Get new jobs by email
- ...Job Summary The Track Access Coordinator will work within a team focused on managing the... ..., stations, station rooms, depots,secure rooms etc.), on behalf of the Consortium... ...Fortnightly Look Ahead documentation for Access Control Attend / Chair Access Planning and Coordination...
- ...Job Summary Security Controls Cyber-security Analytical Skills Information Technology Information Systems CISA Problem Solving Project Management Data Leakage Database Monitoring This role administers security controls management systems...
- ...Description Job Summary: We are seeking a qualified Saudi Security Supervisor to oversee and manage all on-site security... ...security guards and daily security operations. Monitor site access control, CCTV systems, and incident reporting. Ensure compliance with...
- ...SECURITY SUPERVISOR KAYNUNA BEACH ESCAPE, YANBU ABOUT KERTEN HOSPITALITY Kerten... ...Jeddah, and Dammam, ensuring convenient access while retaining a tranquil seaside setting... .... Monitor CCTV, alarms, and access control systems, responding effectively to incidents...
- ...sandbox (Cisco, FortiGate, FireEye) Email Security (Cisco Iron Port) Web Security (... ...systems like firewall, IDS/IPS, VPN, remote access, etc. Maintain and update web proxy, email... ...network policies Management and control of network communication lines, firewalls...
- ...As the Market Access Manager, you will be responsible for developing and executing market access strategies to ensure timely, sustainable patient access to our company's in‑line and pipeline pharmaceutical and vaccine portfolio. The role ensures optimal pricing, reimbursement...
- ...range of benefits including competitive rewards You will have access to state-of-the-art technology that will give you the... ...Information technology, etc. Knowledge/experience in cyber security, information security etc. A track record of strong academic...
- Job Responsibilities: Implements marketing and advertising campaigns. Tracks product sales by analyzing and entering sales data. Prepares marketing reports by collecting, analyzing, and summarizing sales data. Keeps promotional materials ready; inventorying...
- ...Job description: - Entry and exit control - Vehicle management - Monitoring and follow-up - Dealing with emergency situations - Reports and documentation Requirements: Good looking Ability to work in shifts (morning/evening/holidays) Attention...
- ...SECURITY GUARD KAYNUNA BEACH ESCAPE, YANBU ABOUT KERTEN HOSPITALITY Kerten... ...Jeddah, and Dammam, ensuring convenient access while retaining a tranquil seaside setting... ...premises, including restricted areas. Control access to the property and verify identification...
- Summary Support the Head of Value & Access in developing and implementing CPO access, listing, pricing, and reimbursement strategy, ensuring optimal market access outcomes for assigned therapeutic areas and brands. About the Role Location: Riyadh...
- ...VDC, ACI, OTV, VXLAN,CISCO UCS) Support Security TEAM for ISE Servers (SNS-3495-K9... ...Operating and maintaining different Cisco Access Points, Cisco Wireless Services Module (... ...WISM2-K9),Cisco 5500 Series Wireless LAN Controller (AIR-CT5508-K9) Manage company's Own MPLS...
- ...We’re looking for an experienced Senior Security Engineer I to help strengthen our... ...architecture reviews Embed security tools and controls into CI/CD pipelines Partner with... ...conferences and external training. Access our e-learning platform LinkedIn and participate...
- Create your
- ...include programme, project, cost, asset and commercial management, controls and performance, procurement and supply chain, net zero and... ...contracts, archiving files and ensuring all team members have access to necessary documentation. To be successful in this role, you...
- ...construction company seeking a detail-oriented and organized Document Controller to join our team and support ongoing projects. Industry:... ...accurate filing systems to ensure documents are easily accessible and up to date • Coordinate with project teams to ensure timely...
- ...present extensive and deep views of current cyber threats Participate in the design and development of features and capabilities for secure sharing of cybersecurity related information among related entities Analyze submitted cybersecurity questions Support team...
- ...Job description / Role We are looking for a Microsoft Security Engineer with expertise in Microsoft 365 (M365) security to design, implement... .... • M365 Security Implementation & Management • Identity & Access Management (IAM) • Threat Detection • Compliance & Risk...
- A Good Security Guard Wanted Region: Riyadh Are you a good security guard in need of a job? We offering good salary for a good security guard to work with us in our hotel. Kindly get back to us now with your application for more information regarding the job.
- ...Job Summary The Lead Document Control ensures that all organization documents, such as... ...processes to ensure that stakeholders have access to the latest, most up-to-date versions... ...contingency plans as needed. Ensure the security and confidentiality of sensitive project...
- ...Job Summary Responsible for all IS Security in company, risk management and compliance with global best practices and regulations related... ...customers related information,enforce policies and security controls, secure the company infrastructure from malicious attacks, and...
- ...Compliance. Analyze and Evaluate the Telecom company's Remote Access architecture w.r.t placement, coverage and configuration.... ...Establish traceability and analyze gaps in monitoring, protection and securing the Intellectual Property. Prepare detailed report for list...
- ...develop social inclusion and facilitate access to employment, education and leisure throughout... ...seeking a well experienced Document Control Lead to join one of our programs in Riyadh... ...s EDMS, ensuring proper document access, security, and data integrity Monitor document...
- ...Role Overview We are seeking a senior DNS and Endpoint Security Advisor to provide expert guidance on the design, hardening, and management... ...strategies covering EDR/XDR platforms, AV, application control, and device hardening Evaluate and recommend DNS security...
- ...addition to your competitive package and benefits you will have access to a suite of policies that include hybrid working arrangements... ...include; Demonstrating technical knowledge of the Document Control System and processes. Planning, allocating, and evaluating workloads...
- ...Ideally with 10+ years of progressive IT experience with Cyber Security related post nominals such as ISC2, ISACA, SANS, EC Council... ...security, architecture and authorization approaches (role-based access control, direct entitlements-based). Strong understanding of...
- - مطلوب حارس أمن ذو خلق عالي. - يتمتع بسلوك حسن ومظهر لائق. - للعمل على بوابة دخول وخروج موقع العمل في الرياض. - حي النخيل. - يفضل إرسال السيرة الذاتية. - الشروط: العمر 45 سنة - إرسال سابقة العمل شروط الوظيفه - بكالوريوس تربيه رياضيه Create your
- ...consideration. Responsibilities Pursue and cultivate trusted advisor relationships with clients, and understand current and future client security needs, such as cybersecurity strategy, privacy and data protection strategy, cybersecurity risk management, and cyber technology...
- ...and develops cutting-edge innovations accessible to all projects. Through its wide range... ...highly organized and efficient Document Controller (Saudi National) to join our site supervision... ...Maintain confidentiality and security of sensitive project information Qualifications...
- ...Overview: Responsible for ensuring the physical safety and security of SAP employees, buildings, and assets, through the... ...electronic security systems and vendors, to include electronic access control, badging, visitor management, security video, intrusion detection...

