Get new jobs by email
- ...Job Summary Security Controls Cyber-security Analytical Skills Information Technology Information Systems CISA Problem Solving Project Management Data Leakage Database Monitoring This role administers security controls management systems...
- Job Responsibilities: Implements marketing and advertising campaigns. Tracks product sales by analyzing and entering sales data. Prepares marketing reports by collecting, analyzing, and summarizing sales data. Keeps promotional materials ready; inventorying...
- ...sandbox (Cisco, FortiGate, FireEye) Email Security (Cisco Iron Port) Web Security (... ...systems like firewall, IDS/IPS, VPN, remote access, etc. Maintain and update web proxy, email... ...network policies Management and control of network communication lines, firewalls...
- ...range of benefits including competitive rewards You will have access to state-of-the-art technology that will give you the... ...Information technology, etc. Knowledge/experience in cyber security, information security etc. A track record of strong academic...
- ...A Security Manager directs security personal to deliver a safe Guest and Member experience while coordinating with government and law... ...and Emergency procedures Responsible for management of key control within all departments What are we looking for? A Security...
- ...Description Job Summary: We are seeking a qualified Saudi Security Supervisor to oversee and manage all on-site security... ...security guards and daily security operations. Monitor site access control, CCTV systems, and incident reporting. Ensure compliance with...
- ...Description We are seeking experienced and reliable Security Guards to ensure the safety and security of premises, staff, and visitors... ...effectively. Key Responsibilities: Monitor and control access at entry and exit points Conduct regular patrols to ensure...
- ...VDC, ACI, OTV, VXLAN,CISCO UCS) Support Security TEAM for ISE Servers (SNS-3495-K9... ...Operating and maintaining different Cisco Access Points, Cisco Wireless Services Module (... ...WISM2-K9),Cisco 5500 Series Wireless LAN Controller (AIR-CT5508-K9) Manage company's Own MPLS...
- ...of the world's infrastructure, increased access to energy, resources, and vital services... .... We serve the Infrastructure; Nuclear, Security & Environmental; Energy; Mining & Metals... ...: This position is for a Document Controller supporting the KSIA Project in Riyadh, Saudi...
- ...Job Summary Responsible for all IS Security in company, risk management and compliance with global best practices and regulations related... ...customers related information,enforce policies and security controls, secure the company infrastructure from malicious attacks, and...
- ...- Monitoring the entrances and exits of the facility and controlling entry and exit - Conducting periodic inspection tours within... ...with emergency situations such as fire or riot - Implementing security and safety systems and procedures - Recording daily events and...
- ...Compliance. Analyze and Evaluate the Telecom company's Remote Access architecture w.r.t placement, coverage and configuration.... ...Establish traceability and analyze gaps in monitoring, protection and securing the Intellectual Property. Prepare detailed report for list...
- ...Description We need two Security Guards for our new project. The candidate must be able to speak English and Arabic. Below is salary and contract details. If the salary and contract policies are not suitable for you, then please do not apply. Salary Package...
- ...Responsibilities Manage and maintain security systems such as IAM, PAM, DLP, Email Security... .... Implement and maintain security controls to protect systems and data.... ...Vulnerability Assessment Threat Detection & Monitoring Access Management & Data Protection"...
- ...consideration. Responsibilities Pursue and cultivate trusted advisor relationships with clients, and understand current and future client security needs, such as cybersecurity strategy, privacy and data protection strategy, cybersecurity risk management, and cyber technology...
- ...SECURITY SUPERVISOR KAYNUNA BEACH ESCAPE, YANBU ABOUT KERTEN HOSPITALITY Kerten... ...Jeddah, and Dammam, ensuring convenient access while retaining a tranquil seaside setting... .... Monitor CCTV, alarms, and access control systems, responding effectively to incidents...
- ...We are currently seeking enthusiastic, dynamic and committed Security Professionals who want to move their career forward along with the growth of the company. As a Security Officer you are responsible to protect and safeguard all hotel guests, employees, their belongings...
- ...of the world's infrastructure, increased access to energy, resources, and vital services... .... We serve the Infrastructure; Nuclear, Security & Environmental; Energy; Mining & Metals... ...highway. Job Summary: The project controls manager oversees cost estimating,...
- ...Job Summary The Lead Document Control ensures that all organization documents, such as... ...processes to ensure that stakeholders have access to the latest, most up-to-date versions... ...contingency plans as needed. Ensure the security and confidentiality of sensitive project...
- - تعلن الشركة عن حاجتها لتعيين حراس أمن للعمل في موقعها بمدينة الرياض (الشمال). - تتضمن مهام الوظيفة تنفيذ مهام الحراسة والمراقبة لضمان أمن وسلامة الموقع. - والتحقق من هويات الزوار والمركبات وتوثيق الدخول والخروج. - والالتزام بالحصص والورديات المحددة والتقيد بالزي...
- ...Ideally with 10+ years of progressive IT experience with Cyber Security related post nominals such as ISC2, ISACA, SANS, EC Council... ...security, architecture and authorization approaches (role-based access control, direct entitlements-based). Strong understanding of...
- ...Job description: - Entry and exit control - Vehicle management - Monitoring and follow-up - Dealing with emergency situations - Reports and documentation Requirements: Good looking Ability to work in shifts (morning/evening/holidays) Attention...
- ...present extensive and deep views of current cyber threats Participate in the design and development of features and capabilities for secure sharing of cybersecurity related information among related entities Analyze submitted cybersecurity questions Support team...
- ...For a growing security consulting company specializing in industrial security design and compliance, We are seeking a Security Systems... ...Regulations . Verify placement and adequacy of CCTV, access control, intrusion detection, gates, entrances, and emergency systems...
- ...A Security Supervisor keeps constant vigilance of activity on and around the hotel property and reports, with documentation, incidents with the intent of improving the safety and security of Guests, Team Members, and others. What will I be doing? As a Security...
- ...Summary Possess 1-3 years of experience in the Information Security domain specifically in security operations center and, demonstrable... ...of benefits including competitive rewards You will have access to state-of-the-art technology that will give you the opportunity...
- ...Responsibilities Design, implement, and manage enterprise-level network and security infrastructure Configure and optimize advanced security solutions ( Firewalls, IPS, VPNs, Secure Access ) Lead complex troubleshooting and handle escalations from L2 teams...
- ...realize the importance of making each guest feel as welcome and secure as possible. Your protective nature and attention to details will... ...Patrol all areas of the property and assist guests with room access Monitor security feeds and conduct daily physical hazard inspections...
- ...Position: Mobility & Asset Control Specialist Location: Riyadh About CSI Global... ...project sites in Saudi Arabia, including site access, mobilization, and demobilization in... ...and calibration records ~Enforce asset security and custody protocols to prevent misuse or...
- ...ecosystem. Job Overview The Information Security Engineer is a critical defender of the... ...and Operations teams to ensure security controls are embedded throughout the project... ...high-stakes technical environment with access to cutting-edge security technologies....
