Get new jobs by email
- ...Summary Skills Threat Management Cyber Threat Hunting (CTH) Cybersecurity... ...development of features and capabilities for secure sharing of cybersecurity related information... ...Deploy threat intelligence analysts on client premises to evaluate the effect...
- ...Job Summary Working across a portfolio of cyber engagements with our clients, reporting to a Manager or Senior Manager, responsible for the day to day completion of security assessments or delivering elements of a security transformation programme Working with team...
- ...The person should have good understanding of a wide range of security technologies in domain of network security, endpoint security,... ...and update network security systems like firewall, IDS/IPS, VPN, remote access, etc. Maintain and update web proxy, email security solution...
- ...Job Summary As the successful candidate you will hold a bachelor’s degree in criminal justice, homeland security, political science, international studies, or related subjects. An advanced degree in business, national security, criminal justice, or other field related...
- ...Summary Possess 1-3 years of experience in the Information Security domain specifically in security operations center and, demonstrable... .... Develop professional working relationship with fellow analysts. Analyze cybersecurity alerts and data for false positive/true...
- Role Purpose The Digital Transformation Expert will provide strategic and regulatory assurance on digital transformation initiatives, ensuring alignment with national digital policies, governance frameworks, and cybersecurity requirements within Saudi government or...
- ...We are seeking a detail-oriented and strategically minded Information Security Compliance Analyst to join our security and risk team. The ideal candidate will support the development, implementation, and maintenance of information security compliance programs, frameworks...
- ...assets. Implement and manage robust cybersecurity measures, monitor security incidents, and conduct vulnerability assessments. Provide... ...Additionally, you’ll provide technical leadership in the overall Cyber Defense by ensuring Security Design & Architecture, Security...
- ...Job description / Role The Business Analyst is responsible for delivering high quality... ...effective outcomes. • Ensure reliability security and performance of platforms and systems.... ...Telecommunication, Information Technology, Cyber Security, Banking, Energy, Utilities and...
- ...Analyze and Evaluate the Telecom company's Remote Access architecture w.r.t placement,... ...analyze gaps in monitoring, protection and securing the Intellectual Property. Prepare detailed... ...Analyze, Evaluate, Correlate and report Cyber related Risks and Threats for the Telecom...
- ...advisor relationships with clients, and understand current and future client security needs, such as cybersecurity strategy, privacy and data protection strategy, cybersecurity risk management, and cyber technology implementation services, in the context of market dynamics....
- ...or session problems • Collaborate with application owners, IT security, and audit teams to enforce privileged access policies and compliance... ...organizations, in Telecommunication, Information Technology, Cyber Security, Banking, Energy, Utilities and various other industry...
- ...live Qualification Bachelor or Master Degree in computer science, Information technology, etc. Knowledge/experience in cyber security, information security etc. A track record of strong academic performance Ability to meet travel requirements, when...
- ...The CEVP & Physical Security Monitoring (PSM) Analyst provides on-site security vetting and physical security monitoring support for U.S. Government operations. This role is responsible for reviewing personnel vetting data, monitoring physical security and access-control...
- ...products and services ranging from Printing Solutions to AV, Cyber Security, Cloud and IT Services, all aimed at supporting Saudi organizations... ...are seeking a highly skilled and experienced Senior Business Analyst to join our dynamic team in Riyadh, Saudi Arabia. As a Senior...
- ...Job Title: Cybersecurity Analyst Location: Riyadh, KSA Job Summary: Our client is is hiring a Cybersecurity Analyst with... ...financial services. The role focuses on protecting information security in Riyadh, KSA. Responsibilities : - Analyze and...
- ...thrive. Your day at NTT DATA The SOC Analyst (L3) is a developing engineering role,... ...service to clients to ensure that their Security Infrastructures and systems remain operational... ...: Minimum of 4 years of experience in Cyber security At least 3 years of working...
- ...Job Summary Security Controls Cyber-security Analytical Skills Information Technology Information Systems CISA Problem Solving Project Management Data Leakage Database Monitoring This role administers security controls management systems...
- ...your career and make a real impact. The Data & Analytics Analyst will play a critical role in transforming complex data into... ...Insurance for you and your family Annual leave – 25 days Remote working on Sundays Working anywhere – 4 weeks every year...
- ...category network - with strong linkage into plants to ensure conformance at schedule and driver labor / capacity plans and into areas to secure customer services delivery. Manage inventory levels to target expectations and customer services availability agreements...
- ...as well as amongst the top five global companies by market capitalization. Overview We are seeking an experienced Accounting Analyst to join our Downstream Finance, Planning & Performance Management (DS P&PMD). Downstream Planning and Performance Management...
- Aramco energizes the world economy. Aramco occupies a special position in the global energy industry. We are one of the world's largest producers of hydrocarbon energy and chemicals, with among the lowest Upstream carbon intensities of any major producer. ...
- ...Role Title: Data Protection Senior Analyst Location: Jeddah, Saudi Arabia About... ...us at confidential About Accenture Security Join Accenture Security to pioneer security... ...blend risk strategy, digital identity, cyber defense, application security and managed...
- ...Description Role Summary: We are seeking a detail-oriented analyst to screen and shortlist stocks based on predefined technical,... ...Familiarity with US equities preferred Work Environment: Remote-friendly Flexible schedule Outcome-based Compensation: Competitive...
- - مطلوب حارس أمن للعمل بدوام 7 ساعات يوميا. - مع الحصول على إجازة يومين في الأسبوع. - الراتب 6200 ريال. - بالإضافة إلى وجبة غداء ومكافآت للسعوديين. - موقع العمل في حي الشفا. مميزات الوظيفه - المرتب 6200 شروط الوظيفه - بكالوريوس تربيه رياضيه Create ...
- - مطلوب حراس أمن للعمل داخل مدينة الرياض. - حي النسيم ببيئة عمل مستقرة ونظام يناسب الجميع. - المزايا: السكن متوفر. - الرواتب تحدد بعد المقابلة. - نظام ورديات. - استقرار وظيفي. - الشروط: الالتزام والانضباط. - الجاهزية للعمل الفوري. - الأفضلية لأصحاب الخبر...
- - تعلن شركة مقاولات كبرى في الرياض حي إشبيلية عن حاجتها لتعيين موظف أمن وسلامة للعمل بمشروع هندسي. - الشروط: خبرة لا تقل عن 5 سنوات في مجال الأمن والسلامة بالمشاريع الهندسية. - حاصل على شهادات معتمدة في الأمن والسلامة (NEBOSH / OSHA أو ما يعادلها). - حاصل على مؤهل...
- ...Job description / Role • Strong understanding of security principles, protocols, and best practices. • Proven ability to monitor and... ...leading organizations, in Telecommunication, Information Technology, Cyber Security, Banking, Energy, Utilities and various other industry...
- ...Master’s degree in a relevant field is preferred ~ Certifications like CEH, OSCP, OSCE are a plus Responsibilities Champion security with development teams to make their code more secure, primarily through manual code/architecture review Collaborate with...
- ...Description We are looking for a Security Systems Technician with proven experience in the installation, operation, and maintenance of security systems to join our ongoing and upcoming projects. Responsibilities: Installation, operation, and maintenance of security...