Get new jobs by email
- Portfolio Account manager security – Civil development page is loaded **Portfolio Account manager security – Civil development****Portfolio... ...and external stakeholders by: -Sharing general interest information on the customer (i.e. Customer strategy and structure, customer...
- A leading global technology provider is seeking a Portfolio Account Manager in Riyadh, Saudi Arabia. The role involves building account strategies to enhance customer relationships and ensure satisfaction. Candidates should have strong knowledge of the customer industry...
- ...Consultant _IT Security & Risk Management Job Title: Consultant IT Security & Risk Management Experience: Must have Big 4 experience About the Role Our client is seeking an experienced consultant in IT Security and Risk Management for a short-term remote...
- ...develop and execute territory strategies to grow existing business in the Eastern Region. Candidates should have at least 8 years of security industry sales experience and a Bachelor's Degree in Electrical/Computer Engineering or Computer Science. Strong communication...
- ...participating in industry events. The ideal candidate will have an engineering degree, strong problem-solving capabilities, and at least 5 years of relevant experience in a technological or security setting. Bilingual in Arabic and English is a requirement. #J-18808-Ljbffr...
- A tech platform company in Medina, Saudi Arabia, is seeking a Senior Site Reliability Engineer to design and manage production infrastructure using Kubernetes. The ideal candidate has over 8 years of experience in SRE/DevOps roles, with expertise in GitOps, cloud environments...
- A consulting firm is seeking an experienced Consultant in IT Security & Risk Management for a short-term remote engagement. The role will involve supporting risk management initiatives, performing security self-assessments, and creating analytics for stakeholders. Candidates...
- ...resilience through data backup, data recovery, data portability, data security, and data intelligence. Based in Seattle, Veeam protects over... ...protected by federal, state or local law. All your information will be kept confidential. Please note that any personal data...
- ...service providers, governments, and consumer brands the ability to securely deliver every app, anywhere—with confidence. We do this by... ...Region level, EMEA level and World Wide level, sharing this information with other Solutions Engineers and Solution architects operating...
- ...Ensure all staff is properly trained and have the tools and information needed to effectively carry out their job functions. Coordinate... ...) Alert management of potentially serious issues. of securing business for the hotel. A ccurately produce and/or review sales...
- ...reviews to assess the trustworthiness of the company. Remember, your personal and financial security is paramount, and taking preventive measures is crucial to safeguarding your information from potential risks and unauthorized use. SupportFinity is not responsible for any...
- ...enable everyone to accelerate the results that matter. By taking advantage of all structured and unstructured data — securing and protecting private information more effectively — Elastic’s complete, cloud-based solutions for search, security, and observability help...
- ...architectures aligned with customer business objectives, IT landscape, security, and compliance requirements. Prepare technical and... ...~ Bachelor’s degree in Engineering, Computer Science, Information Systems, or related field. ~10+ years of experience in SAP consulting...
- ...newcomers to the space. Kraken is committed to industry-leading security, crypto education, and world-class client support through our... ...Please note, applicants are permitted to redact or remove information on their resume that identifies age, date of birth, or dates of...
- ...and expectations will be established, with compensation reflecting the level of availability required. Secure handling of sensitive personal and financial information is paramount. Compensation Structure: Competitive salary based on experience and responsibilities...
- ...world, managing 25 million enterprise identities and providing secure, convenient access to millions of users. RSAspecializes in... ...something that truly matters, come join our winning team! For more information, go to rsa.com. Assist in creating and implementing...
- ...large businesses across the region of operation. # Continuously secure new business opportunities to meet and exceed monthly/annual... ...in using CRM and ERP systems for tracking sales and customer information. # Strong strategic thinking and market analysis skills. #...
- ..., and crypto businesses to combat illicit activity and global security threats. At TRM, you'll join a mission-driven, fast-paced team... ...application, you are agreeing to allow TRM to process your personal information in accordance with the TRM Privacy Policy. Learn More:...
- ...UK, Immersive Labs has progressed to the global stage and has secured over €170 million of funding. “The speed at which Immersive Labs... ...for doing great work and living our values and behaviours Informal or formal flexible working options, e.g. flexible start and finish...
- ...Maintain confidentiality of sensitive customer and company information Qualifications Required: ~ High school diploma or equivalent... ...of the company. Remember, your personal and financial security is paramount, and taking preventive measures is crucial to safeguarding...
- ...Mandarin, or Hindi. Familiarity with data privacy and enterprise security reviews common across APAC, for example Singapore PDPA, Japan... ..., disability status, pregnancy, parental status, genetic information, political affiliation, or any other status protected by the laws...
- ...capabilities, systems, services, and network: broadband, unique WiFi security Cisco IP Phones, Call Manager, Worksmart call screen,... ...returning to your location and actively training your team with the information. Report regularly and honestly to your Manager....
- ...Containerization Platform Education: Bachelor’s Degree in Information Technology, Computer Science, Software Engineering, or related... ...containerized environments Experience implementing security best practices for containers, including image security, network...
- ...other potential voice system, ensuring seamless connectivity, security, and performance across all environments in addition to other... ...Bachelor's degree in Computer Engineering, Network Engineering, or Information Technology . Minimum 3–5 years of hands-on experience in...
- ...Monitoring Specialist Education: Diploma or Bachelor’s degree in Information Technology, Computer Science, Network Engineering, or related... .... Strong communication skills for coordinating with security, system administration, application, and IT support teams....
- ...Support & Account Growth** + Partner with Sales to identify and secure new business, leveraging deep market insights and executive... ...age 40 and over, color, disability, gender identity, genetic information, military or veteran status, national origin, race, religion,...
- ...cloud, self-hosted, hybrid, and data residency needs. Run security and compliance threads common in APAC. Prepare crisp responses... ...status, disability status, pregnancy, parental status, genetic information, political affiliation, or any other status protected by the laws...
- ...servers. The ideal candidate should possess a Bachelor's degree in Information Technology and 3–5 years of hands-on experience with Windows... ...involves performing OS patching, ensuring compliance with security best practices, and managing user accounts and policies. #J-18...
- ...necessary when clarifying instructions or requesting additional information. Your coordination efforts will help maintain transparency and... ...of the company. Remember, your personal and financial security is paramount, and taking preventive measures is crucial to safeguarding...
- ...Education Bachelor’s Degree in Information Technology, Computer Science, or related field Experience 3–5 years of hands-on experience... ...Knowledge of user/group account management , policies, and security controls Understanding of NCA, NIC, and cybersecurity...
