Get new jobs by email
- ...We are looking for a dedicated and detail-oriented Security Manager to lead safety and security operations at our hotel in Quezon City. This full-time, on-site role plays a key part in ensuring a safe, secure, and welcoming environment for our guests and team members...
- ...Europe #1 bug bounty platform, with offices in Paris, Singapore, Switzerland, Germany. We provide a disruptive approach to Cyber Security through Bug Bounty programs, by connecting more than 100,000+ Ethical Hackers worldwide with organisations to secure their exposed...
- Security Engineer /SOC We are seeking a dynamic and skilled Security Engineer that protecting an organization's information systems by detecting, analyzing, and responding to cybersecurity threats. As a Security Engineer, monitor security alerts, investigate incidents...
- ...Job Description The Security Engineer develops, implements, and maintains SIEM and SOAR solutions to support various business processes. This includes assisting the Cyber Delivery Managers with customer deliverables. He/she designs, develops and implements secure...
- Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...We are seeking a Security Engineer to design, implement, and maintain security controls that protect our systems, networks, and data. The ideal candidate will work closely with IT, DevOps, and engineering teams to identify risks, respond to incidents, and strengthen...
- ...plan, design, build, and monitor our networks and systems. You will be responsible for implementing, managing, and monitoring security measures to protect our systems, networks, and data from unauthorized access, cyber threats, and vulnerabilities. Job...
- ...process-focused, then the Technology & Operations team may be for you! You'll Be Responsible For The Following: Lead end-to-end security architecture for platforms, applications, data, and infrastructure in multi-cloud/hybrid environments. Produce HLD/LLD,...
- ...Job Description Job Title: IT Security Engineer Main Purpose of the Job: IT Security Engineer is responsible for developing and implementing comprehensive IT risk strategies. Key duties include identifying and analyzing technology risks, recommending mitigation...
- Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...Dear Applicant, We are looking for an SAP Security consultant. Please find following JD: Job Description: • Manage user access, roles, and authorizations across SAP systems (ECC, S/4HANA, BW, etc.). • Perform role design and modification with extensive working...
- ...onboarding/offboarding, and system usage policies. Collaborate with IT vendors and partners for escalations and specialized support. Security & Compliance Configure and manage firewalls, VPNs, and network security appliances. Monitor and update security policies for...
- ...spans core management systems, messaging services, and eCargo solutions. These include applications designed to meet customs and security requirements, quality optimization, as well as e-freight and mobility needs. Our products and services are recognized globally under...
- Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Summary: As a Security Delivery Lead, you will oversee the implementation and delivery of Security Services projects. Your...
- ...Position Overview We're looking for a Security Architect who can strengthen our organization's security posture through strong technical expertise and effective stakeholder communication. This role involves assessing current controls, designing and improving security...
- ...Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Summary: As a Security Delivery Lead, you will oversee the implementation and delivery of Security Services projects. Your...
- ...together, let's shape the future of biological discovery. Position Description Develop, integrate, maintain, and support internal security operations tool stack. Administer Microsoft Sentinel: configure workspaces, manage data connectors, design log ingestion...
- ...'s certified practitioners, and Accenture will support you in growing your own tech stack and certifications. Summary: As a Security Engineer, you will be responsible for applying security skills to design, build, and protect enterprise systems, applications, data...
- ...As a Security Analyst, you will be a key member of our Global Cybersecurity Team, helping to strengthen cybersecurity posture. This role involves monitoring tools and dashboards, identifying and mitigating security vulnerabilities, and collaborating with teams to address...
- ...The Service Delivery Engineer supports the secure delivery of internal and external cybersecurity solutions and services by performing technical assessments, risk analysis, and solution deployment. The role works closely with stakeholders to identify security needs...
- ...projects, develop your skills, and grow within a supportive environment that values diverse perspectives and experiences. As a Security Engineer, you will take on a key responsibility to improve the Security Logging & Monitoring Program by maturing the tools,...
- ...Job Summary Responsible for securing data, networks, and applications across system development and implementation projects. Performs threat modeling, security reviews, and vulnerability assessments to ensure that all systems meet security standards. Coordinates penetration...
- The Security Analyst role will function as an Application Security Analyst for the Infor Landmark Product. This role is responsible for performing threat intelligence analyses, reporting and preventing potential security breaches, and creating and proposing comprehensive...
- ...About Your Role As a motivated Cyber Security Engineer who is joining our global security team under this newly created role in our Philippines office, you will have hands-on experience with security tools and the ability to engineer solutions to mitigate risks...
- ...Introduction We are looking for a passionate and detail-oriented Junior API Security Consultant to join our cybersecurity team. This role is ideal for someone with foundational experience in API development or security and a strong interest in securing modern applications...
- ...Security Operations Analyst | Technology - Information Security Do you want to be part of a team helping re-invent the way knowledge professionals work How about a team that works every day to create a more transparent, just and inclusive future At Thomson Reuters,...
- ...The Role to Perform Lead and grow the company's enterprise security business by developing strategies, managing a high-performing team, and driving sales of key security solutions. You'll oversee market mapping, account planning, and partner engagement to achieve business...
- ...and fraud prevention controls for GCash's hybrid environment (private & public cloud). Ensure proposed architectures align with security goals, objectives, and enterprise architecture principles, prioritizing cost-effectiveness and scalability. Craft and deliver...
- ...Responsibilities: Oversees security operations within assigned areas of responsibility. Responds to incidents, implements emergency programs, and supports safety drills. Monitors CCTV systems, identifies potential risks, and recommends smart solutions. Leads...
- ...Walk-In and Apply at our Recruitment Open House! Tuesday, October 28, 2025 10am to 8pm The Security Consultant role at NCC Group is focused on offensive security , identifying and demonstrating vulnerabilities in client systems before they can be exploited...