Get new jobs by email
- ...About the Role The Senior IT Analyst (Security) will be responsible for reviewing, administering, tracking, and remediating potential security incidents. The ideal candidate is detail-oriented, passionate about system and network security, and thrives in a collaborative...
- ...face the world's toughest challenges. We’re currently looking for a high caliber professional to join our team as Officer, Securities and Derivatives Intermediate Analyst. Being part of our team means that we’ll provide you with the resources to meet your unique...
- ...respond to information/data breaches and cyber-attacks. The overall objective of this role is to ensure the execution of Information Security directives and activities in alignment with Citi's data security policy. Responsibilities: Provide core customer service...
- ...the world's toughest challenges. We’re currently looking for a high caliber professional to join our team as Non-Officer - Securities and Derivatives Representative, Hybrid based in Manila, Philippines. Being part of our team means that we’ll provide you with the...
- ...Job Responsibilities Responsible for performing operational/maintenance activities on Infrastructure Security Appliances not limited to only Panorama and Palo Alto firewalls. Managing HA & upgrades on PALO ALTO devices Engineer would be working on daily Deployment...
- ...learnt more here than I have at Microsoft and PwC.” - CyberOne Consultant About CyberOne CyberOne is a pure-play Microsoft security partner dedicated to helping enterprises realise the full value of the Microsoft Security portfolio—across Defender XDR, Sentinel,...
- ...The Security Auditing Program Manager, assigned to a specific client, will be embedded in a Remote role as part of the client's global security function, which aims to protect, sustain, and enable the business to thrive. The role involves supporting the Security Auditing...
- About the Role We are hiring a Security Development Engineer to act as a critical reviewer of internally developed systems, with a strong focus on data handling and protection. This role works closely with development teams to challenge how systems manage, expose...
- About the Role We are looking for a Security Architecture Lead focused on Data Protection and Microsoft Purview. This role owns the design and direction of enterprise data protection controls, not just implementation. You will define how DLP, information protection...
- We are looking for a Senior Cloud Security Engineer with strong hands-on experience in Azure security to support and execute cloud security initiatives across hybrid and cloud environments. This role is ideal for someone who has practical experience implementing security...
- ...process-focused, then the Technology & Operations team may be for you! You'll Be Responsible For The Following: Lead end-to-end security architecture for platforms, applications, data, and infrastructure in multi-cloud/hybrid environments. Produce HLD/LLD,...
- ...minutes from Makati district, the capital's financial, cultural and entertainment hub with first-class shopping malls. DUTIES The Security Supervisor shall drive the day-to-day Security Operation through the effective and efficient leadership of a team of Security...
- ...The Security Consultant role at NCC Group is focused on offensive security , identifying and demonstrating vulnerabilities in client systems before they can be exploited by malicious actors. By providing an attacker's perspective, the consultant helps clients proactively...
- ...We are seeking a Security Engineer to design, implement, and maintain security controls that protect our systems, networks, and data. The ideal candidate will work closely with IT, DevOps, and engineering teams to identify risks, respond to incidents, and strengthen...
- ...maintaining stakeholder relationships. You're also responsible for complying with and enforcing procedures aligned with our information security policies. As a values-led organization, we expect all our team members to exemplify our four values: Curious and Clever ,...
- ...As a Business Unit Security Officer (BUSO) within the Information Risk Management team under Global Wealth Asset Management (GWAM) Information Technology First Line of Defense, you will play a critical role in safeguarding the organization's IT environment. The Information...
- ...Company Description AlphaGuard Security Services Corporation is recognized for its team of well-trained and experienced security professionals who excel in managing a wide range of security-related challenges. With a commitment to safety, our personnel ensure...
- ...with Night Job Description We are seeking an experienced Azure API Management (APIM) Developer responsible for designing, securing, and managing APIs on Microsoft Azure. The role involves implementing APIM policies, integrating APIs with Azure services, and automating...
- ...About the Company As an Information Security Analyst, you will be working collaboratively with CIS in managing cybersecurity risk management and compliance. You will have an opportunity to develop your skills across a broad range of technical, security, risks management...
- ...ready to share your perspective with the world, then you can make a real impact here. This is the Kroll's difference. Kroll's Security Operation's Center helps firm manage cybersecurity risks at every stage of preparedness by identifying vulnerabilities and readiness...
- ...We're seeking an Information Security Analyst to join our Group Functions IT – Information Security Management and Business Resilience (GFT ISM & BR) team at MBPS. In this role, you will play a key part in delivering BUSO services and driving continuous security monitoring...
- *** This is an onsite role based in Ho Chi Minh City, Vietnam - relocation assistance will be provided *** Title: Security Architect Role Overview We are seeking an experienced Security Architect to strengthen enterprise cyber capabilities, safeguard IT system...
- ...international C4I programs. Support services include administrative and executive business processes and address the full lifecycle of the security cooperation process, including Pre-Letter of Request (LOR) efforts, FMS case development, case execution, case reconciliation, and...
- ...Introduction The SWG and CASB Security Specialist will be responsible for designing, implementing, and managing secure web gateway and cloud access security solutions to protect enterprise environments from cyber threats. The role requires a deep understanding of web...
- ...Introduction We are seeking a highly skilled and experienced Cloud Security Consultant who will be responsible for the governance, strategy, and advisory aspects of cloud security. The individual will drive the adoption and continuous improvement of the Cloud Security...
- ...spans core management systems, messaging services, and eCargo solutions. These include applications designed to meet customs and security requirements, quality optimization, as well as e-freight and mobility needs. Our products and services are recognized globally under...
- ...to create meaningful contributions to the world. Location/Division Specific Information Discover Impactful Work: The Network Security Engineer has global responsibility for supporting solutions crafted to protect, detect, and alert to security threats in our...
- ...Our mission is to make the world safer and more secure. And our core strength is the expertise of our people. We are committed to developing the future generation of cyber scientists, analysts and professionals. And we are always keen to hear from talented and experienced...
- ...Key Responsibilities: Work closely with Application Security team to drive the initiative of secrets remediation program Part of Cyber Assessment team, to build internal reusable libraries as a standalone component in remediation of secrets/credentials in...
- ...The Information Security Manager evaluates technology environments through control testing, compliance assessments, identifies key gaps and recommends actions for remediation. Partners with other teams for cybersecurity controls assessment and tests effectiveness of...
