seeking a seasoned Senior MS SQL Database Security Administrator to lead the security strategy, configuration, and monitoring of Microsoft SQL Server environments. This role is responsible for ensuring the confidentiality, integrity, and availability of sensitive...
- ...Solutions Inc. provides and optimizes business processes for our customers. Job Description Role Overview The Cloud Security Architect will lead and elevate our cloud security posture across the BU, with a strong emphasis on Microsoft Azure. The ideal...
- ...Experience in External, Web Application, API, and Cloud Penetration testing. • Experience of mobile applications, cloud infrastructure or secure code reviews is highly desirable • Experience with IT and cybersecurity strategy, policies, standards, procedures and controls...
- ...The Senior Cyber Security Engineer is a key technical leader within the company's security engineering organization and plays a central role in transforming our traditional Security Operations Center into an AI driven, investigation centric threat response function....
- ...JOB DESCRIPTION The Threat & Vulnerability Management Team (TVM) are within the SOC function managing vulnerabilities. The Security Operations Center (SOC) are responsible for protect, detect, response, and remediation of all security alerts. The L2 specialist...
- ...The Information Security Analyst will be a key player in protecting our organization's data and systems. This role involves monitoring security access, conducting vulnerability assessments, and responding to incidents in coordination with IT leadership. Experience with...
- ...meaningful, and convenient financial solutions for the nation! G ka ba Join the G Nation today! We are looking for a Manager, Offensive Security Engineer to lead and execute advanced red team and offensive security operations. This role is for someone who thinks like an...
- ...Role Summary Our organization is looking for a Security Consultant to join our offensive security team. This role is dedicated to identifying and demonstrating vulnerabilities within client infrastructures before they can be exploited by external threats. By adopting...
- ...The Opportunity A leading global information assurance organization is seeking a dedicated Associate Security Analyst to join its specialized vulnerability research and triage team. This role offers a unique opportunity to act as a primary point of contact for...
- ...and take actions accordingly to neutralise or minimize the impact. The opportunity Working under the direction of the Global Security leadership team and GDS RMS Global Security team, the incumbent would be part of the Security and Travel Intelligence Centre. The...
- ...employees distributing products and services to 117 countries/territories around the world. To learn more, visit What does an IT Security Analyst – Cyber Preparedness Sealed Air Shared Service (Philippines) Inc. is seeking a Cyber Resilience and Business Continuity...
- ...Responsibilities: Insight and business planning: Gain insight into local laws and regulations, understand security and privacy requirements of local governments, regulators, and customers as well as loca industry best practices, and develop local business budgets and...
- ...to incorporate new data sources, implements changes that enhance risk models, and engages with internal teams. As part of the Security Development team, the role works with a broad set of software security tools (SAST, SCA, DAST, CSPM, and custom solutions) to streamline...
- ...ssl/tls protocols, and mastery of concepts related to proxy technology (functional scope and purpose, traffic intermediation and security stack..). Operational experience of SkyHigh and Bluecoat technologies appreciated. Load-balancing Strong familiarity of load...
- ...culture focused on improving continuously and being better together. We work hard, we play hard, and we want you to join us! As the Security Operations Manager, you will be primarily responsible for overseeing, leading and evaluating the effectiveness of a workflow...
- ...Reporting & Controles – Securities A colleague with the talent to take on something and make it happen, who is excited to help others to succeed and has the gift of always being a step ahead. In other words, you strive to bring fresh ideas and accept challenges...
- ...Why N-able At N-able, we're not just helping businesses be secure —we're redefining what it means to be cyber resilient. Our end-to-end platform blends AI-powered capabilities and flexible tech stacks, so customers can manage, secure, and recover with confidence. But...
- Application period is on-going
- ...become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. SAP Security and Compliance Senior Consultant (EY GDS Consulting – GRC Technology) As part of our EY-GDS GRC Technology competency, you will...
- ...more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 950 people who collaborate to support the business of EY by protecting EY...
- ...such mobile applications and thick client, all in a stealthy operation without being detected, in order to identify potential security weaknesses in the system. Collaborate with ITG developers by communicating the back doors/security weaknesses identified and providing...
- ...The Security Architect for Network and Cloud will lead the design and development of the Firm's cloud network security solutions. You will oversee the operation and configuration of the Firm's cloud security toolsets. This will include the design and management of CNAPP...
- ...SAP Security Professionals specialising in SAP Security play a crucial role in ensuring the integrity, confidentiality, and availability of SAP systems. Their primary responsibilities include designing, configuring, and maintaining access controls to protect sensitive...
- ...s investment services, banking transaction processing, and equity investment. About Business Line/Function Global Market Securities Settlements team ensures that Security transactions (Bonds, Equities, Complex Securities, ETF, SLAB, Repo.) and positions registered...
- ...# Technical Assessment & Discovery ● Participate in discovery sessions to understand technical requirements and existing security architectures. ● Assist in documenting customer requirements and mapping them to security solutions and/or other security controls...
- ...Position Title: Security Consultant Location: Taguig City, Metro Manila – 2 days per week onsite Role Purpose The Security Consultant role at NCC Group is focused on offensive security, identifying and demonstrating vulnerabilities in client systems before...
- ...opportunities in an environment that embraces your unique skills and experience. Your Role And Responsibilities As a Associate Security Consultant, you'll unleash your exceptional technical prowess to gather and analyze business and technical requirements,...
