Search Results: 640 vacancies
...of board, size of board etc.)
iii) Check the auxiliary items for printing (e.i. Ink, varnish, blanket etc.)
iv) Explain the information on the work order required for printing to the subordinates.
v) Check if colour, text & size are approved before ensuing for printing...
...that includes Palo alto, CISCO, Fortigate , ISE/ASA and other Security Components
enforce security policies and procedures to mitigate... ...and established BCP practices for business continuity.
information security programs and technology projects
# Identify and communicate...
...securityposture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing aptcybersecurity
# Monitoring and safeguarding the log sources and security access
# Planning for disaster recovery in the event of any securitybreaches...
...Understanding of systems and technologies: The applicant must have strong knowledge of information management systems and office software used in the company.
Communication Skills: Ability to communicate effectively with team members and management to ensure smooth...
...Educational Qualifications: Bachelor's degree in computer science, information technology, or related field. Recognized certifications in... ...networks, operating systems, databases, and information security. These skills may include operating and maintaining various hardware...
...role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
Do
# Ensuring customer centricity by providing apt cybersecurity
# Monitoring and...
Security Officer
Responsibilities:
Patrol assigned areas to ensure the security and safety of premises, property, and personnel.
Monitor surveillance cameras and alarm systems to detect and respond to security threats or suspicious activities.
Conduct regular...
...Hold a bachelor's degree in a related field such as computer science, computer engineering, or information security.
Extensive knowledge of IT security concepts and the various techniques used to protect systems and data.
A deep understanding of potential information...
the conditions:
1- Obtaining a bachelor's degree or higher.
2- Educational specialization is required for teaching jobs.
3- The job applied for is suitable for the specialization.
4- Minimum two years of experience in the same field.
...Hold a bachelor's degree in architecture or a related field.
Deep knowledge of architectural and security systems design concepts and their applications in different environments.
Deep understanding of cybersecurity concepts and best practices for protecting systems...
Holds a high school diploma or equivalent.
Good physical strength and ability to work in harsh conditions.
Good communication skills.
Ability to deal with emergency situations effectively.
Compliance with security laws and regulations.
...Education and qualifications:
Bachelor's degree in computer science, information security, computer engineering, or related field.
Recognized cybersecurity certifications such as CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional...
...advertisements with legitimate postings. These ads can include contact instructions and require job seekers to send sensitive personal information or money to pay for visa applications, processing fees, etc., in exchange for consideration for a high-paying position.
KBR...
...Education and experience:
Bachelor's or Master's degree in computer science, information security, or related field.
At least 5-7 years of experience in application security or cybersecurity.
Technical knowledge:
Deep understanding of application and software...
...At least a high school diploma, preferably a graduate certificate in the field of security.
Knowledge of security procedures and techniques used in maintaining security and safety.
Ability to use surveillance systems and security technology, such as surveillance...
...Technical knowledge: Good understanding of information technologies and systems used in information management and databases.
Communication Skills: Ability to communicate effectively with team members and colleagues to exchange information and direct them properly....
University degree in geography, surveying, data science, or related field.
Deep knowledge of GIS technologies and software tools used such as ArcGIS, QGIS, etc.
The ability to analyze geographic data, analyze satellite images, and apply spatial analysis.
Excellent...
...University degree in a related field such as information technology, cybersecurity, security management, or a related field.
Deep knowledge of cybersecurity methods and best practices in the field of security.
A comprehensive understanding of network systems and...
...deal with emergency situations and take necessary actions quickly and effectively.
Compliance with laws and regulations related to security and safety.
Ability to use specialized security devices and technology, such as surveillance cameras and alarm systems....
...Minimum high school diploma; A university degree or professional training in security or business administration is preferred.
Strong knowledge of security concepts and principles, including preventative measures and emergency management.
Ability to analyze risks...