Get new jobs by email
- ...analysis to identify potential risks, vulnerabilities, and threat actor activity relevant to GCash's ecosystem. Oversee day-to-day Security Intelligence operations, ensuring timely collection, correlation, and dissemination of intelligence. Collaborate with the Head...
- The Opportunity The Security Engineer is pivotal in delivering, managing, and supporting security solutions that ensure our customers' environments are secure, efficient, and resilient. This role combines hands-on implementation, customer enablement, project leadership...
- ...Experience in External, Web Application, API, and Cloud Penetration testing. • Experience of mobile applications, cloud infrastructure or secure code reviews is highly desirable • Experience with IT and cybersecurity strategy, policies, standards, procedures and controls...
- ...We are seeking a seasoned Senior MS SQL Database Security Administrator to lead the security strategy, configuration, and monitoring of Microsoft SQL Server environments. This role is responsible for ensuring the confidentiality, integrity, and availability of sensitive...
- About Us As a world leading provider of integrated solutions for the alternative investment industry, Alter Domus (meaning 'The Other House' in Latin) is proud to be home to 90% of the top 30 asset managers in the private markets, and more than 6,000 professionals across...
- ...Solutions Inc. provides and optimizes business processes for our customers. Job Description Role Overview The Cloud Security Architect will lead and elevate our cloud security posture across the BU, with a strong emphasis on Microsoft Azure. The ideal...
775000 $ per day
Review and integrate all application requirements, involving security requirements. Review and integrate the application security technical architecture requirements. Provide input into final decisions regarding application security. Summary: As an Application...- ...The Information Security Analyst will be a key player in protecting our organization's data and systems. This role involves monitoring security access, conducting vulnerability assessments, and responding to incidents in coordination with IT leadership. Experience with...
- ...meaningful, and convenient financial solutions for the nation! G ka ba Join the G Nation today! We are looking for a Manager, Offensive Security Engineer to lead and execute advanced red team and offensive security operations. This role is for someone who thinks like an...
- ...Role Summary Our organization is looking for a Security Consultant to join our offensive security team. This role is dedicated to identifying and demonstrating vulnerabilities within client infrastructures before they can be exploited by external threats. By adopting...
- ...JOB DESCRIPTION The Threat & Vulnerability Management Team (TVM) are within the SOC function managing vulnerabilities. The Security Operations Center (SOC) are responsible for protect, detect, response, and remediation of all security alerts. The L2 specialist...
- ...The Opportunity A leading global information assurance organization is seeking a dedicated Associate Security Analyst to join its specialized vulnerability research and triage team. This role offers a unique opportunity to act as a primary point of contact for...
- ...The Security Consultant role at NCC Group is focused on offensive security , identifying and demonstrating vulnerabilities in client systems before they can be exploited by malicious actors. By providing an attacker's perspective, the consultant helps clients proactively...
- ...The Senior Cyber Security Engineer is a key technical leader within the company's security engineering organization and plays a central role in transforming our traditional Security Operations Center into an AI driven, investigation centric threat response function....
- ...spans core management systems, messaging services, and eCargo solutions. These include applications designed to meet customs and security requirements, quality optimization, as well as e-freight and mobility needs. Our products and services are recognized globally under...
- ...employees distributing products and services to 117 countries/territories around the world. To learn more, visit What does an IT Security Analyst – Cyber Preparedness Sealed Air Shared Service (Philippines) Inc. is seeking a Cyber Resilience and Business Continuity...
- Key Responsibilities Ensure timely settlement of trades across APAC markets (primary focus: Australia). Perform pre-matching, fails investigation, and break clearance. Process fees and cash payments accurately. Monitor nostro and depot breaks and ensure timely...
- ...The Role: Cloud Security Architect to join our Enterprise Architecture team and help define how applications, platforms, and data are securely designed and protected in cloud environments. This role focuses on applying strong cloud security architecture principles...
- ...Responsibilities: Insight and business planning: Gain insight into local laws and regulations, understand security and privacy requirements of local governments, regulators, and customers as well as loca industry best practices, and develop local business budgets and...
- ...About the Company As an Information Security Analyst, you will be working collaboratively with CIS in managing cybersecurity risk management and compliance. You will have an opportunity to develop your skills across a broad range of technical, security, risks management...
- ...and take actions accordingly to neutralise or minimize the impact. The opportunity Working under the direction of the Global Security leadership team and GDS RMS Global Security team, the incumbent would be part of the Security and Travel Intelligence Centre. The...
- ...Description As ICS Business Security Analyst, you will be working closely with WTW's Client teams to assist in responding to Client queries related to our Information Security and Data Privacy programs and controls. In this position, the Business Security Services...
- ...itself from a dominant retail financing player for consumer durables to a relevant player in used auto loans industry. The Head of Secured Loans is tasked to build auto loan products that is competitive in the industry, aligned with Home Credit's underwriting and Risk...
- ...to incorporate new data sources, implements changes that enhance risk models, and engages with internal teams. As part of the Security Development team, the role works with a broad set of software security tools (SAST, SCA, DAST, CSPM, and custom solutions) to streamline...
- ...culture focused on improving continuously and being better together. We work hard, we play hard, and we want you to join us! As the Security Operations Manager, you will be primarily responsible for overseeing, leading and evaluating the effectiveness of a workflow...
- ...Why N-able At N-able, we're not just helping businesses be secure —we're redefining what it means to be cyber resilient. Our end-to-end platform blends AI-powered capabilities and flexible tech stacks, so customers can manage, secure, and recover with confidence. But...
- ...Reporting & Controles – Securities A colleague with the talent to take on something and make it happen, who is excited to help others to succeed and has the gift of always being a step ahead. In other words, you strive to bring fresh ideas and accept challenges...
- ...ssl/tls protocols, and mastery of concepts related to proxy technology (functional scope and purpose, traffic intermediation and security stack..). Operational experience of SkyHigh and Bluecoat technologies appreciated. Load-balancing Strong familiarity of load...
- Application period is on-going
- ...The Security Architect for Network and Cloud will lead the design and development of the Firm's cloud network security solutions. You will oversee the operation and configuration of the Firm's cloud security toolsets. This will include the design and management of CNAPP...
