Get new jobs by email
- ...Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...Europe #1 bug bounty platform, with offices in Paris, Singapore, Switzerland, Germany. We provide a disruptive approach to Cyber Security through Bug Bounty programs, by connecting more than 100,000+ Ethical Hackers worldwide with organisations to secure their exposed...
- ...analysis to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation, and dissemination of intelligence. Collaborate with the Head...
- ...Zone IT Solutions is seeking an experienced Security Consultant. In this role, you will provide expert advice and guidance on a range of security issues, helping to improve our clients' security posture and compliance. Requirements Responsibilities: Assess clients...
- ...to continuously enhance the vulnerability management program Requirements Bachelor's degree in information technology, cyber security, or a related field. Prior experience in vulnerability management, programming, or a related technical role is highly desirable...
- The Opportunity The Security Engineer is pivotal in delivering, managing, and supporting security solutions that ensure our customers' environments are secure, efficient, and resilient. This role combines hands-on implementation, customer enablement, project leadership...
- ...About The Job The primary role of Security Operations Officer is to ensure strong physical security posture in NCR office sites to protect HC employees and company assets through efficient implementation of security-related policies, operation of security systems equipment...
- Information Security Governance & Operations Our Mission Our goal is for everyone to make bolder choices with their finances. To get there, we're creating an all-in-one ecosystem of financial services for today's generation of goal-getters. That feat takes extraordinary...
- Design, develop, and implement security solutions to safeguard digital assets and business operations. Integrate security controls into enterprise systems, applications, and processes to protect against cyber threats, unauthorized access, and data breaches. Project...
- ...We are seeking a seasoned Senior MS SQL Database Security Administrator to lead the security strategy, configuration, and monitoring of Microsoft SQL Server environments. This role is responsible for ensuring the confidentiality, integrity, and availability of sensitive...
- ...Responsibilities The overall duty of a Security Guard is to protect a companys property, employees and visitors. Here are some of their typical daily responsibilities that you can include in a job description: Patrolling and monitoring activities on the companys...
- About Us As a world leading provider of integrated solutions for the alternative investment industry, Alter Domus (meaning 'The Other House' in Latin) is proud to be home to 90% of the top 30 asset managers in the private markets, and more than 6,000 professionals across...
- ...The Role: Cloud Security Architect to join our Enterprise Architecture team and help define how applications, platforms, and data are securely designed and protected in cloud environments. This role focuses on applying strong cloud security architecture principles...
- ...The Information Security Analyst will be a key player in protecting our organization's data and systems. This role involves monitoring security access, conducting vulnerability assessments, and responding to incidents in coordination with IT leadership. Experience with...
775000 $ per day
...multiple teams. - Facilitate training and development opportunities for team members to enhance their skills. - Monitor and assess security risks and vulnerabilities, implementing necessary measures to mitigate them. - Develop and maintain security policies and...- ...Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Summary: As a Security Delivery Lead, you will oversee the implementation and delivery of Security Services projects. Your...
- Design, develop, and implement security solutions to safeguard digital assets and business operations. Integrate security controls into enterprise systems, applications, and processes to protect against cyber threats, unauthorized access, and data breaches. Summary:...
- ...organization proudly affiliated with the prestigious University of Cambridge. We are seeking a technically accomplished Senior Security Analyst to join our Manila-based team at Cambridge University Press & Assessment, aligned to UK working hours. In this role, you...
- ...The Security Consultant role at NCC Group is focused on offensive security , identifying and demonstrating vulnerabilities in client systems before they can be exploited by malicious actors. By providing an attacker's perspective, the consultant helps clients proactively...
- ...Experience in External, Web Application, API, and Cloud Penetration testing. • Experience of mobile applications, cloud infrastructure or secure code reviews is highly desirable • Experience with IT and cybersecurity strategy, policies, standards, procedures and controls...
- Deliver and manage security services across client environments to ensure protection, compliance, and operational resilience. Summary: As a Security Managed Services Practitioner, you will deliver and manage security services across client environments to ensure protection...
- ...meaningful, and convenient financial solutions for the nation! G ka ba Join the G Nation today! We are looking for a Manager, Offensive Security Engineer to lead and execute advanced red team and offensive security operations. This role is for someone who thinks like an...
- ...malls to offer a complete urban experience – lodging, parking, shopping, dining and entertainment. Job Description Good Security Management skills Experience in managing safety and security of work place Experience in monitoring and maintaining security...
- Axos Business Center, Corp About This Job Role Description The Senior Security Engineer is a key technical leader within Axos Bank's Security Engineering organization and plays a central role in transforming our traditional Security Operations Center into an AI...
- ...Generation Firewalls (NGFW) and Prisma Access solutions. This role involves designing, implementing, and maintaining advanced network security infrastructures for large-scale environments. Key Responsibilities: Design, deploy, and support Palo Alto Networks NGFW and...
- ...JOB DESCRIPTION The Threat & Vulnerability Management Team (TVM) are within the SOC function managing vulnerabilities. The Security Operations Center (SOC) are responsible for protect, detect, response, and remediation of all security alerts. The L2 specialist...
- Role Description Functions of Network Security Firewall Engineer includes but not limited to overall management of global infrastructure from commissioning of new firewalls, management, standards and compliance, implementations, replacements (RMAs), code upgrades, firewall...
- ...facilitate discussions and reach decisions Knowledge Excellent oral and written communication skills are required In-depth Securities Operations/ Industry Knowledge is required Highly flexible and adaptable to change Experience ~ A College or University...
- Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Summary: As a Security Delivery Lead, you will oversee the implementation and delivery of Security Services projects. Your...
- REQ14047 Analyst, Cyber Security Operations (Open) Position Summary The Analyst, Cyber Security Operations executes daily operations procedures as part of their daily task and responsibility. He / she conducts the detailed and repeatable execution of all security...
