Get new jobs by email
- ...understand and scope properly Business Associate organization structure to apply necessary controls to be assessed Perform and manage Security Assessment and remediation of identified findings as per process documents Review supplied evidence, reports and provide...
- ...Gamigo Philippines Incorporated is seeking a Security Administrator (Cybersecurity) to join our growing team. This role is crucial for ensuring the integrity, confidentiality, and availability of our digital assets while protecting them from cyber threats. As Security...
- ...Work Setup: Onsite (Ayala Cebu) Work Schedule: Dayshift The Information Security Head is primarily responsible for designing communicating and monitoring reliable information security safeguards across the banks information technology infrastructure; assisting...
- ...Educational Requirements: Bachelors degree in an IT-related program At least 3 years of hands-on experience in Information Security and/or IT Security with leadership experience. Experience in application database and operating system security assessment...
GDS Consulting | Cyber Security - Strategy, Risk, Compliance and Resilience (SRCR) Senior Consultant
...even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY- Cyber Security (SRCR) – Technology Consulting – Senior As part of our EY Strategy, Risk, Compliance and Resilience (SRCR) Technology Consulting...- ...Escalate complex issues to the appropriate teams when necessary • Maintain compliance with company standards, data privacy, and security policies Qualifications • Minimum 6 months to 2 years of voice process/customer service experience (BPO preferred) • Excellent...
- ...Develop performance-optimized pipelines using Snowflake-native capabilities and modern ELT tools Establish data governance, security models, RBAC, and masking policies in line with compliance standards Conduct performance tuning, workload monitoring, and optimization...
- ...inside and outside the organization. Your skills will be essential in coordinating with various teams to ensure the efficiency and security of our telecom infrastructure. Key Responsibilities: ▪ Daily Duties will consist of taking phone calls from customers....
- ...translate them into BI solutions. Optimize performance of dashboards and queries for large datasets. Ensure data accuracy, security, and compliance with governance standards. Maintain documentation and provide support for BI tools and solutions. Key Job Qualifications...
- ...Mockito, or PowerMock. ~ Experience in working with mark-up languages such as JSON and YAML. ~ Experience in using Quality and Security scan tools such as SonarQube, Fortify, and WebInspect. ~ Experience with CI/CD pipelines ~ Knowledgeable in Cloud platforms...
- ...proud to be family owned and operated. Job Summary: The SAP Basis Administrator supports the stability, performance, and security of the SAP landscape at Woodgrain. This role will help to manage installations, configurations, upgrades, and daily operations across...
- ...Cross-Functional Support Coordinate fit-to-work assessments and medical clearances Collaborate with facilities, admin, and security during emergencies Serve as a health resource for managers and staff Requirements Must-Have Qualifications...
- ...Develop performance-optimized pipelines using Snowflake-native capabilities and modern ELT tools. • Establish data governance, security models, RBAC, and masking policies in line with compliance standards. • Conduct performance tuning, workload monitoring, and optimization...
- ...A Senior Software Developer's primary goal is to design, develop, and optimize high-quality software while ensuring security, performance, and maintainability. They lead and mentor junior developers, follow best coding practices, and collaborate with cross-functional...
- ...capability of Salesforce. Maintain the health and stability of Salesforce Platform, software updates, advanced User Management, security, and best practice. Map business processes to Salesforce functionalities. Manage the onboarding and Offboarding of users,...
- ...Terraform patterns and contribute to IaC standards and best practices. Monitor platform systems for performance, availability, and security, and troubleshoot complex infrastructure issues. Implement security controls and compliance policies (e.g., GDPR, HIPAA, PCI...
- ...methodologies and recommend process improvements ~ Contribute to technical solution and data architecture decisions to build secure, compliant, and scalable systems Requirements ~ Proven experience building and maintaining Power BI reports ~...
- ...development team in troubleshooting and resolving technical issues related to architecture. Assist in ensuring compliance with security standards, data privacy regulations, and industry best practices. Bachelor's degree in Computer Science, Information Technology...
- ...practices and coding standards · Troubleshoot, debug, and optimize application performance and database queries · Conduct regular security audits and implement security best practices to protect systems and data · Participate in code reviews to maintain code...
- ...ICT/Low current systems Design Specific Required Knowledge, Skills, And Abilities Excellent knowledge of Communication and Security Systems Design standards, Principles, Guidelines, regulatory codes, and related laws. Comprehensive knowledge of and ability to...
- ...About AvePoint: Beyond Secure. AvePoint is the global leader in data security governance and resilience going beyond traditional solutions to ensure a robust data foundation and enable organizations everywhere to collaborate with confidence. Over 25000 customers worldwide...
- ...supporting more clients, more complex implementations, and higher technical expectations with every new project. Our solutions must be secure, scalable, and reliable while still being delivered quickly and within budget. This role exists because we need a senior...
- ...facing apps. We are looking for a part-time DevOps Engineer based in the Philippines to oversee development workflows enforce secure coding/IP protection practices support architecture decisions and guide outsourced developers using modern AI-assisted coding...
- ...professionals across nine countries, we deliver 24/7 engineering, software development, customer support, and field services. Backed by top security certifications and innovative AI solutions, we provide secure and seamless support for our partners. Join our growing team and...
- ...ecosystem and adjacent technologies (Domo BI Microsoft 365 Intune MuleSoft and other enterprise systems). This role ensures stability security and scalability of the companys cloud infrastructure and integrations that enable clinical operational and analytics workflows...
- ...complete IT needs including IT development implementation and maintenance services. We also provide excellent support for data entry IT security website hosting backup and disaster recovery as well as internal projects to support our own growing business. Check the...
- ...guest engagement for strong relationships and retention. Cultivate media, influencer, and partner relationships to expand reach and secure coverage. Qualifications Proven success in executing marketing strategies, adept in marketing principles with at least 3...
- ...Management: Manage IT infrastructure solutions, including networks, servers, and applications, ensuring optimal performance and security. Implement updates and upgrades as necessary to keep client systems current. ~ Project Initiation: Participate in...
- ...phases. Establish the infrastructure necessary to perform the Services, including all technology, financial, human resources, security, facilities and communication resources. Install all Service delivery processes and Service Level reporting mechanisms Recruits...
- ...globe. Visit for more information. As a Systems Engineer you will design and implement systems architectures to ensure security frameworks. You will lead and coordinate with systems administrators and all project team members in managing system configuration...
