Get new jobs by email
- ...Position: AI SECURITY EXPERT Salary rang e: up to ₱150,000 Philippine Peso (with the final offer subject to the client’s discretion based on the candidate’s experience) Working Hours: AU/NZ business hours Work set-up: 100% Remote work Holidays : New...
- ...building a diverse and inclusive workplace where we embrace our individual talents, and our differences. Job Summary: The Security Analyst Level 1 is responsible for monitoring, analyzing, and responding to security incidents and events to protect MSP...
- ...POSITION: Chief Information Security Officer JOB OVERVIEW The Chief Information Security Officer works with other executives across different departments to design security systems and assets. The CISO’s main responsibility is creating and implementing an information...
- ...This is a remote position. We are seeking a highly organized and dependable Security Administrator Intern to manage user access, credentials, and routine security operations across various business systems. The ideal candidate will have strong attention to detail...
- ...Generation Firewalls (NGFW) and Prisma Access solutions. This role involves designing, implementing, and maintaining advanced network security infrastructures for large-scale environments. Key Responsibilities: Design, deploy, and support Palo Alto Networks NGFW and...
- ...Role Overview As the Safety & Security Supervisor, you are the frontline protector and operational anchor of our restaurant. This is a unique, supervisory-level role that blends physical security, high-level customer service, and technical facility care. Beyond traditional...
- ...This is a remote position. My Amazon Guy is looking for an experienced Automation Security Specialist to join our team! In this role, you will be responsible for optimizing and modernizing existing automation workflows in Zapier. A key focus will be transitioning...
20 - 25 $ per hour
...Insight Therapy Solutions is seeking a freelance consultant to audit our WordPress website for HIPAA compliance, privacy, and security risks. The consultant will assess how sensitive data, including potential PHI, is collected, stored, processed, and shared, then provide...- ...Title: Junior Security Questionnaire & Compliance Analyst | REMOTE Schedule: Monday–Friday, 9:00 AM–5:00 PM Eastern Time Apply here: Overview We're looking for a detail-oriented Junior Information Security professional to help review and complete customer...Remote job
- ...Intuition Machines uses AI/ML to build enterprise security products. We apply our research to systems that serve hundreds of millions of people, with a team distributed around the world. You are probably familiar with our best-known product, the hCaptcha security suite...
- ...YOUR OPPORTUNITY YOUR OPPORTUNITY Join Bacardi at the cutting edge of AI security, helping protect our expanding AI ecosystem from emerging threats. You’ll work closely with senior security and data experts, shaping AI governance and cyber defence while gaining...
- ...are one of the world's leading AI and digital infrastructure providers, with unmatched capabilities in enterprise-scale AI, cloud, security, connectivity, data centers and application services. our consulting and Industry solutions help organizations and society move...
- ...are one of the world's leading AI and digital infrastructure providers, with unmatched capabilities in enterprise-scale AI, cloud, security, connectivity, data centers and application services. our consulting and Industry solutions help organizations and society move...
- ...stability and performance of the production environment and assist in resolving operational issues. Identify and report operational or security-related events in alignment with defined procedures and escalation paths. Document incidents, updates, and operational...
- ...Responsibilities I. Safety & Security - Ensure that the safety and quality standards as defined for DHL and the customer are maintained and managed through consequence on a daily basis. - Ensure that all staff under charge are qualified, fit and able to perform their...
- .../maintenance operations, including maintaining the building, grounds and physical plant with particular attention towards safety, security and asset protection. Accountable for managing the budget, capital expenditure projects, preventative maintenance and energy conservation...
- ...(Planned Training vs, Actual Output - Training Hours and Attendance Ensure that all training documentation and records are kept secured and made readily available (i,e,training attendance logs; assessment; post evaluation & feedback forms etc) Document or take note...
- ...are one of the world's leading AI and digital infrastructure providers, with unmatched capabilities in enterprise-scale AI, cloud, security, connectivity, data centers and application services. our consulting and Industry solutions help organizations and society move...
- ...changes. Write or contribute to instructions or manuals to guide end users. Is able to make sure the coding is bug free and data is secured without any data leakage vulnerability. Certification: Certification on Saas or Package Based solution and/or relevant programming...
- ...Knowledge of operating systems, networking fundamentals, cloud technologies, and common technical architectures. Familiarity with security frameworks and standards (ISO 27001, NIST, CIS Controls, OWASP). Excellent stakeholder management and communication skills....
- ...support consistent delivery and change control. Implement and maintain governance controls across data platforms to meet agreed security and compliance requirements, including: Access control and role-based access (RBAC) Data lineage, auditability and...
- ...Engineer is a hands-on engineering role sitting at the intersection of network operations, client delivery, and infrastructure security. You will operate and evolve the networks that underpin our managed cloud platform, spanning a multi-tenant client estate, public...
- ...SUMMARY The Cybersecurity Analyst is a frontline operational role responsible for monitoring, investigating, and responding to security alerts and incidents across the organization’s security tool stack, with a primary focus on Cisco Secure Workload, Cisco Secure...
- ...organizational skills Skills & Competencies: · Attention to detail and accuracy · Time management and multitasking · Confidentiality and data security awareness · Basic analytical and problem-solving skills · Ability to work in a fast-paced, high-volume environment...
- ...part of something new, getting on from the ‘ground floor’ and benefiting from all the up-side of a ‘start-up’ initiative with the security of a large multinational (and yet none of the down-side). Role Overview The Sales Coordinator is responsible for supporting...
- ...Specific ~ Deep technical and operational understanding of the entire Microsoft 365 productivity ecosystem - designing, administering, securing, and optimizing the M365 environment for large enterprises. ~ Expert in Microsoft Entra ID – hybrid integration with on-premises...
- ...Job Summary: We are looking for a Junior SOC Analyst who will help monitor and respond to security incidents within the organization. In this role, you will be part of the first line of defense against cybersecurity threats by monitoring alerts, investigating incidents...
- ...EIGRP, OSFP, and BGP) Good understanding and practical experience with switching technologies (Spanning tree, EtherChannel, Port Security, 802.1X, MAB) Willingness and ability to travel 50% Desirable: Strongly prefer experience with the implementation of Cisco-...
- ...Messaging Engineer will provide second and third line support for Exchange Hybrid (Online and On-prem), Archiving (EV), and Email Security and Protection across all Baker McKenzie offices. The role‑holder will provide support, design, and apply best practices, developing...
- ...Responsibilities Administer and support the enterprise Power BI environment, including tenant settings, workspaces, gateways, capacity, security, and user access. Manage and maintain the Git repository for Power BI assets, including version control, branching strategy,...