Get new jobs by email
- ...Job Summary Possess 1-3 years of experience in the Information Security domain specifically in security operations center and, demonstrable experience and knowledge of operating platforms (windows, Linux) Have a strong fundamental understanding of TCP/IP and OSI....
- ...Master’s degree in a relevant field is preferred ~ Certifications like CEH, OSCP, OSCE are a plus Responsibilities Champion security with development teams to make their code more secure, primarily through manual code/architecture review Collaborate with...
- ...Master Works is hiring for one our Subsidiary (Soor Cybersecurity) Expert IT Security Operation Job Description: Responsible for developing, implementing, and maintaining enterprise-level information security strategies to protect organizational systems, networks...
- Arthur Lawrence is urgently looking for a Safety, Security & IT Integration Consultant for a client in Riyadh, KSA. Kindly review the... ...-Have: ~6+ years of proven experience in Safety & Security operations and relevant IT systems ~ In-depth knowledge of digital security...
- ...design, planning, delivery, and operation of all AWS global... ...running. We support all AWS data centers and all of the servers, storage... ...engineers, supply chain specialists, security experts, operations managers,... ...operation and maintenance of the IT infrastructure and hardware...
- ...owns the design, planning, delivery, and operation of all AWS global infrastructure. In... ...cloud running. We support all AWS data centers and all of the servers, storage, networking... ...network engineers, supply chain specialists, security experts, operations managers, and other...
- Arthur Lawrence is urgently looking for an Administrative Operations & IT Consultant for a client in Riyadh, KSA. Kindly review the job requirements below. Your immediate application will enable us to place you successfully. Must-Have: ~5+ years of experience in administrative...
- ...Your day at NTT DATA The SOC Analyst (L3) is a developing engineering... ...to clients to ensure that their Security Infrastructures and systems remain operational. Through the proactive... ...working in a 24x7 Security Operation center (SOC) environment. Provide...
- ...We are seeking a highly skilled Senior Security Engineer specializing in Google Cloud Platform... ...using Google Cloud Security Command Center, Cloud IAM / PAM, Cloud NAT, and Cloud... ...to prevent DNS-based attacks. • Manage operations and make sure compliance with SLA Identity...
- ...DESCRIPTION External job description The Amazon Web Services (AWS) Data Center Operations Security Team is seeking a highly talented and motivated physical Security Program Manager (SPM) to join our team. At Amazon, we are working to be the most customer-centric...
- ...This is a remote position. As a Senior Security Engineer at Karaz, you will play a critical role in shaping and advancing our security... ...relevant to technology and healthcare (e.g., ISO 27001, SOC 2, HIPAA, Saudi PDPL). Excellent communication skills with...
- .../ IPS/ VPN, malware sandbox (Cisco, FortiGate, FireEye) Email Security (Cisco Iron Port) Web Security (Forcepoint) End Point Security... ...Participate in audits and provide necessary inputs Work with SOC and InfoSec team to understand trend of security incidents and...
- ...teams and external clients Manage and maintain call center systems and software Ensure data security and regular server/network backups Monitor and... ...issues and ensure uptime and performance Implement IT best practices and security protocols Requirements...
- ...We are seeking a proactive and service-oriented Assistant Center Manager to support the day-to-day operations, administration, and customer service activities of the center. This role will assist in staff supervision, facility upkeep, customer engagement, and performance...
- ...Job Summary Security Controls Cyber-security Analytical Skills Information Technology... ..., functioning, and managing all the IT security applications. This role is... ...substantial compliance with its internal operating policies and any external regulatory or contractual...
- ...Position Purpose The IT Support plays a critical role in ensuring the smooth operation of the Duncan and Ross IT infrastructure... ...systems, and ensuring the security and reliability of network operations... ...Microsoft Intune, SCCM (System Center Configuration Manager), Manage...
- ...Services company ~Lead a dynamic IT department About Our Client... ...regulatory requirements ~Leading IT operations including infrastructure, network, data center, cloud services, end-user support... ..., and maintenance of secure and scalable infrastructure solutions...
- ...~Lead the IT transformation for a premium brand expanding across GCC ~Join an executive... ...of Odoo ERP, ensuring it supports operations across retail, warehousing, logistics, finance... ...deployments, upgrades, and cloud/security initiatives. ~Set milestones, allocate resources...
- ...Job Summary Responsible for all IS Security in company, risk management and compliance with global best practices and regulations related to IT security. Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management...
- ...relationships with clients, and understand current and future client security needs, such as cybersecurity strategy, privacy and data... ...and capability development for the domain, working closely with operating units (OU) and client leadership. Basic Qualifications...
- ...Qualification Bachelor or Master Degree in computer science, Information technology, etc. Knowledge/experience in cyber security, information security etc. A track record of strong academic performance Ability to meet travel requirements, when applicable...
- Job description: - Responding to calls and conversations - Contact customers Requirements: English Previous experience in the field of customer service Language requirements: ~ English-fluent Employment type: ~ Full Time ...
- ...in the design and development of features and capabilities for secure sharing of cybersecurity related information among related entities... ..., response, and mitigation strategies used in cybersecurity operations Maintain an intrusion database and analyze data from sensors...
- ..., deliverables, timeline, budget, and resource requirements for IT projects. Identifying and mitigating potential risks and issues.... ...organizations, in Telecommunication, Information Technology, Cyber Security, Banking, Energy, Utilities and various other industry arenas....
- مطلوب موظفين كول سنتر للعمل بالرياض – تجيد التحدث باللغات Urdu; English; العربية – مرتب مجزي + مواصلات – دوام جزئي 3 أيام من المنزل و 3 من المقر – مقر العمل حي الشفا في الرياض مميزات الوظيفه - يتوفر مواصلات شروط الوظيفه - مؤهل عالى
- وظائف حراسات امنيه تعلن شركه فاست لوجيستك عن توفر وظائف شاغره بمسمي حارس امن في مدينه الرياض . الموقع الرياض السلي سعودي الجنسيه العمر بين 20 – 45 عام لائق بدنيا وحسن السيره يفضل وجود خبره للتقديم والتفاصيل شروط الوظيفه - بكالوريوس تربيه رياضيه - يشترط خبره بالم...
- ...Cybersecurity Operations Manager About the client: Our client is a government-owned... ...capabilities, cybersecurity architecture, and IT requirements are aligned with the... ...and proposed acquisitions to ensure proper security controls and supply chain risk management...
- Senior Network Engineer, Network Security Engineer Region: Dammam (Jeddah / Riyadh / Dammam) We are looking for an experienced person to... ...to provide support to our client for troubleshooting network, VM, and Azure issues. Configuring firewalls and providing IT support.
- ...The Area Support Security Officer is responsible for providing flexible security coverage across multiple client sites within a designated... .... Familiarity with incident reporting tools and basic IT systems. Conflict resolution and customer service abilities...
- ...Sofitel Riyadh Hotel & Convention Center: A Symphony of French Elegance and Saudi... ...have to be applied in all aspects of the operations. This is the largest single ballroom... ...financial transactions are handled in a secure manner via random spot checks in the operation...