...information
Do
# Ensuring customer centricity by providing aptcybersecurity
# Monitoring and safeguarding the log sources and security access
# Planning for disaster recovery in the event of any securitybreaches
# Monitor for attacks, intrusions and unusual,...
...NGFWs that includes Palo alto, CISCO, Fortigate , ISE/ASA and other Security Components
enforce security policies and procedures to... ...application trends and relates these to planning current and future IT needs
# Stakeholder coordination & audit assistance
# Liaise...
...Hold a bachelor's degree in a related field such as computer science, computer engineering, or information security.
Extensive knowledge of IT security concepts and the various techniques used to protect systems and data.
A deep understanding of potential information...
...Agile Leadership. Lead digital transformation of the region.
Assure the SAFe/Agile structure and mechanisms are implemented and secure program execution.
Manage up and across the team: eliminate impediments and relentlessly improve operations and flow. Drive towards...
...Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt...
...Bachelor's degree in Computer Science or related field, advanced certifications in information security such as CISSP, CISM, or CEH preferred.
Extensive IT security experience with a deep understanding of threats, vulnerabilities and defensive techniques.
In-depth...
...information
Do
# Ensuring customer centricity by providing aptcybersecurity
# Monitoring and safeguarding the log sources and security access
# Planning for disaster recovery in the event of any securitybreaches
# Monitor for attacks, intrusions and unusual,...
...Education and qualifications:
Bachelor's degree in computer science, information security, computer engineering, or related field.
Recognized cybersecurity certifications such as CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional...
...Bachelor of Technology/Engineering(Mechanical)
Nationality
Male
Vacancy
1 Vacancy
Job Description
We are seeking a highly... ...or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice...
...مطلوب مهندسين اتصالات
TETRA
و فنيين
Telecom Design Engineer
Creative design engineers industry-leading wire/wireless communication... ...radio systems are the backbone of the Operation and security in Gas and oil company.
· All Facilitate for the project to complete...
...Job Description
We are looking for a dedicated and experienced Security Supervisor to join our team in Jubail, Saudi Arabia. The ideal candidate will have a minimum of 2 years of experience in a security-related role, preferably in a supervisory position. As a Security...
...degree in information technology, cybersecurity, or similar field. Recognized cybersecurity certifications such as CISSP, CEH, CompTIA Security+ are preferred.
Experience: Practical experience in the field of cybersecurity. Regular jobs may require two to five years of...
...Experience:
Previous experience in technology support or information systems support.
Good understanding of network, information security and database management.
Communication and dealing skills:
Good communication skills help in interacting with users and...
It Technical Support
Provides technical support either by phone, remote access or site visits as needed.
Installs and configures... ...Installs and upgrades anti-virus software, firewalls to ensure security at the user level.
Performs tests and evaluations on new...
...Practical experience:
Typically at least 5-7 years of experience in IT, with a background in technical project management.... ...managing IT solutions such as content management systems, networks, security, and databases.
Artistic skills:
Extensive knowledge of technical...
...Rotating Polymer Plant Equipment Engineer
Job Summary
The role operates as a Global Engineering expert as part of the Rotating Equipment... ...or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or...
...information technology and the latest trends in this field.
Deep understanding of network operating systems, databases, information security, web applications, and other core technologies.
Ability to develop and implement information technology strategies that support...
...MECHANICAL ENGINEER
Desription
Bachelors in Engineering
With minimum 8 years of experience for Oil and Gas Projects
Advantage having experience in Water or Waste related Projects
Experience in Utilities and Waste Plant would be plus
Requirement
Bachelors...
Technical knowledge: A deep understanding of technology, information systems, cloud services, and the latest technological trends.
Practical experience: Previous experience in the field of information technology, whether in software development, systems administration...
...The role operates as a Global Engineering expert towards a continuous improvement in reducing operational risks, increasing revenue and optimizing cost across all sites worldwide, through:
Expertise deployment for Safety Systems and Functional Safety solutions & improvements...
...At least a high school diploma, preferably a graduate certificate in the field of security.
Knowledge of security procedures and techniques used in maintaining security and safety.
Ability to use surveillance systems and security technology, such as surveillance...
...The role operates as a Global Engineering expert as part of the Rotating Equipment team within the Asset Technology Centre with the purpose to drive the Asset Integrity Vision for fostering continuous improvement in Reducing operational risks, Increasing revenue and optimizing...
...Job Summary
The Cost Control Engineer coordinates in all aspects of the cost capturing, monitoring and forecasting effort for their assigned project with proper documentation. Ensures in delivering the complete suite of cost-control services and financial support for...
...portfolio of assets. We solve complex problems by finding integrated data-centric solutions from the first stages of consulting and engineering to installation and commissioning, to the last stages of decommissioning and remediation. Join us and help drive innovation and...
...Minimum high school diploma; A university degree or professional training in security or business administration is preferred.
Strong knowledge of security concepts and principles, including preventative measures and emergency management.
Ability to analyze risks...
...technical project management.
Ability to motivate and motivate the team and direct it towards achieving the strategic goals of the IT department.
Technical knowledge:
A deep understanding of the technology infrastructure, systems and applications used within...
...you to get what you need when you need it, all at the tap of a button.
Overview
We are seeking an experienced Backend Staff Engineer with expertise in any language preferred ruby to join our team. As a Staff Engineer, you will play a vital role in driving technical...
...University degree in a related field such as cybersecurity, electronic security, computer science, or equivalent.
Practical experience in the field of security, especially in security coordination, preferably prior experience in areas such as design and implementation...
...University degree in a related field such as cybersecurity, risk management, engineering, or any related discipline.
Deep knowledge of security incident and event management methods and related regulatory frameworks, such as NIST, ISO 27001, or other standards.
Ability...
...Operations Efficiency Engineer is providing Functional Ownership of different aspects of Operational Efficiency in Processes and Methodologies of Operating Assets. They assure Operating Assets Efficiency, complying and driving Operational Processes and Methodologies level...