Get new jobs by email
- ...environment for professionals who strive for excellence within a market-leading corporate ecosystem. Job Overview The Information Security Engineer is a critical defender of the organization’s digital perimeter and a guardian of regulatory integrity. This role...
- ...Job Summary Implement the Security Risk Assessment methodology, policy, and process... ...risk assessments to identify significant information security risks (including applications,... ..... Education computer science/engineering, management information systems (MIS),...
- ...integration with the other areas in Mobily security. Perform investigation and... ...analysis. Previous experience with Security Information and Event Monitoring (SIEM) platforms that... ....) Education Information Systems, Computer Science, or related engineering discipline.
- ...sensitivity and regulatory oversight. Cybersecurity is a strategic priority for the business. The Role The Chief Information Security Officer will lead enterprise-wide cybersecurity strategy, risk management, and compliance. This role will oversee security architecture...
- ~Be a part of a well-established financial services organisation in Jeddah ~Handle all matters related to information security architecture and engineering About Our Client Our client is a well-established financial services organisation in Jeddah. Job Description...
- ...technical requirements and scope for all technical and physical security systems to be delivered within the programme of work to ensure... ...and update the programme, and escalate any issues to the Engineering Manager Interface with other programs to ensure a high-level...
- # Hiring Network & Security Engineer for our CLient in Riyadh, KSA. hashtag # Fortinetsolutions ( FortiGate, FortiAnalyzer, FortiClient EMS, and FortiManager ) hashtag # Palo -Alto Networking ( Firewalls, Panorama ) hashtag # Required : • Experience...
- Security Systems Engineer Region: Riyadh A Security Systems Engineer with experience in installing, operating, and maintaining security systems, to work on current and future projects. Duties and Responsibilities: Installation, operation, and maintenance of security...
- ...Directors, and stakeholders, embedding technology solutions that are secure, resilient, and aligned with Faena’s vision of artistry and... ...while supporting operational excellence. Additional Information What’s in it for you... Lots of opportunity to progress...
- ...capitalization. Overview We are seeking an Information System Consultant to join the Computer... ...operations. This includes providing secure, efficient, and reliable computing... ...Computer Science, Information Technology, Engineering, or a closely related technical field...
- ...Job description / Role • Strong understanding of security principles, protocols, and best practices. • Proven ability to monitor and... ...Requirements • Bachelor's degree in Computer Science, Information Technology or related field would be ideal • 6+ years of experience...
- The Information Technology (“IT”) Instructors for a recently established Institute for Vocational and Technical Training in Riyadh, Saudi Arabia. The appointment is for an initial period of one year in Riyadh, Saudi Arabia with the possibility of extension. Applications...
- ...Job description / Role Role Purpose. The Application Security Tester is responsible for delivering high quality technology capabilities... ...requirements. Requirements • Bachelor degree in engineering information technology or related discipline. • Proven experience in a...
- ...Job description: - An information technology specialist is required to work for the company in Riyadh Requirements: For women only Bachelor's degree in accounting and information technology It is preferable to have experience or prior knowledge of...
- ...capitalization. Overview We are seeking a Geomatics/Geographic Information Systems Analyst to join our Geospatial and System Support... ...in Geomatics, Geographic Information Systems, Geospatial Engineering, Computer Science, Data Science preferable in geospatial data...
- ...Job Title: Cloud Security Architect Location: Riyadh, Kingdom of Saudi Arabia (Onsite... ...or Master’s degree in Computer Science, Information Security, or related field. ~10+ years... ...Security – Specialty ~ Azure Security Engineer Associate ~ Google Professional Cloud...
- ...congestion and enhancing connectivity across the city. Today, we are recruiting for a Test & Commissioning Engineer – FSCADA, Communication & Information Systems to join our team in Saudi Arabia. This is an excellent career opportunity for professionals looking to...
- ...Job Summary Lead cyber investigations for complex computer security incidents. Analyse a large volume of security data from a variety... ...of identifying suspicious and malicious activity. Present information using data visualization techniques. Review the current...
- ...+ Construction magazine. We are also ranked the 6th largest overall U.S. construction management firm by Engineering News-Record magazine . For more information on Hill, please visit our website at . General Description of Role and Responsibilities: Development...
- ...continues. Job Description Security is about anticipation, protection, and... ...Liaise with Front Office, Housekeeping, Engineering, and People & Culture to maintain a cohesive... ...and discretion when handling sensitive information. ~ Physically fit to meet the demands...
- ...organizing trainings, demos and presentations. Drive the Security Numbers for Cybersecurity in KSA. Be able to reach out... ...Preferably B.E/B.Tech in Computer Science, Electronics/Electrical Engineering or Information Systems or Diploma in Electronics / Electrical with...
- ...Job Summary Produce security solutions illustrating proposed changes to or implementation... .... Ensure that the business is kept informed of relevant security developments within... ...Management Information system /Information Technology / Telecommunications engineering.
- ...or session problems • Collaborate with application owners, IT security, and audit teams to enforce privileged access policies and compliance... ...as some world's leading organizations, in Telecommunication, Information Technology, Cyber Security, Banking, Energy, Utilities and...
- ...A Security Supervisor keeps constant vigilance of activity on and around the hotel property and reports, with documentation, incidents with the intent of improving the safety and security of Guests, Team Members, and others. What will I be doing? As a Security...
- ...Join us and become a Heartist ®. Job Description Train Security Officers in the operation of surveillance equipment, written... ...keeping, patrol and first aid procedures Disseminate all information by the Management to team members. Conduct patrols and regular...
- ...A Security Manager directs security personal to deliver a safe Guest and Member experience while coordinating with government and law enforcement and ensuring compliance with local safety legislation and emergency procedures. What will I be doing? As a Security...
- ...Work under the supervision of cyber security leadership within the Technology Consulting... ...skills B.A/ B.Sc. in Computer Engineering or related field. Experience in banking... ...certifications not specified) ~ Global: Certified Information Systems Security Professional (CISSP) -...
- ...Description We are seeking a dedicated and vigilant Security Guard to join our team. The successful candidate will be responsible for enforcing gate security protocols, and preventing unauthorized access. The ideal candidate should have a keen eye for detail, excellent...
- ...companies by market capitalization. Overview We are seeking a Security Investigator to join our Corporate Security Department (CSD).... ...briefings supported by detailed, evidential reports and information to Corporate and Executive Management, in addition to line management...
- ...to Amazon customers every day. To keep our operations network secure and assure operational continuity, we are looking for a hands-... ...incidents, and loss events. During your investigations, you collect information by monitoring systems and tools, analysing data reports, and...
