Get new jobs by email
- Security System Maintenance Technician Region: Yanbu (Remote Sites) Job Description: We are looking for a skilled and dedicated Security System Maintenance Technician to join our team. The candidate will be responsible for the maintenance, troubleshooting, and servicing...
- ...Job Overview We are seeking a high-caliber Senior Business Systems Analyst to join our team in a remote, full-time capacity. In this role, you will act as the critical bridge between our KSA-based clients, product leads, and offshore engineering teams. We are looking...
- ...Solutions is seeking a dedicated Helix Support / Technical Support Analyst to join our remote team. In this role, you will provide... ...tools. Requirements ~ Bachelor's degree in Computer Science, Information Technology, or a related field. ~2-4 years of experience in...
- ...Senior Analyst, MENA (Geoeconomics of GCC region) About Eurasia Group and GZERO Media Eurasia Group is the world's leading global... ...reports and thought leadership pieces, translating complex information into accessible insights for clients. Engage directly with...
- A technology solutions company is seeking a dedicated Helix Support / Technical Support Analyst to join their remote team in Riyadh, Saudi Arabia. This role involves providing exceptional technical support for Helix environments, assisting clients with issues related to...
- ...consulting firm, is seeking a knowledgeable Helix Process & ITSM Analyst / Workflow Engineer to join our dynamic team. With a strong... ...Qualifications ~ Bachelor's degree in Computer Science, Information Systems, or a related field. ~3-5 years of experience in IT...
- A global research and advisory firm is seeking a highly skilled Senior Analyst focused on MENA, particularly the GCC region. The ideal candidate will possess at least 7 years of research experience and strong communication skills. Responsibilities include conducting detailed...
- A technology consulting firm seeks a Senior Business Systems Analyst for a remote role. The candidate must bridge KSA-based clients, product leads, and offshore teams, transforming complex requirements into technical specifications. With at least 6 years of experience in...
- ...resilience through data backup, data recovery, data portability, data security, and data intelligence. Based in Seattle, Veeam protects over... ...protected by federal, state or local law. All your information will be kept confidential. Please note that any personal data...
- ...Mandarin, or Hindi. Familiarity with data privacy and enterprise security reviews common across APAC, for example Singapore PDPA, Japan... ..., disability status, pregnancy, parental status, genetic information, political affiliation, or any other status protected by the laws...
- ...description: - Receiving and welcoming visitors and customers, determining their demands and providing them with the required information - Reservations Management: Handling room reservations via phone, email, or in person - Answering phone calls and dealing with...
- ...~ English-fluent Employment type: ~ Full Time Salary Range: 4000 - 6000 S.R. Benefits and Other Informations: - A rewarding salary determined according to experience - Health insurance - Paid annual vacations - Motivating work environment...
$1100 per month
...improving UI architecture and component reusability - Maintain documentation for implemented features and components - Stay informed about evolving frontend technologies and development practices What you will learn - Building real production features used...- ...and complex medical conditions. Deliver high‑quality medical consultations to patients Utilize telehealth tools (video, phone, secure messaging) to assess, diagnose, and manage patients. Ensure safe prescribing practices and appropriate use of digital monitoring...
- ...language/culture, training/education/instruction, IT, cyber security, and intelligence (analysts, CI, HUMINT, SIGINT, etc.). We are seeking a... ...origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other...
- ...Responsible for loading and offloading of flights ensuring maximum security measures at all times. Knowledge & Skills ~ Good... ...when flights are loaded at Air Force Base. Keeps Supervisor informed in respect of the flights. Follows the regulations of Airport...
$2000 per year
...benefits may apply depending on the work location and, for more information on these, please ask your Talent Partner. Fully remote... ...trustworthiness of the company. Remember, your personal and financial security is paramount, and taking preventive measures is crucial to...- ...enable everyone to accelerate the results that matter. By taking advantage of all structured and unstructured data — securing and protecting private information more effectively — Elastic’s complete, cloud-based solutions for search, security, and observability help...
- ...architectures aligned with customer business objectives, IT landscape, security, and compliance requirements. Prepare technical and... ...~ Bachelor’s degree in Engineering, Computer Science, Information Systems, or related field. ~10+ years of experience in SAP consulting...
- ...capabilities, systems, services, and network: broadband, unique WiFi security Cisco IP Phones, Call Manager, Worksmart call screen,... ...returning to your location and actively training your team with the information. Report regularly and honestly to your Manager....
$2000 per year
...for IoT, called Ubuntu Core, represents the state of the art in security and resilience for high end appliances and equipment. Our... ...aspect of our solutions and products and expect a thoughtful, well-informed answer. We always want to do the best thing for our partners and...- ...UK, Immersive Labs has progressed to the global stage and has secured over €170 million of funding. “The speed at which Immersive Labs... ...for doing great work and living our values and behaviours Informal or formal flexible working options, e.g. flexible start and finish...
- ...transition plan, tools and technology proposals, and effort estimates.* Work with teams to articulate responses to requests for information to showcase company capabilities and strengths in the specific telecommunications domain.* Prepare compelling collaterals – case...
- ...Monitoring Specialist Education: Diploma or Bachelor’s degree in Information Technology, Computer Science, Network Engineering, or related... .... Strong communication skills for coordinating with security, system administration, application, and IT support teams....
- ...Containerization Platform Education: Bachelor’s Degree in Information Technology, Computer Science, Software Engineering, or related... ...containerized environments Experience implementing security best practices for containers, including image security, network...
- ...opportunities. Then you will update, maintain and share all the major information within the accounts through Salesforce. Most important, we are... ...and negotiation skills ~ Knowledge of the physical or cyber security market will be an advantage ~ Fluent in English and Arabic...
- ...other potential voice system, ensuring seamless connectivity, security, and performance across all environments in addition to other... ...Bachelor's degree in Computer Engineering, Network Engineering, or Information Technology . Minimum 3–5 years of hands-on experience in...
- ...Support & Account Growth** + Partner with Sales to identify and secure new business, leveraging deep market insights and executive... ...age 40 and over, color, disability, gender identity, genetic information, military or veteran status, national origin, race, religion,...
- ...Education Bachelor’s Degree in Information Technology, Computer Science, or related field Experience 3–5 years of hands-on experience... ...Knowledge of user/group account management , policies, and security controls Understanding of NCA, NIC, and cybersecurity...
- ...servers. The ideal candidate should possess a Bachelor's degree in Information Technology and 3–5 years of hands-on experience with Windows... ...involves performing OS patching, ensuring compliance with security best practices, and managing user accounts and policies. #J-18...
