Search Results: 413 vacancies
...securityposture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing aptcybersecurity
# Monitoring and safeguarding the log sources and security access
# Planning for disaster recovery in the event of any securitybreaches...
...Degree in computer science or information technology.
Knowledge of operating systems, networks and information security.
Analytical and problem-solving skills.
Ability to install and maintain systems and software.
Communication and cooperation skills with...
...strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud... ...us at ****@*****.***
People Looking for Analyst Jobs also searched
Abdal is a Saudi-based closed joint...
...View all jobs Operation Analyst (OT Cyber)
Jubail, Eastern Province · Information Technology
Incident tracking, analysis, validation and alerting.
Upkeep... ...services compliance.
OT CyberHub servers Security configuration baseline assessment.
Regular reporting...
...role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
Ensuring customer centricity by providing apt cybersecurity
Monitoring and...
...Educational Qualifications: Bachelor's degree in information technology, cybersecurity, or similar field. Recognized cybersecurity certifications such as CISSP, CEH, CompTIA Security+ are preferred.
Experience: Practical experience in the field of cybersecurity. Regular...
...Technical knowledge: Good understanding of information technologies and systems used in information management and databases.
Communication Skills: Ability to communicate effectively with team members and colleagues to exchange information and direct them properly....
...Educational Qualifications: Bachelor's degree in computer science, information technology, or related field. Recognized certifications in... ...networks, operating systems, databases, and information security. These skills may include operating and maintaining various hardware...
...Understanding of systems and technologies: The applicant must have strong knowledge of information management systems and office software used in the company.
Communication Skills: Ability to communicate effectively with team members and management to ensure smooth...
...Hold a bachelor's degree in a related field such as computer science, computer engineering, or information security.
Extensive knowledge of IT security concepts and the various techniques used to protect systems and data.
A deep understanding of potential information...
the conditions:
1- Obtaining a bachelor's degree or higher.
2- Educational specialization is required for teaching jobs.
3- The job applied for is suitable for the specialization.
4- Minimum two years of experience in the same field.
...Hold a bachelor's degree in architecture or a related field.
Deep knowledge of architectural and security systems design concepts and their applications in different environments.
Deep understanding of cybersecurity concepts and best practices for protecting systems...
...Bachelor's degree in Computer Science or related field, advanced certifications in information security such as CISSP, CISM, or CEH preferred.
Extensive IT security experience with a deep understanding of threats, vulnerabilities and defensive techniques.
In-depth...
...Education and qualifications:
Bachelor's degree in computer science, information security, computer engineering, or related field.
Recognized cybersecurity certifications such as CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional...
...technology.
Technical Knowledge: Good understanding of the technical systems and tools used by the assigned technical analyst to analyze data and information.
Experience: The position may require previous experience in analysis or related work, usually ranging from one...
...Education and experience:
Bachelor's or Master's degree in computer science, information security, or related field.
At least 5-7 years of experience in application security or cybersecurity.
Technical knowledge:
Deep understanding of application and software...
...University degree in a related field such as information technology, cybersecurity, security management, or a related field.
Deep knowledge of cybersecurity methods and best practices in the field of security.
A comprehensive understanding of network systems and...
...At least a high school diploma, preferably a graduate certificate in the field of security.
Knowledge of security procedures and techniques used in maintaining security and safety.
Ability to use surveillance systems and security technology, such as surveillance...
...to help our clients achieve business outcomes and You will help design and build data pipelines, data streams, reporting tools, information dashboards, data service APIs, data generators, and other end-user information portals and insight You are expected to function as...
...deal with emergency situations and take necessary actions quickly and effectively.
Compliance with laws and regulations related to security and safety.
Ability to use specialized security devices and technology, such as surveillance cameras and alarm systems....