Search Results: 270 vacancies
...computer science, computer engineering, or information security.
Extensive knowledge of IT security concepts and the various techniques used to... ...how to deal with them.
Ability to provide technical consultations and develop effective security policies and procedures...
...related field, advanced certifications in information security such as CISSP, CISM, or CEH preferred.
Extensive IT security experience with a deep understanding of... ...access control.
Ability to provide technical consultations and develop security policies and procedures...
...Agile Leadership. Lead digital transformation of the region.
Assure the SAFe/Agile structure and mechanisms are implemented and secure program execution.
Manage up and across the team: eliminate impediments and relentlessly improve operations and flow. Drive towards...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt...
...information
Do
# Ensuring customer centricity by providing aptcybersecurity
# Monitoring and safeguarding the log sources and security access
# Planning for disaster recovery in the event of any securitybreaches
# Monitor for attacks, intrusions and unusual,...
...Education and experience:
Bachelor's or Master's degree in computer science, information security, or related field.
At least 5-7 years of experience in application security or cybersecurity.
Technical knowledge:
Deep understanding of application and software...
...and/or audits.
Train and supervise the team for the environmental survey and audits.
Sales and Marketing of environmental consultancy and advisory services.
Qualifications
Bachelor's degree in Science, Chemistry, Environmental or related field.
Minimum 4...
...that includes Palo alto, CISCO, Fortigate , ISE/ASA and other Security Components
enforce security policies and procedures to mitigate... ...trends and relates these to planning current and future IT needs
# Stakeholder coordination & audit assistance
# Liaise...
...Job Description
We are looking for a dedicated and experienced Security Supervisor to join our team in Jubail, Saudi Arabia. The ideal candidate will have a minimum of 2 years of experience in a security-related role, preferably in a supervisory position. As a Security...
...Experience:
Previous experience in technology support or information systems support.
Good understanding of network, information security and database management.
Communication and dealing skills:
Good communication skills help in interacting with users and...
...Previous experience in the field of information technology, whether in software development, systems administration, or technical consulting.
Management skills: Ability to negotiate, build relationships, and manage clients and technical partners.
Good...
Security Officer
Responsibilities:
Patrol assigned areas to ensure the security and safety of premises, property, and personnel.
Monitor surveillance cameras and alarm systems to detect and respond to security threats or suspicious activities.
Conduct regular...
It Technical Support
Provides technical support either by phone, remote access or site visits as needed.
Installs and configures... ...Installs and upgrades anti-virus software, firewalls to ensure security at the user level.
Performs tests and evaluations on new...
...Practical experience:
Typically at least 5-7 years of experience in IT, with a background in technical project management.... ...managing IT solutions such as content management systems, networks, security, and databases.
Artistic skills:
Extensive knowledge of technical...
...information
Do
# Ensuring customer centricity by providing aptcybersecurity
# Monitoring and safeguarding the log sources and security access
# Planning for disaster recovery in the event of any securitybreaches
# Monitor for attacks, intrusions and unusual,...
...information technology and the latest trends in this field.
Deep understanding of network operating systems, databases, information security, web applications, and other core technologies.
Ability to develop and implement information technology strategies that support...
It Consultant
Are you a tech-savvy problem solver with a passion for innovation and client collaboration? We are seeking a skilled IT Consultant to join our team and provide expert guidance on... ...hardware, software, networks, and security measures, to meet client needs....
Job Title: Security Guard
Job Overview:
We are seeking a vigilant and responsible individual to join our team as a Security Guard. The ideal candidate will play a crucial role in maintaining a safe and secure environment for our premises and ensuring the...
We believe infrastructure creates opportunity for Whether it s improving your commute, keeping the lights on, providing access to clean water or transforming skylines, our work helps people and communities
Requirements
Reliable transportation
Smartphone and personal...
...At least a high school diploma, preferably a graduate certificate in the field of security.
Knowledge of security procedures and techniques used in maintaining security and safety.
Ability to use surveillance systems and security technology, such as surveillance...